Professional Documents
Culture Documents
to
Information
Technology
Computer Basics
Computer is an electronic device that performs mathematical and non-mathematical operations with the help of instructions to process the
given information to achieve desired results.
CHARACTERISTICS OF COMPUTERS
Speed: Computers have tremendous processing speed. The speed of computers is calculated in MHz (Megahertz).
Accuracy: Computers are very accurate. Error can only occur due to faulty instructions or hardware malfunctioning.
Diligence: Computer being a machine, does not suffer from the human traits of tiredness and lack of concentration.
Reliability: Computers at the hardware level do not require human intervention between its processing operations.
Storage Capability: Computers can store large amounts of data and can recall the required information almost instantaneously.
Versatility: Computers can perform multiple tasks simultaneously with equal ease.
Resource Sharing: Computers allows sharing of costly resources, such as printers, scanners.
EVOLUTION OF COMPUTERS
Humans invented many tools to develop efficient computing devices before technology was advanced to computers. Some of them are:
Abacus Napier Bones Slide Rule Pascaline Stepped Reckoner
Difference Engine Analytical Engine Hollerith's Tabulator
GENERATIONS OF COMPUTERS
The history of computer development is often discussed with reference to the different generations of computing devices.
CLASSIFICATION OF COMPUTERS
Micro Computers: A small, low cost digital computer, which usually consists of a micro-
processor, a storage unit, an input channel, and an output channel, all of which may be on
one chip inserted into one or several PC boards. Micro computers include desktop, laptop,
and hand-held models such as PDAs (Personal Digital Assistants). Laptop PDA
Mini Computers: A small digital computer, which normally is able to process and store less data than a mainframe but more than a micro
computer, while doing so less rapidly than a mainframe but more rapidly than a micro computer.
Mainframe: An ultra-high performance computer made for high-volume, processor-intensive computing which consists of a high-end
computer processor, with related peripheral devices, capable of supporting large volumes of data processing, high performance on-line
transaction processing systems, and extensive data storage and retrieval.
Super Computers: A computer that has highest processing speed for solving scientific and engineering problems. Contains a number of
CPUs that operate in parallel to make it faster.
THE COMPUTER SYSTEM
Consists of a number of interrelated components that work together with the aim of converting
data into information. A computer system comprises of four components:
Central Processing Unit (CPU): This unit performs processing of instructions and data inside
the computer.
Input Unit: This component accepts instructions and data.
Output Unit: This unit communicates the results to the user.
Storage Unit: This unit stores temporary and final results.
APPLICATIONS OF COMPUTERS
Nowadays, computer technology has revolutionised the businesses and other aspects of human
life (directly or indirectly) and are dependent on computers for information processing. They not Typical Hardware and Peripherals in a
only save time, but also save paper work. Some of the areas where computers are being used Computer System
are: Science, Education, Medicine and Health Care, Entertainment, Communication,
Engineering/Architecture/ Manufacturing, Business Application, Publishing, Banking
Computer Organisation and Architecture
Each computer has a visible structure, which is referred to as its architecture. The concept of architecture and making these hardware
components work in a harmonised manner in order to achieve a common objective in an environment is known as computer organisation.
INSIDE A COMPUTER
To ensure better performance and increase the life of the small, sensitive, and expensive
components, they are placed inside a metal enclosure called system case or cabinet. These
components include power supply, motherboard, ports and interfaces, expansion cards,
cables, memory chips, storage devices, processors, and many others.
System Case
DATA REPRESENTATION IN COMPUTER
A number system defines a set of values used to represent quantity. The number systems can be categorised into two broad categories:
Non-Positional Number Systems
Positional Number Systems
2 16 Remainder = 1 × 2 4 + 1 × 2 3 + 0 × 22 + 1 × 2 1 + 0 × 20
2 8 0 = 16 + 8 + 0 + 2 + 0 = 26
2 4 0 Decimal equivalent of (11010)2 is (26)10
2 2 0
1 0
Binary equivalent of (16)10 is (10000)2
8 359 Remainder = 4 × 8 2 + 5 × 81 + 6 × 80
8 44 7 = 256 + 40 + 6 = 302
8 5 4 Decimal equivalent of (456)8 is (302)10
Decimal to Octal Octal to Decimal
(359)
8 10 0 5 (456)8
Octal equivalent of (359)10 is (547)8
Decimal to Hexadecimal Hexadecimal to Decimal
(5112)10 (B14)16
CODING SCHEMES
Data can be arranged in a way that is very simple and easy to decode, or transmitted with varying degrees of redundancy for error
detection and correction. The most commonly used coding systems are:
American Standard Code for Information Interchange (ASCII): The standard binary code for the alphanumeric characters is ASCII. This
code was originally designed as a 7-bit code. Several computer manufacturers cooperated to develop this code for transmitting and
processing data. In ASCII, upper case letters are assigned codes beginning with hexadecimal value 41 and continuing sequentially through
hexadecimal value 5A and lower case letters are assigned hexadecimal values of 61 through 7A. The decimal values 1 to 9 are assigned
the zone code 0011 in ASCII.
Unicode: Before the invention of Unicode, hundreds of different encoding systems for assigning numbers were used. As no single
encoding system could contain enough characters to assign the numbers, this made the task very difficult. Even for a single language like
English, no single encoding was adequate for all the letters, punctuation, and technical symbols in common use. Moreover, these encoding
systems also conflicted with one another. Therefore, to overcome these issues, Unicode encoding system was developed.
Computer Memory and Storage
Memory refers to the electronic holding place for instructions and data where the computer’s microprocessor can reach quickly. Memory
can classified into two broad categories: primary memory and secondary memory.
Memory Representation
The basic unit of memory is bit. Digital computers work on only two states, ON (1) and OFF (0). The various units, used to measure
computer memory, are: bit, byte, kilobyte, megabyte, gigabyte, and terabyte.
MEMORY HIERARCHY
The processor is the “brain” of the computer where all the essential
computing takes place. The memory in a computer system is of three types:
Internal Processor Memory: Includes cache memory and special registers.
Primary Memory: Includes Random Access Memory (RAM) and Read Only
Memory (ROM), also known as main memory.
Secondary Memory: Includes hard disk, magnetic disk, and magnetic tapes,
also known as auxiliary memory.
Memory Hierarchy
RANDOM ACCESS MEMORY (RAM)
RAM allows the computer to store data for immediate manipulation and to keep track of what is currently being processed. It is the place in a
computer where the operating system, application programs, and data in current use are kept so that they can be accessed quickly by the
computer's processor.
Types of RAM
Static RAM: This RAM retains its contents as long as power remains applied to the memory chips. SRAM does not need to be 'refreshed'
(pulse of current through all the memory cells) periodically.
Dynamic RAM: This RAM must be continually 'refreshed' in order to maintain the data. This is done by placing the memory on a refresh
circuit that rewrites the data several hundred times per second.
Types of ROM
Masked ROM: The very first ROM was a hard-wired device that
contained a pre-programmed set of data/instructions. This kind
of ROM is known as masked ROM.
Programmable ROM (PROM): Creating a ROM chip from
scratch is time-consuming and expensive. Thus, developers
created a type of ROM known as Programmable Read-only
Memory (PROM), which can be programmed.
Erasable Programmable ROM (EPROM): An EPROM can be
erased by simply exposing the device to a strong source of
ultraviolet light for a certain amount of time and programmed
repeatedly.
Electrically Erasable Programmable ROM (EEPROM): This type of ROM can
be erased by an electrical charge and then written to by using slightly higher-
than-normal voltage. EEPROM can be erased one byte at a time, rather than
erasing the entire chip.
