SlideShare une entreprise Scribd logo
1  sur  17
Chapter 1

Notebook PC

Introduction
The electronic computer was first created as a calculating device designed to solve arithmetic
problems for scientists and mathematicians. Today it has become an indispensable tool, helping to
shape the society it serves. The size of the computer system varies from small hand-held devices to
huge machines occupying several large rooms.

When people use the terms personal computers and microcomputers, they mean the small computer
that are commonly found in offices, classroom, and homes. Personal computer comes in all shapes,
and sizes. Although most models reside on desktops, other stand on the floor and some are even
portable. Weighing a little, notebook PC has become very popular.


1.1 Computer Concepts: IPOS Cycle - The machine itself performs only four basic operations.

   a) Input: You use the keyboard or mouse to input data.
   b) Processing: The CPU with which the computer processes and store data.
   c) Output: You see the results (output) on the monitor and you can print these results on the
      printers.
   d) Storage: You can store information on the internal disc or on a removable disc. Storage is
      permanent. You must transfer the data and information to Storage (SAVE) before you quit, if
      you want to keep the information permanently.

1.2 Computing Process: The computer processes data into information.

The computing process includes everything necessary for the computer to accomplish this task. The
computer’s processor uses memory as workspace. Memory is temporary. When you turn off the
computer without saving, everything in the memory is lost.

1.3 Elements of the computing process: In the computing process, computer integrates the use of
five key elements –

   a)   Hardware – The physical part of the computer.
   b)   Software – The programs that tells the computer what to do.
   c)   Data – The data is the input to processing.
   d)   People – You (user) and computer professionals
   e)   Procedure – Procedures are the steps that you must follow to accomplish a specific computer-
        related task.

Knowledge of common procedure is a part of a user’s computer literacy. Chances are, you already
know several computer procedures. For example, you have probably used an automated teller machine
(ATM). Inside the ATM is a computer. In response to on-screen message called prompts, you insert
your card, enter your personal identification number (PIN), and tell the machine how much money you
want. In this write-up, you will become familiar with many more computer procedures.
Chapter 2

Managing operations of a PC

The computer is devoid of any original thinking. It does nothing, what it is not told to do. When you
first start your system, it has no idea how to load operating systems. To solve this problem, it has a
basic Input/Output system (BIOS) that looks for as soon as you turn it on. BIOS are programs that are
usually stored on the Flesh memory on the motherboard.

2.1 Basic Input/Output System (BIOS): The BIOS software have a number of different roles, First of
all BIOS check stored information on CMOS and display text describing things like the memory
installed, the type of hard disc and so on. The BIOS use this information to modify or supplement its
default programming as needed.

After applying power-on self-test (POST), if the BIOS find any error during the POST, it will notify
you by a series of beeps or a text message displayed on the screen. An error at this point is almost a
hardware problem.

The BIOS then display some details about your system. This typically includes information about
processor, floppy drive and hard drive, memory, BIOS revision and date, display etc.

If any special drivers are loaded from the adaptor, the BIOS display the information. The BIOS then
look at the sequence of storage devices identified as boot devices in the CMOS setup. “BOOT” refers
to process of launching the operating system. If it does not find the proper files on a device, the startup
process will halt.

We have seen that BIOS software has a number of different roles, but the most important role is to
load the operating system.

2.2 Operating systems: Operating systems are the most important programs that run on the
computer. Every general-purpose computer must have an operating system to run other programs.

2.3 Utilities: Utility is a program that performs a very specific task, usually related to managing
system resources. Operating systems contain a number of utilities for managing disc drives, printers,
and other devices.

Utilities differ from applications mostly in terms of size and complexity. For example, word
processors, spreadsheet programs, and database applications are considered applications because they
are large programs that perform a variety of functions not directly related to managing computer
resources.

2.4 Compliers and Interpreters: Complier is a program that translates source code into object code.
The complier derives its name from the way it works, looking at the entire piece of source code and
collecting and reorganizing the instructions.

A compiler differs from interpreter, which analyzes and executes each line of source code in
successions, without looking at the entire program. The advantage of interpreters is that they can
execute a program immediately. Compilers require some time before an executable program emerges.
However, programs produced by the compilers run much faster than the same programs executed by
interpreters.
2.5 Word Processors: A word processor is a program that enables you to perform word processing
functions. Of all computer applications, word processors are the most common.

A word processor enables you to create a document, store it electronically on a disk, display it on a
screen, modify it by entering commands and characters from the keyboard, and print it on a printer.

The great advantage of word processing over using a typewriter is that you can make changes without
retyping the entire document. If you make a typing mistake, you simply take back the cursor and
correct your mistake. If you want to delete a paragraph, you simply remove it, without leaving a trace.

It is equally easy to insert a word, sentence, or paragraph in the middle of a document. Word processor
also makes it easy to move sections of text from one page to another within a document, or between
documents. When you have made all the changes you want, you can send the file to a printer to get a
hardcopy. Some of the commonly used word processors are Microsoft Word, WordStar, WordPerfect,
AmiPro, etc.

2.6 Spreadsheets: A spreadsheet is a table of values arranged in rows and columns. Each value can
have a predefined relationship to the other values.

Spreadsheet applications are computer programs that let you create and manipulate spreadsheets
electronically. In a spreadsheet application, each value sits in a cell. You can define what type of data
in each cell and how different cells depend on one another. The relationships between cells are called
formulas, and the names of the cells are called levels. Once you have defined the cells and the
formulas – for linking them together, you can enter your data.

There are number of spreadsheet applications in the market, Lotus 1-2-3 and Excel being among the
most famous. These applications support graphic features that enable you to produce charts and graphs
from the data.

Some spreadsheets are multidimensional, meaning that you can link one spreadsheet to another. A
three-dimensional spreadsheet, for examples, is like a stack of spreadsheets all connected by formulae.
A change made in one spreadsheet automatically affects other spreadsheets.

2.7 Presentation Graphics: Presentation Graphics enables users to create highly stylized images for
slide shows and reports.

The software includes functions for creating various types of charts and graphs and for inserting text
in a variety of fonts. Most systems enable you to import data from a spreadsheets application to create
the charts and graphs.

Presentation graphics is often called business graphics. Some of the popular presentation graphics
software is Microsoft PowerPoint, Lotus Freelance, Graphics, Hardware Presentation Graphics, etc.

2.8 Database Management Systems (DBMS): A DBMS is a collection of programs that enables you
to store, modify, and extract information from a database.

There are many different types of DBMS ranging from small systems that run on personal computers
to huge systems that run on mainframes.

The following are some examples of database applications – computerized library systems, automated
teller machines, flight and railway reservation systems, etc.

Requests for information from a database are made in the form of a query, which is stylized question.
Different DBMS support different query languages, although there is a semi-standardized query
language called SQL (structured query languages). Sophisticated languages for managing database
systems are called fourth-generation languages, or in short 4GLs.

The information from a database can be presented in a variety of formats. Most DBMS include a
report writer program that enables you to output data in the form of a report. Many DBMS also
include a graphic component that enables you to output information in the form of graphs and charts.

Some examples of database management systems are IDMS, IMS, Oracle, Sybase, Informix, Ingress,
MS-SQL, Server, MS Access, etc.

