Cit 100
Cit 100
Cit 100
MICROCOMPUTER AND
APPLICATIONS
(CIT 100)
Contents
INTRODUCTION TO MICROCOMPUTER AND APPLICATIONS ....................................................1
(CIT 100)................................................................................................................................. 1
Contents................................................................................................................................. 1
CHAPTER ONE: INTRODUCTION TO COMPUTER.......................................................................2
CHAPTER TWO: COMPUTER SOFTWARE................................................................................ 43
CHAPTER THREE: WORD PROCESSING SOFTWARE...............................................................63
CHAPTER FOUR: ELECTRONIC SPREADSHEET SOFTWARE.....................................................80
CHAPTER FIVE: COMPUTER NETWORKING..........................................................................102
CHAPTER SIX: COMPUTER VIRUSES..................................................................................... 120
1
CHAPTER ONE: INTRODUCTION TO COMPUTER
We are living in an information age dependent upon digital information. Digital
information is an electronic information result of computer processing. Every
type of job relies upon getting information, using it, managing it, and relaying
information to others. Computers enable the efficient processing and storage of
such information.
Do not think of a computer merely as the machine with the keyboard and the
mouse, although that might be true for some types of computers. Embedded
computers may be inside your household appliances, the Video Cassette
Recording (VCR), the automobile, planes, trains, power plants, water
purification plants, calculators, and even inside a few toys. These embedded
computers are very small. They affect our lives each day. They are all around
us; even modern traffic lights operate with computers. Think of additional ways
in which computers affect our lives each day. Be in any organization, office,
factory or institution, you can find people making use of computer for different
purposes. For example in offices, computers are used for preparing letters,
documents and reports. In hotels, computers are used for advance booking of
rooms, preparing bills and providing inquiry services. In railways, computers
are used for rail reservation, printing of tickets and preparation of reservation
charts. Doctors use computers for diagnosing illness and treatment of deceases.
Architects use them for map designing and city planning. In meteorology
2
department, computers are used for weather forecasting. In short you can say
that there is hardly in all fields now, in which computers are not being used.
Computer is electronic equipment which is used for automating manual tasks.
Using computer you can perform many tasks quickly, effectively and with less
error. It is made by two main components namely Hardware and Software.
The former is said to be the physical component that you can see and touch
while the later is the set of instruction that makes the hardware to perform
tasks.
4
• This technology allowed computers to become smaller, faster, cheaper,
more energy-efficient and more reliable than their first-generation
predecessors.
• Though the transistor still generated a great deal of heat that subjected the
computer to damage, it was a vast improvement over the vacuum tube.
• Second-generation computers still relied on punched cards for input and
printouts for output.
• Second-generation computers moved from cryptic binary machine
language to symbolic, or assembly languages, which allowed
programmers to specify instructions in words.
• High-level programming languages were also being developed at this
time, such as early versions of COBOL and FORTRAN.
• These were also the first computers that stored their instructions in their
memory, which moved from a magnetic drum to magnetic core
technology.
• The first computers of this generation were developed for the atomic
energy industry.
5
• Users interacted with third generation computers through keyboards and
monitors and interfaced with an operating system.
• Used to run different applications at one time with a central program that
monitored the memory
• Computers for the first time became accessible to a mass audience
because they were smaller and cheaper than their predecessors.
6
• In both cases, the higher the value, the more powerful the CPU. For
example, a 32-bit microprocessor that runs at 50MHz is more powerful
than a 16-bit microprocessor that runs at 25MHz.
• What in the first generation filled an entire room could now fit in the
palm of the hand. The Intel 4004chip, developed in 1971, located all the
components of the computer - from the central processing unit and
memory to input/output controls - on a single chip.
7
1.3 Types of Computers
Computers can be classified into various categories, on the basis of their sizes.
When we say, size of the computer, it refers to multiple factors like, size of the
memory, number of terminals that can be connected to the computer, size of
the hard disk, type of processor used in the computer etc.
