Professional Documents
Culture Documents
Introduction to
Computer
final Module
May /2022
Introduction To Computer
Contents
1.0 Aims and Objectives
1.1 Introduction
1.2 Data
1.3 Source of Information
1.3.1 The value of information
1.3.2 Characteristics of valuable information
1.4 What is Technology?
1.5 Components of IT
1.5.1 Computers
1.5.2 Communication networks
1.5.3 Know How
1.6 History of Computers
1.6.1Abacus
1.6.2 Napier’s logs and bones:
1.6.3 Slide rule
1.6.4 Calculating machines and Pascal’s calculator:
1.6.5 Babbage difference and analytical engines
1.7 Generations of Computers
1.7.1 First Generation (1940-1956): Vacuum Tubes
1.7.2 Second Generation Computers (1956-1963): Transistors
1.7.3 Third Generation Computers (1964 - early 1970s):
1.7.4 Fourth Generation Computers (Early 1970s – till date):
1.7.5 Fifth Generation Computers (Present and beyond):
1.8 Types of Computer
1.8.1 Microcomputers
1.8.2 Mini Computers
1.8.3 Mainframe Computers
1.8.4 Supercomputer
1.9 Importance of Computers in Business
1.10 Computer Applications
1.10.1 Business Applications
1.10.2 On-Line Applications
1.10.3 Real-Time Applications
After successfully completing this unit, the learner should able to:
Understand History of Computers
Identify Generations of Computers
Describe Types of Computer
Understand Importance of Computersin Business
Point out Computer Applications
Introduction To Computer
1.1 INTRODUCTION
Dear learner! We collect and use information in one way or the other in our daily life
What is information?
Dear learner! Information: is collection of meaningful facts and figures that can be
used as a base for guidance and decision making.
Dear learner! When it is said that information serves as a base for guidance; it means
information guides the activities of individuals; business organizations or societies. It is
on basis of relevant information that we make decisions. For example you don’t go to
school for registration unless you have information that registration is scheduled for
specific date or you don’t iron your shirt if you don’t have the information it is washed.
1.2 DATA
Dear learner! The word data is the plural form of datum. However it is become standard
practice to treat the word data as singular rather than plural. Data means any collection of
raw hand figures and facts that represents features, or details about peoples, objects,
places, ideas, events, and etc. data can represent small items so small that individual
items have no meaning on their own. For example black hair, 100km, red bull, tall
building, dense forest, etc are representation of data and are known as data elements or
data items. In short data is the raw material for information. Data may be numerical such
as payroll, employee Number, etc. or non-numerical like Student names, Product names,
etc
ACTIVITY
Dear learner! Differentiate data and information
-------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------
Introduction To Computer
Dear learner! Below are given the difference of data and information and please
compare it with your attempts.
Information can be obtain from different sources .In general the various source
information are classified in to two major categories 1.documentary sources and 2.
non documentary sources
Technology refers to all the means people use their inventions, and discoveries to satisfy
their needs and desires .also science and technology are complementary, they are not the
same science attempts to why and how things happen. Technology is concerning with
making developments. Also it can be defined as uses computers to gather, process, store,
protect, and transfer information. Today, it is common to use the term Information and
communications technology (ICT) because it is unimaginable to work on a computer
which is not connected to the network .Information Technology (IT in short) is the
use of modern technology to aid the capture, processing, storage and retrieval, and
communication of information, whether in the form of numerical data, text, sound or
Introduction To Computer
image.In this definition, the phrase: modern technology: is used to exclude the traditional
methods of information handling using simple tools such as pencil and paper.
1.5 COMPONENTS OF IT
1.5.1 COMPUTERS
In simplest terms, a computer is a machine that can be instructed to accept Process, store ,
and present information The computer has become a part of The day-to-day existence of
people around the globe. It is difficult to think of any field that does not involve or is not
affected by the rapidly advancing computer technology.
In the early days of mankind, man used to count the head of cattle by putting lines on
trees. Slowly these lines changed to numbers. To do calculation on numbers he started
inventing machines.
1.6.1Abacus
In 5000 B.C an early manual calculating device was Abacus. It was probably the earliest
of counting devices consists of rectangular wooden frame with two compartments and
beads sliding along the steel wires for counting. Multiplication and divisions are done
using repeated additions and subtractions. Even today in which cross strings are fixed.
Beads are inserted on to the strings. There are a number of rows of beads.
1.6.2 Napier’s logs and bones:
John Napier, a Scottish mathematician invented logarithms. The use of logarithms
enabled him to transform multiplications and division problems of addition and
subtractions. In the beginning he called logarithms as artificial numbers. But later he
named them logarithms. Napier also invented a computing device consisting of sticks
with numbers carved on them. These sticks are called bones as they were made of bones.
These bones helped a lot in multiplication involving large numbers.
1.6.3 Slide rule
As the name indicates, the slide rule has one scale sliding within the other. Suppose you
want to add two numbers 3 and 5, set 3 on the fixed scale and slide the moving scale. So
that its “0’ coincides with”5” of sliding scale. This is the sum of 3 and 5. The process of
reading could be quick if you are trained in the use of slide rule.
wanted to make his job easier by inventing a calculator. You might be familiar with gear
wheels in use in your bicycle which meshes with a driving chain. He used similar gear
wheels with ten teeth for each digit position. He fixed them together so that one wheel
drives the other. When the wheel corresponding to units position rotated by ten teeth, it
drove the wheel corresponding to the next higher position by one tooth. Thus one could
make calculations. Pascal provided dials, which indicated numbers stored on each wheel.
He also used suitable “dialling system” to operate the
gear wheels. Other people also made a number of such calculators. Computer scientists
honoured Pascal by naming a programming language Pascal after him.
Babbage, a British National and the son of a wealthy banker wanted to correct the errors
in the logarithm tables being used during his time. In 1822, he made a machine which
calculated the successive difference of expressions (X2 + ax + b is an example of an
expression) and prepared table which helped him in his calculations. The royal
Astronomical society awarded a gold medal to him for his invention and granted a large
sum of money to carry out further work. He wanted to make an accurate calculating
machine called “Babbage’s Analytical Engine”. The analytical Engine was supposed to
be very accurate. So it needed lot of parts made with precision. Babbage could not make
such parts. He conceived that his machine would use input devices, would have a
processing part called “mill” where you can perform calculations, would also incorporate
It consists of rectangular frame in which cross strings are fixed. Beads are inserted on to
the strings. There are a number of rows of beads .Since he was about 100 years ahead in
his ideas, he could not get parts needed for his machine. This is because there were no
tools to make such precision parts. He did lot of work related to making precision parts
and spend all the grants (and lot of his money too) but failed in his attempt to make a
machine. He ultimately died as a frustrated man.
First generation computers were vacuum tube / thermionic valves-based machines. These
computers used vacuum tubes for circuitry and magnetic drums for memory. A magnetic
drum is a metal cylinder coated with magnetic iron-oxide material on which data and
programs can be stored. Input was based on punched cards and paper tape, and output
was displayed on printouts. First generation computers relied on binary-coded language
(language of 0s and 1s) to perform operations and were able to solve only one problem at
a time. Each machine was fed with different binary codes and hence were difficult to
program. This resulted in lack of versatility and speed. In addition, to run on different
types of computers, instructions must be rewritten or recompiled. In 1947 john Mauchly
and Eckart completed the first large scale Electronic Digital Computer, ENIAC. In this
computer, each time a program was changed, the wiring had to be completely rearranged.
It weighed 30 tons, contained 18,000 vacuum tubes and occupied a space of 30 50 feet.
Maurice V.Wilkes of CambridgeUniversity completed EDSAC in 1949. EDSAC was the
first computer to operate on the stored program concept.
In the sixties, there was lot of development in semiconductor field - a field of materials.
In vacuum tubes, a filament is heated to emit electrons,(the basic component of an
atom)that carry current. In 1946,Willam Shockley and a few of his colleagues invented
transistors, which do not need any heating to liberate electrons in addition to being
smaller in size, they saved power due to the absence of heating and hence the cooling
needed. the smaller size resulted in smaller distances that the electrons have to travel to
transmit information from one part of the computer to another. Hence calculations
became faster. Magnetic core storage and the reliability also increased. Today you
cannot see any second generation computers. The smaller size of components saw mass
production of computers which became cheaper. Many companies started buying and
using them increasing the demand. Computer programming languages developed further
to make programming easier and user friendly. yet if you compare today’s computers,
they were a lot behind. The increased use of computers and the consequent mass
production sent the prices crashing down. Computer scientists and electronic engineers
were developing more sophisticated computers.
not separate. They were fused into the circuits. People called it large scale integrated
circuits (LSI). Computers using such components were called third generation computers.
Since components were packed together more densely, the size of computers became
smaller. Programmers also developed more sophisticated software. Improved secondary
storage device, new input and out put devices(visual display magnetic ink reader, and
high speed printers) was discovered.
1.7.4 Fourth Generation Computers (Early 1970s – till date): Micro processors
More and more circuits were packed in a microprocessor. The components were
integrated further and very large scale integration (VLSI) technology revolutionized
computer field further. Intel Corporation made chips such as 8080 and 8086 to be
followed by 80286, 80386, 80486 and now the Pentium processor. These chips perform
calculations faster. They are not only used in computers, but also in measuring devices
and even in house hold devices such as washing machines.
Computers using such VLSI chips progressively shrunk in size. Computers using the
microprocessors are termed as microcomputers. The software technology also developed
further. Programmers developed more sophisticated and user friendly software. In course
Introduction To Computer
of time, the cost of these computers have come down so much that even individuals
bought them so they came to be known as personal computers.
Parallel Processing:
Most computers today access and execute only one instruction at a time. This is called
serial processing. However, a computer using parallel processing accesses several
instructions at once and works on them at the same time through use of multiple central
processing units.
Introduction To Computer
Different types of computers are used in different organization and offices based on the
individual and organization needs. In general computers can be categorized in four types
based on their processing speed, power, cost and size. These are Microcomputers,
minicomputers, mainframe computers and supercomputers.
1.8.1 Microcomputers
Microcomputers (often called personal computers or pcs in short) are smallest but most
important and most frequently used category of computer for end users. They are
relatively small and compact in size and identified by their brand names :IBM, APPLE
,COMPAQ DELL, HAWLET PACKARD(HP),NEC ,ZENITH, TOSHIBA etc. basically
they can be grouped in to three :laptop, palmtop, and desktop Laptop computers
Small versions of microcomputers about the size of a brief case designed for portability.
Unlike desktop pcs that have mostly detachable components laptops include all their
components (except printer) in single unit. They It has high capacity and processing
speeds as the desktop pcs. They are used in the home, in conference places, and other
areas.
Palmtop computers
Palmtop computer is smallest microcomputers that about the same size in pocket
calculator.
Most portable
Is growing popularity among the latest entries in the microcomputer companies
Used for limited numbers of functions
Desktop computers
Desktop computers are most widely used type of personal computers. Unlike laptop
and palmtop computers desktop computer have detachable parts. It is larger than the other
Introduction To Computer
types of pcs. Not easily portable. It needs table on which the computer can be placed for
convenient operation.
Dear learner! Main frame computers are designed to handle the information processing
needs of organizations with many employees and customers or with complex
computational problem. Used by the organizations those have enormous and complex
data assignments. Such government can be government agencies like Ethiopian central
statistics authority, large bank, hospital, Airlines, industrial and manufacturing
organization. For example AAU since 1980s has been using mainframe computer.
1.8.4 SUPERCOMPUTER
Extremely powerful computer designed for high speed processing .
Characterised as being the fastest,
Most powerful
Most expensive
Requires highly trained data processing professionals to operate computers
It Can take inputs from over 10,000 individual computers and users at the same
time.
Research institution, military defence system, national weather forecasting
agencies, large corporations, aircraft manufacturers ,etc largely use
supercomputers.
1.9 IMPORTANCE OF COMPUTERS IN BUSINESS
Introduction To Computer
To provide security to data and important computer programs, almost every organisation
has some security programs to avoid the illegal access of the company’s information by
unauthorized persons. The three fundamental attributor of a security program are
confidentially, integrity and availability which allow access to only authorized persons in
an organization.
7. Cost Benefits
The extensive availability of internet based information means that companies have a
wider choice of suppliers which leads to a more competitive pricing. Due to the presence
of internet the role of the middleman becomes less important as companies can sell their
product or services directly to the customer.
8. Marketing
Corporates engaged in e-business can take help of their respective websites to create
brand awareness of their products, thus, creating new avenues of promotion of their
products. In addition, companies’ websites can also provide better services such as after
sales service to the customer.
1.10 COMPUTER APPLICATIONS
Computer plays a very important role in each and every aspect of our life, be it banking,
insurance or transportation, it is useful for preparing payroll of the employees,
maintenance of optimum inventory level, sales order processing, reservation of tickets
etc. It processes the transactions very quickly and accurately. So, it finds applications in
various stages of business
1. Computer is useful in business processes like payroll processing for generating
statements useful for various departments like provident office, ESI etc.
2. It is useful for inventory control activities such as maintaining optimum inventory
level and re-order level.
3. Online applications in banking and reservation have brought about advantages
like saving of time and money.
4. Car manufacturing industries and other production functions use real time
applications effectively.
1.11 BUSINESS APPLICATIONS
The following are some of the areas of business in which computers are applied:
Introduction To Computer
1. Payroll Processing:
Business means selling goods and services. To carry out such activities, business
management employs people. They have to be paid monthly salaries and the details
regarding pay particulars of employees have to be kept track.
Business community employs computers for such payroll applications and runs a
program consisting of a number of smaller programs or modules. Each module performs
a particular function of the payroll. Sometimes we call this set of programs as payroll
system. To calculate the pay of an employee, management normally uses the following
details of employees.
(1) Employee number (This is a unique number assigned to the employee to identify
him just as your roll number in the school)
(2) Name, (3) Basic pay, (4) Allowances (House rent allowance and other allowances),
(5) deductions (Example Provident Fund deduction) and (6) Bank account number.
These details above the employees do not change but they have to be used every month.
So they are entered into a file in a computer storage medium and permanently stored.
This file goes with the name master file. The file creation module of the payroll system
creates this file once. Before calculation of the pay of employees every month, some
figures in the master need changes. For example, if an employee completes a year of
service, he normally gets an increment. Such figures are updated using the master update
module of the payroll system.
After updating, another module of the payroll system reads details from master file and
calculates net pay. The program also prints out pay slip for each employee to be handed
over to him. A pay slip shows the employee number, name, basic pay, various
allowances, various deductions and net pay. The payroll system also generates a number
of statements. It prints out the statement showing employee number, name, bank account
number and net pay. This statement is sent to the bank, which transfers the net pay from
the company’s account to the individual employee’s account in the bank. Some
companies copy this statement on to a floppy and send to the bank Which processes this
statement on its computer. The payroll system generates a provident fund deduction
statement. This statement shows the employee numbers, names and amount deducted.