2.9 Image Processors: Image processors or graphic processors enable you to create, edit,
manipulate, add special effects, view, and print and save images.

2.10 Paint Programs: A paint program is a graphical program that enables you to draw pictures on
the display screen, which is represented as a bit maps.

Most paint programs provide the tools in the form of icons. By selecting an icon, you may perform
functions associated with the tools.

In addition to these tools, paint programs also provide easy way to draw common shape such as
straight lines, rectangles, circles and ovals.

2.11 Draw Programs: A draw program is another graphic program that enables you to draw pictures,
then store the images in files, merge them into documents, and print them.

Unlike paint programs, which represent images as a bit maps, draw program use vector graphics,
which makes it easy to scale images to different sizes. In addition, graphics produced with a draw
program have no inherent resolution. Rather, they can be represented at any resolution, which makes
them ideal for high-resolution output.

2.12 Image Editor: Image editor is a graphics program that provides a variety of special features for
altering bit-mapped images.

 The difference between image editors and paint programs is not always clear-cut, but in general
image editors are specialized for modifying bit-mapped images, such as scanned photographs, whereas
paint programs are specialized for creating images.

 In addition to offering a host of filters and image transformation algorithms, image editor also enables
you to create and super impose layers.
Chapter 3

Operating Systems


Operating systems provide a software platform on top of which other programs, called applications
programs can run.

Your choice of operating system therefore, determines to a great extent the applications you can run.
The primary purpose of an operating system is to maximize the productivity of a computer system by
operating it in a most efficient manner. An operating system performs basic tasks, such as –

   a)   Recognizing input from the keyboard,
   b)   Managing functions performed by the hardware,
   c)   Sending output to the display screen,
   d)   Keeping track of files and directories on the disc,
   e)   Controlling peripheral devices such as printers, secondary storage devices, and communication
        and network equipments.

The operating system software must –

   a)   Keep track of each hardware resource,
   b)   Determine who gets what,
   c)   Determine when the user will have access to the resource,
   d)   Allocate how much of the resource the user will be given, and
   e)   Terminate access at the end of the use period.

Many operating systems are designed as a collection of program modules around a central module, or
kernal. For example, some operating system packages include a selected number of utility programs,
language translator program and even some application programs.

3.1 MS-DOS: Microsoft developed the operating system referred to as MS-DOS for the first IBM
personal computer. The initial version DOS 1.0 was released in August 1981.

By the time it was replaced by Window 95, MSDOS had gone through six major revisions. It’s
numerous commands and features are still available to Window users.

DOS operating system contains commands such as COPY and RENAME for copying files and
changing the names of files, respectively.

Computer literates used computers in early days. Users are expected to remember commands and its
meaning. Later on the use of personal computers widely spread over. The human computer interface
was a problem area in using computers.

Attempts were made to replace commands by graphics. The interface, which replaced cryptic
commands by their graphical presentation, is called “ Graphical User Interface” (GUI).

Xerox Corporation developed the first GUI for their Xerox star computers. Apple computers in their
Macintosh personal computers used this interface. It was a hit among users.

Microsoft developed GUI’s called MS-Windows, for IBM personal computers.
3.2 Window 98: Microsoft 98 is the upgraded version of window operating system. It is a single user
multitasking operating system. Navigating around your computer is easier in window 98.

You can open a file by single click. You can use multiple monitor screens with a single computer.
Thus you can increase the size of your workspace.

Window 98 supports the universal serial bus (USB) standard, allowing you to plug in new hardware
and use it immediately without restarting the computer. With Window 98, we can use digital cameras
and other digital imaging devices.

Windows and programs open faster than ever before. By using maintenance wizard, the computer
speed and efficiency can be improved. You can use FAT 32 file system to store files more efficiently
and save hard disc space.

Using the World Wide Web is easier and faster. The connection to Web is simple. Web pages can be
viewed in any window. You can make favorite Web pages. In Microsoft Outlook express, you can
send e-mail and post messages to Internet newsgroup. The conferences on Internet can be arranged.

Window 98 supports DVD and digital audio. You can play high quality digital movies and audio on
the computers. The television broadcast can also be observed on computer.
Chapter 4

Miscellaneous utilities

Utility is a program that performs a very specific task, usually related to managing system resources.
Operating system contains a number of utilities for managing disk drives, printers, and other devices.

4.1 Anti Virus Packages (Scanner): Scanners are software programs that look through code of
strings (byte sequences) that match known strings in known viruses, and then remove the virus.

Scanning program can look at specific disk or files when you require it, or it can be set to look at each
program, which is about to be executed.

The first important thing to know about computer viruses is that nothing in the field is absolute or
standardized. New viruses are created and companies sell software designed to detect and destroy
known viruses and again new viruses are created, etc., in a never-ending cycle of increasing
sophistication.

A computer virus is a computer program that is able to copy all or part of its code into other programs
or files. They are also capable of performing malicious or harmful processes, such as deleting or
changing files. Damage caused by a virus is called the ‘payload’. One important feature of computer
viruses is that they are platform and/or application specific. You must be alert about getting a virus
before you get one –

   •   Make sure your system was booted from a virus-free original boot disc,
   •   Scan all new software media with antivirus software,
   •   Write-protects new software immediately on receipt, then copy it and work from the copies
       (store the originals in a safe place).
   •   Use write-protection mechanisms on discs,
   •   Maintain up-to-date virus-free backups of your files,
   •   Only use Shareware and public domain programs from reliable sources.

Microsoft has a Macro Virus Protection Tool available from their Web site. The tool is supposed to
warn you if you are about to open a file that contains macros (good or evil ones) and will scan and
destroy the Concept macro virus.

4.2 File Compression: Compression programs are very useful on computers where disk space is
limited. If you have a lot of files that you want to keep handy, but you do not have enough room on
your hard disk, you can compress them, and decompress them only when they are needed.

You can probably imagine the advantage of file compression in file transfer. Compressed files are
smaller and it takes less time to transfer them. Most files available on Internet are distributed as
ARCHIVES. Archives are files that contain compressed files. Archives usually have file names ending
with ZIP, LZH, ARJ, or ARC, depending on how they were created.

A SELF-EXTRACTED ZIP FILE is an executable program file (.EXE file) that includes both a Zip
file and software to extract or unzip the contents of a Zip file. User can extract the contents by simply
running it. This is a convenient, because the end user does not need an unzip program (WINZIP).
4.3 Scandisk & Defrag: Scandisk checks your hard drive for errors. There are two different Scandisk
options, STANDARD and THOROUGH.

In case you are running the Scandisk for the first time, do a through check. When you run the Scandisk
in the future, you can run the standard check. You should make sure that you are not doing anything
else when you run Scandisk, as any activity on the hard drive will cause it to restart. Close any other
applications you may be running before you start Scandisk. If you are running a through test, go eat
lunch. It will take a quite some time.

Once the Scandisk is over, you may want to run DISK DEFRAGMENTER. It is in the same folder as
Scandisk on the start menu. Disk Defragmenter or defrag rearranges the data on your hard drive so
that programs and data are all stored in consecutive locations. Defrag, like the through Scandisk
check, takes a long time, so it is recommended that one must select ‘All hard drives’. It will take few
hours before defragmentation of the disk is over.