Flash ROM: It is a type of constantly powered non-volatile memory that can be
erased and re-programmed in blocks. It is a variation of EEPROM, which, unlike
flash memory, is erased and rewritten at the byte level. RAM, ROM, and CPU INTERACTION
OPTICAL DISK
An optical disk is a flat, circular, plastic disk coated with material on which bits may be stored in the form of highly reflective areas and
significantly less reflective areas, from which the stored data may be read when illuminated with a narrow-beam source, such as a laser
diode. An optical disk consists of single long track in the form of spiral shape. This track starts from the outer edge and spirals inward to
the centre of the disk. Data can be written, but cannot be erased from an optical disk.
Types of Optical Disks
Compact Disc-Read Only Memory (CD-ROM): As the name implies, CD-ROM comes pre-recorded with data, which cannot be altered.
Digital Versatile/Video Disk-Ready Only Memory (DVD-ROM): These types of disks are high-capacity data storage medium. In DVD, the
tracks are placed closer together, thereby allowing more tracks per disc. The pits, in which the data is stored, are also a lot smaller, thus
allowing more pits per track.
Write Once-Read Many (WORM): These types of disks can be used to read as well as to write (usually once) data onto their surfaces.
INPUT DEVICES
Keyboard
A keyboard is the most common data entry device that allows the user
to enter data into a computer by simply pressing keys.
Speech Recognition
Digital Camera
Digital camera stores images digitally rather than recording them on a film. Once a snap is taken, it can be
downloaded to a computer system and then manipulated with an image editing software and printed.
Digital Camera
Scanners
A scanner scans an image and transforms the image to ASCII codes and graphics. Scanners use a light beam to scan the input data.
These can be edited, manipulated, combined, and then printed using image editing software. The two most common types of scanners are
hand-held and flat-bed.
Optical Scanners
These scanners are the alternative methods to input data instead of entering data through keyboard. The four types of optical scanners
are:
Optical Character Recognition (OCR): It is a process of scanning Magnetic-Ink Character Recognition (MICR): It refers to the
printed pages as images on a flat-bed scanner and then using special magnetic encoding, printed on the bottom of a negotiable
OCR software to recognise the letters as ASCII text. cheque. This information is machine readable via bank
reader/sorters, which read the visual patterns and magnetic
Optical Mark Recognition (OMR): It is the process of detecting
waveforms of the MICR encoding.
the presence of intended marked responses. A special device
known as optical mark reader does optical mark reading. Bar Code Reader: It is a machine-readable code in the form of a
pattern of parallel vertical lines of varying widths. These codes are
sensed and read by a bar code reader by means of reflective light.
TYPES OF OUTPUT DEVICES
Output is the data that has been processed into useful information. It can be displayed or viewed on a monitor, printed on a printer, or
listened through speakers or a headset. Output, which can be easily understood and used by human beings, are of the following two forms:
Hard Copy: The physical form of output is known as hard copy. It refers to the recorded information copied from a computer onto paper or
some other durable surface, such as printers, plotters, microfilm.
Soft Copy: The electronic version of an output, which usually resides in computer memory and/or on disk, is known as soft copy. It is
transient and is usually displayed on monitors, and audio response.
Printers
A printer prints information and data from the computer onto a paper. Printers are
divided into two categories:
Impact printers: Impact printers work by physically striking a head or needle against
an ink ribbon to make a mark on the paper. This includes dot matrix printers, daisy
wheel printers, and drum printers.
Non-impact printers: Non-impact printers use techniques other than physically
striking the page to transfer ink onto the page. This includes ink-jet and laser printers.
Dot Matrix Printer Laser Printer
Plotters
Plotter is a pen-based output device that is attached to a computer for making vector
graphics. It is used to draw high-resolution charts, graphs, blueprints, maps, circuit
diagrams, and other line-based diagrams. They are mainly used for Computer Aided
Design (CAD) and Computer Aided Manufacturing (CAM) applications. There are two
different types of plotters: drum plotter and flat-bed plotter.
Plotters
Computer Monitor
The monitor is the most frequently used soft copy output device. A computer
monitor is a TV like display attached to the computer on which the output can be
displayed and viewed. Nowadays, most computer monitors are based on Cathode
Ray Tube (CRT) technology. A CRT monitor displays colour pictures by using a
combination of phosphors that emit different-coloured light.
Cathode Ray Tube
Audio Output
Audio response is an output media, which produces either verbal or audio
responses from the computer system. The standard computer system can
provide audio output with the addition of two components: a speech synthesiser
that does the speaking and a screen reading software that tells the synthesiser Audio Output
what to say.
TERMINALS
Computer terminal is a special unit that can perform both input and output. A terminal is an I/O device that uses a keyboard for input and a
monitor for output. Terminals can be categorised into the following types:
Dumb Terminal: It refers to a terminal that has no processing or programming capabilities.
Smart Terminal: It has built-in processing capability and memory but does not have its own storage capacity.
Intelligent Terminal: It has memory and it has inbuilt microprocessors, therefore, it is also known as a user-programmable terminal.
Operating System
Operating system is a collection of system programs that together control the operation of a computer system. Operating system along
with hardware, application and other system software, and users constitute a computer system.
Process Management
As a process manager, the operating system handles the creation and deletion of processes, suspension and resumption of processes,
and scheduling and synchronisation of processes.
Life Cycle of a Process
A process is an execution of sequence of instructions or program
by CPU. Various states that a process changes during execution:
New: The process is being created.
Ready: The process is ready to be assigned to the processor.
Running: The process is being executed.
Waiting: The process is waiting for signal from other process.
Terminated: The process has finished its execution.
File Management
The operating system is responsible for creation and deletion of files and directories. It also takes care of other file-related activities such as
organising, storing, retrieving, naming, and protecting the files.
Device Management
Operating system provides input/output subsystem between process and device driver. It handles the device caches, buffers, and
interrupts. Operating system also detects device failures and notifies the same to the user.
Spooling
Spooling refers to storing jobs in a buffer, a special area in memory or on a disk
where a device can access them when it is ready. Spooling is useful because
devices access data at different rates. The most common spooling application is
print spooling.
Spooling
Security Management
The operating system protects system resources and information against destruction and unauthorised access. Various security techniques
employed by the operating system are, user authentication and backup of data.
User Interface
Operating system provides the interface between the user and the hardware. A user interface is a set of commands or menus through
which a user communicates with the system. Common interfaces provided by different operating systems can be categorised as:
Command Line Interface (CLI)
Graphical User Interface (GUI)
THE DESKTOP
Desktop is the first screen visible after logging in Windows XP. The Desktop is
a full-screen display where all Windows activities take place. It is part of a GUI,
where icons, menus, and dialog boxes on the screen represent programs, files,
and options on computer.
Taskbar
The taskbar is used as a link to easily open and close programs. It also allows
you to switch between the open application programs and files. By default, the
taskbar is placed at the bottom of the Desktop screen. Taskbar includes Start
Menu, Quick Launch Toolbar, and System Tray.
Desktop
Desktop Icons
Customising Desktop
The Desktop includes icons, each having a specific function. Desktop icons can
Windows XP allows you to customise the desktop
be thought of as symbols that represent a program or shortcut to a program, or
according to your preference. The desktop can be
a folder. The simplest way to organise the icons is to drag them to a new
changed by modifying the colour scheme of Windows,
location with the mouse. To use Windows XP in-built feature for organising
wallpaper, screensaver, settings, and much more.
icons, right-click anywhere on the Desktop and select the desired option.
