Uom7 Vetted

  • Upload
    pk

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

  • 8/19/2019 Uom7 Vetted

    1/124

    RGMTTC

    Com utin Skills-Basic UOM-S007for the Students of University of Madras

    BHARAT SANCHAR NIGAM LIMITED(A Government of India Enterprise)RAJIV GANDHI MEMORIAL TELECOM TRAINING CENTRE

    (ISO 9001:2008 Certified)MEENAMBAKKAM, CHENNAI - 16

  • 8/19/2019 Uom7 Vetted

    2/124

    INDEX

    Contents

    UNIT I - INTRODUCTION TO COMPUTERS ........................................................... 3

    UNIT II - WORD PROCESSING ........................................................................... 34 UNIT III - FILE MANAGEMENT ........................................................................... 61

    UNIT IV - SPREADSHEETS ................................................................................ 81

    UNIT V - NETWORKS...................................................................................... 109

  • 8/19/2019 Uom7 Vetted

    3/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 3 / 124

    UNIT I - INTRODUCTION TO COMPUTERS

    We are living in an information age dependentupon digital information. Digital information is electronic information, the result ofcomputer processing. Every type of job relies upon getting information, using it,managing it, and relaying information to others. Computers enable the efficientprocessing and storage of information.

    1.1 Classifications of Computer

    The capability of computer depends upon the amount of data stored in the mainmemory, the speed of operation, the number of peripheral devices, amount andtypes of programs available for the use with the computer system. Accordingly,computer can be classified as follows:

    Mainframe ComputerMini ComputerPersonal Computer

    1.1.1 Mainframe computers , the larger of the computers can literally fill a room. These large computers are used to fulfill the computing needs of large companiesand corporations and are also used in large telecommunications centers. They arevery powerful with huge amount of storage and processing capability. Thedrawbacks to the mainframe computer for use as a personal computer are its size,its immense amount of computing power, and its price, which can run into croresof rupees.1.1.2 Mini computer was developed to serve the computing needs of smaller

    companies and the larger departments of corporations. It has essentially the same

  • 8/19/2019 Uom7 Vetted

    4/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 4 / 124

    functionality of the larger mainframe computer but on a smaller scale. Themainframe was scaled into a smaller package with most of its functions remainingand a little less storage and processing power, sold at reduced price. Because of

    advances in technology, today's minicomputer can fulfill the entire computingneeds of a small- to medium-sized company as well as serve as a very powerfulcommunications server. But mini computer are much too big, in terms ofprocessing power and size, not to mention price, to be used as a personalcomputer.1.1.3 Personal computer is the smallest one and is often seen on the desk thereforeis referred to as desktop. It has a good processing power, though not of the samedegree as of mini or mainframe, with a much smaller size, with affordable price and

    is quite effective for personal uses.

    Two further types of computer need mentioning i.e. Super Computer & EmbeddedComputer. A Super Computer is an extremely powerful computer used mostly inresearch and space, military and governmental applications. A super computer isthe costliest one and can cost crores of rupees. It is equivalent of thousands ofpersonal computers that share in the processing load to solve very large andcomplex problems in hours or days instead of weeks, months, or years. Asupercomputer is the largest and most powerful computer, sometimes equaling thepower of several mainframes combined.

    An Embedded computer is built into another device to control, monitor, ormanage some activity for the device. Virtually all electronic devices have anembedded computer built inside for example a microwave oven, modern televisionsetc. They have very small and single purpose processors. A personal computer also

    has an embedded computer in its microprocessor but it is a multifunctional devicecapable of controlling more than a single process or activity.

    1.2. Role of Computers in Society

    As we hurtle towards the 21st century, we must accept theinevitability of a computer revolution in the near future. It is an-inseparable part ofdevelopment, as demonstrated by other countries. Computers are no longer luxuryor the sole property of the advanced countries. Their appropriate uses in India can

    help us solve the unique problems of a developing country and bring about the

  • 8/19/2019 Uom7 Vetted

    5/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 5 / 124

    desired changes in increasing literacy, optimizing resources, increasing efficiency,productivity and quality.

    Already computers have become such an important part of our lives-

    in airports, banks, railway stations and every well-equipped modern office. Ascomputer continues to proliferate in ever increasing numbers across largesegments of Government, business and industry, the common man is beginning tobelieve hesitantly that computers can actually deliver a good part of the promisethat they had offered. Society is gradually accepting the fact that computers willindeed change the manner in which the things are done.

    Computers can substantially save valuable man-hours by helpingpeople through communication to make reservation of tickets, operate their bank

    accounts, to pay for electricity water and telephone bills, insurance premium andalso do routine shopping. Trains can be operated automatically by computers andtraffic signals be computer co-ordinate to produce best traffic patterns, increasereliability and safety and generally provide for more efficient services.

    The basic industry of India is 'agriculture'. In areas of agriculture andirrigation, computers are making possible better matching of soil characteristicsand crop. This coupled with better use of resources like water, fertilizers andsunlight and more precise prediction of monsoons can help India in increasing crop

    yields manifold.Computer in health is bringing new hope for the sick. In areas of

    health and medicine, expert systems and data bases on blood groups availability,eye banks medical history of patients etc, can bring about a marked improvementin our health services. Expert system can help in more accurate diagnosis ofailments 'Hospital Information Systems' can help improve the efficiency of our hos-pitals reduce mortality and death-rates and in general provide better and speedier

    health care to our people.While this realization is gaining firmer ground in areas like the utilityservices, railways, airlines, agriculture, health etc., as well as organization control,there is area where the role of computers as the prime agents of change has stillnot been recognized. That is the area of education. In our country there are over5,00,000 primary schools of which l/3rd are single-teacher schools. 64% of totalpopulation of our country is illiterate. The number of illiterates at present is higherthan that at independence. To tackle a problem of such gigantic proportions, it is

    essential that a modern aids offered by Information Technology are made use of tospread education to the rural areas where most of the illiteracy is concentrated.

  • 8/19/2019 Uom7 Vetted

    6/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 6 / 124

    Computer based lessons developed in various subjects by experts in that areacould be used to educate the masses. The computer is a rapidly evolving tool thatcan now deal quite effectively with all fine forms of information that man deals with

    for better education are -data, text, image, graphics and voice.

    One thought can take place in our minds for a moment that 'thecomputer will replace the teacher-that would be a suicidal thought. But we shouldfully accept the reality that the computer will radically change the manner in whichteaching-learning processes take place. The role of the teacher will undergo aradical change. From being a mere "information dumping machine", the teacherwill once again rise to the height of being a mentor, philosopher and guide

    developing, instilling values, ideas, creating challenges and nurturing feelings,sentiments and empathy in young minds. In the wider prospective, these are whatare required for building a strong nation-intellectually spiritually and economically.

    In the most important area of government administration, to enableadministration take the right decision at the right time, accurate, relevant and up-to-date information should be made available to them. Modern computerizedcommunication network can significantly help bureaucracy cut its red tape.

    Therefore, computers are synonymous with development. Withappropriate computer usage and quality of life applications, India will be able toeffectively tackle its unique problems. The entire society will undergo atransformation and what would emerge is a society that is more intellectuallyaware and which values its time, intellect and dignity. A society armed withcomputer expertise can meet with confidence the exciting new India of tomorrow.

    1.3 Inside Computers

    1.3.1 Computer and its functions:

    Computer is an electronic data processing device capable of doing arithmeticcomputations and other complex operations at a very high speed. The computerdoes these operations on the basis of instructions given to it by a human being.

    Thus a computer does not do anything by itself; it is only a tool and does what you

    ask to do. If you feed wrong information into it, the result also will be wrong.Basic functions that a computer can perform are:

  • 8/19/2019 Uom7 Vetted

    7/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 7 / 124

    InputProcessStore

    OutputFor different functions the computer has different component namely:

    Input UnitCentral Processing Unito Control Unito Arithmetic & Logic Unito Memory UnitOutput Unit

    Input Unit - It consists of devices through which the data and/or program can becommunicated with the computer. The input device converts the data and/orprogram from the human readable form to the machine readable form i.e. into amachine code. The various input devices in computer are:

    Key boardFloppy/Compact discMagnetic tapes

    MouseCamera/Scanner/Microphone

    Central Processing Unit - Control Unit, Arithmetic & Logical Unit and MemoryUnit collectively act like the heart of the computer and are referred to as the centralprocessing unit. It is here that actual processing of data takes place on execution ofthe programs.Control Unit is responsible for overall control of program execution. It receives

    instruction from memory unit and on deciding the action to be taken, directs otherunits of the computer to carry out respective functions. This unit, thus, performsthe following important functions:

    Directing the flow of dataExecuting instructions operationsLooking-after hardware and program errorsControl the sequence of the operation of various units.