Another statement showing the names, employee numbers and tax deducted is printed.
The company sends it to Income Tax office. Thus we see that a number of statements can
be printed from the same master file.
Introduction To Computer
2 Inventory Control:
The second application is the use of computers to keep track of the purchase and issues of
parts and raw materials needed in an organization. These parts and raw materials are
called inventories and the set of programs used to keep track of the purchase and issue of
these inventories constitute the inventory control system.
In business, a particularly quantity of each item or raw material has to be stocked. Too
less a stock would result in non-availability of these items, when the manufacturing
activity needs it. Too much of stock of these means, more money in terms of investment
in buying the excess stock. Business pays interest on money invested, and the excess
interest paid on cost of excess stock is a loss to business. So the business maintains an
optimum quantity of material. The inventory control system maintains a file with part
number, name, quantity on stock a level of stock at which the company orders for fresh
quantity (called reorder level) and the suppliers’ addresses. This file is the inventory
master. When an item is issued, the inventory update program updates the inventory
master reducing the stock by the quantity issued. If the resultant stock falls below the
reorder level, the inventory control program prints out an order to the supplier of the item
automatically. It can be mailed to the supplier. When the supplier supplies the item, the
inventory control program updates the stock on hand.
The inventory control system keeps track of the supplies and issues. So, it can tell the
management of the company the usage of these items over a period of time quickly. It
also maintains an optimum level of stock of these items.
2. Sales Order Processing
Real –time systems offer the possibility of a greatly prompt service to the customer. His
order can be processed within virtually no time. The finished goods inventory file may
have data terminals throughout the sales territory. So much that the CRT’s can be made
to display the invoice on a terminal for the salesman who is in the customer’s plant and
can input the particulars there and then! The customer would be made immediately in the
general ledge. The invoice can also be posted to the accounts receivable file
instantaneously. The selection of warehouse that is closest to the customer can also be
made and a copy of the invoice could be displayed at the warehouse terminals. Beside,
the following functions can be performed rapidly.
The inquiries about the customer’s accounts status can be answered by the salesman.
Credit appraisal can be carried out on-line.
Introduction To Computer
Sales analysis master file can be updated online. This file provides a ready
Information to the sales manager regarding sales trends, etc.,
Inventory replenishment order can be determined as a part of the sales order
processing.
ACTIVITY
List out any two application of computers in business
1. Banking:
In banks the customers, present cheques for withdrawing money. The clerk verifies from
the register the signature of the customer. (The customer has signed in the application
form while opening an account). Then he checks from a ledger the customer’s balance. If
the customer has sufficient balance to cover the cheque amount, the clerk passes the
cheque for payment, and updates the balance. There are a number of operations that the
bank carries out of which the above is an example. We will see how the above operation
called personal banking is computerized. Suppose you want to open a bank account. The
bank official hands over a form to you. You fill up the details (such as name, address,
profession etc.) and sign the application. The bank stores this information in a computer
on which a banking software runs. The customer’s signature is scanned by suitable
devices and incorporated in the computer file. If you present a cheque to the clerk in the
bank, he can check the signature manually. If he is satisfied with the correctness, he can
enter your account number and the cheque amount into the computer which checks your
account and updates the amount. The clerk then pays you the money. In the method, the
payment is manual and accounting is automatic. There is another way where the checking
of you accounts as well as payment is made by computer using an automatic teller
machine. Let us study this. A machine similar to automatic coffee vending machine is
installed at selected places. It is connected to the bank’s computer. When you open an
account, the bank gives you a special type of card. Your name, account number and
address are suitably recorded. Your signature is magnetically recorded in that card. All
Introduction To Computer
these details are suitably converted and recorded in the computer also. When you want to
withdraw money, you go to the teller counter and press a few buttons. You then insert
your card in the slot provided in the machine. The machine reads your account number
and signature from the card. It sends them to the computer which checks your account
number and signature. If they tally, the computer sends a relevant message to the
automatic teller machine. It asks you to enter the amount. You may enter the amount
through the buttons on the machine. Again the computer checks if you have sufficient
balance. If so, it instructs the machine to pay you. The ATM then delivers the cash on the
tray fixed in it. You may collect the money.
This is only one example of application of computer in banks. Now large systems
installed at the head office of a particular bank are connected to systems installed at its
branches all over the country. The computers of different banks are also connected
together. By sending suitable messages money can be transferred from one bank to the
other. This is called Electronics Funds Transfer.
1. Railway Reservation System:
Application of computers in railway reservation has made tremendous impact in different
countries. For example in India. Now let us study how the computerized railway
reservation system works. There is a central computer with a number of terminals
connected to it the details of all trains for which reservation is done at the region are
stored in the computer. The railway reservation system runs on this computer. The
terminals are situated in booking counters. It is possible to install the terminals in a far off
place and connect them to the computer through cables. When the passenger presents the
reservation form to the booking clerk he enters the train number, date, name, age and
other details of the passenger. The program checks availability of seats in that particular
train on that particular date. If accommodation is available, the clerk presses a button on
the key board and the computer prints out the ticket on the printer connected to the
terminal. It also updates the computer file to reflect the new reservation position. Suppose
you wanted the ticket for train number 1, but you get only a waiting list. The clerk tells
you your position in the waiting list. If you want you can get a wait listed ticket. If not,
you tell the clerk to check for accommodation in a different train to your destination. The
clerk only has to re-enter the train number.
The computer checks availability, reserves you ticket on that train if a seat is
available and prints the ticket. Thus you can go to any booking counter and request for
Introduction To Computer
reservation in any train being operated on that station. Also the errors found in the
manual reservation method are eliminated. The reservation system is broader based as
follows: Today computers in different cities are connected together. (It is called
networking .The reservation data for a number of trains over a period of time is available.
By suitable software, the railway authorities can prepare the data regarding passengers
travelling in different trains to different places during different periods. This helps them
plan for new trains, reschedule the running trains and make lot of analysis regarding
passenger traffic.
2. Air Lines Reservation System:
We saw how computers handle the railway reservation and offer a number of advantages.
They can be used also in Airlines reservation. Only difference will be that some booking
counters in the reservation network may be situated in different countries. This means
that we have to connect computers across the countries. Such networks are operational
now. In the coming years, computerized reservation systems will become very common.
Even hotel accommodation reservation systems for major hotels are coming up. If we
integrate flight and hotel reservation, it is convenient for the passengers.
1.13 REAL-TIME APPLICATIONS
In real time applications, computers control an on-going activity. Let us consider the
example of a manufacturing process. A product C is made from raw materials A and B.
The quality of C depends upon, among other things, the quality of A and B and their
quantities. In big manufacturing processes, raw materials are fed by machineries. Due to
problems in machineries, the performances may vary from machine to machine. This
affects the quality of final product. Manual inspection of quality and operation of these
machineries to control the quantity are slow. This slows the manufacture of C from raw
materials A and B. Signals from Care fed to the computer. Suitable sensors are installed
in the lines carrying raw materials as well as finished product. These generate signals.
The values of these signals for correct proportion of
raw materials are stored in the computer. When the process is on signals keep coming
from the output line depending up the quality of finished product. Let us see what
happens if either A or B varies in quality. The quality of the finished product also suffers.
The sensor in the finished product line senses this. The signals generated
Introduction To Computer
by it change in strength. They are sent to the computer. It compares the signals with
already stored signals. The difference is used to change the quantity of raw materials A
and B. Manual control of this process is slow. Moreover, if people inspect quality and
operate machineries feeding raw materials, they become tired after sometime. But
computer does not. So the quality of product is uniform. Moreover, there may be
processes where the presence of human beings continuously for hours together will be
injurious to their health. In such places computer control avoids such ill-effects.
ACTIVITY
1. Explain in detail about the application of computers in business.
2. Explain in detail about on-line applications.
3. Write short notes on Real-Time Applications.
Contents
2.0 Aims and Objectives
2.1 Introduction
2.2 Computer Hardware
2.2.1 The Computer Physical Setup:
2.2.2 The Computer Case
2.2.3 Expansion Slots and Cards
2.2.4 Power Supplies
2.3 Operational Setup of Computer:
2.3.1 Central Processing Unit (CPU):
2.4 Input Devices:
2.4.1 Keyboard:
2.4.2 Pointing Devices:
2.4.3 Speech Recognition:
2.4.4 Digital Camera:
2.4.5 Scanner:
2.5 Output Devices:
2.5.1 Monitors:
Introduction To Computer
After successfully completing this unit, the learner should able to:
Understand ad identify computer hardware and software
Describe Relationship between Software and Hardware:
Identify Factors that affect the processing speed of a computer
2.1 INTRODUCTION
A. Data
Introduction To Computer
Dear learner! Data are raw facts which the computer can manipulate and process into
information that is useful to people. Computer data is digital, or in the form of digits or
numbers.Data may be simple numbers for mathematical calculations, text such as names
and addresses or more complex structures such as pictures or drawings. The instructions
that make up the program define what data is tobe processed, in what form and at what
time. The computer reads and stores all data as numbers.
Data can be semi information that need to be processed more and generates complete
information.
Information is the output of the computer that can be used by human beings to do some
decisions.
B. Users
The users are the people operating the computers.
C. Hardware
The term hardware embraces the physical components of the system that you can touch
and fill:
1 The box which contains the printed circuit boards, power supply, etc.
2 The display screen, keyboard and mouse for user interaction.
3 The peripheral devices such as disks and printers.
Dear learner! The internal electronic circuits of modern computers are made up from a
number of integrated circuit chips and other components. An integrated circuit chip is a
small packaged device a few centimeters square which contains complex electronic
circuits. The heart of the modern computer is the microprocessor which is an integrated
circuit chip containing the central processing unit (the basic control and processing
circuits) of a small computer system. A complete microcomputer system contains a
microprocessor plus memory, input/output devices, power supplies, etc. However, before
the computer hardware can perform a task (for example add numbers or read a character
from a keyboard), it requires a program to tell it what to do.
C. Software
Introduction To Computer
Dear learner! Software comprises the programs that tell the hardware what to do. A
program is a sequence of instructions stored in the memory of the computer system. The
central processing unit fetches an instruction, decodes it and then executes the required
operation (e.g. to add two numbers). When an instruction has been executed the next
instruction is fetched, decoded and executed, etc. A program may be very simple, for
example, to calculate the average of ten numbers, or very complex, as would be required
to draw a television quality picture on a display screen.
Dear learner! Computer hardware is one component of computer system whichis the
physical components of the computer. It is the part of the computer or any accessory
attached to the computer called “peripheral” which you can touch or feel. The computer
case, monitor, keyboard, mouse, printer, modem and scanner all constitute hardware.
cards, etc. Expansion cards are inserted into expansion slots in the motherboard (a board
into which most of the basic components of the computer are built).
i) PCI (Peripheral Component Interconnect) is a local bus system that allows devices to
be inserted quickly and easily (plug–and–play compatible). Most of the computers today
come with PCI slots and cards.
ii) AGP (AcceleratedGraphicsPort) is a new platform bus specification that enables high
performance graphics capabilities, especially 3D graphical display applications.
iii) USB (Universal Serial Bus) defines a class of hardware that makes it easy to add
serial devices to your computer. It provides an instant, no-hassle way to connect a new
digital joystick, a scanner, a set of digital speakers, a digital camera or a PC telephone to
their computer. To install a USB device, plug the cord from the device into
any USBPort on your computer.
Dear learner! Power supply converts normal household electricity, alternating current
(AC), into electricity that can be used by the computer, direct current (DC). It also
lowers the voltage level. In Ethiopia, the normal household voltage is 220V/50Hz AC.
The capacity of a power supply is measured in watts (W). A power supply of 150–200 W
is large enough for most computers.
Storage Unit
Secondary Storage
Indicates flow of
Control Unit instructions and
data
• Arithmetic and Logic Unit (ALU) – this is the part of the CPU that executes the
computer's commands by doing arithmetic or the logical comparisons. The data
and instructions, stored in the primary storage prior to processing are transferred as
and when needed to the ALU, where processing takes place. Intermediate results
generated in the ALU are temporarily transferred back to the primary storage until
needed at a later time. Data may thus move from primary storage to ALU and back
again to storage many times before the processing is over.
Introduction To Computer
• Control Unit (CU) - directs the operation of the entire system. It obtains
instructions from the program stored in main memory, interprets the instructions,
and issues signals that cause other units of the system to execute them. It acts as a
central nervous system for the other components of the computer system.
• Registers – The registers are special purpose, high speed temporary memory units.
They hold various types of information such as data, instructions, addresses and the
intermediate results of calculations. Essentially they hold the information that the
CPU is currently working on. Registers can be thought of as CPU’s working
memory. The important registers within CPU are Program Counter, Instruction
Register, Accumulator, Memory Address Register, Memory Buffer Register and
Data Register.
2.4.1 Keyboard: Keyboard is the standard input device. Using a keyboard, the user can
type text and execute commands. Keyboard is designed to resemble a regular typewriter
with a few additional keys. Data is entered into computer by simply pressing various
keys. The number of keys in a typical keyboard varies from 82 keys to 108 keys. The
keys are arranged as follows:
b. Numeric keypad – found at the right side of the keyboard, it is used for
entering numbers and moving the pointer.
c. Function keys – these are the twelve function keys, F1 – F12, at the first row of
the keyboard. They may be programmed to perform different tasks.
e. Cursor movement keys – found between the alphanumeric keys and numeric
keypad, they are used to move the cursor.
2.4.2 Pointing Devices: A pointing device is used to communicate with the computer by
pointing to location on the monitor screen. Such devices do not require keying of
characters, instead the user can move a cursor on the screen and perform move, click or
drag operations.
ons. Some of the commonly used pointing devices are mouse, trackball,
joystick, light pen and touch screen.
i) Mouse: Mouse is a small hand held pointing device. Usually a mouse contains two or
three buttons for left clicking, right clicking and for scroll
scrolling.
ing. The mouse may be
classified as a mechanical mouse or an optical mouse, based o the technology it uses.
A mechanical mouse uses a rubber ball at the bottom surface, which rotates as the
mouse is moved along a flat surface to move the cursor. An optical mouse uses a
light beam instead of a rotating ball to move the cursor. Some of the common mouse
actions are pointing, click, Right
Right-click, Double-click, Drag and drop.
ii) Trackball – issimilar
similar to a mouse except the ball is
on top where it can be moved with the thumb.
iv) Touch screen – is a type of display screen device that is placed on the computer
monitor in order to allow the direct selection or activation of the computer when
somebody touches the screen.
v) Integrated pointing device – is a small joystick built into the keyboard.