MY COMPUTER
My Computer allows users to access disk drives, view and manage files and
folders, and access other areas of operating system such as Control Panel and
installed Printers. This window has many parts, these are:
Title Bar Menu Bar
Toolbar Address Bar and Status Bar
Windows Pane Area Working with Views
My Computer Window
WORKING WITH FILES AND FOLDERS
A file is defined as an organised and structured collection of related information stored in the computer’s
memory. A folder is a collection of files and subfolders in an organised way on a computer’s hard drive or on a
removable drive. Any file or folder can be renamed, moved, or copied to any other location on the computer.
Creating Files and Folders
Since the hard drive can store tens of thousands of files, generally a common practice is to create folders to
help in keeping files organised on the hard drive. Folders can be created on Desktop, in My Documents
folder or at any other location.
Moving and Copying Files and Folders
Copying file or folder is similar to the cut operation, except that copy command retains the file or folder at the Folders and Subfolders
original place, but in case of cut, the file or folder is removed from the original location.
Renaming File and Folders
Sometimes you may be required to rename a file or folder. Right-click on the file or a folder name and select Rename, here enter the new
file or folder name and press the Enter key.
Deleting File and Folders
If you wish to delete a file or folder, select the file or folder and right-click on the file or folder and press Delete key.
Recycle Bin
The Recycle Bin is a temporary storage area where you can move any files or folders that you no longer need. An item remains in the
recycle bin until you decide to permanently delete it or restore it.
WINDOWS EXPLORER
Windows XP provides a very useful feature called Windows Explorer,
which helps you to organise files and folders stored on a computer in
an efficient manner.
Search Results
INFORMATION
Information is the processed data, on which decisions are taken and the
subsequent actions are performed thereafter. For decisions to be meaningful and
useful, the information must possess the following attributes: Accurate, Timely,
Complete, Precise, and Relevant.
TECHNOLOGY
Technology is the study of science. It is the specific information and knowledge required for the practical purposes like development in
various fields. Some of the advantages of technology are:
Makes work Easy
Fast
Helpful in Performing Creative Work
INFORMATION TECHNOLOGY
Information Technology (IT) refers to scientific, technological, and engineering
disciplines as well as management technologies used in information handling,
communication, processing, their applications and associated software, equipment
and their interaction. The essential components of IT comprises of Hardware,
Software, Data, and People.
Intranet
CAREERS IN IT INDUSTRY
The fast spread of IT has generated versatile jobs such as programmer, systems
analyst, network administrator, database administrator, web designers, information
security analyst, and many more.
Careers in IT
Multimedia Essentials
Multimedia can be described as an integration of multiple media elements together to influence the given information so that it can be
presented in an attractive and interactive manner.
MULTIMEDIA SYSTEM
A multimedia system is a system capable of processing multimedia data
and applications. It is characterised by processing, storage, generation,
manipulation, and rendition of multimedia information.
VIRTUAL REALITY
Virtual reality can be described as an artificial environment that is created by using special
computer hardware and software, which is presented to the user in such a manner that it appears
and feels like a real three-dimensional world. Some of the devices that are used in virtual reality
are:
Head Mounted Display (HMD): HMD has two miniature display screens and an optical system
that channels the images from the screens to the eyes, thereby, presenting a 3D view of the
virtual world.
Data Gloves: Glove is equipped with sensors that sense the movements of the hand and
interfaces those movements with a computer.
Software: Software gives the wearer of this special headgear and gloves the interactive sensory
experience that feels like an alternative to real-world experiences. Using HMD and Data Gloves
Computer Programming and Languages
Computers work on a set of instructions called computer program, which clearly
specify the ways to carry out a specific task.
FLOWCHART
A flowchart is a pictorial representation of an algorithm in which the steps are drawn in the form of different shapes of boxes and the logical
flow is indicated by interconnecting arrows. The boxes represent operations and the arrows represent the sequence in which the
operations are implemented.
Benefits of Flowcharts
Makes Logic Clear Communication Effective Analysis
Useful in Coding Proper Testing and Debugging Appropriate Documentation
Limitations of Flowcharts
Complex Costly Difficult to Modify
No Update
Flowchart Symbols
A flowchart uses special shapes to represent different types of actions or steps in a process. Some standard symbols, which are frequently
required for flowcharts, are:
Flowchart Symbols
PSEUDOCODE
Pseudocode is a generic way of describing an algorithm without using any specific programming language-related notations. It is an outline
of a program, written in a form, which can easily be converted into real programming statements.
PROGRAMMING PARADIGMS
Different types of programming paradigms have been developed in order to minimise the programming efforts. Programming paradigm
refers to how a program is written in order to solve a problem. Programming can be classified into three categories:
Unstructured Programming: Unstructured style of programming refers to writing small and simple programs consisting of only one main
program. All the actions such as inputs, outputs, and processing are done within one program only.
Structural Programming: Using structural programming, a program is broken down into small independent tasks that are small enough to
be understood easily, without having to understand the whole program at once. Each task has its own functionality and performs a specific
part of the actual processing. These tasks are developed independently, and each task can carry out the specified task on its own, without
the help of any other task. When these tasks are completed, they are combined together to solve the problem.
Object-Oriented Programming: Object-oriented programming is a style of computer programming, which promotes building of
independent pieces of code that interact with each other. It allows pieces of programming code to be reused and interchanged between
programs.
Characteristics of a Good Program
Portability Readability Efficiency Structural
Flexibility Generality Documentation
PROGRAMMING LANGUAGES
Programming language is a language that a user employs to interact with the computer. They can be divided into three major categories:
Machine Language: It is the native language of computers. It uses only 0s and 1s to represent data and the instructions written in this
language, consist of series of 0s and 1s.
Assembly Language: It correspondences symbolic instructions and executable machine codes and was created to use letters instead of
0s and 1s to run a machine. Together, machine and assembly language are also known as low-level languages.
High-level Language: These languages are written using a set of words and symbols following some rules similar to a natural language
such as English. The programs written in high-level languages are known as source programs and these programs are converted into
machine-readable form by using compilers or interpreters.
TYPES OF SOFTWARE
Software can be categorised as system software and application software.
System Software
System software contribute to the control and performance of the computer system and
Software Categories
permit the user to use the system more conveniently. Some examples of system software
are operating systems, device drivers, language translators, and system utilities.
Operating System: Operating system is responsible for performing basic tasks such as
recognising input from the keyboard, sending output to the display screen, keeping track of
files and directories on the hard disk, and controlling peripheral devices such as printers
and modems.
Device Drivers: Device drivers are responsible for proper functioning of devices. Every
device or hardware, whether it is a printer, monitor, mouse or keyboard, has a driver
program for support. System Software, Application Software
Language Translators: Language translators are tools, which translate a program written and Hardware
in a programming language to machine language. Along with every programming
developed,
language a language translator is also developed, which accepts the programs written in a programming language and execute them by
transforming them into a form suitable for execution.
System Utility: System utility programs perform day-to-day tasks related to the maintenance of the computer system. They are used to
support, enhance, expand, and secure existing programs and data in the computer system.
Application Software
Application software is used to accomplish specific tasks rather than just
managing a computer system. Application software may also include a larger
collection of programs (a software suite), related but independent programs
and packages, which have a common user interface or shared data format,
such as Microsoft Office suite. Some examples of application software are word
processors, spreadsheets, image editors, database management systems,
presentation applications, and desktop publishing software.