Once you have run both Scandisk and defrag, you have taken a major step towards keeping your
system running at its best. As you know that Windows saves the data into the first open space it comes
across. This means that sometimes files can get broken up into smaller pieces, which makes it take
longer time to load those files.

Disk Defragmentation consolidates fragmented files and folders on your computer’s hard disk, so that
each occupies a single, contiguous space on the Volume. As a result, your system can gain access to
your files and folders and save new ones more efficiently. By consolidating your files and folders,
Disk Defragmenter also consolidates the Volume’s free space, making it less likely that new files will
be fragmented.
Chapter 5

Internet

The Internet, an umbrella term covering countless networks and services is a global network that was
initiated in the 1960’s by a team of scientists under a U.S. government research contract.

It rapidly became evident that people wanted to share information between networks, and as a result
commercial networks were developed to meet consumer demand. Today’s Internet is somewhat
difficult to describe. Essentially, the Internet is a network of computers that access to information and
people.

Internet also called as Net, is the World’s largest network providing free exchange of information. The
definition for Internet, which can be best understood by a layman, is that the Internet consists of an
incredible number of participants, connected machines, software programs, and a massive quantity of
information spread all around the world. Internet can be considered as millions of people constantly
communicating about every topic under the sun.

However, since the Internet has grown to a phenomenal size, it has also become complex for users. To
help the growing number of users, who are not computer professionals, various developments has
occurred. First is the setting up of online service like Yahoo, Rediffmail, etc. These Online services
operate on one powerful computer, connected to the Internet. User from any part of the world connect
to this computer and avail various facilities there, which includes access to information from database,
software libraries, news, bulletin boards for various interest groups, online chat facilities, E-mail etc.
A revolutionary development on the Internet is the World Wide Web (WWW) or Web in short.

5.1 World Wide Web: The World Wide Web (WWW), which is a component (part) of the Internet, is
a collection of web pages. The Web provides access to large amounts of information located on many
different servers. The Web also provides access to many of the services available on the Internet.

The increasing popularity of the Net is mainly because of World Wide Web. Web documents allow
user interaction freely with the application through dialog boxes and forms.

5.2 Web Pages: The fundamental unit of the Web is the web pages. It contains information that can
be a combination of text, pictures and hyperlinks. The information displayed on the web page includes
graphics, video and audio.

Hyperlinks are also known as links. Each link in a web page refers to another web page. A hyperlink
can be a word, a group of words, a picture or a part of picture. When we click on a link, the browser
fetches the page connected to the link, which in turn can contain more links to other places over the
Net.

Hypertext is a text document that contains link to other documents.

Web Site refers to a particular location on the web.
The web pages that represent the online home of their author are called home pages.

5.3 Web Browsers: Web browser is a client program that lets the user access and view the
information provided by a specific type of server. Internet Explorer is a Window 95 browser from
Microsoft. It is fast and offers a number of features. It comes as a part of Microsoft PLUS.
The web browser delivers maps to all the topics on the Internet. The web maps are called directories.
Web directory is used to locate a site of interest. There are many directories available for searching
the Net, which are unique and accurate. Each directory consists of many levels or sub-directories. The
top level gives the broadest overview of the Net.

5.4 Search Engines: Search engines are organized in a particular manner for easy and productive
browsing. Search engines allow the user to type in keywords to be searched. The engine searches for a
matching word and gives a list of hyperlinks to web sites.

Web directories may or may not contain search engines. The bigger directories have built-in search
engines, which are more convenient as both browsing through the directory and using the search
engine are possible. The directories that come with the built-in engines are Yahoo!, Lycos and Exite.

Yahoo! Is a large, well-indexed directory of web pages. It is one of the most dynamic and useful web
search tools. It is highly accessible. Both Usenet news and e-mail can be assessed from a common
page more conveniently.

It is not a complete text search engine. For full text search, we need to use links for other search
services displayed at the bottom of the pages. It is an integrated searching environment, which enables
the user to browse and search from the same page.

5.5 E-Mail: Email or Electronic Mail as the name suggests, is an electronic form or regular mail. The
Internet Service Provider (ISP) delivers the message conveyed in the e-mail to the recipient.

One of the major advantages of E-mail is that it is very easy to use, very fast and is much cheaper than
sending regular mail. Every user who has an e-mail access to the Internet will have an e-mail address.
The ISP delivers the message sent by the user to the recipient’s computer. This computer then looks
up the user to whom the mail is addressed. If the recipient exits the destination computer will move the
mails into the mailbox. If the recipient does not exist then the e-mail is bounced back to the sender.

5.6 More Information: Internet contains topics other than mailing, news and servers. We can find
some fascinating things on the net.

The National Weather Map – When we click on any point in the map, a whether forecast for that
particular place is displayed.

WWW Weather World – We get here weather maps, animation, infrared satellite photographs and
visible light photographs.

The Universities – Many Universities all over the world have Internet connection. Any particular
institution can be selected from the list organized by its domain.

Internet Distribution Services - We can access books and magazines partly or entirely on the Net.

Books - There is a bunch of bookstores available on the Net.

The Commerce Word – The WWW is more serviceable to people in the World. Business
organizations access the Net with web pages. For more information about the Commerce World, the
Internet Mall, the Internet shopping Network and Branch Mall are available.
5.7 Communication on the Web: Communication on the Web can take place in many contexts. The
different ways of communication on the Web are given below: -

Interpersonal – The user can create a home page on the Web, which conveys personal or professional
information. Home pages are the top-level page for a server, organization or an individual. When
created by individuals, the home page reveals detailed personal information about its author and is
listed in directories of home pages.

Group – People with common interest can form an association on the Web. These interaction systems
include Web-based “chat” or conferencing systems.

Mass – The Web can be used for mass communication just like other media. Many commercial and
non-commercial magazines are distributed throughout the Web. Any person can read the publicly
available Web pages and this is therefore a one to many communications.

5.8 Downloading: It means simply transferring a file from a host computer to your computer. Owing
to advancement of Internet technology today’s browsers come fully equipped with the tools necessary
to download most files.

If you want some more advanced features for downloading sites then you can use download tools.
Following are some download tools, which can be used for downloading sites.

       Fresh Download
       Download Accelerator Plus
       Leech Get 2001
       Webcow
       ScanDL
       Download Express
Chapter 6

E-Commerce (EC)

E-Commerce is defined as buying and selling of products and services over the Internet, but there are
many more aspects to it. There are different definitions to E-Commerce:

    1. From a communication perspective, EC is the delivery of information, product, services, or
       payment via telephone lines, networks or any other means.

    2. From a business process perspective, EC is the application of technology towards the
       automation of business transactions and workflows. These applications may result in more
       effective performance, greater economic efficiency, and more rapid exchange.

    3. From a service perspective, EC is a tool that addresses the desire of firms, consumers, and
       management to cut service costs while improving the quality of services and increasing the
       speed of service delivery. For example, in the case of online trading, it can add value by
       including trend analysis etc.

    4. From an online perspective, EC provides the capability of buying and selling products and
       information on the Internet and other online services.
Chapter 7

Web Commerce

7.1 Electronic Data Interchange (EDI)

The administrative bodies with large information systems came to a point where typing/printing of all
the information arriving or leaving their domain is no longer feasible. It is very difficult to respond
hundreds and thousands of standard forms after data entry and processing in the computer. The whole
process is time consuming and prone to human errors during data entry and expensive to operate.