Computers are generally classified into following categories:
1. Microcomputers
2. Minicomputers
3. Mainframe computers
4. Supercomputers
1.3.1Micro Computers
Microcomputer is the smallest category of computers, in which single
microchip is used for two basic units i.e. ALU and Control Unit. This
microchip is often referred to as microprocessor. Microcomputers are further
classified into following categories:
1. Personal computers
2. Laptop computers
Personal Computers (PC)
Computers that we commonly see these days in offices, hotels, restaurants etc.
are examples of Personal Computer. In short they are called PC. Outward
appearance of PC is shown in figure 1.0. PC mainly comprise of four units i.e.
chassis (also called CPU box), keyboard, VDU and mouse. Only one person
can work on it at a time. This is the reason why PCs are called single user
computers. Originally PCs were designed and manufactured by IBM. Later,as
8
they became popular, other manufacturers also started manufacturing similar
type of computers called IBM clones.
Laptop Computers
Laptop computers also fall into the category of microcomputers. Their
capabilities are the same as that of a PC. A laptop computer is shown in figure
1.1. Laptop computers look like a briefcase. Upper panel of the briefcase
comprises of LCD screen. Lower panel contains keyboard and mouse
arrangement. Other components and circuitry remains packed inside the
briefcase. Laptop computers are deliberately designed to be light in weight.
They run on chargeable battery, which resides inside. Due to their size, weight
and independence from power (for two to three hours) people carry them while
traveling in car, train or airplane and work on them.
9
Figure 1.1 Laptop Computer
1.3.2 Minicomputers
Minicomputers are relatively larger and faster computers. They support multi
user environment. They are generally used for automating those applications,
which are large in size, require fast processing capabilities and demand for
resource sharing among multiple users. Main characteristics of Minicomputers
are described below:
1. They are built, using high performance and high capability processors.
2. Memory size, in such type of computers is generally very large.
3. They support multiple terminals connectivity, which may range from 2
to 128.
4. Large capacity disks are used in multiple numbers so that the data and
programs of all the users could be put on-line.
5. They provide facility to connect multiple printers.
6. They possess the capability of performing computer network related
operations.
10
1.3.3 Mainframes
Mainframes fall into next higher category of computers. Their internal
architecture and circuitry remains different from Minicomputers. They use
specially designed proprietary circuits instead of just single microprocessor as
their CPU. Their circuitry promotes higher connectivity, faster throughputs and
large data processing capabilities.
Due to proprietary circuitry, Mainframes become quite big in size and provide
facility for connecting Minicomputers and microcomputers with them. Few
characteristics of Mainframes are listed below:
1. They possess the capability of addressing larger memory sizes than that
of Minicomputers.
2. They also support larger capacity disks like optical disks etc.
3. Their terminal connectivity can go as high as 256 or beyond.
4. They possess large number of application libraries that provide great
help to developers in developing useful applications.
DEC 20, IBM 370 etc. are the examples of few mainframes. IBM (USA) is the
largest manufacturer of Mainframes.
1.3.4 Supercomputers
Supercomputer is the largest category of computers. They use multiple CPUs
for processing the data and executing the instructions. While performing a task
through Supercomputer, the complete task gets divided into multiple
independent tasks. Each CPU performs individual task and completes it in
parallel. This methodology of processing is called parallel processing.
11
Due to parallel processing, Supercomputers are capable of processing large
volumes of data at very fast speed. They process multi million to few trillion
commands per second. Applications like weather forecasting, nuclear weapon
design, projection system modeling, aero modeling etc. which require
tremendous processing capabilities, can be very well executed on
Supercomputers. CRAY, XMP 24 and NEC 500 are few examples of
Supercomputer.
Input - Entry of raw data; for example, typing names and addresses on
a keyboard or transmitting a picture from a digital camera.
Processing - Manipulation of the raw data to produce useful
information, the key purpose of a computer; for example, sorting or
indexing the names and addresses or adding effects to the picture.
12
Each of this operation is performed by specific unit in the computer. This
section will give an explanation and organization of each unit of the computer.