You can move it in the direction that you want to move the pointer.
2.4.3 Speech Recognition: Speech recognition is the technology by which sounds, words
or phrases spoken by humans are converted into digital signals, and these signals are
transformed into coding patterns where the meaning has been assigned. It is more
generally called as sound recognition.
Introduction To Computer
2.4.4 Digital Camera: Digital camera stores images digitally rather than recording them
on a film. Once a picture has been taken, it can be downloaded to a computer system and
then manipulated with an image editing software and printed.
2.4.5 Scanner: A scanner is a device that scans an image and transforms the image into
ASCII code. These images can be edited, manipulated, combined and printed. The
common types of scanners are hand held scanners and flatbed scanner.
Other devices like devices for hand- include pens, and game controllers;
optical input devices- include bar code readers; audio devices- include microphones
also used as input device.
2.5 Output Devices:
Dear learner! Output devices are peripheral devices through which processed data is
made available for humans. An output device is an electromechanical device, which
converts machine readable data or the information into human readable form. The
computer output generated by output devices is of two forms: Hard copy and soft copy.
The printed form of output is referred as hard copy while the form of output which is
shown on a display screen or is in audio or voice form is referred as soft copy.
Based on the hard copy and soft copy outputs, the output devices are classified into tow
types: Hard copy output devices and soft copy output devices. Among the most
extensively used output devices are Video adapter cards, monitors and printers.
Output Devices
2.5.1 Monitors:
Dear learner! The monitor displays the output of the computer. Monitors are categorized
by the colors they produce and by the technology they use.
• Cathode ray tube (CRT) – in these monitors, electrons are fired at phosphor dots
on the screen. The dots are grouped into picture elements called pixels, which
glow when struck by electrons. In color CRT monitors, each pixel contains a red,
green and blue dot. These glow at varying intensities to produce color images.
• Liquid Crystal Display (LCD) – these screens use an entirely different technique.
The screen is still made of dots but is quite flat. LCD displays are made of two
layers of a polarizing material with a liquid crystal solution in between. An
electrical signal makes the crystals line up in a way that keeps light from going
through entirely or just partly. A black screen has all the crystals lined up so that no
light gets through. A color LCD screen uses groups of 3 color cells instead of 3
phosphor dots. The signal for a picture cleverly lets just the right spots show their
colors. Your eye does the rest.
o VGA (Video Graphics Array) monitors have resolution of 640 X 480 pixels.
Introduction To Computer
o SVGA (Super VGA) monitors have resolutions ranging from 800 X 600 pixels
to 1024 X 768 pixels or more.
• Refresh rate – indicates how often the picture is redrawn on the monitor. If the
rate is low, the picture will appear to flicker. Flicker is not only annoying but also
causes eye strain and nausea. So, a high refresh rate is desirable. 60 times per
second is tolerable at low resolutions for most people. 75 times per second or more
is better and is necessary for high resolutions.
• Dot pitch – is the distance between phosphor dots that make up a single pixel. A
dot pitch of .28 is very common and .26 should be good for nearly all purposes,
however it is measured.
When the same image is displayed on a monitor for a long time, it leaves a
“shadow” or “screen burn”. To avoid this effect, “screen saver” program that
blanks out the monitor or displays a moving image or text when not in use for a
prolonged time, is used.
2.5.2 Video Adapter Cards: Video adapter cards convert information from the CPU
into a format used by the monitor and the monitor displays the information sent to it by
the video adapter card. The video adapter card can be built into the motherboard but, in
most cases, it is installed as an expansion card.
Video adapter and monitor standards ensure that your video adapter card and monitor are
compatible with all popular programs and operating systems. The following standards
exist at the moment.
VGA (Video Graphics Array), which is suitable for low–budget home and business
applications. It has a resolution of 640 X 480 pixels.
SVGA (Super VGA), which is ideal for business applications, has greater resolution
(800 X 600 pixels) than VGA and also supports true colors.
Dear learner! Video adapter cards come with their own memory, separate from the
computer’s main memory. The amount of memory installed on the video adapter card
determines the maximum number of colors that can be displayed at a given resolution.
For example, a video adapter card with 1MB video memory can display up to 16.7
million colors at VGA resolution but only up to 256 colors at SVGA resolution. At the
moment, video adapter cards may come with up to 16 MB video memories. The
minimum amount of video memory required for windows applications is 1MB.
2.5.3 Printers:
Dear learner! Printers are used to produce “hard copy” of documents, programs and data.
Some printers use serial communication (RS232 standard) while others use parallel
communication to transfer information from the PC to the printer. In serial
communication, data is transferred one bit at a time while in the case of parallel
communication; one byte (8 bits) is transferred at one time.
The printing method (the actual forming of characters) also varies. Based on the printing
method used, printers are categorized as impact printers and non-impact printers.
Impact printers strike an inked ribbon, pressing ink from the ribbon onto the paper while
non-impact printers use different methods to place ink on paper.
• Dot–matrix printersare common types of impact printers. The print head has an
assembly of tiny pins that are activated in a row and physically “hit” the paper
through the ribbon to produce the desired impression. Speeds are expressed in
characters per second (cps) and vary between 180cps and 400cps. These printers
are loud, inexpensive and slow. The quality of the printout is not so good as that
of inkjet or Laser printers. But, we can have carbon copies and printouts on
stencils from these printers.
• Inkjet printers are non-impact printers. Tiny particles of ink are electrically
charged after leaving the nozzle. The droplets are then guided to the right position
on paper by electrically charged deflection plates. The print quality is very good.
We cannot use them with stencils nor can we produce carbon copies using these
printers. Inkjet printers are available for color or black and white.
Introduction To Computer
storage capacity because it is very expensive. The primary storage of modern computer
systems is made up of semiconductor devices.
• RAM contains a large number of cells (or locations) in which are the data and
instructions stored. Each location is specified by an address.
• ROM (Read Only Memory) is a non-volatile memory whose contents cannot
be changed by the user and contains minimum instructions that the computer
needs to get started
There exist two technologies for secondary storage: magnetic and optical. Floppy disk,
hard disk, magnetic tape is examples of magnetic storage. CD-ROM, DVD-ROM, CD-
R, CD-RW are examples of optical storage.
2.6.2.1Magnetic storage devices – the medium contains iron particles, which can be
polarized, i.e. given magnetic charge in one of two directions. Each particle’s direction
represents a 1 or a 0, representing each bit of data that the CPU can recognize. A disk
drive uses read/write heads containing electromagnets to create magnetic charges on the
medium.
o Formatting maps the disk’s surface and determines how data will be stored.
During formatting, the drive creates circular tracks around the disk’s surface, and
then divides each into sections called sectors. The OS organizes sectors into
Introduction To Computer
groups, called clusters, and then tracks each file’s location according to the cluster
it occupies. Formatting also deletes any information that exists on the disk.
Boot sector – stores the master boot record, a small program that runs when
you first start the computer.
File allocation table (FAT) – a log that records each file’s location and each
sector’s status.
Root folder – enables the user to store data on disk in a logical way.
Data area – the portion of the disk that actually holds the data.
Inside the case of the hard disk drive are a set of rigid rotating disks, called platters,
stacked on a spindle. As the platters rotate at high speed, Read/Write heads move
back and forth recording or reading magnetic information on both sides of the
platters.
The speed with which the heads can find data is called
Hard disk drive is selected based on its storage capacity (measured in “Gigabytes”
(GB)) and its access time (measured in milliseconds (ms)). The larger the capacity
and the smaller the access time, the better. Today, it is not uncommon to have hard
disks with capacity in excess of 200GB. Operating system and application software
normally reside in hard disk drives. Documents created using application software
may also be placed on hard disk drives.
Write-protect
ii) Floppy disk drive: Window
Floppy disk drives store information onto a removable media known as diskettes or
floppy disks. Floppy disk drives operate slower and have much less capacity
(1.44MB) than hard disk drives.
Diskettes store information on the magnetic surfaces of a thin, flexible disk inside a
protective plastic cover.
Although some years back, we had two standards as far as physical size is concerned,
namely 3½” and 5¼”, the standard size these days is invariably 3½”. With respect to
the amount of information that a 3½” diskette can store, a few years back diskettes
were coming with sizes of 720KB and 1.44MB; now they come only with 1.44MB.
Software used to come in floppies some years ago. Now, floppies are rarely used to
carry software unless the software happens to be very small. Floppies are mainly
used to carry personal files, to transfer information from one PC to another or as
backup media for small files.
Previously, a good number of removable (floppy–like) drives have made their way
into the computer business, but nowadays it is out of the market (becoming obsolete).
Their capacities range from 100MB (Iomega Zip) to 1.5GB (SyQuest SyJet). Indeed,
the larger capacity drives are considered “portable equivalent of the hard drive”.
They may be used to supplement the hard disk drive, to carry private files, to
transport personal files and core applications between home and office and to backup
important files.
Magnetic tape systems offer very slow data access, but provide large capacities and
low cost. Thus, they are particularly convenient if we want to backup the entire hard
disk.
Tape backup units are available as either internal or external models. Tapes must be
formatted before you can use them. Backed up information could be compressed,
where compression ratios vary for different types of data.
2.6.2.2 Optical Storage Devices – offer high-capacity storage medium. Optical drives
use reflected light to read data. The disk’s metal surface is covered with dents (pits) and
flat spots (lands), which cause light t be reflected differently. Light cannot be reflected
back from pits (data = 0) and lands reflect light back to its source (data = 1).
o CD–ROM (Compact Disk Read Only Memory) discs can hold large amounts of
information (text, graphics and hi–fi stereo sound), which cannot be altered.
They are designed to last indefinitely, but finger marks or scratches can damage
the disk’s surface. CD–ROM drives read programs and data stored on removable
CD–ROM disks.
The first CD–ROM drives transferred data at 150KB per second.The speed then
doubled to 300KB (2X), then quad speed at 600KB (4X). Today, we have as
much as 52X (78000 KBps).
CD–ROM drives are often installed inside the computer case although external
units, which connect to the computer by a cable, are also available.
o CD–R is a standard and technology allowing you to write to and read from a
Compact Disc, but not erase or change what you record. This technology is
compatible with existing CDs, i.e. you are able to read these discs in existing CD–
players.
multiread variety in order to read them. CD–R/W was initially known as CD–E
(or CD–Erasable).
o Digital Video Disc (DVD), also called Digital Versatile Disc, is similar to CD–
ROMs but able to store far more music, video or data. DVDs are of the same
physical size as today's CDs but are able to store as much as 17GB, compared to
the 650MB on today's CD–ROMs.
2.7 The Bus System:
In computer architecture, a bus is a subsystem that transfers data or power between
computer components inside a computer or between computers. Unlike a point-to-
point connection, a bus can logically connect several peripherals over the same set of
wires. Each bus defines its set of connectors to physically plug devices, cards or
cables together. It includes:
Data bus- transfer data from CPU to other components and vise versa
Address bus - transfer the address of the ongoing executable data or
instruction.
Control bus - sends the control over each executable code and data
• Registers – these are the memory areas in the CPU that store data and instructions
while the CPU processes them. The size of the registers, also called word size,
determines the amount of data with which the computer can work at one time.
Most PCs have 32-bit registers.
• RAM – has direct effect on system’s speed. The more the RAM size, the faster.
These days, PCs come with RAM sizes of 128MB – 512MB.
• System clock – sets the pace for the CPU by using a vibrating quartz crystal. A
single “tick” of the clock is the time required to turn a transistor off and back on.
This is a clock cycle measured in hertz (Hz). The faster the PC’s clock runs, the
more instructions the PC can execute each second. Today, PC clock speeds exceed
3GHz (3 X 109 Hz).
Introduction To Computer
• Bus width – determines how many bits can be transmitted between the CPU and
other devices. The bus refers to the path between components of a computer. The
larger the bus width, the faster the computer.
• Cache memory – cache is a high speed memory that holds the most recent data
and instructions that have been loaded by the CPU. It is located directly on the
CPU (L1 cache) or between the CPU and RAM (L2 cache). Amount of cache
memory has tremendous impact on the computer speed. The larger the cache size,
the faster the computer.
2.9 COMPUTER SOFTWARE
Dear learner! As we know, a computer cannot think or perform on its own. It performs
various operations only when the user instructs it to do so. The user issues instructions
and the CPU acts in accordance with the instructions. Such a sequence of instructions
written in a language that can be understood by a computer is called a program. It is the
program that controls the processing activity of computers, and computer performs
precisely what the programs want it to do. The term software refers to the set of computer
programs, procedures and associated documents. The sets of instructions which control
the sequence of operations are known as programs and collectively programs are called
software.
Application Software
System Software
Hardware
Introduction To Computer
Computer software
System
System development
management
program
Dear learner! The most often used software by a general user is the application software.
It is used to accomplish specific tasks rather than just managing a computer system.
Application software may consist of a single program such as Microsoft’s Notepad for
writing and editing simple text. It may also consists of a collection of programs called a
software package, which work together to accomplish a task such as a spreadsheet
package. Application software may also include a larger collection of programs ( a
software suite), related but independent programs, which have a common user interface,
such as Microsoft Office Suite.
Application software are in turn controlled by system software, which manages hardware
devices and perform, background tasks for them. Fig. given below illustrates that
application layer executes on the system software layer, which lies on the hardware layer.
Application Software
Introduction To Computer
System Software
Hardware
Fig. Relationship of Application and System Software, and Hardware part of the
computer
You can save a spreadsheet model and use it again whenever you need it.
Never again will you forget how a specific analysis was done and how to
reconstruct it from scratch the next time you need to use it. You will find
ways to modify your models so that they can grow in power and
simplicity. You can save each revision to provide the base for the next
step forward in your understanding and analysis. There are many
spreadsheet programs available and more are sure to come. Each
spreadsheet is slightly different from the others.
Examples are Microsoft Excel, Lotus 1-2-3 etc.
c. Database Management System: A database software is a set of one or
more programs that enable users to create a database, maintain it( add,
delete and update its records), organize its data in desired fashion and to
selectively retrieve useful information from it. Database software is widely
used today by both large and small organizations to maintain employee
Introduction To Computer
data, customer data, asset data, accounting data etc. Examples are dBase
III Plus, FoxPro, MS Access, Oracle etc.
d. Graphic Software: Computer graphics is the technique of creating,
editing, displaying, and printing graphs, diagrams, charts, and images in a
computer system. The old saying that a picture is worth a thousand words
applies to computer graphics. At a glance, graphics can convey
information that could be difficult or even impossible to put into words.