The solution to the above problem comes in the form of EDI. As quite obvious from the name, EDI
refers to the electronic interchange of data between computer systems. The recipient computer without
the need of human intervention directly uses the information transmitted. EDI is defined as the transfer
of structured data for processing from the computer-to-computer using agreed formats and protocols.

7.2 Electronic Fund Transfer (EFT)

An EFT system involves the electronic movement of funds and fund information between financial
institutions. The transfers are based on EDI technology transfer of funds. EDI can be useful of almost
any sector; however, banks have been the primary user for EDI service till now.

7.3 Value-Added Networks (VAN)

VAN is a communication network that typically exchanges EDI messages among trading partners
Businesses can exchange data either by connecting to each other directly or by hooking into a VAN.
Chapter 8

Electronic Payment Systems

In everyday life, you pay for goods and services in a number of different ways, you can pay by cash,
check, credit card, or debit card. Now with the increasing commercialization of the Internet, and the
popularity of the Web, consumers and businesses are both looking for ways to conduct business over
the Internet.

The methods that have been developed for making payments on the Internet are essentially electronic
versions of the traditional payment systems we use everyday –cash, checks, and credit cards. The
fundamental difference between the electronic payment system and traditional one is that everything is
digital i.e., everything about the payment has been virtualized into strings of bits. This virtualization
will make many of the electronic payment options appears similar to each other.

8.1 Electronic Cheques: Credit card payments will undoubtedly be popular for commerce on the
Internet. However, following two systems have been developed to let consumers use electronic
cheques to pay Web merchants directly.

   a) By the Financial Services Tech. Corpn. (FSTC)
   b) By Cyber Cash

8.2 Smart Cards: Smart cards have an embedded microchip instead of magnetic strip.

The chip contains all the information a magnetic strip contains but offers the possibility of
manipulating the data and executive applications on the card. Three types of smart cards have
established themselves.

   a) Contract Cards – Smart cards that need to insert into a reader in order to work, such as the
      smart card reader or automatic teller machines.

   b) Contactless Cards – Contactless smart cards do not need to be inserted into a reader. Just
      waving them near a reader is just sufficient for the card to exchange data. This type of cards is
      used for opening doors.

   c) Combi Cards - Combi Cards contain both technologies and allow a wider range of
      applications.

8.3 Electronic Purses: Electronic Purse is yet another way to make payments over the net. It is very
similar to a prepaid card.

For example, Bank issues a stored value cards to its customers, the customer can then transfer value
from their accounts to the cards at an ATM, a personal computer, or a specially equipped telephone.
When the value on a card is spent, consumer can load additional funds from their accounts on the card.

The electronic purse card can be used as an ATM card as well as a credit card.
Chapter 9

Microsoft Outlook-2000

Microsoft outlook 2000 is a Window messaging system. It includes customizable email, scheduling,
task and contact tracking tool to help you efficiently manage your office activities.

9.1 Outlook Bar

The Outlook bar is a list of shortcuts that appears in the far-left pane of the Microsoft Outlook screen.
These shortcuts allow you to easily switch between different aspects of Microsoft Outlook. The
Outlook bar is customizable and contains two ‘group’ of shortcuts by default: Outlook Shortcuts and
My Shortcuts. Outlook 2000 also includes a group called Other Shortcuts. The most common shortcut
bar is described below:

Outlook Today – Shows a daily overview of appointment, tasks and email scheduled for that day or
several days.

Inbox – Stores all your incoming messages.

Calendar – Opens you calendar so you can schedule meetings appointments or check your
availability.

Contacts – Allows you to store a detailed list of personal contacts.

Tasks – Here you can list your tasks, schedule tasks and monitor their status.

Journal – Allows you to track sent and received email from a variety of different contacts.

Notes – Notes are the electronic equivalent of paper sticky notes. Use notes to jot down questions,
ideas, reminders, or anything you would write on paper.

Deleted Items – contains emails, contact, tasks, and other items that have been deleted from various
folders.

9.2 Configuring Outlook for Your Email: Outlook was designed first as an e-mail communication
tool such as:

       Creating e-mail messages
       Sending an e-mail
       Receiving an e-mail
       Managing the e-mail – Sorting, field Chooser
       Folders
       Selecting multiple messages
       Opening folders
       Filters
       Rules
       Mail merger to a database file
       Create/Faxes/E-mails
       Sending and viewing attachments
       Acting on messages
       Recalling e-mail messages
Printing e-mail messages
Moving messages
Subscribing to mailing lists
Leaving a mail list
Organizing e-mail addresses using the address book
Creating a personal mailing list

Contenu connexe

Tendances

Computer basics worksheet
Computer basics worksheetComputer basics worksheet
Computer basics worksheet
Donna Rue
 
BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1
Ndubi Amos
 
Assignment (2)
Assignment (2)Assignment (2)
Assignment (2)
aroosa12
 
How Computers Work Presentation
How Computers Work PresentationHow Computers Work Presentation
How Computers Work Presentation
mrtheodisthorne2
 
Data Types Unit-5 IGCSE ICT
Data Types Unit-5 IGCSE ICTData Types Unit-5 IGCSE ICT
Data Types Unit-5 IGCSE ICT
mkhisalg
 
Computer capsule ibps_po_2014
Computer capsule ibps_po_2014Computer capsule ibps_po_2014
Computer capsule ibps_po_2014
Lucky Saini
 

Tendances (20)

Management Information System
Management Information SystemManagement Information System
Management Information System
 
Introduction To Computers
Introduction To ComputersIntroduction To Computers
Introduction To Computers
 
Software
SoftwareSoftware
Software
 
Basic hardware familiarization
Basic hardware familiarizationBasic hardware familiarization
Basic hardware familiarization
 
Computer basics worksheet
Computer basics worksheetComputer basics worksheet
Computer basics worksheet
 
C with lab
C with labC with lab
C with lab
 
C PROGRAMING AND PC
C PROGRAMING AND PCC PROGRAMING AND PC
C PROGRAMING AND PC
 
Class 6 computer part 2
Class 6 computer part 2Class 6 computer part 2
Class 6 computer part 2
 
Computer memory, Types of programming languages
Computer memory, Types of programming languagesComputer memory, Types of programming languages
Computer memory, Types of programming languages
 
Computer Programming Grade 9
Computer Programming Grade 9Computer Programming Grade 9
Computer Programming Grade 9
 
BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1
 
Assignment (2)
Assignment (2)Assignment (2)
Assignment (2)
 
Assignment
AssignmentAssignment
Assignment
 
How Computers Work Presentation
How Computers Work PresentationHow Computers Work Presentation
How Computers Work Presentation
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
Data Types Unit-5 IGCSE ICT
Data Types Unit-5 IGCSE ICTData Types Unit-5 IGCSE ICT
Data Types Unit-5 IGCSE ICT
 
COMPUTER APPLICATION
COMPUTER APPLICATIONCOMPUTER APPLICATION
COMPUTER APPLICATION
 
Computer
ComputerComputer
Computer
 
Computer capsule ibps_po_2014
Computer capsule ibps_po_2014Computer capsule ibps_po_2014
Computer capsule ibps_po_2014
 