Before we discuss each unit let us define the term hardware as part of computer
system. The term computer hardware refers to the physical components of a
computer, i.e. all the components that you can physically see and touch
namely: keyboards, CPU, monitors, drives (hard disk, CD, DVD, floppy,
optical, tape, etc...), mouse, printers, modems, scanners, digital cameras and
cards (sound, color, video ). Computer hardware is an integral part embedded
in all modern day automobiles, microwave ovens, electrocardiograph
machines, compact disc players, and other devices. In fact computer hardware
without software is useless; it is the software that instructs it to perform a
particular task
13
Therefore a computer system is defined as a device that accepts input,
processes, stores, and produces output.
Physically the units exist in the form of electronic devices which can be seen
and touched. Generally a computer system is made up by Hardware and
Software. Each unit performs its own function, in coordination with other
devices to perform the given task. What is the role of each unit and in what
form do they physically exist, will be explained in the following subsections.
14
example, if you wish to calculate simple interest on Tsh. 100,000, at 17% for
10 years then the data 100,000, 17%, 10 years etc. and the instructions for
calculating the simple interest will have to be given to the computer, through
input unit.
All those devices, that works in entering information to the computer falls in
this unit (input unit) Few commonly used input devices that can be found
attached with almost every computer, includes keyboard, mouse, and CD-Rom
drive. Others are scanner, digital camera, joy stick, microphones etc. The
primary input devices are discussed here under.
Computer Keyboard
The keyboard is the standard device used to enter information into the
computer system. It looks and operates much like a standard typewriter
keyboard and includes the 26 letters of the alphabet, the 10 digits used for
numbers, and some special characters. However, a computer keyboard had
many additional keys that allow it to do many special things a regular
typewriter cannot do. The keys in a computer are classified in the following
categories; Alphabet keys, Number keys, Special character keys, Function
keys, Cursor keys and Action keys.
Alphabet keys
Alphabet keys have alphabets, from A to Z, written on them. By pressing these
keys, you can type alphabets, words, sentences etc. in lower case. For example,
15
when you press 'A' key, 'a' gets typed. To type the alphabet in upper case, you
need to press Shift key along with the alphabet key. For example, if you press
'A' key along with Shift key, letter 'A' gets typed.
Number keys
Number keys have digits, from 0 to 9, written on them. These keys are used for
typing the numbers. Note that each number key also has a special character
written just above the number. To type this character, you will have to press the
number key along with the Shift key. For example, number 5 key has % sign
marked on it. When you press number 5 key, 5 will get typed. If you pres the
combination of same key and Shift key ‘%’ sign will get typed.
Special character keys
Few keys of the keyboard have special characters like semicolon (;), comma
(,), dot (.) etc. marked on them. Such keys are called special character keys.
When you press special character key, character marked on it gets typed at
current cursor position.
Function keys
There are 12 function keys present on the keyboard. They are named as F1, F2,
F3 …..F12. When you press these keys they perform special functions
depending on which program your working with.
Cursor keys
Four cursor keys are there on the keyboard. They are marked with arrows on
them, pointing in four different directions. Using cursor keys, you can move
the cursor from one place to another.
16
Action keys
Keyboard has many action keys. When you press an action key, a special event
takes place. Most commonly used action keys of the keyboard are described
below.
Caps Lock Key: When you press this key, capital lock becomes on. When you
press an alphabet key, while caps lock is on, the letter written on it gets typed
in upper case.
Shift key: Always this key is pressed in combination with other keys. When you
press this key along with number key then the symbol written on upper part of
the key gets typed. When you press Shift key along with alphabet key then the
alphabet gets typed in upper case.
Ctrl key: The Control (Crtl) key works like the Alt key. It is always used in
combination with some other key.
Esc key: The Escape (Esc) key is used to escape or leave some function you
have selected. The Escape key is always used by itself. Currently on-going
activity gets cancelled when this key is pressed.