  • 8/19/2019 Uom7 Vetted

    8/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 8 / 124

    Arithmetical & Logical Unit - All calculating functions like addition, subtraction,multiplication, and division are carried out in this unit.

    Memory Unit - This unit stores instructions and/or data. This unit is also calledas main or internal memory. In this context two terms needed to be introduced i.e.RAM & ROM.

    RAM (Random Access Memory) is the actual usable memory where the instructionsand data are made to reside during execution. The contents of this area exist thereas long as power is on.

    ROM (Read Only Memory) contains programs (of permanent nature) in machinecode which do not get wiped out even when power goes off. The method of storageof this memory is such that, it is neither erasable nor replaceable. Programs in thisarea include operating system, monitor programs, etc.Auxiliary or external memory is the additional memory used to supplement thestorage capability. Magnetic tape, floppy, disc, etc. are examples of this category.

    Output Unit - The final result for a given problem residing in main memory can beinscribed on an appropriate output device in the output unit of the computer. Theoutput can be in either visual or audio or printer form. The output devices whichare in use today are:PrinterVisual Display Unit

    The various input and output devices of the computer are termed are termed asComputer Peripheral

    Computer Software

    The physical and tangible components of the computer i.e. those componentswhich can be touched and seen are called Hardware. It includes centralprocessing units consisting of resistors, capacitors, ICs etc. and peripheralsconsisting of input devices and output devices.But all these devices are mere junks of there is no proper software. Software is theprogram which gives life to the hardware. There are three major categories of

    software viz.Operating System

  • 8/19/2019 Uom7 Vetted

    9/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 9 / 124

    Language ProcessorApplication Package

    Operating System - These are programs usually written by computer

    manufacturers. These programs are inbuilt into the computer and are used togovern the control of the computer hardware components, such as processors,memory devices and input/output devices. They, in fact, act as an interfacebetween the user's programs and the computer components and facilitate in theexecution of programs.

    Language Processor - This software is used to translate the programmer writteninstructions into machine code instructions. This is machine-dependent softwareand is popularly known as assembler /compiler.

    Application Package - Application programs are user-written programs to performcertain specific jobs. They are unique in their construction and can be used onlyfor identical jobs. MS Word, Excel, etc. are common example of it.

    1.3.2. Hardware:

    Computers generally are of three type i.e. mainframe, mini and personal. What wesee on our desk is a personal computer. It has only been developed after themainframe and mini computer. Mainframe and mini computers, though fast inprocessing, were large in size, costly and needed experts for use and application.But the Personal Computer (PC) has removed all these limitations and has madethe computing popular. Now we shall study the component of a typical personalcomputer. In other words we shall study the hardware of a PC.

    The hard wares of a typical PC include:

    Visual display unitKeyboard / MouseSystem unit, which contains the motherboard, disk drive, expansion card, andinput/output portsPrinter

    Visual Display Unit (VDU) -

    The two general categories of PC visual presentation are monitor and display. A

    monitor has a Cathode Ray Tube ( CRT ) and looks something like a traditionaltelevision set. On the other hand, a display is a flat-panel Liquid Crystal Display

  • 8/19/2019 Uom7 Vetted

    10/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 10 / 124

    (LCD ) that can be attached to a PC or hung on the wall. A display is really anadaptation of the monitor, but because it uses different technology, they are treatedas two different components.

    A monitor has some advantages over the display. It is bright, well-lit, andeconomical and produces excellent color and graphic qualities. A monitor uses thesame technology common to the television set. The monitor is basically a funnelshaped glass tube (technically known as cathode ray tube) that uses electron gunsto light up (technically known as excite ) phosphor elements on the back of displayglass. The lighted phosphorous blend to form images and movements and is shownthrough the display of the CRT for the user to view. The user views thephosphorous through a single pane of glass, which is why the display is so bright

    and why it is easily viewed from an angle.But if there is limitation of space on a desk or worktable an LCD display is a moresuitable option than a CRT monitor. A typical CRT monitor are 12 inch or morefrom front to back, which can take a considerable amount of workspace on a desk.Flat-panel LCD displays are typically only a few inches deep including its foot,which makes them perfect for small desks or places where a large CRT monitorwould negatively impact the aesthetics or decor. Even the new PCs that areintegrated into the same package as a flat-panel display are only inches in depth.Flat-panel LCD display are backlit, which means the light source of the displayshine through several layers of filters and glass before on see it. This is why LCDdisplays appear to be less bright than a CRT-style display and less legible from anangle. However, LCD displays are digital, which means they are able to reproduceimages more accurately, especially colors.

    The monitor and display can be found in different sizes. The most popular sizes are14-inch, 15-inch, 17-inch, 19-inch and 21-inch. This is the size of the CRT or LCD

    measured diagonally from a top corner to an opposite bottom corner (in the sameway a television set is measured and marketed). The viewable size of CRT, however,is a bit less than its nominal size for the front bezel (the plastic around the edge ofthe display) covers up a small portion of the display.

    The images displayed on a monitor are created from a pattern of dots in much thesame way as the photographs in a newspaper. Dots are shaded lighter or darker sothat ones eyes can form a visual image from them. The CRT creates these dots fromthe phosphor on the back of its screen using masking methods that isolate each

    dot so that it can be illuminated by an electron gun.

  • 8/19/2019 Uom7 Vetted

    11/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 11 / 124

    A monochrome, or single color, monitor has phosphor of only one color, so thatwhen the phosphor dots are illuminated, the text and the graphic image is a singlecolor on a contrasting background. Typically, the background is black and the

    display color is green, amber or white. The image produced on a color monitor is created by illuminated small triangles ofphosphor dots called picture elements, or pixels for short. In the CRT, one-third ofthe dots are red dots, one-third are green dots, and one-third are blue dots. Thesedifferent colored dots are interspersed evenly on the screen so that a dot of eachcolor can be grouped with a dot of each of the other colors to form a triangle orpixel.A color CRT has three electron guns that are used to light up the phosphors in

    each pixel. The combinations and intensities used to illuminate the phosphorsdefine the image produced on the screen. The electronic guns sweep over the pixelsfrom side to side, one row at a time, to create or refresh the displayed image.LCD displays are of two different types: passive matrix and active matrix. A passivematrix display has a layer of LCD elements on a grid (matrix) of wires. Whencurrent is applied to the wire intersections, the diodes (pixels) are lighted. A passivematrix refreshes the display by applying current to the pixels at a fixed rate. Activematrix displays control each LCD element (diode) individually with one or moretransistors that continually refresh each element of the display.

    Keyboard The most common input device is the keyboard. The keyboard allows a user tocommunicate with the PC through keystrokes that represent character data andcommands. Virtually every PC sold has a keyboard included as a part of itsstandard package. In fact, most people take their keyboard for granted and rarelyeven think about it.

    Most keyboard layouts are still a variation on the key layout of a typewriter, at leastfor the alphabetic, numerical, and special character keys. However, keyboards alsoinclude a variety of other keys that are dedicated to specific functions or areassigned functions by the software running on the PC, such as a keyboard‘sfunction keys.

    Mouse The mouse is a very natural, intuitive, inexpensive pointing device on a graphicaluser interface like Windows. Two types o mouse in use today are:

    Mechanical Mouse

  • 8/19/2019 Uom7 Vetted

    12/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 12 / 124

    Optical Mouse

    Mechanical MouseIn a mechanical mouse, the movement of a rubber ball causes a pair of wheels to

    spin that sensors detect to send data signal to the PC. Later modification came to itand light emitting diodes were used to sense mouse movements and thus termedas optomechanical mouse. A little modification of optomechanical mouse when afinger wheel was attached on the top of it, typically between the two buttons i.e. leftclick button and right click button. The wheel allows the user to scroll forward andbackward through a document in place of clicking on a window‘s scroll b ar or usingthe PAGE UP and PAGE DOWN keys or the cursor control arrow keys or the cursorcontrol arrow keys.

    Optical Mouse The optical mouse eliminates the mouse ball, replacing it with a optical sensorsthat track the movement of the mouse against the background of the mouse pad orwhichever flat surface it‘s on. One real advantage to the optical mouse over theoptomechanical mouse is that it does not require internal cleaning. Because it haseliminated all moving parts, the optical mouse does not pick up dust and otherdebris that could clog up the optomechanical mouse and require it to be regularly

    cleaned. Another advantage is that, according to manufacturer claims, an opticalmouse is at least 33 percent faster and many times more accurate than anoptomechanical mouse.