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERSCOMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
COMPUTER OPERATIONS & PACKAGES NOTES & INTRODUCTION TO COMPUTERS
 

Similaire à Note book pc

AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfAERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
ssuserb3a23b
 
Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cpp
meharikiros2
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3
willye83
 
Chapter 5 It Architecture
Chapter 5 It ArchitectureChapter 5 It Architecture
Chapter 5 It Architecture
UMaine
 
Cibm bis work shop 2 chapter five
Cibm bis   work shop 2 chapter fiveCibm bis   work shop 2 chapter five
Cibm bis work shop 2 chapter five
Shaheen Khan
 

Similaire à Note book pc (20)

Unit IV with Answers
Unit IV with AnswersUnit IV with Answers
Unit IV with Answers
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
C LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdfC LECTURE NOTES FULL_1.pdf
C LECTURE NOTES FULL_1.pdf
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 
C program full materials.pdf
C program  full materials.pdfC program  full materials.pdf
C program full materials.pdf
 
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdfAERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
AERO_PROGRAMMING_FOR_PROBLEM_SOLVING_LECTURE_NOTES.pdf
 
Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cpp
 
What is a computer
What is a computerWhat is a computer
What is a computer
 
System software vt
System software vtSystem software vt
System software vt
 
Lecture 1 2
Lecture 1 2Lecture 1 2
Lecture 1 2
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3
 
A+ hand out
A+ hand outA+ hand out
A+ hand out
 
Chapter 5 It Architecture
Chapter 5 It ArchitectureChapter 5 It Architecture
Chapter 5 It Architecture
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptx
 
lesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptxlesson_1_Introduction_to_computers_pptx.pptx
lesson_1_Introduction_to_computers_pptx.pptx
 
Topic_1___Part_1_Introduction.pptx.pdf
Topic_1___Part_1_Introduction.pptx.pdfTopic_1___Part_1_Introduction.pptx.pdf
Topic_1___Part_1_Introduction.pptx.pdf
 
Cibm bis work shop 2 chapter five
Cibm bis   work shop 2 chapter fiveCibm bis   work shop 2 chapter five
Cibm bis work shop 2 chapter five
 
BasicComputer Training in Ambala ! BATRA COMPUTER CENTRE
BasicComputer Training in Ambala ! BATRA COMPUTER CENTREBasicComputer Training in Ambala ! BATRA COMPUTER CENTRE
BasicComputer Training in Ambala ! BATRA COMPUTER CENTRE
 
Features Of A Operating System
Features Of A Operating SystemFeatures Of A Operating System
Features Of A Operating System
 

Plus de Ankit Agarwal (14)

Ghost Protocol
Ghost ProtocolGhost Protocol
Ghost Protocol
 
Flow charts
Flow chartsFlow charts
Flow charts
 
Important Questions of Appointment of Auditor
Important Questions of Appointment of AuditorImportant Questions of Appointment of Auditor
Important Questions of Appointment of Auditor
 
Appointment of Auditor
Appointment of AuditorAppointment of Auditor
Appointment of Auditor
 
Indian post office
Indian post officeIndian post office
Indian post office
 
Mutual fund
Mutual fundMutual fund
Mutual fund
 
Permanent account number
Permanent account numberPermanent account number
Permanent account number
 
Business environment
Business environmentBusiness environment
Business environment
 
Stretigic Management
Stretigic ManagementStretigic Management
Stretigic Management
 
Peer review
Peer reviewPeer review
Peer review
 
Forex
ForexForex
Forex
 
Valuation of shares
Valuation of sharesValuation of shares
Valuation of shares
 
Fema
FemaFema
Fema
 
Syllabus
SyllabusSyllabus
Syllabus
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Note book pc