Software Install
SOFTWARE PIRACY
Software piracy is the unauthorised copying of an organisation’s internally developed software or the illegal duplication of commercially
available software. A software license is a type of proprietary licence, which acts as a memorandum of contract between the producer and
the end user.
Types of Software Piracy
The six basic forms of software piracy are:
Softloading Software Counterfeiting Internet Downloading Renting
Hard Disk loading License misuse
SOFTWARE TERMINOLOGY
Some common terms used in the field of software are:
Public-domain software Freeware Shareware Commercial Software
Open Source Software Proprietary Software Firmware
Word Processing with Microsoft Word 2000
Word processing is the manipulation of characters, words, texts, numbers, sentences,
and paragraphs in the document so that it is error-free and looks attractive.
Inserting Table Dialog Box Tables and Borders Toolbar Table Properties Dialog Box
PRINTING A DOCUMENT
A major part of any word processing software is to print a document. Microsoft Word allows you
to choose what part of the document to print (such as the current page, multiple pages or the
entire file). In addition, you can specify which printer to use and how many copies to print.
Setting Page Margins: Page margins determine the distance between the text and the edge of
the paper. To specify the margins in the document, choose Page Setup from the File menu to
display the Page Setup dialog box. The Page Setup dialog box also allows you to format the size
and orientation of the paper. To change the size of the paper, click the Paper Size tab and select
the desired size (letter, A4, etc.) from the Paper size list. Page Setup Dialog Box
Print Preview: Print preview is a way to review the appearance of the printed document on-
screen before printing the final output. Previewing the document is a great way to catch
formatting errors, such as incorrect margins, overlapped text, boldfaced text, and other text
enhancements. To view document in print preview mode, choose Print Preview from File menu
or click the Print Preview button on the Standard Toolbar.
Printing the Document: Once you are ready with all the formatting and editing, you can print the
document. To print a document, click the Print button on the Standard toolbar or select Print
from the File menu to display the Print dialog box. This dialog box allows you to select the
number of copies and how many pages of the document you want to print.
Print Preview
Spreadsheets and Microsoft Excel 2000
Naming a Range Using Cut and Paste Undo and Redo Action
Using AutoSum
Formulas: Formulas are mathematical expressions built in Excel that instruct the computer to carry out
calculations on specified sets of numbers in the rows and columns. A formula always begins with an equal
sign (=) followed by some combination of numbers, text, cell references, and operators.
Using Formulas
INSERTING CHARTS
In Excel, numerical data can be easily converted into a chart for graphical presentation of the data, which
provides more visual clarity than tables of data and, therefore, have more impact. The range of chart types
includes pie charts, bar charts and line charts. Microsoft Excel allows a chart to be placed in two ways:
Embedded chart
Chart sheet
PRINTING IN EXCEL
Printing in Excel is similar to printing in other Windows based applications. Several options particularly those concerned with arranging the
page, are specific to the application.
Setting Page Layout: Page Layout option is used to view the existing page layout or to set a new layout. To set a new layout, select Page
Setup from the File menu to display the Page Setup dialog box. This dialog box splits page layout into four tabs: Page, Margins,
Header/Footer, and Sheet.
Print Preview: Print preview is a way to view the appearance of the printed document on-screen before printing the final output.
Previewing the document is a good way to identify formatting errors, such as incorrect margins, overlapped text, boldfaced text, and other
text enhancements. This helps in saving costly printer paper, ink, and time.
Printing Worksheets: Once you have completed formatting and editing worksheets(s), you can print the whole sheet (Active sheet), part
of the sheet (selection), or several sheets (workbook).
Making Presentation with Microsoft PowerPoint 2000
In today’s highly competitive world, representing ideas effectively has become the
need of the hour. One of the best ways of expressing the ideas is visual images,
which includes usage of graphics and pictures. Graphics, when used to convey
ideas, expression, or thoughts are known as presentation graphics or business
graphics. A good presentation can truly convince, motivate, inspire and educate its
audience.
Microsoft PowerPoint Environment: When Microsoft PowerPoint is opened, the
main screen of the program appears. This main window contains many parts; these
parts are:
The title bar is located at the very top of the PowerPoint window and it displays the Main Microsoft PowerPoint Window
name of the application and active presentation. Below this bar is the menu
bar, contains different menus that control all options, functions, and commands for the entire PowerPoint application. Generally, a toolbar
which
is positioned just below the menu bar. Below the toolbars, on the left side outline pane is located, which is used to organise and develop
content for the presentation, move slides from one position to another, and edit titles and body text. The different screen layouts available
are Normal, Outline, Slide, Slide Sorter, and Slide Show views.
DESIGNING PRESENTATION
A presentation is created using the slides, which contains text, graphics, animations, and so on.
Two ways in PowerPoint, which helps you to choose the look of your slides are:
Design Template: A design template is a presentation containing PowerPoint masters with
custom formatting, fonts, color scheme, placeholders for text, graphics, animations, and so on.
Masters: Masters in PowerPoint are used to control many facets of the slides such as
backgrounds, font typeface, font size, colours, bullets and locations for all main components, tab,
and indent. PowerPoint has four masters, namely, Title Master, Slide Master, Notes Master, and
Handouts Master.
Working with Slides: You can insert, copy, delete, duplicate, navigate between slides, and Slide Master
change the appearance of your slide background by changing its colour, shade, pattern, or
Working
texture. with Text: There are a number of ways in which text can be added into the
slides, which are text placeholder, text box, an auto shape, and WordArt.
Formatting the Text: As you enter and edit text, you can change its appearance to add
emphasis and make the presentation easier to read. Formatting is the process of
determining how the typed text will appear on a printed page. Formatting is applied by
altering the appearance of text by setting the typeface (font), size, line spacing, and
colour. Formatting can be done by using the Formatting toolbar.
Working with Graphics: The graphical elements can help you create eye-catching
slides for a presentation. Graphics are frequently used with text to add emphasis and
visual impact. PowerPoint 2000 provides you the option of adding AutoShapes,
WordArt, and Pictures. Transition Dialog Box
Adding Multimedia: A presentation can be made interactive and interesting by
adding
multimedia effects, which helps in capturing audience’s attention. You can add multimedia effects such as animations, video, and sound to
the slides.
Running Slides: PowerPoint 2000 provides a number of ways to view and deliver presentations so that they are well designed and look
professional. You can use the Slide Show to view a presentation before printing it or to prepare to show it electronically.
Pack and Go: PowerPoint contains a useful feature called Pack and Go, which allows you to view the
presentation file on a computer that does not have PowerPoint installed.
PRINTING IN POWERPOINT
Printing in PowerPoint is similar to printing in other Windows based
applications. PowerPoint provides a number of choices for you to take
printouts.
Setting Page Layout: The Page Layout option is used to view the
existing page layout or to set a new layout.
Printing Presentation: Once you are ready with all the formatting and
editing, you can print the presentation.
Printing Handouts: PowerPoint 2000 allows you to print the handouts
and using handouts as an option lets you print two, three, four, six, or
nine slides per page.
Print Dialog Box
Data Communication and Computer Networks
Data communication means sending or receiving data and information between computers, connected through a network, in a fast and
efficient manner. Networking also helps sharing expensive resources like printers, scanners, backup tape drives, and so on.
DATA COMMUNICATION
Data communication is the exchange of data between two devices using some form of
wired or wireless transmission medium. It includes the transfer of data, the method of
transfer and the preservation of the data during the transfer process.
Components of Data Communication: The five basic components in data
communication system are: Message, Sender, Receiver, Medium, and Protocol.