Page Keys: There are two page keys on the keyboard, named as PgDn (i.e.
Page Down) and PgUp (i.e. Page Up). When you press PgUp key, previous
page gets displayed on the screen. When you press PgDn key, next page gets
displayed on the screen.
Enter key: The Enter key is typically used to end a paragraph when working in
most application programs or to execute a command, also it used as okay tool.
17
Tab key: The Tab key is typically used to move the insertion point across the
screen to the next tab stop, in the same manner as a tab key on a typewriter.
Backspace key: The Backspace key, located directly above the Enter key,
deletes the character to the left of the insertion point.
Delete key: The Delete key, located to the right of the Enter key, deletes the
character to the right of the insertion point.
Insert Key: This key is used to insert characters in between the two characters,
which have already been typed.
All the keys on the keyboard are auto-repeat keys. This means that if you hold
the key down, the character or function that the key performs will be repeated
as long as the key is held down.
The Mouse
Another kind of input device that is often used with a computer is a mouse.
This device is shaped a little like a real mouse. In fact, the cable that connects it
to the computer looks a little like the tail of a real mouse However currently
there are wireless mouse which does not have the cable connect to the
computer system. Mouse is a pointing device that allows user to point to a
specific position on the screen. It has two or three buttons on top for
selecting/executing different operations the figure 1.3 shows the picture of a
computer mouse.
18
Figure 1.3 Computer Mouse
19
Note: It is important to clean the mouse periodically, particularly if it becomes
sluggish. A ball type mouse has a small circular panel that can be opened,
allowing you to remove the ball. Lint can be removed carefully with a tooth
pick or tweezers and the ball can be washed with mild detergent. A build up
will accumulate on the small wheels in the mouse. Use a small instrument or
finger nail to scrape it off taking care not to scratch the wheels. Track balls can
be cleaned much like a mouse and touch-pad can be wiped with a clean, damp
cloth. An optical mouse can accumulate material from the surface that it is in
contact with which can be removed with a finger nail or small instrument.
The mouse and its pointer can be used to do many things. Sometimes when you
turn on your computer, there you can use your mouse to point to one of the
program you want to use from the start menu.
Sometimes when you turn your computer screen on, you see a series of pictures
called icons. A popular program with icons is Windows. You can use the mouse
to choose one of these pictures to run the program being presented. Usually,
picking a picture allows you to start a program or do something within a
program.
By moving a mouse with your hand, you can make the pointer move around a
computer screen until you are ready to point at an object. Usually you will find
that a computer mouse has two/three buttons. The button on the left is the one
20
you will most often push. Once you have the arrow pointing at the object you
wish to pick, you can click the button ones (single click) or two times (double
click) and will open whatever you are pointing at.
You can also move an object across the screen with your mouse. This is called
dragging. To drag an object across the screen, point at the object, click and
hold down the mouse button, and move the mouse to a new place on the screen
and release the button.
Note: You can set the mouse buttons according to your wishes but the above
explanation is the default setting of the mouse especially for the computer with
windows system.
CD-ROM Drive
CD is acronym for Compact Disk. It works as a medium for storing data or
instructions. It looks like circular plastic disk. Huge amount of data can be
stored on CD. For example, single CD can hold personal data of all the students
studying in a college.
CD-ROM drive is an input unit that reads data from CD. As the name indicates,
CD-ROM (Compact Disk Read Only Memory) can only read the data from
CD, it cannot write on it. CD and CD-ROM drive are shown in figure 1.5.
21
Figure 1.5 Computer CD and CD-ROM drive
22
Bar Code It is used to accept barcode inputs.
Reader A barcode is a series of vertical bars
representing numbers and alphabets
printed on product labels. One must
have noticed all standard items like
perfumes, greeting cards, books,
cassettes available in the market
have similar lines as shown in the
figure, known as bar codes. These
can be read with the help of bar
code readers.
Web It is an easy to connect low
Camera resolution digital camera normally
employed for transfer of images on
the web-based conferencing.