Contents
3.0 Aims and Objectives
3.1 Introduction
3.2 Elements of Desktop and Taskbar
3.3 Launching Applications
3.4 Shortcut Keys
3.5 Configure Desktop and Hardware
3.6 Common Command Prompt Commands
3.7 Installation of Windows Applications
3.8 Installation of Windows Hardware
3.9 File Management
3.10 File Compression
3.0 AIMS AND OBJECTIVES
After successfully completing this unit, the learner should able to:
Identify elements of desktop and Taskbar
Understand how Launching Applications
Differentiate Shortcut Keys
Configure Desktop and Hardware
Introduction To Computer
3.1 INTRODUCTION
The desktop is composed of Icons and the Taskbar. The Taskbar includes the Start
button, Window tabs and the System tray.
i) Icons: Small graphical images that can represent computer programs, files, folders,
printers, etc. To activate the feature that the icon represents, point the mouse arrow to the
icon and double click the left-hand mouse button in quick succession. This action will,
for example, open a word processing document in Word, open an options menu for a
printer or execute a windows program.
A list of options for an icon can be brought up by moving the mouse pointer to the icon
and then clicking the right-hand mouse button.
Introduction To Computer
Rename allows you to change the name associated with an icon, along with its file
extension. The Open With optionenables you to select which program to use to open a
file. A shortlist of possible programs will often be listed, along with the option Choose
Program, which brings up a more comprehensive listing. Checking the Always use this
program to open this type of file box means that the program you have selected will
implicitly be used to open your file type.
One of the main icons found on your desktop is the Recycle Bin icon. Whenever your
delete a file, Windows XP will place that file into the Recycle Bin so that it may be
retrieved at a later date. Files may be retrieved from the Recycle bin by either dragging
the icon onto the desktop or by right clicking on the icon or selecting Restore from the
menu.
Introduction To Computer
ii) Taskbar: Windows tasks may be monitored by using the Task Manager Window.
This may be accessed by right clicking on the Taskbar and selecting Task Manager from
the resulting menu. The total number of processes running, as well as the total CPU
usage, is displayed at the bottom of this menu. The window has the following tabs:
a) Applications – Shows all currently running applications. Provides options to end the
application, switch to an application or create a new application.
b) Processes – Lists all currently running processes along with the user they are being
run under, the CPU usage and memory usage. Selecting a process and clicking the End
Process button will terminate that process.
c) Performance - Displays CPU and memory usage graphs. This window also displays
some additional counters, such as the amount of memory allocated to the system cache
and the total amount of memory used by the kernel.
d) Networking - Displays the network utilization graph for your network adapters. You
can view the quality and availability of your network connection and whether you are
connected to more than one network.
e) Users – Lists all users currently logged into Windows, locally or remotely. Provides
the option of sending messages to other users and, with the proper permissions, the ability
to logoff or disconnect users.
Introduction To Computer
1) Start Button: Clicking on the Start Button brings up the start menu, which allows
access to a number of Windows features. For instance, you can view and execute
Windows programs by clicking on All Programs, obtain Help and Support, access My
Computer (discussed below), Search your computer for files and applications, and log
off or turn off your computer. Clicking on the Turn Off Computer button enables you
to a) put your computer on standby or sleep mode (ideal if you use your to computer a lot
and do not want to reboot every time) b) turn off your computer or c) Restart your
computer.
Introduction To Computer
2) Window Tabs: One of the main uses of the Task Bar is to switch between programs
that are currently running on Windows. Clicking on a particular Window Tab will bring
up the window of interest.
When too many Window Tabs are present, Windows XP will consolidate them based on
their type. For instance, if there are three different Word files open, they will be
accessible by a single tab. Left clicking on the tab will bring up a menu listing all Word
documents that are currently open.
3) System Tray: Contains icons for some of the programs that are currently running,
along with the clock. Examples of icons residing in the System Tray are printer status
monitors and antivirus monitors. You can attempt to stop programs in the System tray by
right clicking on their icon.
Double clicking on the time at the bottom right of the taskbar brings up a window with
the following features.
A) View the monthly calendar
B) Select a desired month
C) Select a desired year
D) View the current time
E) Alter the current time
F) View and adjust the time zone
G) Synchronize your clock with an Internet server
Introduction To Computer
For instance, you can double click on the C-drive icon, navigate through the directory
tree until you find your application file and double click the icon the start the executable.
c) Desktop Shortcut Icon: Simply double click on the short cut icon, usually created on
your desktop (see discussion below), to start your application.
d) Run Command: Click on the Start Button and select Run from the menu to bring
up the dialog box. Enter the path and name of the application you want to run and click
OK. Alternatively, use the browse feature to find your desired application.
a) The following list of shortcuts are useful in word processing programs like Word,
Notepad or Wordpad: (Del = Delete; Ins = Insert)
Alt + F Brings up file menu options
Alt + E Brings up edit menu options
F1 Brings up help window (also works on the desktop)
Ctrl + A Select all text
Ctrl + X Cut selected text
Shift + Del Cut selected text
Ctrl + C Copy selected text
Ctrl + Ins Copy selected text
Ctrl + V Paste
Shift + Ins Paste
Home Goes to beginning of current line
Ctrl + Home Goes to beginning of document
End Goes to end of current line
Ctrl + End Goes to end of document
Shift + Home Highlights the current position to beginning of line
Shift + End Highlights the current position to end of line
Ctrl + left arrow Moves one word to left
Ctrl + right arrow Moves one word to right
The Tab key is a very useful shortcut key. On the desktop, pressing tab will allow you
cycle between:
i) The Start Button – press enter to bring up the start menu
ii) Windows tabs - use arrow keys to traverse open tabs and enter key to launch
iii) System tray – use arrow keys to traverse icons and enter key to launch
iv) Desktop icons – use arrow keys to traverse and enter key to launch
As well, you can use Tab on web pages to cycle through text fields, check boxes
and buttons. Tab is used to go from top to bottom and Shift + Tab is used to go from
bottom to top.
Creating shortcut icons: Shortcut icons provide a fast means of executing a program or
opening a file. There are two methods to create shortcut icons for a program or file:
i) Right click on the icon of interest and select Create Shortcut from the menu. This
will create a shortcut icon in the current directory, which can then be moved to the
desired location.
ii) Right click on the icon of interest and select Send To from the menu. This will bring
up a second menu that contains the option Desktop (create shortcut). Selecting this
option will automatically create a shortcut icon on the desktop.
a) The Desktop: Right clicking on the desktop brings up a menu with options to alter the
appearance of the desktop.
One option is Arrange Icons By, which brings up a second menu listing options for how
to display your desktop icons. You can sort icons by name, size, type or have Windows
auto arrange them. In addition, icons may be aligned to a grid to form straight lines.
Finally, selecting Run Desktop Cleanup Wizard will move unused shortcuts to a
desktop folder called Unused Desktop Shortcuts.
Introduction To Computer
Another desktop menu option is Properties, which brings up the Display Properties
window.
The Themes tab allows you set desktop themes, which consist of a background plus a set
of sounds, icons, etc. Windows XP comes preloaded with a number of themes but they
can also be downloaded or created.
The Desktop tab allows you to select the background picture for your desktop.
The Screen Saver tab enables you to set a screen saver for Windows and also lets you
adjust your monitor power settings.
The Appearance tab allows you to adjust the look of windows, buttons, fonts and colors.
The Settings tab allows you to configure your monitor’s resolution, color and graphics.
Introduction To Computer
You can also configure the appearance of the Start Menu and Taskbar. Simply right
click on the Start Button and select Properties from the menu.
The Taskbar tab allows you to alter the appearance of the Taskbar. For instance,
selecting Auto-hide the taskbar hides the bar from view until you drag your mouse over
the bottom of the screen. The Group similar taskbar buttons option, when selected,
will group together window tabs of the same type, as described above in Section I.
The Start Menu tab allows you to configure the appearance of the Start Menu as
either the Windows XP format or the classic Windows 95/98/ME format. Clicking on the
Customize button enables you to set the icon size in the menu and to display shortcuts to
your favorite Internet browser and Email program
Introduction To Computer
Right clicking on the Taskbar and selecting Toolbars brings up a listing of toolbars that
can be displayed. For example, selecting the Links toolbar places a list of websites on
the taskbar. You can add links to this list simply by dragging a web site link or icon onto
the Links menu. The Toolbars menu also gives you the option of creating your own
toolbar for the Taskbar.
b) System and Hardware: The Control Panel folder contains many icons dealing with
system and hardware configuration. The Control Panel may be accessed from the Start
Menu.
Double clicking the Automatic Updates icon allows you to set up the updating process
for Windows XP. It is very important to keep your operating system up to date. You
have the option of having:
i) Automatic download and installation
ii) Automatic downloads with user option on when to install
iii) User option on downloading and installing
iv) No updating
Introduction To Computer
The Keyboard and Mouse icons allow you configure basic operating features.
The System icon provides a number of window tabs dealing with system and hardware
information:
General: Provides basic information about your computer, such as the type of operating
system running, type of processor and the total amount of system RAM.
Hardware: Provides access to the Device Manager window, which gives a listing of all
the hardware currently installed on your system. Clicking on the ‘+’ symbol beside the
headings will bring up a listing of specific components (ex. Keyboards). Right clicking
on a hardware component brings up an options menu that allows you to uninstall the
hardware component, update the hardware driver or view hardware properties.
The latter option provides general information on the hardware component (ex. make and
model) as well as the status of the component (ie. working properly or malfunctioning).
If a problem is indicated, clicking on the troubleshoot button will bring up a help
window that will assist in fixing the problem. The properties window also displays
information on the current hardware driver along with a means to update the driver.
Introduction To Computer
Lastly, the properties window for some of the hardware components, such as the mouse,
allows you to alter advanced settings.
System Restore: Can track and reverse harmful changes to your computer. Provides a
status window that indicates what part of the system can be restored (ex. C-drive). The
user must allocate a set amount of system memory in order to provide restore points. The
more memory allocated, the more restore points can be saved. This window also enables
the user to turn the System Restore feature on or off.
Advanced: Can view and alter settings for overall system performance, such as
memory usage and processor scheduling.
Clicking on the Environment Variables button allows you to view, edit, create
and delete user and system variables. A common variable to alter is PATH, which
provides a listing of directories that your operating system will look in order to run an
application. For instance, to run Perl and Java programs you will need to add the path to
the desired compiler.
Introduction To Computer
The Windows Command Prompt may be accessed from the Start Menu by selecting
Run and typing cmd. Through the Command Prompt, you can utilize all the Windows
features (ex. creating new directories and files, opening files, launching applications, etc),
by issuing short commands. Using the Command Prompt in Windows mirrors working
with Linux and is generally faster and more efficient than using icons with the mouse.
Note that, unlike Linux, the Windows directory slash is ‘\’. Also note that Windows
commands are case-insensitive.
As with Linux, typing ‘..’, refers to the directory located one level up from the current
directory. Also, ‘*’ serves as a wild-card character. For example, if you wanted to delete
all files with extension .exe, you would use *.exe.
1) chdir (cd): With no arguments, displays the name of the current directory. If
provided with the name of a directory, chdir will switch to that directory. Example
usage ->chdir c:\Perl
3) Comp: Compares the contents of two files or sets of files byte by byte. Can compare
files in the same directory or in different directories. Example usage -> comp
c:\compfile1.txt c:\Test\compfile2.txt. A sampling of options for comp is as
follows:
/d : Displays differences in decimal format. (The default format is hexadecimal.)
Introduction To Computer
4) Copy: Copies one or more files from one location to another. The general form of
the command is copy dir:\File1 dir:\File2. File1 is the file to be copied and File2 is
the name of the new file to be created. If a directory is not specified, the current
directory is used. Example usage -> copy c:\Perl\test.pl c:\Java\test.java.
5) Date: Displays the current date and provides a prompt to enter a new date.
6) del: Deletes specified files. You can delete one file (ex. del test.doc) or a group of
files. Example usage -> del c:\Perl\*.pl. A sampling of options for del is as follows:
/p : Prompts you for confirmation before deleting the specified file.
/f : Forces deletion of read-only files.
/s : Deletes specified files from the current directory and all subdirectories.
Displays the names of the files as they are being deleted.
/q : Specifies quiet mode. You are not prompted for delete confirmation.
/a [[:] attributes]: Deletes files based on specified attributes. A sampling of
attributes is as follows:
r = read only
a = archive
s = system
h = hidden
A ‘-‘ character in front of an attribute indicates ‘not’
Example usage -> del *.pl /a:r
7) dir: Displays a list of files and subdirectories within a particular directory. When no
options are specified, dir uses the current directory. When provided with a drive and
a path, dir will list contents of specified directory. By default, dir does not display
Introduction To Computer
hidden or system files. Example usage ->dir c:\Java. A sampling of options for dir
is as follows:
/q : displays ownership information of files and directories
/p : displays one screen of the listing at a time. To see the next screen,
press any key on the keyboard.
/a [[:] attributes] : When no attributes are listed, ‘dir /a’ list all files including
hidden and system files. Attributes are listed after the colon (ex dir /a:h).
Combinations of attributes may also be used (ex. dir /a:hs). Some example
attributes are as follows:
h = show only hidden files
s = show only system files
d = show only directories
r = show only read-only files
A ‘-‘ character in front of an attribute indicates ‘not’
9) find: Searches for a specified string of text within a specified file or files. Will
display any lines of text that display the specified string. Example usage ->find
“command” c:\Java\*.java. A sampling of options for find is as follows:
/v : Displays all lines that do not contain the specified string.
/c : Counts the lines that contain the specified string and displays the total.
/n : Precedes each line with the file's line number.
/i : Specifies that the search is not case-sensitive.
10) help: Provides online information about system commands. When entered with no
other parameters, lists info for all commands. When entered with the name of a
specific command, provides info for that command only. Example usage -> help
exit.
11) mkdir (md): Creates a directory or subdirectory. If no path is specified, mkdir
creates a new directory within the current directory. Example usage ->mkdir
c:\test.
Introduction To Computer
12) more: Displays one screen of output at a time. Useful for displaying contents of
large files. Example usage -> more bigfile.txt. You can also provide multiple file
names (or use the ‘*’ character) for more to output. The following commands are
accepted at the more prompt:
Spacebar = show next page
Enter = show next line
f = show next file
q = quit
pn = display next ‘n’ lines
sn = skip next ‘n’ lines
13) move: Move one or more files from a directory to a specified directory. The general
form of the command is move dir:\File1 dir:\File2. Example usage -> move
c:\C++\test.cpp c:\C\test.c.
14) print: Sends a text file to a printer. The name of the printer to use is set by
/d:printer name. Example usage -> print /d:LPT1 c:\printme.txt. In this
example, the printer is connected to parallel port LPT1.
15) rename (ren): Changes the name of a file or set of files. Example usage -> rename
file_badname.txt file_goodname.txt.