Data Transmission Mode: Data transmission mode refers to the direction of signal
flow between two linked devices. Data can be transmitted in the following three modes:
Simplex: Simplex transmission is unidirectional.
Half-duplex: Each communicating device can receive and transmit information, Data Communication
but
Full-duplex:
not at the same time.both communicating devices to transmit and receive data simultaneously.
Allows
Analog and Digital Data Transmission: An analog signal is a continuous waveform that changes smoothly over time. The sine wave is
the most fundamental form of an analog signal. Digital signal is the data stored in the form of 0s and 1s. When the signal is at a high point,
its value is 1 and when it is low, its value is 0.
Data Communication Measurement: Fundamentally, bandwidth refers to the maximum volume of information that can be transferred
over any communication medium. The more the information needed to transmit in a given period, the more the bandwidth required. The
level of bandwidth falls into three categories, Narrowband, Wideband, and Broadband.
TRANSMISSION MEDIA
The physical or wireless medium through which two communicating devices communicate is
known as transmission media. It can be divided into:
Guided Media: This media use a cabling system that guides the data signals along a specific
path. There are three basic types of guided media: twisted pair, coaxial cable, and optical Unshielded Twisted Pair Cable
fiber.
Unguided Media: They are data signals that flow through the air. They are not guided or
bound to a fixed channel to follow. One of the common unguided media of transmission is
radio frequency propagation (microwave and satellite) where the signal is carried over carrier
waves which have frequencies in the range of radio frequency spectrum. Microwave Transmission
MODULATION
Modulation refers to the process of impressing information on a carrier wave by changing
some of the wave’s characteristics (such as amplitude, frequency or phase) so that it is more
suitable for transmission over the medium between transmitter and receiver.
Amplitude Modulation: In this modulation, the amplitude of a carrier wave is varied in
accordance with a characteristic of the modulating signal. The frequency of the carrier
remains the same, only the amplitude changes to follow variations in the signal.
Frequency Modulation: In this modulation, the instantaneous frequency of carrier wave is
caused to depart from the centre frequency by an amount proportional to the instantaneous
value of the modulating signal.
Phase Modulation: Phase modulation is the encoding of information into a carrier wave by Amplitude Modulation
variation of its phase in accordance with an input signal. In this technique, the phase of sine
wave carrier is modified according to the amplitude of the message to be transmitted.
MULTIPLEXING
Multiplexing refers to the process of transmitting more than one signal over a single link, route or channel. An analogy of multiplexing can
be made with a multilane highway.
Multiplexers: The communication device that multiplexes (combines)
several signals from the devices on the left for transmission over the
common medium is called a multiplexer (MUX). At the receiving end, a
demultiplexer (DEMUX) completes the communication process by
separating multiplexed signals from a transmission line and distributing it
to the intended receiver. There are two basic multiplexing techniques: A Multiplexed System
frequency-division multiplexing (FDM) and time-division multiplexing
(TDM).
Asynchronous and Synchronous Transmission: Asynchronous
transmission refers to the data transmission of one character at a time,
with intervals of varying lengths between transmittals, and with start bits
at the beginning and stop bits at the end of each character, to control the
transmission, whereas Synchronous transmission is a method of
communication in which data is sent in blocks, without the need for start
and stop bits between each byte.
Synchronous Transmission
SWITCHING
Switching means routing traffic by setting up temporary connections between two or more network points. This is done by devices located
at different locations on the network, called switches (or exchanges). In a switched network, some switches are directly connected to the
communicating devices while others are used for routing or forwarding information. There are three methods of switching:
Circuit Switching: It is a type of communication in which a dedicated channel (or circuit) is established between two devices for the
duration of transmission.
Packet Switching: It refers to the data transmission method whereby data is
transmitted in packets. Each packet contains addresses of the machine
sending it and the machine expected to receive it. At the destination, the
packets are reassembled into the original message.
Message Switching: It employs store and forward system, where each
message contains a destination address. It is passed from source to
destination through intermediate nodes. At each transfer point in the
connection, incoming data is stored in its entirety, and then forwarded to the
next point. This process continues until the data reaches its destination.
NETWORK TOPOLOGIES
The term topology refers to the way a network is laid out, either physically or logically. It is the geometric
representation of the relationship of all the links. There are five basic topologies:
Bus: Bus topology network uses a common backbone (a single cable) to connect all devices with
terminators at both the ends.
Ring: In ring topology, every node has exactly two neighbours connected to form a ring for
communication purposes.
Star: In star topology, devices are not directly linked to each other but are connected through a hub
forming the shape of a star. Star Topology
Tree: Tree topology consists of groups of star-configured workstations connected to a bus backbone cable.
Mesh: In mesh topology, every node has a dedicated point-to-point link to every other node.
Mesh Topology
COMMUNICATION PROTOCOL
A computer protocol is a set of rules that coordinates the exchange of information. Open Systems Interconnection (OSI) is a standard
reference model for communication between two end users in a network. It consists of seven separate but related layers:
Physical Layer Data Link Layer Network Layer Transport Layer
Session Layer Presentation Layer Application Layer
NETWORK DEVICES
To communicate over a network, a particular set of network devices interconnect individual computers and ensure that they communicate
efficiently. The various types of networking devices available in the formation of computer network are as follows:
Network Interface Card Hub Repeater Switch
Bridge Router Gateway
EVOLUTION OF INTERNET
In 1969, US DoD created a network known as ARPANET, which linked Us scientific
and academic researchers. By 1970s, ARPA helped in the development of a new
protocol called TCP/IP for transferring data between the networks. In 1980s, Usenet
newsgroup and Electronic Mail (e-mail) came into picture. Internet really became
popular in the 1990s after the development of the World Wide Web (WWW).
In 1991, CERN developed the protocol based on hypertext (HTTP) that makes it The Internet
possible to connect content on the web with hyperlinks. Nowadays, an Internet user
gets information on all sorts of activities ranging from how to add to the design of a
functional spaceship to choosing a product for personal use.
BASIC INTERNET TERMS
Web Page: It is an electronic document written in a computer language called HTML and are linked together through a system of
connections (called hyperlinks), which enable the user to jump from one web page to another by clicking on a link.
Website: It is a set of related (linked through hypertext links) web pages, published by an organisation or individual.
Home Page: It is the starting point or a doorway to the web site.
Browser: It is a computer program used to access web pages and display them on the computer screen.
Uniform Resource Locator (URL): It is a unique address assigned to a web page.
Hypertext: It refers to the text that connects to other documents. These texts are known as hypertext link, hyperlink, hotlink, or simply links.
Internet Service Provider (ISP): It is an organisation that provides the required software, which is used to connect to the Internet.
Web Server: It is a computer equipped with a server software, which provides a specific kind of service to client software running on other
computers.
Download and Upload: Download refers to the activity of moving or copying a document, program or other data from the Internet or other
interconnected computer to one's own computer. Upload refers to the act of moving or copying data or program from one computer to
another, usually to a server, remote computer.
Online and Offline: Online is commonly referred to as 'connected to the World Wide Web via Internet‘ and Offline refers to the actions
performed when the user is not connected, via telecommunications, to another computer or a network like the Internet.
GETTING CONNECTED TO INTERNET
The basic requirements for getting online are:
A TCP/IP enabled computer with a web browser
An account with an ISP
A telephone line plugged to a suitable socket
A modem to connect the computer to the telephone line
Internet Software
To connect to the Internet, computer requires three kinds of software, TCP/IP, Dialler
Software, and Browser.