  • 1.
  • 2. Chapter 1 Notebook PC Introduction The electronic computer was first created as a calculating device designed to solve arithmetic problems for scientists and mathematicians. Today it has become an indispensable tool, helping to shape the society it serves. The size of the computer system varies from small hand-held devices to huge machines occupying several large rooms. When people use the terms personal computers and microcomputers, they mean the small computer that are commonly found in offices, classroom, and homes. Personal computer comes in all shapes, and sizes. Although most models reside on desktops, other stand on the floor and some are even portable. Weighing a little, notebook PC has become very popular. 1.1 Computer Concepts: IPOS Cycle - The machine itself performs only four basic operations. a) Input: You use the keyboard or mouse to input data. b) Processing: The CPU with which the computer processes and store data. c) Output: You see the results (output) on the monitor and you can print these results on the printers. d) Storage: You can store information on the internal disc or on a removable disc. Storage is permanent. You must transfer the data and information to Storage (SAVE) before you quit, if you want to keep the information permanently. 1.2 Computing Process: The computer processes data into information. The computing process includes everything necessary for the computer to accomplish this task. The computer’s processor uses memory as workspace. Memory is temporary. When you turn off the computer without saving, everything in the memory is lost. 1.3 Elements of the computing process: In the computing process, computer integrates the use of five key elements – a) Hardware – The physical part of the computer. b) Software – The programs that tells the computer what to do. c) Data – The data is the input to processing. d) People – You (user) and computer professionals e) Procedure – Procedures are the steps that you must follow to accomplish a specific computer- related task. Knowledge of common procedure is a part of a user’s computer literacy. Chances are, you already know several computer procedures. For example, you have probably used an automated teller machine (ATM). Inside the ATM is a computer. In response to on-screen message called prompts, you insert your card, enter your personal identification number (PIN), and tell the machine how much money you want. In this write-up, you will become familiar with many more computer procedures.
  • 3. Chapter 2 Managing operations of a PC The computer is devoid of any original thinking. It does nothing, what it is not told to do. When you first start your system, it has no idea how to load operating systems. To solve this problem, it has a basic Input/Output system (BIOS) that looks for as soon as you turn it on. BIOS are programs that are usually stored on the Flesh memory on the motherboard. 2.1 Basic Input/Output System (BIOS): The BIOS software have a number of different roles, First of all BIOS check stored information on CMOS and display text describing things like the memory installed, the type of hard disc and so on. The BIOS use this information to modify or supplement its default programming as needed. After applying power-on self-test (POST), if the BIOS find any error during the POST, it will notify you by a series of beeps or a text message displayed on the screen. An error at this point is almost a hardware problem. The BIOS then display some details about your system. This typically includes information about processor, floppy drive and hard drive, memory, BIOS revision and date, display etc. If any special drivers are loaded from the adaptor, the BIOS display the information. The BIOS then look at the sequence of storage devices identified as boot devices in the CMOS setup. “BOOT” refers to process of launching the operating system. If it does not find the proper files on a device, the startup process will halt. We have seen that BIOS software has a number of different roles, but the most important role is to load the operating system. 2.2 Operating systems: Operating systems are the most important programs that run on the computer. Every general-purpose computer must have an operating system to run other programs. 2.3 Utilities: Utility is a program that performs a very specific task, usually related to managing system resources. Operating systems contain a number of utilities for managing disc drives, printers, and other devices. Utilities differ from applications mostly in terms of size and complexity. For example, word processors, spreadsheet programs, and database applications are considered applications because they are large programs that perform a variety of functions not directly related to managing computer resources. 2.4 Compliers and Interpreters: Complier is a program that translates source code into object code. The complier derives its name from the way it works, looking at the entire piece of source code and collecting and reorganizing the instructions. A compiler differs from interpreter, which analyzes and executes each line of source code in successions, without looking at the entire program. The advantage of interpreters is that they can execute a program immediately. Compilers require some time before an executable program emerges. However, programs produced by the compilers run much faster than the same programs executed by interpreters.
  • 4. 2.5 Word Processors: A word processor is a program that enables you to perform word processing functions. Of all computer applications, word processors are the most common. A word processor enables you to create a document, store it electronically on a disk, display it on a screen, modify it by entering commands and characters from the keyboard, and print it on a printer. The great advantage of word processing over using a typewriter is that you can make changes without retyping the entire document. If you make a typing mistake, you simply take back the cursor and correct your mistake. If you want to delete a paragraph, you simply remove it, without leaving a trace. It is equally easy to insert a word, sentence, or paragraph in the middle of a document. Word processor also makes it easy to move sections of text from one page to another within a document, or between documents. When you have made all the changes you want, you can send the file to a printer to get a hardcopy. Some of the commonly used word processors are Microsoft Word, WordStar, WordPerfect, AmiPro, etc. 2.6 Spreadsheets: A spreadsheet is a table of values arranged in rows and columns. Each value can have a predefined relationship to the other values. Spreadsheet applications are computer programs that let you create and manipulate spreadsheets electronically. In a spreadsheet application, each value sits in a cell. You can define what type of data in each cell and how different cells depend on one another. The relationships between cells are called formulas, and the names of the cells are called levels. Once you have defined the cells and the formulas – for linking them together, you can enter your data. There are number of spreadsheet applications in the market, Lotus 1-2-3 and Excel being among the most famous. These applications support graphic features that enable you to produce charts and graphs from the data. Some spreadsheets are multidimensional, meaning that you can link one spreadsheet to another. A three-dimensional spreadsheet, for examples, is like a stack of spreadsheets all connected by formulae. A change made in one spreadsheet automatically affects other spreadsheets. 2.7 Presentation Graphics: Presentation Graphics enables users to create highly stylized images for slide shows and reports. The software includes functions for creating various types of charts and graphs and for inserting text in a variety of fonts. Most systems enable you to import data from a spreadsheets application to create the charts and graphs. Presentation graphics is often called business graphics. Some of the popular presentation graphics software is Microsoft PowerPoint, Lotus Freelance, Graphics, Hardware Presentation Graphics, etc. 2.8 Database Management Systems (DBMS): A DBMS is a collection of programs that enables you to store, modify, and extract information from a database. There are many different types of DBMS ranging from small systems that run on personal computers to huge systems that run on mainframes. The following are some examples of database applications – computerized library systems, automated teller machines, flight and railway reservation systems, etc. Requests for information from a database are made in the form of a query, which is stylized question. Different DBMS support different query languages, although there is a semi-standardized query
  • 5. language called SQL (structured query languages). Sophisticated languages for managing database systems are called fourth-generation languages, or in short 4GLs. The information from a database can be presented in a variety of formats. Most DBMS include a report writer program that enables you to output data in the form of a report. Many DBMS also include a graphic component that enables you to output information in the form of graphs and charts. Some examples of database management systems are IDMS, IMS, Oracle, Sybase, Informix, Ingress, MS-SQL, Server, MS Access, etc. 2.9 Image Processors: Image processors or graphic processors enable you to create, edit, manipulate, add special effects, view, and print and save images. 2.10 Paint Programs: A paint program is a graphical program that enables you to draw pictures on the display screen, which is represented as a bit maps. Most paint programs provide the tools in the form of icons. By selecting an icon, you may perform functions associated with the tools. In addition to these tools, paint programs also provide easy way to draw common shape such as straight lines, rectangles, circles and ovals. 2.11 Draw Programs: A draw program is another graphic program that enables you to draw pictures, then store the images in files, merge them into documents, and print them. Unlike paint programs, which represent images as a bit maps, draw program use vector graphics, which makes it easy to scale images to different sizes. In addition, graphics produced with a draw program have no inherent resolution. Rather, they can be represented at any resolution, which makes them ideal for high-resolution output. 2.12 Image Editor: Image editor is a graphics program that provides a variety of special features for altering bit-mapped images. The difference between image editors and paint programs is not always clear-cut, but in general image editors are specialized for modifying bit-mapped images, such as scanned photographs, whereas paint programs are specialized for creating images. In addition to offering a host of filters and image transformation algorithms, image editor also enables you to create and super impose layers.