16) rmdir (rd): Deletes a directory. Example usage ->rmdirBaddir. A sample of
rmdir options is as follows:
/s : Removes the specified directory and all subdirectories including any files. Use
/s to remove a tree.
/q : Runs rmdir in quiet mode. Deletes directories without confirmation.
17) Time: Displays the current time and provides a prompt to enter a new time.
18) Tree: Graphically displays the directory structure of a path or of the disk in a drive.
Example usage: tree c:\C++. In this example, tree will graphically display the
directory structure for the C++ directory.
19) Type: Displays the contents of a text file. Example usage -> type test.cpp.
20) Xcopy: Copies files and directories, including subdirectories. Example usage -
>xcopy c:\Perl c:\Perl2. This command will copy all files within the c:\Perl
directory, along with all subdirectories and their associated files. A sampling of
options for xcopy is as follows:
Introduction To Computer
/p : Prompts you to confirm whether you want to create each destination file.
/c : Ignores errors.
q : Suppresses the display of xcopymessages.
/s : Copies directories and subdirectories, unless they are empty. If you omit /s,
xcopyworks within a single directory.
/e : Copies all subdirectories, even if they are empty. Use /e with the /s and /t
command-line options.
/t : Copies the subdirectory structure (that is, the tree) only, not files. To copy
empty directories, you must include the /e command-line option.
/h : Copies files with hidden and system file attributes. By default, xcopy does not
copy hidden or system files.
/o : Copies file ownership and discretionary access control list (DACL)
information.
3.7Installation of Windows Applications
a) Software with an installation disk (CD or floppy disk)
For commercial software, you simply need to insert the program CD into the drive and
wait for the installation window to appear. This window will guide you through the
installation process, enabling you to select which components to install and the directory
in which to install them.
Another method for installing Windows applications, which can be used if the install
window does not automatically appear, is to use the Add or Remove Programs icon
found in the Control Panel window. Clicking on the icon brings up a listing of
applications currently installed on Windows XP. By selecting a particular application,
the user may either change or remove the program. Clicking on the Add New Programs
button on the left brings up a window that will prompt you to insert your startup CD or
floppy disk. Clicking the next button will cause Windows to automatically find and run
the install program for your application.
A final method for installing a Windows application is to go to My Computer, double
click the drive in which the installation disk is housed and double click on the installation
icon.
b) Downloaded software
Introduction To Computer
3.9File Management
a) My Computer
The main file management tool on Windows XP is My Computer, which
wasmentionedpreviously under section II. My Computer can be accessed through a
desktop icon or through the start menu. The My Computer window allows you to
traverse through the file structure on a particular drive. The tool bar at the top of the
window provides options for traversing file structures, such as the Back, Forward and
Up (move up to the parent directory) buttons. There is also a Search button to find a
specific file or folder.
Files and folders can be sorted according to parameters such as Name, Size and Type by
selecting Arrange Icons By from theViews menu in the toolbar.
Introduction To Computer
Clicking on the Folders button in the Toolbar brings up a file tree-like structure in the
left-hand side of the My Computer window. This view is essentially Windows Explorer
found on previous Windows versions. This view allows you to see the entire file
structure in one window pane and the contents of a particular directory in another.
Introduction To Computer
b) Master Folders
Windows XP tries to group related types of user files into master folders. The
following is a summary of master folders along with their file types:
My Documents -> Word documents, Excel documents, etc
My Pictures -> Image files (ex. jpeg)
My Music -> Music files (ex. mp3)
My Videos -> Video files (ex. avi)
My Webs -> user created web pages
These folders behave like My Computer and are thus easy to search.
c) File Operations
As was described in the Command Prompt section, files and folders may be created,
deleted, copied and renamed. The following describes how these operations can be
carried out on the Windows desktop.
Create – Right click on the desktop or in a folder directory and select New from the
menu. This list gives the option of creating a new folder or a file from a common format
(ex. Text document, Word document, etc). The same menu may also be accessed from
file management windows such as My Computer by selecting File from the top toolbar,
followed by New.
Files can also be created from within an application such as Word. In most cases, the
Save and Save As options can by found under the File menu.
Delete – Can be achieved by right clicking on a folder or file and selecting Delete from
the menu. This action will move the folder or file to the Recycle Bin. The Delete option
can also be found under the File menu in My Computer. Alternatively, you can simply
drag a file or folder into the recycle bin.
Copy – Can be achieved by right clicking on a folder or file and selecting Copy from the
menu. Next, traverse into the destination folder, right click the mouse and select Paste
from the menu. Alternatively, you can select your file or folder under My Computer and
then select Copy To Folder... from the Edit menu. From the resulting menu you can
select the destination folder.
Move - Can be achieved by right clicking on a folder or file and selecting Cut from the
menu. Next, traverse into the destination folder, right click the mouse and select Paste
from the menu. Alternatively, you can select your file or folder under My Computer and
then select Move To Folder... from the Edit menu. From the resulting menu you can
Introduction To Computer
select the destination folder. Lastly, you can simply drag a file or folder from one
location to another.
Rename – Can be achieved by right clicking on a folder or file and selecting Rename
from the menu. The Rename option can also be found under the File menu in My
Computer.
d) Folder Options
The Folder Options menu is accessible from the Control Panel.
The View tab allows you to perform such tasks as i) Displaying hidden files ii)
Hiding the extension of known files or iii) Displaying protected operating system files.
The File Types tab allows you to view or alter the application used by default to
open or execute a particular file type (ex. .doc or .txt).
3.10File Compression
File compression is used to maximize the number of files that can stored in a particular
location and to speed up downloading over the Internet. One method of compressing text
files is to use Active Pattern Substitution. Here, common patterns in text such as
recurring words or “strings” are replaced or substituted with a shorter word.
Compression programs such as WinZip (www.winzip.com) use a dictionary to associate
common patterns with shorter strings. Since compressed files contain shorter versions of
strings, they cannot be executed or viewed without first decompressing them. A program
such as Winzip can also be used for this purpose. The following describes how to
compress and decompress files using the Wizard mode in WinZip.
a) WinZip Compress
At the Wizard menu, select Create a new Zip file and click the Next button. Now type
in the name and select the destination folder of your new zip file and click Next. Finally,
add file(s) or complete folders into the zip archive file and click Zip Now.
Introduction To Computer
b) WinZip Decompress
At the Wizard menu, select Unzip or install from an existing zip file and click the Next
button. Select the zip file to be decompressed from the provided listing and click Next.
Select the folder in which to store the decompressed files and click Unzip Now.
Introduction To Computer
Contents
4.0 Aims and Objectives
Introduction To Computer
4.1 Introduction
4.2 How to Start Microsoft Word
4.2.1Entering Text
4.2.2 Deleting Text
4.2.3 Saving a Document
4.2.4Close a File (Without Closing Word)
4.2.5 Open a File
4.2.6 Print a File
4.2.7 Highlighting Text
4.2.8 Formatting Text
4.2.9 Formatting Paragraphs
4.2.10 Formatting a Page
4.2.11Copy and Paste
4.2.12 Cut and Paste
4.2.13 Create a Bulleted / Numbered List
4.2.14 Undo Feature
4.2.15 Spell Check
Create a Bulleted
4.1 INTRODUCTION
Dear learner! In the third unit, you have discussed on the computer system and its
application our daily life. This unit will try to address one of the computer program
Microsoft word and its application.
Dear learner! The following procedure helps you how to use Microsoft words on your
computer.
Note: If you do not have Microsoft Word icon on your desktop, try this:
Activity
Dear learner! How do we enter text?
4.2.1Entering Text
• To enter text, simply start typing!
Exercise 1
TYPE: this is a computer class that I am taking to enhance my abilities to use
the program Microsoft word. This text will be used to demonstrate the
different functions and capabilities that I can utilize with this program.
Introduction To Computer
Exercise 2
Delete a letter or word from your sentence using BACKSPACE
and DELETE
Carriage Return
Microsoft Word incorporates an auto-wrap feature so that you can continue to type
until you reach the page margin and Word will automatically bring you to the next
line. However, to move to the next line, hit the ENTER key
Note: Notice there are two save options (SAVE, SAVE AS). The first is
useful is you are updating a document you have already saves and you would
like to save over the previous version. It’s a shortcut. When saving for the first
time, use SAVE AS
3. Select the folder, or area of your computer you would like to save the file
to using the drop down arrow to navigate between areas on your PC
Introduction To Computer
4. Highlight the text located in the FILE NAME field and hit the DELETE
key
5. Enter the name you would like to give the file
6. Click SAVE
Click this
‘x’ icon to
close the
file, but
leave Word
4.2.5 Open a File open
1. Click FILE
2. Select OPEN
3. Using the drop down arrow, navigate to the location of your desired file
4. Click on the file name
5. Click OPEN
Note: If you would like to see what the document will look like before its
committed to paper, select the PRINT PREVIEW option instead. If you like
3. Review the print settings to make any changes necessary (changes could
include printing only certain pages, number of copies, as well as scaling
features)
4. Click OK
Note: If you simply want to print a whole document quickly, you can also use
Exercise 3
1. Practice highlighting text using both options
2. Try to highlight just one word, or just one line of text
Note: Text formatting can be done before text is entered, as well as after. To format text
that has already been entered, highlight the selected text you want to change and follow
the steps above.
Note: You can also use the shortcut buttons located in the menu bar at the top of the
page to make quick font type, style, and size changes
Exercise 4
1. Highlight part or all of your text, and make the following changes:
2. Change the font VERDANA, select the font style as BOLD, change the
color of text, and then click OK
Introduction To Computer
Note: Paragraph justification can also be done using the justification shortcut buttons
located in the menu bar at the top of the page.
Exercise 5
1. Change the line spacing to DOUBLE, change the alignment
to CENTER and then click OK
2. Change the paragraph justification using the menu shortcut
Exercise 6
Change the left margin to 1.25”, add line numbering, and add a border to the
document and click OK
Introduction To Computer
4. Place your cursor specifically where you would like to copy the selected
text to (make the cursor is blinking in the place by clicking once with the
left button)
5. Click EDIT
6. Click PASTE (or CTRL + V)
Exercise 7
Select the last word in the paragraph, copy the word and paste it BEFORE the first
word in the paragraph so that it then becomes the first word
Exercise 8
Select the last word in the paragraph, cut the word and paste it BEFORE the first word
in the paragraph so that it then becomes the first word
3. Choose the type of list and parameters you would like to set for the list
4. Click OK
Introduction To Computer
5. Begin entering your text, and click ENTER to create the next item in the
list
6. To end the list, click the BULLET LIST or NUMBER LIST icon located
in the formatting menu at the top of the page (You can tell which to click
because it will be the one that is shaded and has a blue trim around it
Note: You can also create numbered and bulleted lists as well as remove them using the
menu shortcuts located at the top of the page. Click on the type of list you would like
to create to make a list. Highlight a list and click on the shaded corresponding shortcut
icon to remove the list
Exercise 9
Select the entire paragraph using the SELECT ALL option, and then turn the paragraph into
a numbered list (use whichever method you would like)
Note: Each time you use this feature it will undo the last change that was done. You
can undo several sequential items in a row.
Exercise 10
Undo the last edit that we performed, which should be creating the
numbered/bulleted list
Contents
5.0 Aims and Objectives
5.1 Introduction to Ms – Excel 2000
5.2 Starting Ms – Excel 2000
5.3 Working with Ms – Excel 2000
5.4 Screen Elements of Ms – Excel
5.4.1 Menus
5.4.2 Tool bars
5.4.2.1 The Standard Tool bar and Formatting Toolbar
5.4.2.2 Formula bar
5.5 Editing Worksheet
5.5.1 Selecting Cells
5.5.1.1 Selecting Cells using mouse
5.6 Navigating
5.6.1 Moving around a spreadsheet
5.6.2 Moving around a workbook
5.7 Entering and Editing Text
5.7.1 Entering Numbers
5.8 Modifying Worksheet
5.8.1 Adding Worksheets, columns and Rows
5.8.2 Resizing Rows and Columns
Introduction To Computer
Dear learner! Microsoft Excel is a powerful spreadsheet program that allows you to
organize data, complete calculations, make decisions, graph data, develop professional
looking reports, convert Excel files for use on the Web, and access the Web. Entering
data on to a spreadsheet (or worksheet as they are called in Excel) is a quick and easy.
Once data has been entered in a worksheet, excel can instantly perform any type of
calculation on it. Excel can also make your information look sharp and professional.
Introduction To Computer
Each spreadsheet contains 16384 rows and 256 columns. That makes 4,194,304 cells
(16384 * 256), each holding either text or numbers or formulas. And this is not all, each
workbook can contain 16 or more worksheets (limited only by your computer’s memory
and storage capacity)! Sounds huge, isn’t it! Well actually it is.
this section. When you start working in Excel, you begin using a workbook that contains
screens called Worksheets. They are identified as Sheet1, Sheet2, and so on.
Menu bar
Standard
Tool bar
Formatting
Tool bar Up
scroll
Current cell arrows
Name box
Row headings
Scroll
bar
Drawing bar
5.4.1 Menus
Here, the table holds the menu which appears in the menu bar.
charts
Format Commands to format fonts ,cell alignment, and borders
Tools Lists tools such the spell checker and macros. You can also change
excel
Data Commands to analyze and work with data information
Window Commands to display and arrange multiple windows (if you have
more than one file open)
Help Get help on using the program
The menu bar can change to include other menu names depending on the type of work
you are doing in Excel. For example, if you are working with a chart sheet rather than a
worksheet, the chart menu bar will display with menu names that reflect changing
command options.
Unlike previous versions of Excel, the menus in Excel 2000 initially list only the
commands you have recently used. To view all options in each menu, click the double
arrows at the button of the menu. If you would like to revert to the way older versions
of Excel displayed menu options, follow these steps:
picture on the button face that helps you remember that button’s function. Also, when
you move the mouse pointer over a button or box, the name of the button or appear below
it. This is called a
Screen Tip.
Print
Save E-mail Print Preview Spelling Cut Copy Paste
Open
Format
New Painter
Undo Help
Control
Dear learner! Below the Formatting toolbar is the formula bar. As you type, the data
appears in the formula bar. Excel also displays the active cell reference on the left side of
the formula bar in the Name box.
Dear learner! Before entering, editing or formulating cells, they need to be selected. You
can select a single cell, or a group of continuous cells or even a discontinuous group of
cells. This selection is called a range.
5.6 Navigating
5.6.1 Moving around a spreadsheet
Dear learner! To move around the spreadsheet either use the keyboard keys ”↑” for going
up,”↓” for going down, “←” for going left,”→” for going right,” Page Up” for going on
screen up,” Page Down” for going on screen down, and other related keys; or use mouse
Introduction To Computer
to traverse the different parts of the worksheets through scroll bars. You can also type the
desired cell address directly in the Address name box to randomly go anywhere in the
worksheet.