Connecting to Internet
INTERNET APPLICATIONS
Some of the important services provided by Internet are:
World Wide Web (WWW): It is a subset of the Internet and it presents text, images,
animation, video, sound, and other multimedia in a single interface. The operation of the
Web relies primarily on hypertext, as it is a means of information retrieval.
Electronic Mail (E-Mail): It is the process of exchanging messages electronically, via a
communications network, using the computer.
File Transfer Protocol (FTP): It is a system of rules and a software program that
enables a user to log on to another computer and transfer information between it and
his/her computer.
Telnet: It connects one machine to another in such a way that a person may interact
with another machine as if it is being used locally.
Internet Relay Chat (IRC): This service allows people to communicate in real time and
carry on conversations via the computer with one or more people. It provides the user
with the facility to engage in simultaneous (synchronous) online 'conversations' with Internet Applications
other users from anywhere in the world.
Chatting and Instant Messaging: Chat programs allow users on the Internet to communicate with each other by typing in real time.
Instant messaging allows a user on the Web to contact another user currently logged in and type a conversation.
Internet Telephony: It refers to the use of the Internet rather than the traditional telephone company infrastructure, to exchange spoken or
other telephonic information.
Video Conferencing: It uses the same technology as IRC, but also provides sound and video pictures. It enables direct face-to-face
communication across networks via web cameras, microphones, and other communication tools.
Commerce through Internet: It refers to buying and selling goods and
services online.
Newsgroups (Usenet): It is an international discussion group that focus
on a particular topic and helps in gathering information about that topic.
Mailing Lists (Listserver): It refers to a large community of individuals
who carry out active discussions, organised around topic-oriented forums
that are distributed via e-mail and this method is known as mailing list.
Mailing List
Static Component
Static component includes the information displayed on the browser that does not interact with the user.
Dynamic Component
Dynamic component imparts life to a web page. This component refers to a specification by which a user can interact with a web server.
Some of the programming languages (often called scripts) used to provide dynamism to a web page are Perl, JavaScript and Jscript,
VBScript, Active Server Pages (ASP), PHP, XML, Java, and so on.
Internet Tools
Internet has become one of the most popular means of communication and is probably the best solution that provides all kinds of
information at a single place.
WEB BROWSER
A web browser (or simply browser) is a software application, which provides a graphical
user interface (GUI) so that the user can navigate the Internet easily by clicking on
menus, icons, or buttons instead of learning difficult keyboard commands. The two most
popular web browsers are Netscape Navigator and Microsoft Internet Explorer.
Internet Explorer Environment
To open Internet Explorer, double-click the Internet Explorer icon located on the
desktop or click Start, select All Programs, and select Internet Explorer. When Internet
Explorer is opened, the main screen of the program appears. This main window has
many parts to it; these parts are:
Title bar Menu bar Standard toolbar
Address bar Link bar Status bar
Main Internet Explorer Browser Window
Content Area or Document View
Netiquette: Communicating online, whether by e-mail, chat rooms or message boards, is informal, quick, and easy. Netiquettes are rules
that should be followed while communicating over the Internet. Disobeying netiquettes while sending e-mail can create trouble. Like e-mail
and other online communication, the rules of netiquette are short and to the point.
E-MAIL CLIENT
An e-mail client (also known as Mail User Agent) is a computer program that runs on
a personal computer and enables the user to organise, filter, and sort all the sent and
received e-mails. Some examples of e-mail clients include Microsoft Outlook Express,
Eudora, and Pegasus Mail.
Outlook Express Environment: To open Outlook Express, double-click the Outlook
Express icon located on the desktop or click Start, select All Programs, and then
select Outlook Express. When Outlook Express is opened, the main screen of the
program appears, and it is divided into four panes: folder list, folder content, contact
list, and preview pane.
Creating an Account: Before you can send or receive e-mail using the Outlook
Express, you need to configure it to communicate with incoming and outgoing mail
servers. Outlook Express Environment
Sending E-mails Using Outlook Express: Sending mails using Outlook Express is
similar to sending mail using any web-based mail accounts.
Checking E-mails Using Outlook Express: To open the received e-mails in
Outlook Express, there is no requirement to open a web browser. Instead, Outlook
Express itself downloads the received e-mails. The e-mails sent to you are stored on
the mail server of your ISP until you retrieve them.
Creating Newsgroup Account: A newsgroup is a virtual place where people with
common interests can ask questions and get answers on just about any imaginable
topic ranging from sports to space. Newsgroups generate huge volumes of
messages for which you need a newsreader to read.
SEARCH ENGINES
A search engine is a searchable database of Internet files which allows the user to enter keywords relating to particular topic and retrieve
information about Internet sites containing those keywords.
Searching the Internet: Some of the well-known search engines are www.google.com, www.hotbot.com, www.lycos.com, and
www.altavista.com.
Refining the Search: The major search engines allow the user to choose whether to search for the exact typed phrase, all the words in
the phrase, any of the words in a phrase, and so on.
INSTANT MESSAGING
Instant messaging is a web-based service to exchange messages in real time between two or more people over the Internet. It is a
combination of e-mail and chat room. Usually, users send their messages in text format. However, while sending instant messages, a user
can also communicate through web cam (video chatting) as well as through speakers and microphone (voice chatting).
Features of Messenger: The features of messenger that make it a favourite among Intenet users include Chatting, Emoticons/Smileys,
Audibles, Games, and Address book.
Getting Started with Yahoo Messenger: To use Yahoo Messenger, a unique Yahoo ID is required. When you start the messenger, it will
display a screen asking you to enter your yahoo mail ID and password. If you are using the messenger for the first time, you may wish to
add the e-mail addresses of all those known ones who also use Yahoo messenger. Once you and your friends are online, you can chat
and send instant messages.
Sending Instant Messages: A message can be sent to a friend whose e-mail address you have stored in your Friend List.
Sending Files: In addition to the messages, you can also send and receive text, image, audio, or graphical files using the messenger.
Computer Security
Security has always been an overriding concern of humankind. For any organisation, information plays a fundamental role in running
businesses. Therefore, it has become essential for an organisation to take preventive measures to safeguard their confidential data from
reaching illegal hands. When data takes the shape of digital form, a different security procedure is required. This branch of security is
called computer security.
COMPUTER SECURITY
Computer security refers to the protection given to computers and the information contained in them from
unauthorised access. It involves the measures and controls that ensure confidentiality, integrity, and
availability of the information, processed and stored by a computer.
Security Threats
Computer systems are vulnerable to many kinds of threats that can cause various types of damages, which
may result in significant data loss. Such damages can range from errors that can cause harm to database
integrity to natural calamity destroying the entire computer centres. Some of the commonly occurring Computer Security
threats to a network are:
Errors and Omissions Fraud and Theft Loss of Physical and Infrastructure Support
Hacker and Cracker Malicious Code and Software Foreign Government Espionage
MALICIOUS PROGRAMS
Malicious programs perform unusual activities upon opening certain files (screen saver, game,
utility, and so on) on the internet. These programs generate threats to the computer system and
precious data and takes the form of virus, worm, Trojan horse, logic bomb, spyware, and other
uninvited software.
Virus
Viruses are programs, which are designed to replicate, attach to other programs, and perform
unsolicited and malicious actions. It executes when an infected program is executed. The different
types of viruses are:
Boot Sector Virus
Boot Sector Virus File Infecting Virus Polymorphic Virus
Stealth Virus Multipartite Virus
CRYPTOGRAPHY
Cryptography is the process of altering messages to hide their meaning from
adversaries who might intercept them. It provides an important tool for protecting
information and is used in many aspects of computer security. Cryptography can
be done using:
Secret Key Cryptography: In secret key cryptography, a single key is used for
both encryption and decryption of data. With this form of cryptography, it is obvious
that the key must be known to both sender and receiver.