Digital It is a high-resolution camera, which
Camera captures images and stores them in
digital format. It has provision to
connect to the computer using
special computer communication
cables (such as USB cables)
Refer figure 1.2 and note that three units which are; Memory, ALU and Control
Unit put together are referred to as Central Processing Unit or CPU in short.
23
The CPU, a small electronic circuit chip, is the heart of the computer system
and is the device that allows the machine to perform its complex mathematical
and logic functions. The CPU is considered the “brains” of the computer
system. Although it is not important to know how the CPU works in order to be
able to use the personal computer, it is important to know that it is a major part
of the machine. Role of each unit is explained below.
Memory
Memory holds data, instruction or results temporarily. For example, when you
give instructions to the computer to compute simple interest on Tsh. 1,000,000,
@ 10% for 3 years, this data and instructions can be entered into computer
from any of the input or Input/output devices and get stored in memory.
Similarly result (simple interest in this example) also gets stored in memory. In
other words, you can say that the unit, which holds data, instructions or results
in it, is called memory. The data being processed in a computer needs to be
stored in memory for references. Computer has two types of Memory namely
Primary and Secondary memory.
Primary memory
That memory, which is utilized by the computer for its internal functioning, is
called primary memory. Since it plays an important role in internal functioning
of computer hence it is often referred to as internal memory.
24
This is the memory that can be directly accessed by the CPU which constantly
interacts with it, retrieves data stored therein, goes through instructions and
execute them as per the requirements. All the information, data and application
are loaded there in uniform manner. It is used to store the information
(programs and data) that the computer is currently using i.e. the data or
program that is being processed by the CPU are stored in this memory. In other
words the CPU directly stores and retrieves information from it. Primary
memory is further categorized into two categories:
1. Read Only Memory (ROM)
2. Random Access Memory (RAM)
ROM- is an integrated circuit programmed with data that holds instructions for
starting up the computer. Data stored in ROM is non volatile that is; will not
get lost when powered off. These data cannot be changed until a special
operation is done to change. Using special devices, such as ROM programmer,
instructions are written in it. Once instructions are written in it, it is put inside
the computer. As and when required, computer reads instructions from it. Since
data can only be read from it hence it is called Read Only Memory or ROM in
short. ROM physically exists in the form of blank electronic chip, in which
programs or data are written, using special devices. Those ROMs, in which
data once written, cannot be erased by any means are called Programmable
Read Only Memory or PROM in short. Other type of ROM, in which data is
25
written or erased, using ultraviolet rays is called Erasable Programmable Read
Only Memory or EPROM in short.
Random Access Memory (RAM)
RAM – is the temporary storage in which a CPU can read and write
information on it. In some text this memory is called read and write memory
(RWM) but RAM is the most adapted and well known terminology worldwide.
It stores the information that currently being processed by the computer. This
memory is accessed by CPU, in random fashion. That means any location of
this memory can be accessed by the CPU to either read information from it, or
to store information in it and nothing else.
RAM is temporary/volatile memory this is due to the fact that information
stored in get lost when the computer is switched off (or when power fails e.g. if
you pull out the power lead). Therefore there is need for permanent or long
term storage which is also referred to as secondary storage or auxiliary storage
(secondary storage unit).
Figure 1.6 random access memory (ram) for desktop and laptop computer.
26
This unit performs arithmetic and logical calculations in computer. Recall that
calculations like, addition, subtraction, multiplication division etc. fall into the
category of arithmetic calculations. Operations like a>b, c>=d etc. are logical
operations. In computer terminology, the activity of performing arithmetic and
logical calculations is called processing. In other words it can be said that in
computer ALU performs data processing.
The Control Unit
While computer functions, data moves from one unit to another unit. For
example, when you give input to computer, data and instructions move from
input unit to memory. When data is processed, it moves from memory to ALU.
Similarly when processing is over, results move from ALU to memory and
memory to output unit. Now the question is which part of computer organizes
data movement within the computer? Well, Control Unit is the main unit,
which performs traffic police like task. It ensures movement of right data from
right source, to right destination at right time so that all the units of computer
perform their functions in coordination with each other.