    1.3.3 Internal Hardware

    The major components within a typical system case are:

    MicroprocessorsMotherboard

    Chipsets and ControllersBIOSComputer MemoryCache MemoryHard Disks and Floppy DisksCD-ROMsExpansion Cards

    Power SupplyNow we will discuss in brief each of these components.

  • 8/19/2019 Uom7 Vetted

    13/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 13 / 124

    Microprocessors The microprocessor is a multi function integrated circuit that is, in essence, thecomputer. The processor, which is also called the central processing unit (CPU), is

    made up of several parts. These parts work together to carry out the instructionsand actions that translate to a word processing system or a game on the PC.Microprocessor of Intel is very popular and has a very higher clock speed. The clockspeeds of the Pentium I processor of Intel range from 60 MHz to 200 MHz and thatof Pentium IV range from 1.3 GHz to 3 GHz.

    The primary parts of the CPU are Control Unit, Protection Test Unit, Arithmetic andLogic Unit, Floating Point Unit, Memory Management Unit, Bus Interface Unit, ThePrefetch Unit, Decode Unit and Registers.

    Motherboard

    A motherboard (also known as a main board or system board) aggregates all of thePC's primary system components on a single printed circuit board. In themotherboard's single board design all the Pc's electronic circuitry that provides theconduit through which all operations flow is located on the motherboard.

    The major components found in a typical motherboard are CPU slot and socket,Chipset, Memory sockets, BIOS ROM, CMOS battery, Power connectors, I/O

    Connectors and Expansion Slots.Chipset

    The chipset is technically a group of chips that helps the processor and othercomponents on the PC communicate with and control all of the devices pluggedinto the motherboard. The chipset controls the bits (data, instructions, and controlsignals) that flow between the CPU, system memory and over the motherboard'sbus. The controller chip also manages data transfers between the CPU, memory

    and peripheral devices and provides support for the expansion bus and powermanagement features of the system.BIOSA PC's BIOS (Basic Input / Output System) includes the programming to performthree vital useful functions for the PC:

    It boots the computer.It validates the PC's configuration.It provides an interface between the hardware of the PC and its software.

  • 8/19/2019 Uom7 Vetted

    14/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 14 / 124

    ROMROM (Read Only Memory) is an electronic component. The data stored on ROM cannot be changed. Moreover it is nonvolatile i.e. it keeps its content even without a

    power source. This makes it ideal for storing the PC's startup instructions andsystem BIOS.CMOSCMOS memory is based on Complementary Metal Oxide Semiconductor technologyand requires only about one-millionth of an ampere to hold any data stored on it.Using only a lithium battery, CMOS memory is able to store the startupconfiguration of a PC for many years. The term CMOS is still synonymous with thePC's startup configuration data.

    RAMRAM (Random Access Memory) is used in the PC for its primary memory. RAM iswhere all active programs and data are stored to that they are readily available andeasily accessed by the CPU and other component of PC. When a program isexecuted, a copy of the program from the hard disk is copied into RAM. Once it isin RAM, the instructions that make up the program are passed one at a time to theCPU for execution. Any data that the program accepts or reads from a disk is alsostored in RAM. It is a volatile but very fast in accessing the data. For exampleaccessing data from a hard disk takes from 8 to 16 milli-second while the samedata from RAM takes from 50 to 80 nano-second. The size of the RAM is measuredin bytes e.g. kilobyte or megabyte.

    Cache Memory

    Cache memory is very fast computer memory that is used to hold frequentlyrequested data and instructions. A cache is any buffer storage used to improvecomputer performance by reducing its access time. The cache is commonly foundbetween RAM and CPU. To speed up the transfer of data and programs from thehard disk drive to RAM, also, a disk cache is used.

    Hard Disk & Floppy Disk Drives

    Hard disk and floppy disk are types of secondary storage, with the PC's RAMproviding its primary storage. Hard disk drive is electronic equipment which storesthe data on the hard disk of the system. Whereas floppy disk drive stores the dataof the system on the floppies which are kept outside the system and helps in thetransfer of data from one system to another.

  • 8/19/2019 Uom7 Vetted

    15/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 15 / 124

    CD-ROM Drive with Writer

    CD-ROM (Compact Disk Read Only Memory) Drive is a new invention and hassolved the problem of secondary storage. A huge data can be stored on a single CD.

    The technology used is same as that of audio CD. Earlier once the data stored on aCD was not re-writable but now the data can be written, read and re-written on theCD through the CD Drive.

    Expansion Card

    Expansion cards are used to connect different peripherals (like ports providingnetwork connection, memory expansion etc.) of the computer to its motherboard.Power Supply

    The PC's power supply unit converts AC power from the wall socket to DC power forthe computer. Even the devise outside the computer case use DC power. In makingthis conversion, the functions the power supply performs are conversion,rectification, filtering, regulation, isolation, cooling, and power management.Peripheral devices such as printers, external modems and disk drive use Ac powerconverters to convert AC power to DC power.

    1.4 Operating Systems

    An operating system is a collection of programs that is needed to start and operatethe computer system. It works mostly in the background, specially when one startthe computer system, it is the operating system which takes over and does thehousehold routines on the computer system and hands over the computer to thatself for operation. Moreover it checks for the various commands that are given tothe computer to ensure that nothing wrong is happening.Operating system also acts as an interface between a user and the hardware of thecomputer. It controls and coordinates the use of the hardware among the variousapplication programs and thus acts as a Resource Manager.We can thus summarize the functions of operating system as follows –

    Execution of programInput/Output operationHandling File SystemDetection of errorsAllocation of resources

    Information and Resource Protection

  • 8/19/2019 Uom7 Vetted

    16/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 16 / 124

    All these services are ensured by the functions provided by an operating system. The functions offered by different operating system differs from one operatingsystem differs from one operating system to another, but more or less they provide

    the same services. Most commonly used operating systems are:MS DOSWindowsUNIXLinux

    1.4.1 MS DOS (MicroSoft Disk Operating System)

    Microsoft's Disk Operating System, simply known as MS DOS had been the

    prominent software for the running of the Personal Computer (PC). Actually it wasthe big factor in popularizing the PC. Starting with version 1.0 MS DOS has nowcome to the version 7.

    The operating system should always remain in the main memory. The process oftransferring the operating system to the main memory is known as booting . Theoperating system contains three files for booting viz.:

    IO.SYS hidden file

    MSDOS.SYS hidden fileCOMMAND.COM

    If the floppy contains these three files in the 0 track then it is called as bootingfloppy.

    There is a program called Bootstrap (Boot Program) in BIOS chip in the computer.It does the following functions.

    Testing the Hardware as per configuration

    Search the OS and transfer the same i.e. it reads the boot sector, whichcontains DOS boot record and then transfers the same to the main memory.

    The boot record copies the IO.SYS, which contains SYSINT. Once IO.SYS is loaded,boot record is not required. The SYSINIT will take care of further action. NowMSDOS.SYS is loaded. Now SYSINIT searches for the CONFIG.SYS file and thenloads the same and gives instruction to MSDOS.SYS to act on CONFIG.SYS. TheSYSINIT instructs the MSDOS.SYS to load COMMAND.COM.

    The COMMAND.COM contains the I/O operation and internal commands. It is thecommand interpreter. After the loading of the COMMAND.COM the

  • 8/19/2019 Uom7 Vetted

    17/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 17 / 124

    AUTOEXEC.BAT file will be executed. Finally the prompt will be displayed on theVDU indicating that the booting is successfully completed and now the PC is readyto accept any command.

    A command is something you use to instruct MS-DOS what to do. All commandsare entered in the command line following the MS-DOS prompt. A command isentered along with the necessary parameters and switches. So,

    Command - what is to be done (What to do)Parameters - to act upon what (Where to do)Switches - how the command is to be carried out (How to do)

    DOS commands are divided into internal commands and external commands .

    Internal command are memory resident. They are available in command.com. The external commands are available in the form of a file, whose name is same asthe command with extension as either COM or EXE. Whenever the command isissued the processor refers to the file and executes the command.

    1.4.2 Windows

    Windows is also a product of Microsoft. From Windows 95 to Windows xp it hasseen several version with each newer version improved over the older. What makes

    it different from the MS-DOS is that it is based on Graphic User Interface (GUI).Here the user is not required to write a command in the command line as in theMS DOS rather he can use different menus of commands available on the screen.Moreover it is mouse compatible. So a user is required to click the mouse only toaccess different commands.Another feature of this operating system is that multiple works can be carried outthrough several windows which can be operated simultaneously. For example,while the system is copying the file from the computer to floppy one can also readanother file. This feature of window has made it much popular and time saving.