Message Exchange Using Secret Key
Public Key Cryptography: In public key cryptography, each person gets a pair of keys, one called the public key (used for encryption)
and the other called the private key (used for decryption). Each person’s public key is published while the private key is kept secret. The
need for the sender and receiver to share secret information is eliminated and all communications involves only public keys, and no
private key is ever transmitted or shared.
Hash Functions: A hash function is a one-way encryption algorithm that uses no key to encrypt or decrypt the data. It generates a
sequence of bit values of fixed length from the original message.
DIGITAL SIGNATURE
Digital signature includes markings as digitised images of paper signatures, and is
used to authenticate the electronic document. It is created and verified by
cryptography (the branch of applied mathematics) that concerns itself with
transforming messages into seemingly unintelligible forms and back again. It uses
public key cryptography technique, which employs an algorithm using two different but
mathematically related keys, one for creating a digital signature or transforming data
into a seemingly unintelligible form, and another key for verifying a digital signature or
returning the message to its original form.
Digital signature creation, uses a hash result derived from and unique to both the
signed message and a given private key. For the hash result to be secure, there must
be only a negligible possibility that the same digital signature could be created by the
combination of any other message or private key. Message Exchange Using Digital Signature
Digital signature verification, the process of checking the digital signature by reference to the original message and a given public key,
thereby determining whether the digital signature was created for that same message using the private key that corresponds to the
referenced public key.
FIREWALL
Firewall is an application, which prevents outside connections from
entering into the network. It is typically implemented using one of the
three primary architectures—packet filtering, application-level gateway,
and circuit-level gateway.
Packet filtering is a basic firewall protection technique, which operates at
the network layer to examine incoming and outgoing packets.
Application-level gateway uses server programs (called proxies) that
run on the firewall. These proxies take external requests, examine them, Firewall Software and Hardware
and forward legitimate requests to the internal host that provides the
appropriate service.
Circuit-level gateway firewall monitors connections that are found to be valid. It allows relevant packet to pass through the firewall.
Biometric Techniques
SECURITY AWARENESS AND POLICIES
Computer security awareness and policies is an issue that affects all computer users, whether they use a personal computer or terminals
connected to the mainframe computer. Awareness is used to reinforce the fact that security supports the mission of the organisation by
protecting valuable resources. Training is an activity, which teach skills to the people that enable them to perform their jobs in a more
secure manner. A security policy is a formal statement of rules for people who are given access to an organisation’s technology.
Database Fundamentals
Data is a collection of raw items such as words, numbers, images, and sounds that have not been organised and arranged into
understandable form. When data is processed and converted into a meaningful and useful form, it is known as information. Hence,
information is a set of organised and validated collection of data. Knowledge is an act of understanding the context in which the
information is used. It can be based on learning through information, experience, guessing and/or intuition.
DATABASE: DEFINITION
A database is a collection of related data, organised in a manner that
allows access, retrieval, use, and maintenance of the data. Within the
database, data is organised into storage containers called tables, which
are made up of columns and rows.
Basic Database Terms: Field/Column, Record/Row, Table, Data type,
Key
Table
LOGICAL DATA CONCEPTS
Logical data description refers to the manner in which the programmer or end user
views data. This model is also known as entity-relationship model and is based on
the perception of the real world. It consists of the following set of basic objects:
Entity: An entity is a person, place, thing, an activity, or event for which data is
collected, stored, and maintained.
Attribute: An attribute describes characteristics of a particular entity. In a database,
entities are represented by tables and attributes by columns.
Relationships: A relationship is an association, dependency or link between two or Entities, Attributes, and Relationship
more entities. Generally, relationships are of three types: one-to-one (1:1), one-to-
many (1:M) and many-to-many (M:M).
DBMS ARCHITECTURE
According to ANSI/SPARC, a DBMS can be viewed as a three-layered system:
Internal Level: It is the lowest level of abstraction and it describes how the data is physically stored and organised on the storage medium,
as well as access to the data, such as through data storage in tables and the use of indexes to expedite data access.
Conceptual Level: It describes what type of data is actually stored in the database, and the relationships among the data.
External Level: It is the view that the individual user of the database has. This view is often a restricted view of the database and the same
database may provide a number of different views for different classes of users.
Data Independence
The ability to modify a schema definition in one level without affecting a schema definition in the next higher level is called data
independence. There are two levels of data independence: Logical Data Independence and Physical Data Independence.
DATABASE MODELS
Data modelling is a way of organising a collection of information pertaining to a system under investigation. Every database and database
management system is based on a particular database model. A database model consists of rules and standards that define how data is
organised in a database. There are four types of database models.
Hierarchical Database Model: In this model, data is organised in a series
like a family tree or organisation chart. As with a family tree, the
hierarchical database has branches made up of parent and child records.
Each parent record can have multiple child records, but a child record can
have only one parent.
Network Database Model: This model is similar to a hierarchical model
except that each child record can have more than one parent. Hence, this
model allows one-to-one, one-to-many, and many-to-many relationships.
Relational Database Model: A relational database model represents all
data in the database as simple two-dimensional tables called relations that
are the logical equivalent of files. The tables in relational databases are Hierarchical Database Model
organised in rows and columns, simplifying data access, and manipulation.
Object-Oriented Database Model: An object-oriented database model stores and maintains objects. An object is an item that can contain
both data and the procedures that manipulate the data.
NORMALISATION
The process of refinement that the database designer undertakes after identifying the data objects of the proposed database, their
relationships, and defines the tables required and the columns within each table is known as normalisation. The rules of normalisation are
referred to as normal forms. There are six generally accepted rules of normal forms, namely, first normal form (1NF), second normal form
(2NF), third normal form (3NF), Boyce-Codd normal form (BCNF), fourth normal form (4NF), and fifth normal form (5NF).
TYPES OF DATABASES
Organisations are faced with questions regarding how and where to hold the corporate data.
Advances in computer technology and the rapid development of GUI-based applications,
networking, and communications have resulted in new dimensions in database management.
Primarily, organisations adopt two approaches:
Centralised Databases: In centralised databases, application processing is shared between
numerous clients and a server. The client is responsible for managing the user interface, and
the database server is responsible for database storage and access.
Distributed Databases: A distributed database system consists of a collection of
interconnected sites, where each site is a database system in its own right and the sites have
agreed to work together, so that a user at any site can access anywhere in the network as if
the data were all stored at the user’s local site.
DML COMMANDS
Data Manipulation Language (DML) is used to retrieve, insert, and modify database information. DML commands will be used by all
database users during the routine operation of the database. The most important DML statements in SQL are:
INSERT INTO: inserts new data into a table
UPDATE: updates data in a table
DELETE FROM: deletes data from a table
SELECT: extracts data from a table
Combining Queries Using UNION: UNION adds the result of a second SELECT clause to the table created by the main SELECT
command. With UNION, only distinct values are selected. To select all the values, use UNION ALL.
STARTING ACCESS
To start Access, double-click on the Microsoft Access Icon on the desktop or
click Start, select All Programs, and then select Microsoft Access.