1. Resize a row by dragging the line below the label of the row you would like to
resize. You can also resize a column in a similar manner by dragging the line to the
right of the label corresponding to the column you want to resize.
2. Click the row or column label and select: Format – Row – Height or Format –
Column – Width from the menu bar to enter a numerical value for the height of
the row width of column.
Tip: You can call the Row height or/and the Column width dialog box and resize the
rows and columns by Right – clicking on row/column
label and set the height/width.
The worksheets in a workbook are accessible by clicking the worksheet tabs just above
the status bar. By default, three worksheets are included in each workbook. To rename
the worksheet tab:
Underline
Format cells
Font color
Font tab: All of the font attributes are displayed in this tab including font face, size,
style, and effects.
Borders and pattern tabs: These tabs allow you to add borders, shading, and
background colors to a cell. Figure: Cell
formatting dialog box
happens while pointing to cell B1.This process not only makes it unnecessary for you to
type the cell addresses in the formula bar but also ensures that no mistakes are committed
in specifying cell addresses. See the examples below to view the formula for calculating
the sub total for a number of sold Items Title. The formula multiplies the quantity and
price of Items Title and adds the sub total for each item.
The next window allows you to choose the cells that will be included in the function. In
the example below, Excel automatically selected cells A and E for the sum function.
Click on OK when all the cells for the function have been selected.
Use the Auto sum function to add the contents of a cluster of adjacent cells. Select the
cell that the sum will appear in that is outside the cluster of cells whose values will be
added.
5.11 Charts
Dear learner! Charts are visually appealing and make it easy for users to see comparisons,
patterns, and trends in data. For instance, rather than having to analyze several columns
of worksheet numbers, you can see at a glance whether sales are falling or rising over
quarterly periods, or how the actual sales compare to the projected sales.
Dear learner! You can create a chart on its own sheet or as an embedded object on a
worksheet. You can also publish a chart on a Web page. To create a chart, you must first
enter the data for the chart on the worksheet. Then select that data and use the Chart
Wizard* to step through the process of choosing the chart type and the various chart
options, or use the Chart toolbar to create a basic chart that you can format later.
* Chart wizard shows each step along the path from entering raw data to completing a
graph. You can transform numbers in to graphs, illustrating the power of visually
oriented information to strengthen presentations.
Introduction To Computer
Contents
6.0 Aims and Objectives
6.1 Introduction
6.2 Familiarizing Yourself with the Workspace
6.3 Naming and Saving Your PowerPoint
6.4 Identifying the Number of Slides You Need
6.5 Adding, Rearranging, and Deleting Slides
6.6 Applying a New Layout to a Slide
6.7 Adding Speaker’s Notes
6.8 Transitioning Between Slides
6.9 Using Themes
6.10 Adding Clip Art
6.11 Converting Text to SmartArt Graphics
6.12 Adding A Chart
6.13 Adding Sound
6.14 Adding Excel Worksheet Data
6.16 Adding Hyperlinks
6.16 Previewing Your Presentation
6.17 Printing Hand-outs And Speaker’s Notes
3.1 INTRODUCTION
• Microsoft Office PowerPoint 2007 is a program that enables you to create slide-show
presentations. The 2007 version offers expanded graphics and formatting capabilities,
making it easier to create professional presentations. The information in this handout
is adapted from Microsoft Office Online; for more detailed information, visit
http://office.microsoft.com/enus/powerpoint.
o Add hyperlinks
o Preview your presentation
o Print handouts and speaker’s notes
Dear learner! When you start PowerPoint, it opens in Normal view, where you create and
work on slides.
2. Dotted borders identify placeholders, where you can type text or insert pictures,
charts, and other objects.
3. The Slides tab shows a thumbnail version of each full size slide shown in the
Slide pane. After you add other slides, you can click a thumbnail on the Slides tab
to make the slide appear in the Slide pane, or you can drag thumbnails to
rearrange the slides in your presentation. You can also add or delete slides on the
Slides tab.
Introduction To Computer
4. In the Notes pane at the bottom, you can type notes about the current slide. You
can hand out your notes to your audience or refer to your notes in Presenter view
when you give your present
presentation.
• By default, PowerPoint 2007 applies the Blank Presentation template, which appears
in the preceding illustration, to new presentations. Blank Presentation is the simplest
and most generic of the templates in PowerPoint 2007. Blank Presentation is a good
template to use when you first start working with PowerPoint because it is
straightforward and can be adapted to many presentation types.
Dear learner! As with any software program, it is a good idea to name and save your
presentation right away and then to save your changes frequently while you work:
work
• Click the Microsoft Office Button , point to Save As,, and then do one of the
following:
o For a presentation that can be opened only in PowerPoint 2007, click
PowerPoint Presentation
Presentation.
o For a presentation that can be opened in either PowerPoint 2007 or earlier
versions of PowerPoint, click PowerPoint 97-2003
2003 Presentation.
Presentation
• In the Save As dialog box,x, in the Save in drop down menu, select the folder or other
location where you want to save your presentation.
• In the File name box, accept the default name or type a new name for your
presentation; in the Save as type box, select the file type (the default
lt is .pptx); then
click Save.
• From now on, you can press CTRL+S or click Save near the top of the screen to
save your presentation quickly at any time.
• By using this basic structure, if you have three major points or areas to present, you
can plan to have a minimum of six slides: a title slide, an introductory slide, one slide
for each of the three major points or areas, and a summary slide.
• If there is a large amount of material to present in any of your main points or areas,
you may want to create a subgrouping of slides for that material by using the same
basic outline structure.
Dear learner! The default New Presentation provides a single slide with two placeholders:
the top for a title; the bottom for subtitles. The arrangement of placeholders on a slide is
called a layout. PowerPoint 2007 also provides other types of layouts, such as those for
including pictures and SmartArt graphics.
Introduction To Computer
• When adding a slide to your presentation, you can do the following to choose a layout
for the new slide at the same time:
o On the Slides tab, click just below the single slide that already appears
there.
o On the Home tab, in the Slides group, click the arrow next to New Slide.
o A gallery appears, showing thumbnails of the various slide layouts that are
available.
1. The name identifies the content that each layout is designed for.
2. Placeholders that display icons can contain text, but you can also click the icons to
insert objects automatically, including SmartArt graphics and clip art.
• Click the layout that you want for your new slide. The new slide now appears both on
the Slides tab, where it is highlighted as the current slide, and in the Slide pane.
Repeat this procedure for each new slide that you want to add.
Introduction To Computer
• If you want to create two slides that are similar in content and layout, you can save
work by creating one slide that has all of the formatting and content that both slides
will share and then copying that slide. This can be done before or after adding
content.
o On the Slides tab, right-click the slide that you want to copy, and then
click Copy on the shortcut menu.
o Still on the Slides tab, right-click where you want to add the new copy of
the slide, and then click Paste on the shortcut menu.
o You can also insert a copy of a slide from one presentation into another
presentation.
• To rearrange the order of slides, on the Slides tab, click the slide that you want to
move, and then drag it to the location that you want. To select multiple slides, click a
slide that you want to move, and then press and hold CTRL while you click each of
the other slides that you want to move.
• To delete a slide, on the Slides tab, right-click the slide that you want to delete, and
then click Delete Slide on the shortcut menu.
Dear learner! Speaker's notes, which you can type in the Notes pane for each slide, help
you keep your onscreen presentation free of excess content while you still keep track of
all of the information that you need during the presentation. You can cut excessively
Introduction To Computer
detailed text from the Slide pane at any time and then paste that text directly into the
Notes pane so that you still have it for reference.
Note: Using the Speaker’s notes feature will help prevents you from giving your
audience an “information overload.”
• You can print your speaker's notes and then refer to them while you give your
presentation. Alternatively, if you run your PowerPoint 2007 presentation from one
monitor (at a podium, for example) while your audience views it on a second monitor,
you can use Presenter's view to display the notes only on your monitor while you are
presenting.
Dear learner! Slide transitions are animation-like effects that occur when you move from
one slide to the next. PowerPoint 2007 provides many types of slide transitions, including
standard fades, dissolves, cuts, and wipes, as well as more unusual transitions such as
wheels and checkerboards.
Note: Be careful not to overdo it with transitions; too many or overly animated
transitions make presentations look tacky.
• On the Animations tab, in the Transition to This Slide group, click the transition
that you want.
• To preview how the current slide looks with a particular transition applied, rest your
pointer on the thumbnail of that transition.
• To see thumbnails of additional transitions, click the arrows next to the row of
thumbnails.
Introduction To Computer
• You can choose other options in the Transition to This Slide group to control the
transition speed, to add a sound, and to apply the same transition to all of the slides in
the presentation.
Dear learner! PowerPoint 2007 provides a wide variety of design themes that make it
easy to change the overall look of your presentation. A theme is a set of design elements
that provides a specific, unified appearance for all of your Office documents by using
particular combinations of colors, fonts and effects. PowerPoint 2007 automatically
applies the Office theme to presentations that are created by using the Blank Presentation
template, but you can change the look of your presentation at any time by applying a
different theme.
• On the Design tab, in the Themes group, click the document theme that you want to
apply.
• To preview how the current slide looks with a particular theme applied, rest your
pointer on the thumbnail of that theme.
• To see thumbnails of additional themes, click the arrows next to the row of
thumbnails.
• Unless you specify otherwise, PowerPoint 2007 applies themes to the entire
presentation. To change the appearance of only selected slides, on the Slides tab,
Introduction To Computer
press and hold CTRL while you click each slide that you want to change. When all of
the slides are selected, right
right-click
click the theme that you want to apply to them, and then
click Apply to Selected Slides on the shortcut menu.
Note: Alternating slides with different themes may help maintain your
audience’s attention.
Dear learner! Note: You want to create the most effective visual presentation
possible — often, a series of slides that contains only bulleted lists is not the most
dynamic choice. Lack of visual variety can cause your audience's attention to drift. And
many kinds of information aren't most clearly expressed in a paragraph or a bulleted list.
As such, Clip Art, SmartArt graphics, charts, and sound are available options for curing
“slide burnout.”
• To add clip art, click the placeholder that you want to add clip art to. If you
don'tselect a placeholder, or if you select a placeholder that cannot contain an image,
the clip art is inserted at the cente
center of the slide.
o On the Insert tab, in the Illustrations group, click Clip Art.
o In the Clip Art task pane, locate the clip art you want, and then click it.
o You can move the clip art, resize it, rotate it, add text to it, and make other
changes.
o You can search for additional clip art on the Microsoft Office Online site;
click the Clip art on Office Online link at the bottom of the Clip Art task
pane.
Introduction To Computer
Graphic .
o To see how a SmartArt graphic looks with your text, in the gallery hover
your pointer over the thumbnail for that SmartArt graphic. The gallery
contains layouts for SmartArt graphics that work best with bulleted lists.
To view the entire set of layouts, click More SmartArt Graphics.
o When you find a SmartArt graphic that you like, click it; this will apply it
to your text.
o You can now move the SmartArt graphic, resize it, rotate it, add text to it,
apply a different Quick Style (Quick Styles: Collections of formatting
options that make formatting your documents and objects easier.) to it, and
make other changes.
• Although it is especially easy to create a SmartArt graphic for existing text, you can
also work the other way around, by first inserting the SmartArt graphic that you want
and then adding text to it:
Introduction To Computer
o Click the placeholder that you want to add a SmartArt graphic to. If you
don't select a placeholder, or if you select a placeholder that cannot
contain an image, the SmartArt graphic is inserted at the center of the
slide.
o On the Insert tab, in the Illustrations group, click SmartArt.
SmartArt
o In the Choose a SmartArt Graphic dialog box, in the leftmost pane, click
the type of SmartArt graphic that you want.
o In the center pane, locate and click the layout that you want, and then click
OK.
o To see a preview of any layout, cclick
lick that layout. The preview appears in
the rightmost pane.
Dear learner!
• In Excel, select the chart that you want to copy to a PowerPoint presentation.
• On the Home tab, in the Clipboard group, click Copy .
• Click in the PowerPoint presentation where you want to paste the copied chart.
• On the Home tab, in the Clipboard group, click Paste.
• Click Paste Options next to the chart, and then do one of the following:
o To paste the chart with a link to its source data, click Chart (linked to
Excel data).
o To paste the chart and to include access to the entire workbook in the
presentation, click Excel Chart (entire workbook).
Introduction To Computer
Dear learner!
Note: To prevent possible problems with links, it is a good idea to copy the
sounds into the same folder as your presentation before you add the sounds to
your presentation.
• In the pane that contains the Outline and Slides tabs, click the Slides tab.
• Click the slide to which you want to add a sound.
• On the Insert tab, in the Media Clips group, click the arrow under Sound.
o Either:
o click Sound from File, locate the folder that contains the file, and
then double-click the file that you want to add or…
o click Sound from Clip Organizer, scroll to find the clip that you
want in the Clip Art task pane, and then click it to add it to the
slide.
o You can preview a clip before adding it to your presentation. In the Clip
Art task pane, in the Results box that displays the available clips, move
your mouse pointer over the clip's thumbnail. Click the arrow that appears,
and then click Preview/Properties.
Introduction To Computer
• When you insert a sound, you are prompted with a message asking how you want the
sound to start: automatically (Automatically) or when you click the sound icon
(When Clicked).
o To automatically start the sound when you show the slide, click
Automatically. The sound plays automatically when you show the slide
unless there are other media effects on the slide. If there are other effects,
such as an animation, the sound plays after that effect.
o To manually start the sound when you click it on the slide, click When
Clicked.
• Multiple sounds are added on top of each other and play in the order in which they
were added. If you want each sound to start when you click it, drag the sound icons
off of each other after you insert them.
• You can play a sound continuously during just one slide or across many slides.
o To play a sound continuously for one slide
o When you loop a sound, it plays continuously until you advance to the
next slide.
o In the Custom Animation task pane, click the arrow to the right of the
selected sound in the Custom Animation list, and then click Effect
Options.
o On the Effect tab, under Stop playing, click After,, and then select the
total number of slides on which the file should play.
o The sound file should be as long as the specified display times of the
slides. You can see the length of the sound file on the Sound Settings
tab, under Information.
Dear learner! In Excel, select the worksheet data that you want to copy to a PowerPoint
presentation.
• Click in the PowerPoint presentation where you want to paste the copied worksheet
data.
Note: If you don't see the Paste Options button, you may have to turn it on.
Click the Microsoft Office Button , and then click PowerPoint Options.
Options In
the Advanced category, under Cut, Copy, and Paste,, select the Show Paste
Options buttons check box. If you paste the data into a PowerPoint table, the
Paste Options button is not displayed.