    1.4.3 UNIX

    A multi-user, multitasking operating system that is widely used as the mastercontrol program in workstations and servers. The Open Group holds the trademarkfor the UNIX name (spelled in upper case) on behalf of the industry and providescompliance certification to the UNIX standard.Unix is written in C. Both Unix and C were developed by AT&T and freelydistributed to government and academic institutions, causing it to be ported to a

  • 8/19/2019 Uom7 Vetted

    18/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 18 / 124

    wider variety of machine families than any other operating system. As a result,Unix became synonymous with "open systems."Unix is made up of the kernel, file system and a shell, which is the command line

    interface with more than 600 commands for manipulating data and text. The majorshells are the Bourne shell (original), C shell and Korn shell.Varieties of commercial applications run on Unix servers, and many Web sites rununder Unix. Over the years, there have been many different versions of the OS,and, except for the PC world, where Windows dominates, almost every hardwarevendor offers Unix as its primary or secondary operating system. Sun has beensingularly instrumental in commercializing Unix with its Solaris OS (formerlySunOS). HP, IBM, SCO and Digital (before it merged with Compaq) have also been

    major Unix promoters.

    1.4.4 LINUX

    A very popular version of the Unix operating system that runs on a variety ofhardware platforms including x86, Itanium, PowerPC and IBM's entire product line.Linux is widely used as a server OS and is gaining ground in the desktop market.In 1990, Finnish computer science student Linus Torvalds turned Minix, a popularclassroom teaching tool, into Linux, which is closer to the real Unix. Torvalds

    created the kernel, and most of the supporting applications and utilities came fromthe GNU project of the Free Software Foundation. Many programmers havecontributed to the Linux/GNU system.Linux is the most popular open source operating system in use now. Its sourcecode is available free of charge; however, Linux is distributed along with technicalsupport and training for a fee from several vendors such as Red Hat Software(www.redhat.com) and SUSE Inc. (www.suse.com). The distribution CD-ROMsinclude the complete source code as well as hundreds of tools, applets and utilities.

    1.5.Storage devices

    Most of the storage media in PC systems operate on magnetic principles. Hard diskis the largest external memory of a PC system. It can be classified as exchangeable& fixed. It is attached to a PC system through an IDE(Intelligent Drive Electronics)adapter port or SCSI(Small Computer System Interface) adapter port. It is availablein different capacities like 20 GB, 40 GB, 80 GB,100 GB etc.A Hard Disk Drive is a sealed unit that a PC uses for non-volatile data storage.Nonvolatile, or permanent storage, in this case, means that the storage device

  • 8/19/2019 Uom7 Vetted

    19/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 19 / 124

    retains the data even when there is no power supplied to the computer. Becausethe HDD is expected to retain its data until a user deliberately erases it, the PCuses it to store its most crucial programming and data. As a result, when the Hard

    Disk fails, the consequences are usually very serious.1.5.1 Hard Disk

    A Hard disk drive contains rigid, disk-shaped platters, usually constructed ofaluminium or glass. A motor spins the platters at 5400 or 7200 rpm when the driveis operating. In order to increase the amount of information the drive can store,most hard disks have multiple platters and read/write heads.Data is stored on the surface of a platter in sectors and tracks. Tracks are

    concentric circles and sectors are pie-shaped wedges on a track.A sector contains a fixed number of bytes- say 256 or 512 bytes. Sectors are oftengrouped together into clusters.

    The identically positioned tracks on each side of every platter together make up acylinder. A HDD normally has one head per platter side, with all the heads on acommon carrier device, or rack .

    The process of low-level formatting a drive establishes the tracks and sectors on theplatter. The starting and ending points of each sector are written onto the platter.High level formatting then writes the file-storage structures like the file-allocationtable into the sectors. This process prepares the drive to hold files.A Hard disk drive is designed to be used with more than one operating system.Partitioning enables a single HDD to run more than one type of Operating Systemor it can enable a single Operating System to use the disk as several volumes or

    Operating System assigns a drive letter or name.

    1.5.2 Floppy Disk

    Floppy disk is another magnetic storage device. It is made of thin, flexible Mylar plastic coated with magnetic material and protected by an envelop. Earlier, 5.25” floppy disk with capacity 360 KB were in use. Nowadays 3.25” floppy disks are onlyavailable in the market with capacity 1.44MB.

    On the basis of recording density and capacity of a sector, floppy can be classifiedas single density and double density disk.

    The major parts of a Floppy disk drive include:

  • 8/19/2019 Uom7 Vetted

    20/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 20 / 124

    1) Read/write head : Located on both sides of a diskette, they move together onthe same assembly.

    2) Drive motor : A very small motor that spins at either 300 or 360 rotations per

    minute.3) Stepper motor : This motor makes a precise number of stepped revolutions tomove the read/write head assembly to the proper track position.

    4) Mechanical frame : A system of levers that opens the little protective windowon the diskette to allow the read/write heads to touch the dual-sideddiskette media.

    5) Circuit board : Contains all of the electronics to handle the data read from orwritten to the diskette.

    1.5.3 CDROM

    CDROMs are used for storing large software packages and can contain all types ofmultimedia data storing over 650MB of data. They are optical storage devices.A CDis a simple piece of plastic about 1.2 mm thick and 12cm in diameter. CD consistsof an injection-molded piece of clear polycarbonate plastic. Once the clear piece ofpolycarbonate is formed, a thin, reflective aluminum layer is sputtered onto thedisc, to make the surface reflective. The colour of a CD can be cyanine-green,

    Phthalo cyanine- yellow or azo-blue. Then a thin acrylic layer is sprayed over thealuminum to protect it. The label is then printed onto the acrylic.A CD has a single spiral track of data, circling from the inside of the disc to theoutside. The data track is approximately 0.5 microns wide, with 1.6 micronsseparating one track from the next. The track always circles from the inside ofthe disc to the outside.

    1.6 Programming

    1.6.1 Overview:

    Computer programming (often shortened to programming or coding ) is theprocess of designing, writing, testing, debugging, and maintaining the sourcecode of computer programs. This source code is written in one ormore programming languages. The purpose of programming is to create a set ofinstructions that computers use to perform specific operations or to exhibit desiredbehaviors. The process of writing source code often requires expertise in many

  • 8/19/2019 Uom7 Vetted

    21/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 21 / 124

    different subjects, including knowledge of the application domain,specialized algorithms and formal logic.

    1.6.2 Need for Languages:

    Aprogramming language is an artificial language designed tocommunicate instructions to a machine, particularly a computer. Programminglanguages can be used to create programs that control the behavior of a machineand/or to express algorithms precisely.

    The earliest programming languages predate the invention of the computer, andwere used to direct the behavior of machines such as Jacquard looms and player

    pianos. Thousands of different programming languages have been created, mainlyin the computer field, with many more being created every year. Most programminglanguages describe computation in an imperative style, i.e., as a sequence ofcommands, although some languages, such as those that support functionalprogramming or logic programming, use alternative forms of description.

    The description of a programming language is usually split into the twocomponents of syntax (form) and semantics (meaning). Some languages are definedby a specification document (for example, the C programming language is specified

    by an ISO Standard), while other languages, such as Perl 5 and earlier, have adominant implementation that is used as a reference.A vocabulary and set of grammatical rules for instructing a computer to performspecific tasks. The term programming language usually refers tohigh-levellanguages, such as BASIC, C, C++, COBOL, FORTRAN, Ada, and Pascal. Each language has a unique set of keywords (words that it understands) and aspecial syntax for organizing program instructions. High-level programming languages, while simple compared to human languages,are more complex than the languages the computer actually understands,

    http://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/C.htmlhttp://www.webopedia.com/TERM/A/Ada.htmlhttp://www.webopedia.com/TERM/P/Pascal.htmlhttp://www.webopedia.com/TERM/S/syntax.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/I/instruction.htmlhttp://www.webopedia.com/TERM/I/instruction.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/S/syntax.htmlhttp://www.webopedia.com/TERM/P/Pascal.htmlhttp://www.webopedia.com/TERM/A/Ada.htmlhttp://www.webopedia.com/TERM/C/C.htmlhttp://www.webopedia.com/TERM/C/computer.html

  • 8/19/2019 Uom7 Vetted

    22/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 22 / 124

    called machine languages . Each different type of CPU has its own unique machinelanguage.Lying between machine languages and high-level languages are languages

    called assembly languages. Assembly languages are similar to machine languages,but they are much easier to program in because they allow a programmer tosubstitute names for numbers. Machine languages consist of numbers only.Lying above high-level languages are languages called fourth-generationlanguages (usually abbreviated 4GL ). 4GLs are far removed from machinelanguages and represent the class of computer languages closest to humanlanguages.Regardless of what language you use, you eventually need to convert your program

    into machine language so that the computer can understand it. There are two waysto do this:

    compile the programinterpret the program

    See compile and interpreter for more information about these two methods. The question of which language is best is one that consumes a lot of time andenergy among computer professionals. Every language has its strengths andweaknesses. For example, FORTRAN is a particularly good language for processingnumerical data, but it does not lend itself very well to organizing large programs.Pascal is very good for writing well-structured and readable programs, but it is notas flexible as the C programming language. C++ embodies powerful object-oriented features , but it is complex and difficult to learn.