Microsoft Access Environment: When Microsoft Access is opened, the main
screen of the program appears. This main window contains many parts; these
parts are:
Title bar Menu bar
Standard Toolbar Database Window
Objects Groups
Status bar
TABLES
Table in Access holds a collection of information stored on one topic in the form of
fields and records. All the information necessary for the queries, forms, and reports
in the database are based on the data in the table. Tables can be mainly created
in Design View and Table Wizard. Parts of an Access Window
QUERIES
Query facilitates retrieval of information from multiple tables, which can be put together for viewing and analysis purposes. One can select
records from different tables, sort the results, summarise, and perform calculations using query. It is saved as a database object and can,
therefore, be easily used in the future. The query is updated whenever the original tables are updated.
Creating a Simple Query Using Query Wizard
Click on Queries under Objects and click New button from the Database Window toolbar. This will display the New Query dialog box.
Select Simple Query Wizard and click OK. From the first screen, select fields that will be included in the query by first selecting the table
from the Tables/Queries drop-down box. Now select the fields and click ‘>’ button to move the field from the Available Fields list to
Selected Fields. Click the Next > button when all the fields have been selected. Depending on the fields selected, the next screen may
give you the option of choosing between a Detail query and a Summary query. Choosing Detail (show every field of every record) will
show every field of every record. If you select the Summary option, you have additional options for how you would like the data to be
summarised. The last step of the Query Wizard prompts for the query name. Enter a title for the query and click Finish. Access creates
and saves the query and then opens it in Datasheet View.
Using SQL in Microsoft Access
Apart from generating queries using Wizards or Query Designer, Access also facilitates generation of queries using SQL. SQL is a
language often used in querying, updating, and managing relational databases. Each query created in Microsoft Access has an associated
SQL statement that defines the actions of that query.
FORMS
A form is nothing more than a graphical representation of a table. Forms are the front-end side of an Access that allows entering of data. It
is an object in Access, which allows the database users to edit and view information, one record at a time.
Creating a Form using Form Wizard
The easiest way to build a form is by using the Form Wizard. The wizard allows the user to choose the layout of records in the form and the
background, colour, and format of the display. The wizard also allows preview of the layout and style options when a form is created.
REPORTS
Reports are the polished form of data representation. When information from the tables and
queries are ready to be displayed, reports help in presenting this information in a formatted
manner and look very professional. Reports can be made by combining data, images, charts,
and even audio/video elements. You can add headers, footers, and page numbers, group the
information, and change the background colours, among other things.
Creating a Report using Report Wizard
The quickest way to design your report is by using the Report Wizard. The Report Wizard
asks you a series of questions to help you design the data exactly the way you desired. After
you have created the report, you can open it in Design view to modify its structure.
Preview of Report
Emerging Trends in IT
Information technology has interwoven itself into our socio-economic fabric in such a manner that it is often said that we live in an
information age. Although different organisations, industries, and regions of the world are adopting IT in various ways, it is increasingly
penetrating the heart of organisations and will continue to do so in future. With the emergence of electronic commerce and wireless
networks, trading activities have become much easier. The development of mobile phones, smart card, and bluetooth, has enabled people
to communicate in every corner of the world. All the developments have made historic transition from industrial to information age possible.
Working of EDI
EDI Benefits: The goal of EDI is to provide a standard format and data element dictionary to exchange data in an electronic environment.
EDI solves the problem of sharing data between dissimilar operating systems, applications, and computers using a simple neutral format.
EDI Limitations: EDI is not a technology but a new way of doing business. Though identifying the costs related to EDI is relatively easy,
identifying the benefits of EDI, especially when a company is not using EDI is hard, since most of the real benefits are strategic and
intangible in nature.
MOBILE COMMUNICATION
Millions of people around the world make use of cellular phones for
their day-to-day activities. Nowadays, using cell phones, one can
keep track of appointments and set reminders, use built-in
calculator, send or receive e-mail, get information (news,
entertainment, stock quotes) from the Internet, play simple games,
integrate with other devices such as PDAs, MP3 players and GPS
receivers, and many more. Mobile phones provide many services
which are as follows:
Short Message Service (SMS): It is a globally accepted wireless
service that enables transmission of alphanumeric messages
between mobile subscribers and external systems such as
electronic mail, paging, and voice-mail systems.
Multimedia Message Service (MMS): These are delivered using a
combination of SMS and WAP technologies. When a cell phone
receives an MMS message, it actually receives an MMS notification
message, which it receives over SMS and WAP.
Wireless Application Protocol (WAP): It is the de-facto standard Signal Passing Among Cells
for providing Internet communications and advanced telephony
services on digital mobile phones, pagers, personal digital
assistants, and other wireless devices. WAP uses Wireless Markup
Language (WML).
GLOBAL POSITIONING SYSTEM (GPS)
Global Positioning System is a satellite-based navigation system, which is made up of a network of satellites placed into orbit by the US
Department of Defence. It was originally intended for military applications, but in 1980s, the government made the system available for
civilian use. GPS works in any weather conditions, anywhere in the world, 24 hours a day. It has wide variety of applications on land, at sea
and in the air.
INFRARED COMMUNICATION
Infrared communication is a medium available for communication between various consumer devices. The medium supports high data
transfer rate.
BLUETOOTH
Bluetooth is a technology, which uses short-range radio links, intended to
replace the cable(s) connecting portable or fixed electronic devices. It is used
to connect wireless peripheral devices like printers to computers, PDAs to
communicate with other nearby PDAs or computers, etc.
Bluetooth Communication
SMART CARD
A smart card is a card, which is embedded with either a microprocessor and memory
chip or only a memory chip having non-programmable logic inside it. The
microprocessor card includes added functionality of adding, deleting, and manipulating
information on the card, while a memory-chip card (for example, pre-paid phone cards)
is designed to undertake pre-defined operations. There are three categories of smart
card available in the market: microprocessor cards, memory cards and optical memory
cards.
KNOWLEDGE-BASED SYSTEMS
Knowledge is defined as the ability to remember earlier learned material, which involves the
recalling of a wide range of materials, all that is required is bringing the appropriate information
to mind. Knowledge-based systems make extensive use of knowledge to perform complex
tasks. This, in turn, led researchers to develop knowledge representation schemes and
techniques to manipulate knowledge.
Knowledge acquisition is a type of knowledge-based systems, which involves conversion of
information gathered from various sources into knowledge.
Knowledge organisation involves storage of knowledge in such a way that retrieval of
information becomes easy. This is done using indexing.
Knowledge manipulation is the computational equivalent of reasoning. This requires a form of
inference or deduction, using knowledge and inferring roles.
Knowledge representation is based on logic and mathematics and has an easily parsed Different Knowledge
grammar to ease processing in a system. It can be represented in first order predicate logic Representation Schemes
(FOPL), fuzzy logic, and associative network.
SEARCHING TECHNIQUES
Searching techniques involves the use of an optimal state out of available states. For every problem,
there are a number of alternatives available to find a solution. It can be categorised into two groups:
uninformed search and informed search.
Uninformed search proceeds in a systematic way by exploring nodes in some predetermined order.
The important search strategies used in this form include Breadth-First Search and Depth-First Search.
Informed search strategies are used to find optimal solution. It involves evaluation function, called
heuristic functions. It includes best-first search and hill climbing search.
EXPERT SYSTEMS
Expert system is an AI application that uses a knowledge base of human
expertise to aid in solving problems. The degree of problem solving is based on
the quality of the data and rules obtained from the human expert. This system
simulates the judgement and behaviour of a human or an organisation that has
expert knowledge and experience in a particular field. Expert systems are
currently being used in applications such as medical diagnosis, equipment
repair, financial, and insurance planning, route scheduling for delivery vehicles,
production control and training.