Dear learner! You can use hyperlinks to move from one slide to another, to a network or
Internet location, or even to another file or program altogether.
o Select the text that you want to click to activate the hyperlink.
Alternatively, you can select an object (a piece of clip art, for example, or
a SmartArt graphic).
o On the Insert tab, in the Links group, click Hyperlink.
o In the Insert Hyperlink dialog box, click the appropriate button in the My
Places box for the target of your link (that is, the place where the link
takes you).
o To go to another slide in your presentation, for example, click
Place in This Document
Document.
o Find and click the target location, make any changes that you want in the
Text to displa
display and Address boxes, and then click OK.
Introduction To Computer
Dear learner! To view your presentation on your computer screen exactly the way that it
will look to your audience when you are presenting, do the following:
o On the Slide Show tab, in the Start Slide Show group, do one of the
following: 1) To start with the first slide in the presentation, click From
Beginning, or 2) To start with the slide that currently appears in the Slide
pane, click From Current Slide.
o Click to advance to the next slide.
o To return to Normal view at any time, press ESC.
3.17 PRINTING HANDOUTS AND SPEAKER’S NOTES
Dear learner!
• Print handouts and speaker's notes You can print your presentation either as
speaker's notes or as handouts:
o Speaker's notes show one slide at the top of each printed page,
along with the content of the Notes pane for that slide at the
bottom of the page. Such handouts can be used by the speaker as a
script or outline during the presentation. They can also be
distributed to the audience, so that each member has more
complete information from the presentation.
o Handouts show one, two, three, four, six, or nine slides per printed
page and are intended for cases in which it isn't desirable to
include the Notes pane contents in the distribution to the audience.
Note: The three-slides-per-page handout includes ruled space where the audience
can write notes.
Introduction To Computer
Introduction To Computer
Contents
7.0 Aims and Objectives
7.1 Introduction
7.2 Categories of Computer Networks
7.2.1 Local Area Network (LAN):
7.2.2 Metropolitan Area Network (MAN):
7.2.3 Wide Area Network (WAN):
7.3 Peer-to-peer & Client/server networks
7.4 Advantages and Disadvantages of Installing a Network
7.4.1 Advantages
7.4.2 Disadvantages
7.5 Network Topologies:
7.6 Considerations When Choosing a Topology:
8.7 Summary Chart:
7.8 Media Access
7.9 The Internet
7.9.1 Getting connected to Internet:
7.9.2 Protocols
.9.3 Social network service
7.9.4 Important Internet Applications or Services
After successfully completing this unit, the learner should able to:
Understand Categories of Computer Networks
Identify Advantages and Disadvantages of Installing a Network
Describe Network Topologies:
Describe about The Internet
Understand Important Internet Applications
Introduction To Computer
7.1 INTRODUCTION
Dear learner! A computer network is a collection of two or more computers, which are
connected together to share information and resources like printer. Computers in a
network are interconnected by telephone lines, coaxial cables, satellite links, radio and/or
some other communication technique. A network can be as few as several personal
computers on a small network or as large as the internet, a worldwide network of
computers.
Dear learner! Generally there are three primary categories of computer networks: Local
Area Network (LAN). Metropolitan Area Network (MAN) and Wide Area Network
(WAN). These categories are defined based on various factors like the size of the
network, the distance it covers, and the type of link used in interconnection.
Dear learner! A local area network or LAN is a computer network that spans only a small
geographical area, such as an office, building or campus. It cconnects computers & other
devices within a limited physical area s.a. an office, classroom, building etc. It uses a
variety of telecommunication media s.a. ordinary telephone wiring, coaxial cable etc. to
interconnect workstation & other devices. To communicate each PC has a circuit board
called a network interface card (NIC). Most LANs uses a more powerful microcomputer
having a larger hard disk capacity, called a file server or network server that contains a
Network Operating System Program that controls communication and the use and sharing
of network resources.
Introduction To Computer
Dear learner! Metropolitan Area Networks or MANs are large computer networks usually
spanning a campus or a city. They typically use wireless infrastructure or optical fiber
connections to link their sites. For instance a university or college may have a MAN that
joins together many of their local area networks (LANs) situated around site of a fraction
of a square kilometer. It may cover a group of nearby corporate offices or a city and
could either be private or public
public. It can
an support both data & voice, and might even be
related to the local cable television network.
Dear learner! A computer network that spans a relatively large geographical area.
Typically, a WAN consists of ttwo
wo or more LANs. Computers connected to a wide-area
wide
network are often connected through public networks, such as the telephone system. They
can also be connected through leased lines or satellites. The largest WAN in existence is
the internet.
• Based on security and access, we may classify networks into peer-to-peer and
client/server networks technologies:
i. Peer-to-peer networks – all computers are equal - they are peers.
Each computer can be a client that requests resources and a server that
provides resources upon request. They s are characterized by the
following:
Security is centralized and tighter. All user accounts are stored in the
same database on the server.
The network is highly scalable; you can have tens of thousands of
workstations in the network.
Introduction To Computer
7.4.1 Advantages: installing a network has its own great advantages from those:-
• Speed. Networks provide a very rapid method for sharing and transferring files.
Without a network, files are shared by copying them to floppy disks, then
carrying or sending the disks from one computer to another. This method of
transferring files (referred to as sneaker-net) is very time-consuming.
• Cost. Networkable versions of many popular software programs are available at
considerable savings when compared to buying individually licensed copies.
Besides monetary savings, sharing a program on a network allows for easier
upgrading of the program. The changes have to be done only once, on the file
server, instead of on all the individual workstations.
• Security. Files and programs on a network can be designated as "copy inhibit," so
that you do not have to worry about illegal copying of programs. Also, passwords
can be established for specific directories to restrict access to authorized users.
• Centralized Software Management. One of the greatest benefits of installing a
network at a school is the fact that all of the software can be loaded on one
computer (the file server). This eliminates that need to spend time and energy
installing updates and tracking files on independent computers throughout the
building.
• Resource Sharing. Sharing resources is another area in which a network exceeds
stand-alone computers. Most organizations cannot afford enough laser printers,
fax machines, modems, scanners, and CD-ROM players for each computer.
However, if these or similar peripherals are added to a network, they can be
shared by many users.
• Electronic Mail. The presence of a network provides the hardware necessary to
install an e-mail system. E-mail aids in personal and professional communication
for all school personnel, and it facilitates the dissemination of general information
Introduction To Computer
to the entire school staff. Electronic mail on a LAN can enable students to
communicate with teachers and peers at their own school. If the LAN is
connected to the Internet, students can communicate with others throughout the
world.
• Flexible Access. If you take School networks as example, allow students to
access their files from computers throughout the school. Students can begin an
assignment in their classroom, save part of it on a public access area of the
network, then go to the media center after school to finish their work. Students
can also work cooperatively through the network.
• Workgroup Computing. Workgroup software (such as Microsoft BackOffice)
allows many users to work on a document or project concurrently. For example,
educators located at various schools within a county could simultaneously
contribute their ideas about new curriculum standards to the same document and
spreadsheets.
• Expensive to Install. Although a network will generally save money over time,
the initial costs of installation can be prohibitive. Cables, network cards, and
software are expensive, and the installation may require the services of a
technician.
• Requires Administrative Time. Proper maintenance of a network requires
considerable time and expertise
• File Server May Fail. Although a file server is no more susceptible to failure
than any other computer, when the files server "goes down," the entire network
may come to a halt. When this happens, the entire may lose access to necessary
programs and files.
• Cables May Break. The Topology chapter presents information about the various
configurations of cables. Some of the configurations are designed to minimize the
inconvenience of a broken cable; with other configurations, one broken cable can
stop the entire network.
Data moves down a one-way path from one computer and if the
next computer is the recipient it accepts the data; otherwise it amplifies it and
sends it to the next computer down in the path.
Any break disrupts the entire network and hence the physical ring topology is
seldom used.
Today, the mesh topology is rarely used, and then only in a WAN environment
and only because the mesh topology is fault tolerant. Computers or network
devices can switch between these multiple, redundant connections if the need
arises. On the con side, the mesh topology is expensive and quickly becomes
too complex.
• Money. A linear bus network may be the least expensive way to install a network;
you do not have to purchase concentrators.
• Length of cable needed. The linear bus network uses shorter lengths of cable.
• Future growth. With a star topology, expanding a network is easily done by
adding another concentrator.
• Cable type. The most common cable in schools is unshielded twisted pair, which
is most often used with star topologies.
Twisted Pair
Ethernet
Linear Bus Coaxial
LocalTalk
Fiber
Twisted Pair
Tree Coaxial Ethernet
Fiber
ii. Token Passing – this media access method uses a special packet called a token. The
first computer turned on creates the token. It then passes the token on to the next
computer. The token passes around the network until a computer that has data to
send takes the token off the network, modifies it, and puts it back on the network
along with the data it has to send. Each station between the sender and the receiver
along the network reads the destination address in the token. If the destination
address doesn't match its own, the station simply sends the package on its way.
When the destination station recognizes its address in the destination address of the
token, the NIC copies the data into the station's memory and modifies the token,
indicating it has received the data. The token continues around the network until the
original sender receives the token back again. If the original sender has more data to
send, the process repeats itself. If not, the sender modifies the token to indicate that
the token is "free" for anyone else to use. With this method, there are no collisions
Introduction To Computer
7.9THE INTERNET
Dear learner! The Internet is a huge collection of computer networks that can
communicate with each other – a network of networks. It is an umbrella under which
many different networks, small or big, freely exchange information. When you connect to
the Internet from office or home, your computer becomes a small part of this giant
network.
To ensure the delivery of the data to the right computer, each computer on the Internet is
given an address. This address scheme is known as the Domain Name System.
Dear learner!You can connect to the Internet in one of two basic ways, dialing into an
Internet service provider's (ISP) computer called dial-up internet connection, or with a
direct connection to an Internet service provider called broad band or leased line internet
connection.
To establish a conventional dial-up connection to the Internet, you will need the
following:
An account with an ISP (a company that provides the Internet access, in
Ethiopia Telecommunication is an account provider)
A telephone connection:
Modem (external/internal): used to connect the telephone line to the computer
Introduction To Computer
Broad band internet connection you can also get a direct connection to your ISP,
where you have a fixed cable or a dedicated phone line to the ISP.
Dear learner!Since most computers were not similar, they had to share the same
language to understand each other. This is what gave birth to the various protocols.
Protocols are the formal rules governing the exchange of information between computers
so as to provide reliable and efficient transfer of information. Without protocols to guide
Introduction To Computer
the orderly exchange of data between points in a network, there would be chaos, not
communication. Detailed protocols are required to precisely define the format in which
data and system messages are to be sent. These also describe how a message is addressed
and govern network traffic flow by controlling priority, routing and sequencing of
messages.
Dear learner!When you send a message across the Internet to another user, TCP divides
the data into manageable units called packets and attaches to each packet the information
necessary to reassemble the data and check for errors. IP then labels all the packets with
a header containing the address of the destination and sends them on their way.
Once the packets reach their destination, the computer at the receiving end removes the
IP header and uses the data that TCP attached to each packet to make sure none of the
packets have been lost or damaged. The packets are then reassembled into the original
message. If the computer discovers a damaged packet, it sends a message to the sending
computer asking it to resend the packet.
Dear learner!You access pages on web servers by using a program called a browser. As
soon as you tell your browser what web page you want to view, it goes to the web server
that holds the page and retrieves it for you.
The links contained in web pages can point to areas within the same page, to other pages
residing on the same web server, or to pages sitting on a computer on the other side of the
world.
The term web site refers to a collection of one or more web pages on the web.
The relationship between Browsers and the web servers is a client/server relationship.
The client (your browser) requests information from the server (the web server containing
the requested information) and the server delivers it.
Social networking has encouraged new ways to communicate and share information.
Social networking websites are being used regularly by millions of people.
While it could be said that email and websites have most of the essential elements of
social network services, the idea of proprietary encapsulated services has gained popular
uptake recently.
The main types of social networking services are those which contain category divisions
(such as former school-year or classmates), means to connect with friends (usually with
self-description pages) and a recommendation system linked to trust. Popular methods
now combine many of these, with Facebook widely used worldwide; MySpace, Twitter
and LinkedIn being the most widely used in North America; Nexopia (mostly in Canada);
Bebo, Hi5, MySpace, dol2day (mostly in Germany), Tagged, XING;and Skyrock in parts
of Europe;Orkut and Hi5 in SouthAmerica and CentralAmerica; and Friendster, Multiply,
Orkut, Xiaonei and Cyworld in Asia and the Pacific Islands.
WWW uses Hypertext Mark-up language (HTML) to design a web document. WWW
has revolutionized the way the world is accessing the information on the Internet as:
The web is not linear - a user can click on any of the links and jump to the related
document.
The web is rich in media elements – it includes text, voice, video, pictures, etc.
The web is interactive - A web user can fill in forms on-line, run programs, select
options
Dear learner!Web Server - a program and a computer clubbed into one entity which
responds to the requests from web browsers for Internet resources.
Home Page - the first hypertext document to be shown when a user follows a link to the
web server.
Hyper Text Transfer Protocol (HTTP)- the protocol used by the Web to transfer
hypertext documents & other Internet resources.
Uniform Resource Locator (URL) - a special scheme that tells the user exactly where a
resource is located on the Internet. URL typically refers to the complete address of a
resource located on a computer on the Internet. For example:
http://www.hu.edu.et
Web Browser - a program that allows a user to display & interact with a hypertext
document.
Introduction To Computer
You can jump immediately to any site on the web by typing its URL in the Address Box
and pressing Enter.
Hyperlinks allow you to jump to another page on the web. Normally, hyperlink text is
underlined and appears in a different color on the web page. Browsers give you an
additional visual clue as well as when the mouse cursor passes over a hyperlink, it
changes to a hand with pointing finger.
Both Netscape and Internet Explorer remember your favorite web pages by using
bookmarks. You can instantly jump to any of your marked pages by selecting it from the
Bookmarks menu.
ii. E-Mail:
Dear learner!E-mail is the most widely used feature of the Internet. Using e-mail, a user
can send and receive mail through computers to and from any Internet user.
E-mail can be used transmit text, messages, audio and video clips.
E-Mail allows users to send a message to just one user or a group of users. Large
documents can be attached.
Users can read, print, forward, answer or delete a message.
E-mail is much cheaper and faster in comparison to other communication services.
Each E-mail user is assigned a unique address, which is used by the e-mail network to
deliver the message.
Dear learner!Internet offers FTP (File Transfer Protocol). FTP allows a user to transfer
data between computers on the Internet. FTP can send and receive data to/from any
distant computer on the Internet from/to the user's computer.
FTP provides commands that allow users to manage files. The FTP applications allow the
users to download files from computers connected to the Internet.