  • 6. Chapter 3 Operating Systems Operating systems provide a software platform on top of which other programs, called applications programs can run. Your choice of operating system therefore, determines to a great extent the applications you can run. The primary purpose of an operating system is to maximize the productivity of a computer system by operating it in a most efficient manner. An operating system performs basic tasks, such as – a) Recognizing input from the keyboard, b) Managing functions performed by the hardware, c) Sending output to the display screen, d) Keeping track of files and directories on the disc, e) Controlling peripheral devices such as printers, secondary storage devices, and communication and network equipments. The operating system software must – a) Keep track of each hardware resource, b) Determine who gets what, c) Determine when the user will have access to the resource, d) Allocate how much of the resource the user will be given, and e) Terminate access at the end of the use period. Many operating systems are designed as a collection of program modules around a central module, or kernal. For example, some operating system packages include a selected number of utility programs, language translator program and even some application programs. 3.1 MS-DOS: Microsoft developed the operating system referred to as MS-DOS for the first IBM personal computer. The initial version DOS 1.0 was released in August 1981. By the time it was replaced by Window 95, MSDOS had gone through six major revisions. It’s numerous commands and features are still available to Window users. DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files, respectively. Computer literates used computers in early days. Users are expected to remember commands and its meaning. Later on the use of personal computers widely spread over. The human computer interface was a problem area in using computers. Attempts were made to replace commands by graphics. The interface, which replaced cryptic commands by their graphical presentation, is called “ Graphical User Interface” (GUI). Xerox Corporation developed the first GUI for their Xerox star computers. Apple computers in their Macintosh personal computers used this interface. It was a hit among users. Microsoft developed GUI’s called MS-Windows, for IBM personal computers.
  • 7. 3.2 Window 98: Microsoft 98 is the upgraded version of window operating system. It is a single user multitasking operating system. Navigating around your computer is easier in window 98. You can open a file by single click. You can use multiple monitor screens with a single computer. Thus you can increase the size of your workspace. Window 98 supports the universal serial bus (USB) standard, allowing you to plug in new hardware and use it immediately without restarting the computer. With Window 98, we can use digital cameras and other digital imaging devices. Windows and programs open faster than ever before. By using maintenance wizard, the computer speed and efficiency can be improved. You can use FAT 32 file system to store files more efficiently and save hard disc space. Using the World Wide Web is easier and faster. The connection to Web is simple. Web pages can be viewed in any window. You can make favorite Web pages. In Microsoft Outlook express, you can send e-mail and post messages to Internet newsgroup. The conferences on Internet can be arranged. Window 98 supports DVD and digital audio. You can play high quality digital movies and audio on the computers. The television broadcast can also be observed on computer.
  • 8. Chapter 4 Miscellaneous utilities Utility is a program that performs a very specific task, usually related to managing system resources. Operating system contains a number of utilities for managing disk drives, printers, and other devices. 4.1 Anti Virus Packages (Scanner): Scanners are software programs that look through code of strings (byte sequences) that match known strings in known viruses, and then remove the virus. Scanning program can look at specific disk or files when you require it, or it can be set to look at each program, which is about to be executed. The first important thing to know about computer viruses is that nothing in the field is absolute or standardized. New viruses are created and companies sell software designed to detect and destroy known viruses and again new viruses are created, etc., in a never-ending cycle of increasing sophistication. A computer virus is a computer program that is able to copy all or part of its code into other programs or files. They are also capable of performing malicious or harmful processes, such as deleting or changing files. Damage caused by a virus is called the ‘payload’. One important feature of computer viruses is that they are platform and/or application specific. You must be alert about getting a virus before you get one – • Make sure your system was booted from a virus-free original boot disc, • Scan all new software media with antivirus software, • Write-protects new software immediately on receipt, then copy it and work from the copies (store the originals in a safe place). • Use write-protection mechanisms on discs, • Maintain up-to-date virus-free backups of your files, • Only use Shareware and public domain programs from reliable sources. Microsoft has a Macro Virus Protection Tool available from their Web site. The tool is supposed to warn you if you are about to open a file that contains macros (good or evil ones) and will scan and destroy the Concept macro virus. 4.2 File Compression: Compression programs are very useful on computers where disk space is limited. If you have a lot of files that you want to keep handy, but you do not have enough room on your hard disk, you can compress them, and decompress them only when they are needed. You can probably imagine the advantage of file compression in file transfer. Compressed files are smaller and it takes less time to transfer them. Most files available on Internet are distributed as ARCHIVES. Archives are files that contain compressed files. Archives usually have file names ending with ZIP, LZH, ARJ, or ARC, depending on how they were created. A SELF-EXTRACTED ZIP FILE is an executable program file (.EXE file) that includes both a Zip file and software to extract or unzip the contents of a Zip file. User can extract the contents by simply running it. This is a convenient, because the end user does not need an unzip program (WINZIP).
  • 9. 4.3 Scandisk & Defrag: Scandisk checks your hard drive for errors. There are two different Scandisk options, STANDARD and THOROUGH. In case you are running the Scandisk for the first time, do a through check. When you run the Scandisk in the future, you can run the standard check. You should make sure that you are not doing anything else when you run Scandisk, as any activity on the hard drive will cause it to restart. Close any other applications you may be running before you start Scandisk. If you are running a through test, go eat lunch. It will take a quite some time. Once the Scandisk is over, you may want to run DISK DEFRAGMENTER. It is in the same folder as Scandisk on the start menu. Disk Defragmenter or defrag rearranges the data on your hard drive so that programs and data are all stored in consecutive locations. Defrag, like the through Scandisk check, takes a long time, so it is recommended that one must select ‘All hard drives’. It will take few hours before defragmentation of the disk is over. Once you have run both Scandisk and defrag, you have taken a major step towards keeping your system running at its best. As you know that Windows saves the data into the first open space it comes across. This means that sometimes files can get broken up into smaller pieces, which makes it take longer time to load those files. Disk Defragmentation consolidates fragmented files and folders on your computer’s hard disk, so that each occupies a single, contiguous space on the Volume. As a result, your system can gain access to your files and folders and save new ones more efficiently. By consolidating your files and folders, Disk Defragmenter also consolidates the Volume’s free space, making it less likely that new files will be fragmented.
  • 10. Chapter 5 Internet The Internet, an umbrella term covering countless networks and services is a global network that was initiated in the 1960’s by a team of scientists under a U.S. government research contract. It rapidly became evident that people wanted to share information between networks, and as a result commercial networks were developed to meet consumer demand. Today’s Internet is somewhat difficult to describe. Essentially, the Internet is a network of computers that access to information and people. Internet also called as Net, is the World’s largest network providing free exchange of information. The definition for Internet, which can be best understood by a layman, is that the Internet consists of an incredible number of participants, connected machines, software programs, and a massive quantity of information spread all around the world. Internet can be considered as millions of people constantly communicating about every topic under the sun. However, since the Internet has grown to a phenomenal size, it has also become complex for users. To help the growing number of users, who are not computer professionals, various developments has occurred. First is the setting up of online service like Yahoo, Rediffmail, etc. These Online services operate on one powerful computer, connected to the Internet. User from any part of the world connect to this computer and avail various facilities there, which includes access to information from database, software libraries, news, bulletin boards for various interest groups, online chat facilities, E-mail etc. A revolutionary development on the Internet is the World Wide Web (WWW) or Web in short. 5.1 World Wide Web: The World Wide Web (WWW), which is a component (part) of the Internet, is a collection of web pages. The Web provides access to large amounts of information located on many different servers. The Web also provides access to many of the services available on the Internet. The increasing popularity of the Net is mainly because of World Wide Web. Web documents allow user interaction freely with the application through dialog boxes and forms. 5.2 Web Pages: The fundamental unit of the Web is the web pages. It contains information that can be a combination of text, pictures and hyperlinks. The information displayed on the web page includes graphics, video and audio. Hyperlinks are also known as links. Each link in a web page refers to another web page. A hyperlink can be a word, a group of words, a picture or a part of picture. When we click on a link, the browser fetches the page connected to the link, which in turn can contain more links to other places over the Net. Hypertext is a text document that contains link to other documents. Web Site refers to a particular location on the web. The web pages that represent the online home of their author are called home pages. 5.3 Web Browsers: Web browser is a client program that lets the user access and view the information provided by a specific type of server. Internet Explorer is a Window 95 browser from Microsoft. It is fast and offers a number of features. It comes as a part of Microsoft PLUS.