27
Computer Monitor
The VDU looks very similar to a television set. The types of information that
can be displayed on it include words, pictures, tables, numbers, and graphs,
Videos etc. it display the contents that are being typed through keyboard as
well as the processed data. The size of a video monitor is measured by the
distance diagonally from one corner of the screen to the opposite corner of the
screen. Commonly Video monitors can range in size from 14"-21" (35 cm-52.5
cm) but larger size exists as well. Monitors have their own on/off switches and
usually must be turned on and off separately from the computer. The figure 5
below illustrates the VDU.
28
1. Dot Matrix Printer
2. Inkjet Printer
3. Laser Printer
This printer also strikes an inked ribbon to create letters. These letters are made
up of many tiny inked dots. These printers drive their name "Dot Matrix" from
the fact that they print the characters making dots. Pins of the printer print these
dots so close to each other that the gap between them is hardly visible. Viewer
gets an impression of full continuity. These printers are versatile printers and
are capable of printing not only text, but up to some extent graphics also.
For printing the characters and drawings, inkjet printers make use of colored
inks. They use Cyan, Magenta, Yellow and Black inks. Using these four basic
colors, inkjet printers generate all other colors. This type of printer shoots out
small dots of ink onto the paper. These printers are very popular due to their
high quality and low cost.
Many sound boards are able to be connected to a pair of small external audio
speakers or even a set of larger home stereo speakers. This allows a computer
user to hear the very realistic sound effects of certain video games or
multimedia presentations. These sounds include the sound of car engines,
explosions, etc. The sound boards and audio speakers also allow a computer
user to play music through his/her computer. In some instances, speech itself
can be played through the speakers.
The Modem
The word modem is a short form for modulator demodulator. It is a special
communication device that is able to allow one computer to talk to another
computer via telephone lines. It is similar to two friends talking to one another
30
on the telephone. Since the modem allows the computer to both send and
receive information, it is called an input/output device.
Some modems are located inside computers while other modems are located
outside computers. Those located inside are called internal modems. Those
located outside the computer are called external modems. In order to work,
modems require special computer software called a communication program.
Since a modem allows for the communication of information via telephone
lines, it is also referred to as a telecommunication device. Different modems
send and receive information at different speeds
Most computers have a permanent storage device inside them called a hard
disk drive. Sometimes they are also called a hard drive. This storage device
contains rotating disks where data or programs are stored magnetically. The
amount of information that can be saved on the hard drive is dependent on its
size. The size of the hard drive, like a computer’s temporary memory (RAM),
is usually described in megabytes, Gigabyte, Terabyte. One advantage of a hard
drive is that much more information can be saved on the disks of the hard drive
than on a disk of a floppy disk drive.
32
Figure 1.9 Hard disk drive
Floppy Disk
This is the former technology used for data storage and transfer from one
location to another. The floppy disk drive allows a computer user to save data
and programs on removable floppy disks or diskettes. There are two sizes of
floppy disks drives. One kind can receive 3.5" disks, while a second type,
which is rarely used anymore, works with 5.25" disks. Although the disks that
go into a floppy disk drive do not hold as much information as a typical hard
drive, these disks used to offer the advantage of being very portable. This
technology have been phased out in favor of the USB flash drive which can
perform all the work which previously was done by using the Floppy disk drive
with more advantage of storing more data, portability, faster and cheap. Until
approximately 2005, most desktop and laptop computers were supplied with
floppy disk drives, but floppy disk drives have been abandoned in favor of
USB ports.
33
Figure 1.10(a) Floppy disk Figure 1.10(b). Floppy
disk drive
34
Can be read by most CD-ROM drives
CD-RW (Compact Disc-Rewritable)
A USB flash drive consists of a flash memory data storage device integrated
with a USB (Universal Serial Bus) interface. USB flash drives are typically
removable and rewritable, and physically much smaller than a former
technology floppy disk which have been abandoned. Most weigh less than 30g
with high storage capacity and cheap.