    The choice of which language to use depends on the type of computer the programis to run on, what sort of program it is, and the expertise of the programmer.

    1.6.3 Skills Needed In Programming

    Programming does not represent a theoretical subject like Biology, Physics,Mathematics or Chemistry. Consequently it is not necessary to have an advanceddegree in order to do very well or rather become perfect at programming.In comparison to a variety of so-called physical tasks such as writing poetries,singing, painting, gymnastics or rhyming, programming is not in need of specialinnate talents or skills. So programming does not require strength, power,condition or coordination. In order to do very well at programming it is necessary to

    be careful and have a special capacity like craftsmanship.

    http://www.webopedia.com/TERM/F/feature.htmlhttp://www.webopedia.com/TERM/F/feature.html

  • 8/19/2019 Uom7 Vetted

    23/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 23 / 124

    Things that are required for doing very well at programming are attention to detail,specialized and technical knowledge, stupidity, good memory and the specificability to think in an abstract way in both all respects and every sense.

    1.

    Attention to detail : Considering the matter of programming details areplaying a significant and very important role. So if the respectiveprogramming language says it is necessary to declare and specify variablesbefore using them, you have to do so. However, if the programming languagerequires the usage of parentheses, brackets and square brackets, you haveto do so as well.

    2. Specialized and Technical knowledge : If you want to do very well atprogramming you should have a profound specialized and technical

    knowledge considering programming languages, programming ingeneral, web hosting , servers, etc. Be sure that you possess expert know-how considering all things that have to do with web sites and webdevelopment as well as other related issues such as for instanceconfiguration, optimization and practical use of both servers and webhosting.

    3. Stupidity : You certainly will not believe, but in spite of all it is true thatcomputers are incredibly stupid. Fact is that computers do only those things

    you tell them to do – no more, no less. When it comes to programming inconnection with the so-called stupidity of computers it is helpful to think asstupidly as computers do.

    4. Good Memory : Programming requires a very good memory. Because of thefact that there are loads of important things and details to remember, it isessential to be able to memorize basic and relevant programming facts.Some of these are for instance the syntax of the respective programming

    language, prewritten functions and parameters, variables and specificfunctions, bugs you have had in the past and you want to avoid in thefuture, etc. So the more of this basic know-how and details you are able tokeep in mind, the more successful you will be at programming.

    5. Ability to think in an abstract way : The specific ability to think in anabstract way on several levels as well as in all respects is certainly the mostessential skill in programming. Strictly speaking computers do represent oneof the most extensive and complex systems of all which do require knowing

    and memorizing every single basic aspect and function of this system at alllevels as well as in all respects.

  • 8/19/2019 Uom7 Vetted

    24/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 24 / 124

    1.7.Networking Basics:

    The term network usually means a set of computers andperipherals (printers, modems, plotters, scanners, and so on) that are connected

    together by some medium. The connection can be direct (through a cable) orindirect (through a modem). The different devices on the network communicatewith each other through a predefined set of rules called the protocol. Computernetworks allow people and machines to communicate, using a number of services.

    The networking of computers become essential for two reasons:

    Data SharingResource Sharing

    Data SharingNetworks offer the capabilities of multi-user access to the organisational Data.Shared files may exist in one location with multiple people accessing them orupdating parts of them. Database applications are found in virtually everycomputerised organisation. Transmitting E-mail is one method of sharing data.

    This avoids the face to face contact of people and improves the faster data flow.

    Not only data files may be shared, but executable files may be shared as well. Whena user invokes an executable file on a network server, a copy of it is transmittedover the network into the memory of the local user's workstation. That is where theactual execution takes place, not on the file server

    Resource Sharing

    One of the distinct benefits of networking is the ability to share peripherals. Forexample Laser Printer is costly and for a small office one can not afford to purchasemore than one printer to attach for each PCs. Instead one Laser Printer can beshared by more PCs when the PCs are connected through Network. The ability ofsharing printers and disk space has been the driving force behind many companiesinstalling PC-based networks.

    Line Configuration:

  • 8/19/2019 Uom7 Vetted

    25/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 25 / 124

    The Line configuration defines the attachment of Network devices to a link. Thereare basically two type of line configurations are there, they are:

    Point to Point

    Multi Point

    The Point to Point line configuration provides a dedicated link between two Networkdevices. The entire band width is available for transmission.

    The Multi point Line configuration is also called Multi drop. In Multi Point Lineconfiguration more than two devices share the media. The bandwidth is sharedeither Spatially or Temporally. If several devices can use the link simultaneously it

    is a spatially shared line configuration. If the user must take turns, it is a timeshared Line configuration

    Topology

    The Physical layout or how the transmission media are wired together is known asthe Physical topology.

    There are different type of topologies used in the Network they are: BUS Topology Ring Topology Star Topology Mesh Topology Tree Topology

    The Bus Topology

    The bus network is the simplest, comprising a single main communicationspathway with each device attached to a single transmission media.

    A bus topology is a multipoint line configuration. A bus topology uses a singletransmission media to which network devices are attached. This single

    Terminat

  • 8/19/2019 Uom7 Vetted

    26/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 26 / 124

    transmission media acts as backbone. Because all workstations share this bus, aworkstation checks for any information that might be coming down the backbonebefore sending their messages. All messages pass the other workstations on the

    way to their destinations. Each workstation then checks the address of eachmessage to see if it matches its own. The primary advantage of a bus network is that it allows for a high-speed bus.Another advantage of the bus network is that it is usually immune to problems.Ends are terminated with a terminator called Head End to avoid signal reflection.

    Advantages of a BUS Topology

    Easy to connect a computer or peripheral to a linear bus.Requires less cable length than a star topology.

    Disadvantages of a Bus Topology

    Entire network shuts down if there is a break in the main cable. Terminators are required at both ends of the backbone cable.Difficult to identify the problem if the entire network shuts down.Not meant to be used as a stand-alone solution in a large building.

    Ring Topology

    Ring topologies consist of several nodes joined together to form a circle. In a ringtopology each device has a dedicated point to point line configuration only with theother two devices on the either side of it. Ring consists of series of 150 Ω shieldedtwisted pair cable connecting each station to its neighbour. Output port of onedevice is connected to input port of its neighbour. Messages move from one nodeto the next, in one direction only. When a node receives a message that isaddressed to itself, the message is copied and sent back with a modification thatindicates it was received. Data was transmitted Uni-directionally around the ring.Each workstation acted as a repeater, accepting and responding to packetsaddressed to it, and forwarding on the other packets to the next workstation―downstream.‖ (i.e the frame is passed to each station in sequence, where theframe is examined, regenerated and then passed to the neighbour).

  • 8/19/2019 Uom7 Vetted

    27/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 27 / 124

    Ring Topology

    Multi Access UnitA disabled or disconnected node may block the Ring. To avoid this an

    automatic switch will by pass the faulty NIC. Once the node comes live it will beput in to the Ring. For practical purpose these switches are combined into acentralised devices called Multi Access Unit (MAU). The Multi Access Unit will havemultiple ports to connect the devices.Advantages:

    The benefit of such LANs was that response time was fairly predictable.Disadvantages:

    The more devices there were in the ring, the longer the network delays.The entirenetwork could be completely disabled if one of the workstations failed.

    Star Topology

    The star topology uses a central device with drop cables extending in all directions.Each networked device is connected point-to-point to the central device, or hub. InStar topology, each node has a dedicated Point to Point link only to the Hub. Thedevices are not directly linked. All messages in a star topology must go through thecentral device (Hub) before reaching their destination. It also acts as a repeater forthe data flow. This configuration is common with twisted pair cable; however, it canalso be used with coaxial cable or fibre optic cable.

  • 8/19/2019 Uom7 Vetted

    28/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 28 / 124

    Advantages of a Star Topology

    Easy to install and wire.No disruptions to the network then connecting or removing devices.Easy to detect faults and to remove parts.