Telnet is another popular feature available on the Internet. It is a program that allows one
computer to connect to another computer, anywhere in the world.
iv . Telnet
Dear learner!Telnet is a program that allows you to log into computers on the Internet
and then enter commands which will be executed as if you were entering them directly on
the server. There are no graphics in Telnet sessions, just text. To Telnet to a computer,
you must know its address. This can consist of domain name (locis.loc.gov) or IP address
(140.147.254.3).
On the Web, HTTP and FTP protocols allow you to request specific files from remote
computers, but not to actually be logged on as a user of that computer. With Telnet, you
log on as a regular user with whatever privileges you may have been granted to the
specific application and data on that computer.
v . Usenet News
Dear learner!Usenet News is a global electronic bulletin board system in which millions
of computer users exchange information on a vast range of topics. The major difference
between Usenet News and e-mail discussion groups is the fact that Usenet messages are
stored on central computers, and users must connect to these computers to read or
download the messages posted to these groups. This is distinct from e-mail distribution,
in which messages arrive in the electronic mailboxes of each list member.
There are thousands of Usenet newsgroups. These range from academic to recreational
topics. Serious computer-related work takes place in Usenet discussions.
Usenet is not as popular nowadays as it once was. Blogs and RSS (Rich Site Summary)
feeds are newer modes of communication that have caught the interest of Internet users.
Introduction To Computer
Dear learner!Chat programs allow users on the Internet to communicate with each other
by typing in real time. They are sometimes included as a feature of a Web site, where
users can log into the "chat room" to exchange comments and information about the
topics addressed on the site.
Internet Relay Chat (IRC) is a service through which participants can communicate to
each other on hundreds of channels. These channels are usually based on specific topics.
While many topics are frivolous, substantive conversations are also taking place. To
access IRC, you must use an IRC software program.
After successfully completing this unit, the learner should able to:
Understand what a computer security mean
Describe The Need for Security:
Describe Security Threats
Understand Motives, Goals, and Objectives of Malicious Attackers
Explore Security Vulnerabilities
Describe Security Policies and plans.
8.1 INTRODUCTION
Introduction To Computer
Some Examples:
Chinese Foreign Ministry spokesman Zhu Bangzao rejected allegations that China
stole U.S. nuclear secrets, saying such claims are meant to undermine China-U.S.
relations. Meanwhile, a CIA-led task force was assessing how much damage may have
been done to U.S. national security after a Chinese scientist at the Los Alamos
National Laboratory in New Mexico allegedly shared nuclear secrets.
Dear learner! Two parties agree and seal their transaction using digital signatures.
The signature cannot be ruled invalid by state legislature or other law-making bodies
because it uniquely identifies the individuals involved.
Dear learner! You visit a Web site and the site collects more personal information
than you are willing to divulge or the site distributes data to outside parties. By doing
this, it compromises your privacy and opens your world to other parties.
The World Wide Web Consortium (W3C) is developing the Platform for Privacy
Preferences Project (P3P)
Dear learner! We need to know the value of the information as defined above in order
to develop protective measures that will protect the information from the outside
world, while allowing known individuals with unique identities the access required.
Here are some protective measures to consider:
Introduction To Computer
Prevention:
Take measures that prevent your information from being damaged, altered, or stolen.
Preventive measures can range from locking the server room door to setting up high-
level security policies.
Detection:
Take measures that allow you to detect when information has been damaged, altered,
or stolen, how it has been damaged, altered, or stolen, and who has caused the damage.
Various tools are available to help detect intrusions, damage or alterations, and viruses.
Reaction:
Take measures that allow recovery of information, even if information is lost or
damaged.
The above measures are all very well, but if we do not understand how information
may be compromised, we cannot take measures to protect it. Here are some
components that we can examine on how information can be compromised:
Confidentiality:
The prevention of unauthorized disclosure of information. This can be the result of
poor security measures or information leaks by personnel. An example of poor security
measures would be to allow anonymous access to sensitive information.
Integrity:
The prevention of erroneous modification of information. Authorized users are
probably the biggest cause of errors and omissions and the alteration of data. Storing
incorrect data within the system can be as bad as losing data. Malicious attackers also
can modify, delete, or corrupt information that is vital to the correct operation of
business functions.
Availability:
Introduction To Computer
Authentication:
The process of verifying that users are who they claim to be when logging onto a
system. Generally, the use of user names and passwords accomplishes this. More
sophisticated is the use of smart cards and retina scanning. The process of
authentication does not grant the user access rights to resources—this is achieved
through the authorization process.
Authorization:
The process of allowing only authorized users access to sensitive information. An
authorization process uses the appropriate security authority to determine whether a
user should have access to resources.
Dear learner! There is a price to pay when a half-hearted security plan is put into
action. It can result in unexpected disaster. A password policy that allows users to use
blank or weak passwords is a hacker’s paradise. No firewall or proxy protection
between the organization’s private local area network (LAN) and the public Internet
makes the company a target for cyber crime.
Introduction To Computer
Organizations will need to determine the price they are willing to pay in order to
protect data and other assets. This cost must be weighed against the costs of losing
information and hardware and disrupting services. The idea is to find the correct
balance. If the data needs minimal protection and the loss of that data is not going to
cost the company, then the cost of protecting that data will be less. If the data is
sensitive and needs maximum protection, then the opposite is normally true.
Security Threats
The first part of this section outlines security threats and briefly describes the methods,
tools, and techniques that intruders use to exploit vulnerabilities in systems to achieve
their goals.
Security Threats, Attacks, and Vulnerabilities
Dear learner! Information is the key asset in most organizations. Companies gain a
competitive advantage by knowing how to use that information. The threat comes from
others who would like to acquire the information or limit business opportunities by
interfering with normal business processes.
Dear learner! Threats can originate from two primary sources: humans and nature.
Human threats subsequently can be broken into two categories: malicious and non-
non
malicious. The non-malicious
malicious “attacks” usually come from users and employees who
are not trained on computers or are not aware of various computer security threats.
Malicious attacks usually come from non
non-employees
employees or disgruntled employees who
have a specific goal or objective to achieve.
Figure 1 introduces a layout that can be used to break up security threats into
different areas.
Figure 1
Natural Disasters
Dear learner! Nobody can stop nature from taking its course. Earthquakes, hurricanes,
floods, lightning, and fire can cause severe damage to computer systems. Information
can be lost, system downtime or loss of productivity can occur, and damage to
hardware can disrupt
srupt other essential services.
Few safeguards can be implemented against natural disasters. The best approach is to
have disaster recovery plans and contingency plans in place. Other threats such as
riots, wars, and terrorist attacks could be included here.
re. Although they are human-
human
caused threats, they are classified as disastrous.
The most dangerous attackers are usually insiders (or former insiders), because they
know many of the codes and security measures that are already in place. Insiders are
likely to have specific goals and objectives, and have legitimate access to the system.
Employees are the people most familiar with the organization’s computers and
applications, and they are most likely to know what actions might cause the most
damage.
The insider attack can affect all components of computer security. By browsing
through a system, confidential information could be revealed. Insider attacks can affect
availability by overloading the system’s processing or storage capacity, or by causing
the system to crash.
Dear learner! People often refer to these individuals as “crackers” or “hackers.” The
definition of “hacker” has changed over the years. A hacker was once thought of as
any individual who enjoyed getting the most out of the system he or she was using. A
hacker would use a system extensively and study it until he or she became proficient in
all its nuances. This individual was respected as a source of information for local
computer users, someone referred to as a “guru” or “wizard.”
Now, however, the term hacker refers to people who either break in to systems for
which they have no authorization or intentionally overstep their bounds on systems for
which they do not have legitimate access.
Dear learner! The correct term to use for someone who breaks in to systems is a
“cracker.” Common methods for gaining access to a system include password
cracking, exploiting known security weaknesses, network spoofing, and social
engineering.
Malicious attackers normally will have a specific goal, objective, or motive for an
attack on a system. These goals could be to disrupt services and the continuity of
business operations by using denial-of-service (DoS) attack tools. They might also
Introduction To Computer
want to steal information or even steal hardware such as laptop computers. Hackers
can sell information that can be useful to competitors.
Dear learner! In 1996, a laptop computer was stolen from an employee of Visa
International that contained 314,000 credit card accounts. The total cost to Visa for
just canceling the numbers and replacing the cards was $6 million.
SecurTek Corporation, http://www.securtekcorporation.com/Protect1.ht
Attackers are not the only ones who can harm an organization. The primary threat to
data integrity comes from authorized users who are not aware of the actions they are
performing. Errors and omissions can cause valuable data to be lost, damaged, or
altered.
Non-malicious threats usually come from employees who are untrained in computers
and are unaware of security threats and vulnerabilities.
Figure 2
Introduction To Computer
The following table gives some examples of the various aspects discussed above.
Note that ignorant employees usually have no motives and goals for causing damage.
The damage is accidental. Also, malicious attackers can deceive ignorant employees
by using “social engineering” to gain entry. The attacker could masquerade as an
administrator and ask for passwords and user names. Employees who are not well
trained and are not security aware can fall for this.
There is a strong overlap between physical security and data privacy and integrity.
Indeed, the goal of some attacks is not the physical destruction of the computer system
but the penetration and removal or copying of sensitive information. Attackers want to
achieve these goals either for personal satisfaction or for a reward.
April 27, 2000: Cheng Tsz-chung, 22, was put behind bars last night after changing
the password on
another user’s account and then demanding $500 (Hong Kong currency) to change it
back. The victim paid
the money and then contacted police. Cheng has pleaded guilty to one charge of
unauthorized access of a
computer and two counts of theft. The magistrate remanded Cheng in custody and
said his sentence, which
will be handed down on May 10 pending reports, must have a deterrent effect.
Cheng’s lawyer told
Magistrate Ian Candy that his client committed the offenses “just for fun.”
Viruses. Attackers can develop harmful code known as viruses. Using hacking
techniques, they can break into systems and plant viruses. Viruses in general are
a threat to any environment. They come in different forms and although not
always malicious, they always take up time. Viruses can also be spread via e-mail
and disks.
Trojan horses. These are malicious programs or software code hidden inside
what looks like a normal program. When a user runs the normal program, the
hidden code runs as well. It can then start deleting files and causing other damage
to the computer. Trojan horses are normally spread by e-mail attachments. The
Melissa virus that caused denial-of-service attacks throughout the world in 1999
was a type of Trojan horse.
Worms. These are programs that run independently and travel from computer to
computer across network connections. Worms may have portions of themselves
running on many different computers. Worms do not change other programs,
although they may carry other code that does.
Password cracking. This is a technique attackers use to surreptitiously gain
system access through another user’s account. This is possible because users
Introduction To Computer
often select weak passwords. The two major problems with passwords is when
they are easy to guess based on knowledge of the user (for example, wife’s
maiden name) and when they are susceptible to dictionary attacks (that is, using a
dictionary as the source of guesses).
Denial-of-service attacks. This attack exploits the need to have a service
available. It is a growing trend on the Internet because Web sites in general are
open doors ready for abuse. People can easily flood the Web server with
communication in order to keep it busy. Therefore, companies connected to the
Internet should prepare for (DoS) attacks. They also are difficult to trace and
allow other types of attacks to be subdued.
E-mail hacking. Electronic mail is one of the most popular features of the
Internet. With access to Internet e-mail, someone can potentially correspond with
any one of millions of people worldwide. Some of the threats associated with e-
mail are:
Impersonation. The sender address on Internet e-mail cannot be trusted because the
sender can create a false return address. Someone could have modified the header in
transit, or the sender could have connected directly to the Simple Mail Transfer
Protocol (SMTP – the protocol used for sending e-mail) port on the target computer to
enter the e-mail.
Eavesdropping. E-mail headers and contents are transmitted in the clear text if no
encryption is used. As a result, the contents of a message can be read or altered in
transit. The header can be modified to hide or change the sender, or to redirect the
message.
term for tricking people into revealing their password or some form of security
information.
Intrusion attacks.In these attacks, a hacker uses various hacking tools to gain
access to systems. These can range from password-cracking tools to protocol
hacking and manipulation tools. Intrusion detection tools often can help to detect
changes and variants that take place within systems and networks.
networking, once a hacker connects to that one computer, the hacker can often
connect to any other computer in the network.
Some Examples:
Example 1: non-malicious
malicious threat (ignorant employees).
An employee known here as John Doe copies games and other executables from a 1.44
MB disk onto his
local hard drive and then runs the executables. Unfortunately, the games contained
various viruses and
Trojan horses. The organization had not yet deployed any anti-virus
virus software. After a
short time, John Doe
and other employees began to notice strange and unforeseen events occurring on their
computers, causing
disruption of services and possible corruption of data. The following figure explains
the various
vulnerabilities
erabilities that existed and the loss in assets that are involved.
Figure 3
An employee known here as Sally was turned down for promotion three times. Sally
believes that she has
Introduction To Computer
put in a considerable amount of work and overtime and is being turned down for
promotion because she is
too young. Sally has a degree in computer science and decides to resign from the
company and take
revenge on it by causing the company’s Web server to stop servi
servicing
cing requests. Sally
uses a denial-of
service attack tool called Trin00 to start an attack on the company’s Web server.
Most of the company’s business is conducted via ee-commerce
commerce and clients are
complaining that they cannot
connect to the Web server. The ffollowing
ollowing diagram outlines the various tools and
vulnerabilities Sally used to
achieve her goal.
Figure 4
An organization has various modems and Integrated Services Digital Network (ISDN)
router installations and does not hhave
ave surge protection. During a thunderstorm,
lightning strikes the telephone and ISDN lines. All modems and ISDN routers are
destroyed, taking with them a couple of motherboards. The following diagram shows
the vulnerability and the loss of assets.
Introduction To Computer
Figure 5
Understand
rstand and implement security policy.
Security policy enforces uniform security standards for groups of users. Security policy
is used to establish a basis of security for the environment. Different from user rights
and permissions, security policy applies to all users or objects in the deployment.
Implementing the appropriate security standards is a key issue for most organizations.
To implement security standards, devise a security plan that applies a set of security
technologies consistently to protect the organization’s resources.
For starters, the easiest way to deal with security policies is to use some pre-written “off
the shelf”. This is certainly a reasonable approach, but it is important to ensure that the
policies are of the requisite standard, and perhaps are compliant with standards.
An example: http://www.securitypolicy.co.uk/secpolicy/
Introduction To Computer
Conclusion
Malicious attackers will use various methods, tools, and techniques to exploit
vulnerabilities in security policies and controls to achieve a goal or objective. Non-
malicious attacks occur due to poor security policies and controls that allow
vulnerabilities and errors to take place. Natural disasters can occur at any time, so
organizations should implement measures to try to prevent the damage they can cause.