  • 11. The web browser delivers maps to all the topics on the Internet. The web maps are called directories. Web directory is used to locate a site of interest. There are many directories available for searching the Net, which are unique and accurate. Each directory consists of many levels or sub-directories. The top level gives the broadest overview of the Net. 5.4 Search Engines: Search engines are organized in a particular manner for easy and productive browsing. Search engines allow the user to type in keywords to be searched. The engine searches for a matching word and gives a list of hyperlinks to web sites. Web directories may or may not contain search engines. The bigger directories have built-in search engines, which are more convenient as both browsing through the directory and using the search engine are possible. The directories that come with the built-in engines are Yahoo!, Lycos and Exite. Yahoo! Is a large, well-indexed directory of web pages. It is one of the most dynamic and useful web search tools. It is highly accessible. Both Usenet news and e-mail can be assessed from a common page more conveniently. It is not a complete text search engine. For full text search, we need to use links for other search services displayed at the bottom of the pages. It is an integrated searching environment, which enables the user to browse and search from the same page. 5.5 E-Mail: Email or Electronic Mail as the name suggests, is an electronic form or regular mail. The Internet Service Provider (ISP) delivers the message conveyed in the e-mail to the recipient. One of the major advantages of E-mail is that it is very easy to use, very fast and is much cheaper than sending regular mail. Every user who has an e-mail access to the Internet will have an e-mail address. The ISP delivers the message sent by the user to the recipient’s computer. This computer then looks up the user to whom the mail is addressed. If the recipient exits the destination computer will move the mails into the mailbox. If the recipient does not exist then the e-mail is bounced back to the sender. 5.6 More Information: Internet contains topics other than mailing, news and servers. We can find some fascinating things on the net. The National Weather Map – When we click on any point in the map, a whether forecast for that particular place is displayed. WWW Weather World – We get here weather maps, animation, infrared satellite photographs and visible light photographs. The Universities – Many Universities all over the world have Internet connection. Any particular institution can be selected from the list organized by its domain. Internet Distribution Services - We can access books and magazines partly or entirely on the Net. Books - There is a bunch of bookstores available on the Net. The Commerce Word – The WWW is more serviceable to people in the World. Business organizations access the Net with web pages. For more information about the Commerce World, the Internet Mall, the Internet shopping Network and Branch Mall are available.
  • 12. 5.7 Communication on the Web: Communication on the Web can take place in many contexts. The different ways of communication on the Web are given below: - Interpersonal – The user can create a home page on the Web, which conveys personal or professional information. Home pages are the top-level page for a server, organization or an individual. When created by individuals, the home page reveals detailed personal information about its author and is listed in directories of home pages. Group – People with common interest can form an association on the Web. These interaction systems include Web-based “chat” or conferencing systems. Mass – The Web can be used for mass communication just like other media. Many commercial and non-commercial magazines are distributed throughout the Web. Any person can read the publicly available Web pages and this is therefore a one to many communications. 5.8 Downloading: It means simply transferring a file from a host computer to your computer. Owing to advancement of Internet technology today’s browsers come fully equipped with the tools necessary to download most files. If you want some more advanced features for downloading sites then you can use download tools. Following are some download tools, which can be used for downloading sites. Fresh Download Download Accelerator Plus Leech Get 2001 Webcow ScanDL Download Express
  • 13. Chapter 6 E-Commerce (EC) E-Commerce is defined as buying and selling of products and services over the Internet, but there are many more aspects to it. There are different definitions to E-Commerce: 1. From a communication perspective, EC is the delivery of information, product, services, or payment via telephone lines, networks or any other means. 2. From a business process perspective, EC is the application of technology towards the automation of business transactions and workflows. These applications may result in more effective performance, greater economic efficiency, and more rapid exchange. 3. From a service perspective, EC is a tool that addresses the desire of firms, consumers, and management to cut service costs while improving the quality of services and increasing the speed of service delivery. For example, in the case of online trading, it can add value by including trend analysis etc. 4. From an online perspective, EC provides the capability of buying and selling products and information on the Internet and other online services.
  • 14. Chapter 7 Web Commerce 7.1 Electronic Data Interchange (EDI) The administrative bodies with large information systems came to a point where typing/printing of all the information arriving or leaving their domain is no longer feasible. It is very difficult to respond hundreds and thousands of standard forms after data entry and processing in the computer. The whole process is time consuming and prone to human errors during data entry and expensive to operate. The solution to the above problem comes in the form of EDI. As quite obvious from the name, EDI refers to the electronic interchange of data between computer systems. The recipient computer without the need of human intervention directly uses the information transmitted. EDI is defined as the transfer of structured data for processing from the computer-to-computer using agreed formats and protocols. 7.2 Electronic Fund Transfer (EFT) An EFT system involves the electronic movement of funds and fund information between financial institutions. The transfers are based on EDI technology transfer of funds. EDI can be useful of almost any sector; however, banks have been the primary user for EDI service till now. 7.3 Value-Added Networks (VAN) VAN is a communication network that typically exchanges EDI messages among trading partners Businesses can exchange data either by connecting to each other directly or by hooking into a VAN.
  • 15. Chapter 8 Electronic Payment Systems In everyday life, you pay for goods and services in a number of different ways, you can pay by cash, check, credit card, or debit card. Now with the increasing commercialization of the Internet, and the popularity of the Web, consumers and businesses are both looking for ways to conduct business over the Internet. The methods that have been developed for making payments on the Internet are essentially electronic versions of the traditional payment systems we use everyday –cash, checks, and credit cards. The fundamental difference between the electronic payment system and traditional one is that everything is digital i.e., everything about the payment has been virtualized into strings of bits. This virtualization will make many of the electronic payment options appears similar to each other. 8.1 Electronic Cheques: Credit card payments will undoubtedly be popular for commerce on the Internet. However, following two systems have been developed to let consumers use electronic cheques to pay Web merchants directly. a) By the Financial Services Tech. Corpn. (FSTC) b) By Cyber Cash 8.2 Smart Cards: Smart cards have an embedded microchip instead of magnetic strip. The chip contains all the information a magnetic strip contains but offers the possibility of manipulating the data and executive applications on the card. Three types of smart cards have established themselves. a) Contract Cards – Smart cards that need to insert into a reader in order to work, such as the smart card reader or automatic teller machines. b) Contactless Cards – Contactless smart cards do not need to be inserted into a reader. Just waving them near a reader is just sufficient for the card to exchange data. This type of cards is used for opening doors. c) Combi Cards - Combi Cards contain both technologies and allow a wider range of applications. 8.3 Electronic Purses: Electronic Purse is yet another way to make payments over the net. It is very similar to a prepaid card. For example, Bank issues a stored value cards to its customers, the customer can then transfer value from their accounts to the cards at an ATM, a personal computer, or a specially equipped telephone. When the value on a card is spent, consumer can load additional funds from their accounts on the card. The electronic purse card can be used as an ATM card as well as a credit card.
  • 16. Chapter 9 Microsoft Outlook-2000 Microsoft outlook 2000 is a Window messaging system. It includes customizable email, scheduling, task and contact tracking tool to help you efficiently manage your office activities. 9.1 Outlook Bar The Outlook bar is a list of shortcuts that appears in the far-left pane of the Microsoft Outlook screen. These shortcuts allow you to easily switch between different aspects of Microsoft Outlook. The Outlook bar is customizable and contains two ‘group’ of shortcuts by default: Outlook Shortcuts and My Shortcuts. Outlook 2000 also includes a group called Other Shortcuts. The most common shortcut bar is described below: Outlook Today – Shows a daily overview of appointment, tasks and email scheduled for that day or several days. Inbox – Stores all your incoming messages. Calendar – Opens you calendar so you can schedule meetings appointments or check your availability. Contacts – Allows you to store a detailed list of personal contacts. Tasks – Here you can list your tasks, schedule tasks and monitor their status. Journal – Allows you to track sent and received email from a variety of different contacts. Notes – Notes are the electronic equivalent of paper sticky notes. Use notes to jot down questions, ideas, reminders, or anything you would write on paper. Deleted Items – contains emails, contact, tasks, and other items that have been deleted from various folders. 9.2 Configuring Outlook for Your Email: Outlook was designed first as an e-mail communication tool such as: Creating e-mail messages Sending an e-mail Receiving an e-mail Managing the e-mail – Sorting, field Chooser Folders Selecting multiple messages Opening folders Filters Rules Mail merger to a database file Create/Faxes/E-mails Sending and viewing attachments Acting on messages Recalling e-mail messages
  • 17. Printing e-mail messages Moving messages Subscribing to mailing lists Leaving a mail list Organizing e-mail addresses using the address book Creating a personal mailing list