    Disadvantages of a Star TopologyRequires more cable length than a linear topology.If the hub or concentrator fails, nodes attached are disabled.More expensive than linear bus topologies because of the cost of theconcentrators.

    The protocols used with star configurations are usually Ethernet or LocalTalk. Token Ring uses a similar topology, called the star-wired ring.

    Tree Toplology

    In tree topology devices are connected to a secondary hub and that in turnconnected to central Hub. A tree topology combines characteristics of linear bus

    and star topologies. It consists of groups of star-configured workstations connectedto a linear bus backbone cable. Tree topologies allow for the expansion of anexisting network, and enable schools to configure a network to meet their needs.

  • 8/19/2019 Uom7 Vetted

    29/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 29 / 124

    Advantages of a Tree Topology

    Point-to-point wiring for individual segments.Supported by several hardware and software vendors.

    Disadvantages of a Tree TopologyOverall length of each segment is limited by the type of cabling used.If the backbone line breaks, the entire segment goes down.More difficult to configure and wire than other topologies .

    Mesh TopologyMesh topology is uncommon today because of its sheer impracticality. In a meshtopology system, every node is connected to every other node. The pervadingthought behind this is to offer the maximum amount of reliability for data transitand fault-tolerance.

    1.8 Virus:

    A computer virus is a program that spreads by first infecting files or the systemareas of a computer or network router's hard drive and then making copies of itself.Some viruses are harmless, others may damage data files, and some may destroyfiles. Viruses used to be spread when people shared floppy disks and other portablemedia, now viruses are primarily spread through email messages.Unlike worms, viruses often require some sort of user action (e.g., opening an emailattachment or visiting a malicious web page) to spread.A virus is simply a computer program--it can do anything that any other program

    you run on your computer can do. Some viruses are designed to deliberatelydamage files, and others may just spread to other computers. A worm is a type ofvirus that can spread without human interaction. Worms often spread fromcomputer to computer and take up valuable memory and network bandwidth,which can cause a computer to stop responding. Worms can also allow attackers togain access to your computer remotely.

  • 8/19/2019 Uom7 Vetted

    30/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 30 / 124

    A Trojan horse is a computer program that is hiding a virus or other potentiallydamaging program. A Trojan horse can be a program that purports to do one actionwhen, in fact, it is performing a malicious action on your computer. Trojan horses

    can be included in software that you download for free or as attachments in emailmessages.Most viruses, Trojan horses, and worms are activated when you open anattachment or click a link contained in an email message. If your email clientallows scripting, then it is possible to get a virus by simply opening a message. It'sbest to limit what HTML is available in your email messages. The safest way to viewemail messages is in plain text.Most users get viruses from opening and running unknown email attachments.

    Never open anything that is attached to an email message unless you know thecontents of the file. If you receive an attachment from a familiar email address, butwere not expecting anything, you should contact the sender before opening theattachment. If you receive a message with an attachment and you do not recognizethe sender, you should delete the message.Selecting the option to view your email messages in plain text, not HTML, will alsohelp you to avoid a virus.Tips to avoid virus:

    Install anti-virus software from a reputable vendor. Update it and use itregularly.

    In addition to scanning for viruses on a regular basis, install an "on access"scanner (included in most anti-virus software packages) and configure it tostart each time you start up your computer. This will protect your system bychecking for viruses each time you run an executable file.

    Use a virus scan before you open any new programs or files that may

    contain executable code. This includes packaged software that you buy fromthe store as well as any program you might download from the internet.If you are a member of an online community or chat room, be very careful

    about accepting files or clicking links that you find or that people send youwithin the community.

    Make sure you back up your data (documents, bookmark files, importantemail messages, etc.) on disc so that in the event of a virus infection, you donot lose valuable work.

  • 8/19/2019 Uom7 Vetted

    31/124

  • 8/19/2019 Uom7 Vetted

    32/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 32 / 124

    Viruses and worms are self-replicating programs or code fragments that attachthemselves to other programs (viruses) or machines (worms). Both viruses andworms attempt to shut down networks by flooding them with massive amounts of

    bogus traffic, usually through e-mail.

    5. Back DoorsHackers can gain access to a network by exploiting back doors administrativeshortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid ofcomputerized searchers (bots), hackers can probably find anyweakness in the network.

    6. Trojan Horses Trojan horses, which are attached to other programs, are the leading cause of allbreak-ins. When a user downloads and activates a Trojan horse, the software cantake the full control over the system and you can remotely control the wholesystem.. great..!!! They are also reffered as RATs(Remote Administration tools)

    7. KeyloggersConsider the situation, everything you type in the system is mailed to the hacker..!!Wouldn't it be easy to track your password from that.. Keyloggers performsimilar functionallities.. So next time you type anything.. Beware..!! Have alreadyposted about keyloggers and ways to protect yourself from them..

    8. Social Engineering This was one of the oldest trick to hack.. Try to convince your user that you are alegitimate person from the system and needs your password for the continuation of

    the service or somemaintainence.. This won't work now since most of the users arenow aware about the Scam.. But this Social Engginering concept is must for you tohave to convince victim for many reasons..!!!

    9.Phishing This is another type of keylogging, here you have to bring the user toa webpage created by you resembling the legitimate one and get him to enter hispassword, to get the same in your mail box..!! Use social engginering..

  • 8/19/2019 Uom7 Vetted

    33/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 33 / 124

    10. Fake MessengersSo its a form of phishing in the application format.. getting user, to enterthe login info in the software and check your maill..!!!

  • 8/19/2019 Uom7 Vetted

    34/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 34 / 124

    UNIT II - WORD PROCESSING

    MS-WORD or Word in short, is a comprehensive word processing software package.It provides all the features of a most advanced electronic typewriter. In addition tothese, many other features are also available in Word .Some of the important features are given below. You can

    Insert characters, words, sentences, paragraphs or pages of text anywhere inthe opened file.Alter, insert, delete, or correct any character, paragraph, page at any time in thefile.Move a selected portion of text to any location in the file using a few keystrokesor mouse clicks.Copy a section of text and insert it in any location using a few key strokes ormouse clicks.Find and replace a character, a word or phrase repeatedly.View the document in its true form or in miniaturized form.Insert pictures and objects in the existing text.

    Check the spelling and correct the wrongly typed words.Check the grammar in a portion or entire document in the file.Check the words with similar and opposite meaning for a given word.Create a multi column document.Introduce numbering and bullet in the document.Insert a table.Use different fonts of different styles for a part/entire file.Superscript or subscript.Draw shapes using available drawing tools.Create borders and shades.Create headers and footers.Resize the pages and so on.

    A typical Word screen looks like Fig-1.1

    Elements of Word Window

    Word is built around a set of interactive windows (rectangular on-screen boxes)through which you communicate with the Word Program .

  • 8/19/2019 Uom7 Vetted

    35/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 35 / 124

    Figure 1.1 shows two windows on the screen, one nested within the other. They arecalled

    Application window and

    Document window.Application Window -Application window is the outer window that contains theworkspace for all word-processing procedures. Application window frames theentire screen of the monitor. You use it to communicate with the Word program.Document Window -Document window sits within application window. It is theinner window where the text and images are entered.

    Control Menu Box- This appears at the top-left corner of the window. Whenclicked, it displays menu options to move, resize, close a window, or switch to otherapplications.Sizing Buttons- They are located in the upper-right corner of the window. They arecalled minimize button, maximize/resize button, close button.Minimize button - This is located to the left of the resizing button. A click on itreduces a Window to a button on Taskbar .

  • 8/19/2019 Uom7 Vetted

    36/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 36 / 124

    Maximize/resize button- The button, when clicked enlarges a program windowto fill the entire screen or enlarge a document window to increase the work areainside an application window.

    Close button - Clicking on this button closes the window.Title Bar- Title Bar is the band displaying the name of the application. Title bar isa part of the application window. The inner window displays the contents of thecurrent document. Title bar displays the name of the opened document asDocument1. If you open one more document, the name of that document will bedisplayed as Document2. When you save the documents, Save As dialog boxappears and now you can opt for same name or a new one.Menu Bar- It contains different menus located below the Title bar. You can select

    any of the options by clicking on it or pressing Alt key and then the underlinedalphabet (Hot key). Refer figure 1.1. When you click on a menu, a list of optionsdrops down. From it select any option by clicking on it. If an item appears dimmed(usually in gray shade), it means that it is not available for use.Standard Toolbar- This bar is usually located below the menu bar. It contains thetools that are used very frequently while working with the documents. Each tool isactivated by clicking on its icon. See fig 1.1Formatting Toolbar- This toolbar contains drop down menus for differentheadings, types and sizes of fonts, borders and shades and also options of textattributes, text alignments, bullets and indents. See fig.1.1.Ruler- Ruler contains scales that indicate the tabs, indents, and margin/paragraphsettings for the line/paragraph in which the insertion point is currently positioned.

    The settings of current paragraph may be quickly changed through the use of themouse and the ruler.Insertion Point - It is the vertical blinking line in the document window that

    indicates current location and where the next text entry or graphics will beinserted.I-Beam-Pointer - It is the shape of the mouse pointer when it navigates within thetext area of the document window. (The pointer will take different shapesdepending on its location in the Word window and the Word procedures currentlyin use.)Status Bar - It is the bar at the bottom of the Word window that includes the pagenumber; section number, current page / total pages, the position of the insertion

  • 8/19/2019 Uom7 Vetted

    37/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 37 / 124

    point in inches, the current line number and column number, current modes inwhich Word runs.Scroll Bars - They are the bars along the sides and/or bottom of a window, a dialog

    box, or a list. They indicate that there is more information to be seen by scrolling. To scroll through a document content, click on the beginning or end arrows locatedon the scroll bar, or drag the scroll box slowly along the bar. The location of thescroll box on the bar indicates the position of currently displayed information inrelation to the entire document.

    The files in Word normally are called documents and DOC is the extension attachedby the system to the name of a Word file

    2.1.1 Opening a Document

    In File menu,Click New for opening a new document.Click Open for the existing document

    Otherwise the respective icons in the standard tool bar can be clicked.If you click New , the New dialog box appears. In that, choose blank document (inGeneral tab option). Click OK . A blank document is opened with its name asDocument1, say, on the title bar. While saving this document, Save in dialog boxwill appear. Choose the drive/folder/file‘s name and then click on the Save button.

    The document will be saved with this new name.If you click Open in the file menu, Open dialog box appears. Choose thedrive/folder/file to be opened and click on the Open button. The particulardocument will be opened.

    2.1.2 Saving a Document

    As you enter information into a new document, the information is temporarilystored in the computer‘s memory. The computer‘s memory will be erased wh en thecomputer is turned off (or when you exit from your program). Saving the documentas a file on a disk provides a permanent copy of the document. A saved file can berecalled later and its contents can be edited and can then be saved withmodifications included in it. When you save a document as a file, you must give a name to it and specify thelocation (drive and folder) where the file is to be stored.Complete the following steps to save the current document.

  • 8/19/2019 Uom7 Vetted

    38/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 38 / 124

    Click on the Save button on the Standard toolbar to display the Save As dialog box

    (see fig 2.2)Locate the blinking insertion point in the File name text box. Type the name

    CTTC and do not press Enter .Find the Drives‘ list in the Save in text box. Drop down the menu to choose the

    drive.

    Click either on the name of the drive shown in the Save in textbox, or on the drop-down arrow. Choose one from the list.

    If necessary, use the scroll bar to select the name of the drive.Locate the directory from the list below the Save in text box. Click on the

    appropriate folder.Click on the Save button to save the file.After the file has been saved, note that the title bar on the window now reads

    Microsoft word-CTTC.

    Modifying and Saving the Document- You have saved the document as CTTC.doc. But still the document is open. Make some changes or go to the end of thedocument by pressing Ctrl key and then End key. Enter you name there at the end.You can save this document as a new file also. If you save this document as RTTC,say, your name will appear in RTTC.doc only. The CTTC.doc will be left unchanged.

    To save it as CTTC itself,

  • 8/19/2019 Uom7 Vetted

    39/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 39 / 124

    Click on the save button on the Standard Toolbar. No dialog box is presented. To save it as RTTC, say,In the File menu, choose Save As option and complete the operations.

    2.1.3 Closing a Document and Exiting Word

    If the current file is not saved and if you try to close it, a dialog box appears withoptions whether to save the changes in the file or not. Choosing Yes saves the fileunder its current name and closes it. If the document is new and has not beensaved earlier, Yes option displays the Save As dialog box and complete theoperations.

    There are numerous ways to exit Word safely. The ways to exit safely from Word are

    listed as follows. We can use any one method Open the File menu and click on the Exit option.Double-click on the Word window control-menu box.Press the Alt key and F4 key.Click on the Close x box in the application window.

    If the current document has not been saved when you enter the Exit command,Word displays a dialog box asking with options whether the changes are to besaved or not before exiting the program. On clicking the Yes button, Word saves thedocument with changes included in it.Note: Always close all running programs before turning off the computer.

    2.2 Entering Text

    When the document is opened, the blinking insertion point it is automaticallypositioned at the top of the document. The default margins are 1.25‖ on left andright, and 1‖ on top and bottom. The standard paper size is 8.5‖ by 11‖(Letter size),default font is 10-point regular Times New Roman . The default document view isNormal .In the following exercise, a detailed description of few facilities provided by Word isdiscussed.

    Type the following paragraph. As you key in, notice that the insertion point movesto the right. At the end of one line(boundary fixed by the right margin), Word wrapsto move the insertion point automatically to the next line. If you make a mistakewhile entering, leave it, as you can correct it later.

    ―Microsoft Word word-processor is being used to create this document. I amlooking forward to learning about some of the things that I can do with word so far.

  • 8/19/2019 Uom7 Vetted

    40/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 40 / 124

    I have read how to start and exit Word and how to work with some of the dialogboxes. When I complete this section, I will have learned to display- the paragraphmarks and symbols that Word uses to organize my document and to select, delete

    and replace text.‖ Press the tab key once and press Enter .Press the Enter key again.Click on the Show/Hide ¶ button to display the tab stops , paragraph and space markers in your document.

    Fig. 2.1 displays one such paragraph.A paragraph can contain any amount of text or blank lines ending with aparagraph marker. The document on your screen (See figure 2.1) should consist ofthree paragraph markers. The first paragraph contains the text just entered. Thenext two paragraphs consist of blank lines. Space is displayed as a dot (•) and tab

    stop as right pointing arrow ( ).Note: The dot representing space and the paragraph marker and tab stops arereferred to as ‗Non printable characters‘. Though they appear on the screen, theywill not appear in print outs.

  • 8/19/2019 Uom7 Vetted

    41/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 41 / 124

    Edit and Format Word offers too many ways to change the appearance of the document. One maychange the indents, adjust space between lines or paragraphs and so on. The work

    of executing such jobs as above is called editing and formatting.2.2.1 Editing Text

    You can open an existing file for modifications, printing etc.Complete the following exercise to practice opening a file.

    Invoke Word.Click the Open button on the Standard toolbar or from File Menu, click Open to

    display the Open dialog box.

    If necessary, open the Look in drop down list box by clicking on drop downarrow.

    Select the Folder in which the file is available.Move the pointer into the File name text box and double-click to select the

    current entry or Type Intro.Doc in that text box and press Enter .Intro.Doc file now is opened. Verify that the Title bar of the window contains

    Microsoft Word - Intro .Open the File menu and click on the Save As option to get the Save As dialog

    box. Then save the file as ALTTC .

  • 8/19/2019 Uom7 Vetted

    42/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 42 / 124

    2.2.2 Formatting Text

    So far, you have entered only plain text. Altering the style or size of the charactersis called formatting. Formatting work includes all the functions which contributefor change in appearance of the document.

    Word offers many ways to change the appearance of the document. You can formatindividual character, word, change the indents, change at paragraph level. You canchange the font type or size and so on. The Formatting toolbar contains a numberof formatting buttons. Refer figure 2.1.

    Fonts and its sizes - To change the type or size of the fonts, select the text.Thenclick the drop down font list on the Formatting toolbar.Select the font from the dropdown list, to change the type .

    Font type in the selected passage immediately changes. Now select size drop downlist. Choose the size and click. The change is effected immediately.

    Then, for illustration click B and observe. Then click I and see. Then click U and notice.All the tree boxes are highlighted and the text now assumes bold, italic andunderlined. Click B, I and U one by one again. The text assumes original shape andstyle.

    These operations can be done from Format menu also.

  • 8/19/2019 Uom7 Vetted

    43/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 43 / 124

    Click Format menu.Select Font .Font dialog box appears as shown in fig 3.2.

    Choose a font, type and size . This box provides few more facilities also as describedin the following.

    Superscripts and Subscripts and other effects

    To get the superscripts or subscripts and other effects, select the appropriate checkbox in the Font dialog box.Bold Face, Italic and Underline - When you select any of these along with font, youget a preview with valuable information displayed below that box. Refer figure 3.2.

    Other options can also be selected. See the effects in the preview window.

    Getting Italic letters - Select the text and then click I button in Formatting tool bar.Copying Font Styles- After font formatting you can apply the font formatting of theselected text to other paragraphs easily and repeatedly.Select the new text paragraph- Choose Repeat Font formatting from Edit Menu andclick on it or Press F4 .Changing Case - To change the case of the selected text click on the Format Menu.

    Select Change Case and click on it. This opens the change case dialog box, whichoffers the following five choices.

    Sentence Case: Changes the first letter of each sentence into capital.Lower Case: Changes all the selected text into lower case.Upper Case: C hange the selected text into the upper case.Title Case: Changes the first letter of each selected into Capital letter.Toggle Case: Changes the upper case into lower and lower case into upper.

    2.2.3 Inserting Bullets and Numbers

    You can insert bullets or numbers to your text to give more attraction.

    For inserting bullets, select the text and click on Bullets button or Number buttonin the Standard toolbar. There is the other way to do the above.From Format menu select Bullets and Numbering and click. In Bullets and Numbering dialog box, select either Bullets tab or Numbers tab and select any style.

  • 8/19/2019 Uom7 Vetted

    44/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 44 / 124

    Removing Bullets and Number- Select the numbered or bulleted passage. ChooseBullets and Numbering from Format menu. Bullets and Numbering dialog box opens.Select None .

    Select the numbered or bulleted text then click the highlighted Number button orBullet button in Standard toolbar to clear the bullets. These buttons are in toggle innature.

    2.3 Spell Check

    Word provides a spell check tool that you can use to proof the spelling of thedocuments. You can check the spelling in entire document, a selection of text or asingle word.

    Word 97 and above can automatically check your spelling as you type if you want itto do. Word will either call the misspellings to your attention immediately or keeptrack of them for later. Possible errors are flagged with wavy red underlines so thatthey are easy to spot. You can hide the red lines while you work by checking theHide spelling errors in the document option in Spelling & Grammar tab of theOption dialog box.

    Select the text or a single word or paragraph for which the spelling is to bechecked. To check the entire document make sure that nothing is selected.(Press Ctrl +Home key to come to the beginning of the document).Choose Spelling & Grammar from Tools Menu.

    When the Spelling and Grammar checking begins, the Spelling and Grammar dialogbox appears when the first error encountered. The dialog box suggests list of wordswhich sounds like error word.You can select a correct word from the list and click Change option button.Change All: Option button changes all the instances of the error word with the

    selected word.Ignore All : Ignore all the instances of the particular error word in the selecteddocument.Once the spell check is over, Word will display a dialog box stating that the Spell check is over. Click on OK button to return to the document. Pressing F7 key orclicking Spell check button from the Standard tool bar also can activate spell check.

  • 8/19/2019 Uom7 Vetted

    45/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 45 / 124

    2.4 Navigating In Word – Keyboard and Mouse

    There are many ways to navigate from the beginning to the end of a Worddocument. You probably have your favorites, using the mouse or the keyboard. Butlet‘s look at the wide variety of choices that Word offers, and you‘ll probably find some new ones that you never knew existed.Let‘s start with the basics: make sure you have a Word document of some lengthopen as we do this; the instructions will be easier to follow.

    Using the mouse

    On the right side of your screen is a vertical scroll bar. (It has up anddown arrows at either end, agray area in the middle, and a scrollbox that moves from one end to the other to reflect your position inthe document.)

    To scroll through your document, do the following:

    Click the up arrow to scroll up one line.Click the down arrow to scroll down one line.Click above the scroll box to scroll up one full screen.Click below the scroll box to scroll down one full screen.Drag the scroll box to go to a specific page in your document.If your mouse has a scrolling wheel , turn it to scroll quickly toany part of your document.

    Using KeyBoard

    Somewhere on your keyboard, you have PageUp and Page Down buttons that do exactly whatthey say: by pressing them, you move by pagesthrough your document.Near these keys are the Home and End keys.

    These keys take you to the beginning or end ofa line, respectively.

  • 8/19/2019 Uom7 Vetted

    46/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 46 / 124

    Next, while holding down the Control ( Ctrl ) key, press the Home key. Your cursor jumped to the beginning of the document. If you hold down the Ctrl + End keys at

    the same time, you reach the end of your document.

    With your Word program open, locate the right scroll bar. Rightbeneath it, you will see a double arrow pointing up, a small circle,and a double arrow pointing down. Click the small circle.

    The Select Browse Object grid with 10small buttons appears. Run your mouse overthem to see what each button stands for. Notice that inthe first row, the third button from the left is the Browse

    by Footnote button .Browsing with Edit > Go To

    If you prefer working with menus, click Edit > Go To (shortcut: Ctrl + G) . In thedialog box that opens, look at the objects listed in the left-hand box: Page, Section,Line, Bookmark, Comment, Footnote, Endnote, Field, Table, Graphic, Equation,Object, Heading. Click one that is familiar to you, and follow the instructions givento browse your document.

    For instance, open a Word document that includes several pictures. Click Edit >Go To , and select Graphic in the list. In the blank box to the right of the list, type+2; the second graphic in your document appears on the screen.

  • 8/19/2019 Uom7 Vetted

    47/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 47 / 124

    2.5 Document Formatting

    2.5.1 Paragraph Alignment

    Margins define the upper, lower, left, right page boundaries of entire document.Indents define the left and right boundaries of the selected paragraph/line with inthe document. By default a paragraph‘s left and right indents align with left andright margins.Let us correct the paragraph you have typed using the following tools/facilitiesprovided by Word. At the end of this process, you will become familiar withdeleting, inserting and replacing a portion of text. For this, you should know how tocontrol the cursor. The following table shows the functions of Arrow keys and

    Special keys. These keys can be used as an alternative to the mouse also.Cursor control keys and action

    Key press ActionMoves insertion point up one lineMoves insertion point down one lineMoves insertion point one character to therightMoves insertion point one character to the left

    Ctrl + Moves insertion point one word to the rightCtrl + Moves insertion point one word to the leftCtrl + Moves insertion point to the beginning of the

    current paragraphCtrl + Moves insertion point to the beginning of the

    next paragraphHome Moves insertion point to the beginning of the

    line.End Moves insertion point to the end of the line.Page up Moves insertion point up in the screen.Page Down Moves insertion point down in the screen.Ctrl + Home Moves insertion point to the top of the

    documentCtrl + End Moves insertion point to the end of the

    document

  • 8/19/2019 Uom7 Vetted

    48/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 48 / 124

    Place the I-Beam pointer before „h‟ in “have read ‖ and click. Point the I beam behind „d‟ in “read” .Keep the shift key pressed. Click once.

    Press Delete key once.Key in the word ‗ know‟. Keep the inse rtion point in front of the word ― display- ”. Double click on disabled OVR in the Status bar.

    Note that this enables over writing mode and OVR appears in Status bar. But it isalways better to keep the OVR disabled.

    Type the word identify.Double click on OVR in the Status bar to disable it.

    Inserting Text

    Place the insertion point after the word “this ‖. Press space once and key in lesson.

    Note: OVR in Status bar must be in disabled mode.

    Deleting Text

    Place the I beam pointer before ‗ w‟ in the word “word processor” in the first line and

    click. The insertion pointer appears just in front of w. Press Delete key five times toremove word- . You can press back space key also for this operation. Then place theinsertion pointer after ‗ learning‟ in the second line and press backspace key thrice.

    The backspace key deletes one character to the left of it and the delete key removesa character to the right.Complete the following steps to correct the other errors in any document, ingeneral.

    Read the document on the screen and locate the errors.Use either the cursor keys or the mouse to position the insertion point next to your first error, use the Backspace or the Delete key to remove incorrectletters, then enter your correction. Repeat this step as needed to correct thedocument.

    Selecting and Replacing Text- Changing a string of text (letters, words, sentences,paragraphs or entire document) is usually a two step process. The first step is toidentify the text to be changed by selecting it. Selected text appears in reverse video

    (or highlighted).The second step is keying in the new text.Complete the following exercises to practice selecting, and replacing text.

  • 8/19/2019 Uom7 Vetted

    49/124

    UOM-S007

    RGM TTC,BSNL Computing Skills - Basic Page 49 / 124

    Move the I-beam pointer after the word about in second line.Click to position the insertion pointer and then select the text some of the thingsI can do with word so far by dragging the mouse pointer across the words until

    they appear in reverse video. Release the mouse button once the text is selected.When the proper text selected, enter the words the power of Word . The selected

    text is deleted when the first keyboard letter is pressed, and also theremaining text moves to maintain the proper spac