35
USB flash drives are often used for the same purposes for which floppy disks
or CD-ROMs were used. They are smaller, faster, have thousands of times
more capacity, and are more durable and reliable because of their lack of
moving parts. Until approximately 2005, most desktop and laptop computers
were supplied with floppy disk drives, but floppy disk drives have been
abandoned in favor of USB ports.
USB Flash drives use the USB mass storage standard, supported natively by
modern operating systems such as Linux, Mac OS X, Windows, and other
Unix-like systems. USB drives with USB 2.0 support can store more data and
transfer faster than a much larger optical disc drives like CD-RW or DVD-RW
drives and can be read by many other systems such as the PlayStation 3, DVD
players, TV sets and in some upcoming mobile Smartphone.
1.7.1 PC ports
As defined above computer port is where a physical connection of the devices
is made. There different computer port with different function as has shown in
figure 1.13 below followed by the explanation of function for each port.
Parallel Port
Parallel ports can be used to connect a host of popular computer peripherals
like: Printers, Scanners, CD burners, External hard drives, Network adapters
and Tape backup drives. Parallel ports were originally developed by IBM as a
way to connect a printer to PC. Parallel ports are also known as LPT ports.
When a PC sends data to a printer or any other device using a parallel port, it
sends 8 bits of data (1 byte) at a time. These 8 bits are transmitted parallel to
37
each other all at once. The standard parallel port is capable of sending 50 to
100 kilobytes of data per second.
The original specification for parallel ports was unidirectional, meaning that
data only traveled in one direction for each pin. With the introduction of the
PS/2 in 1987, IBM offered a new bi-directional parallel port design. This mode
is commonly known as Standard Parallel Port (SPP) and has completely
replaced the original design. Bi-directional communication allows each device
to receive data as well as transmit it.
Figure 1.13 Computer ports
38
Serial ports, also called communication (COM) ports, support sequential data
transmission and are bi-directional. As explained above, bi-directional
communication allows each device to receive data as well as transmit it. The
name "serial" comes from the fact that a serial port "serializes" data. That is, it
takes a byte of data and transmits the 8 bits in the byte one at a time serially
one after the other. The main advantage is that a serial port needs only one wire
to transmit the 8 bits (while a parallel port needs 8 because all 8 bits are sent in
one go). The disadvantage is that it takes 8 times longer to transmit the data
than it would if there were 8 wires. Serial ports lower cable costs and make
cables smaller. A serial port is commonly used to connect external modems,
scanners or the older computer mouse to the computer.
It comes in two versions, 9-pin and 25-pin. 25-pin COM connector is the older
version while the 9-pin connector is the current standard. Data travels over a
serial port at 115 Kb per second.
Most computers have at most two serial ports, and they are very slow in most
cases.
Devices that needed faster connections came with their own cards, which had
to fit in a card slot inside the computer's case. Unfortunately, the number of
card slots is limited and a Ph.D. was needed to install the software for some of
the cards.
USB (Universal Serial Bus) Port
USB, introduced in 1997 is a plug and play peripheral connection, which was
invented to solve all these headaches. It is used to connect various devices, for
example, digital joystick, a scanner, digital speakers, digital cameras, or a PC
39
telephone etc. to the computer. USB is generally a two-and-a half-inch long
port on the back of computers or built into a hatch on the front of a computer.
The Universal Serial Bus provides a single, standardized, easy-to-use way to
connect up to 127 devices to a computer. Just about every peripheral made now
comes in a USB version. A sample list of USB devices that you can buy today
includes: Printer, Scanner, Mic, Joystick, Flight yoke, Digital camera,
Webcam, Scientific data acquisition device, Modem, Speaker, Telephone,
Video phone, Storage device such as Zip drive, Network connection.
Connecting a USB device to a computer is as simple as finding the USB
connector on the back of the machine and plugging the USB connector into it.
If it is a new device, the operating system auto-detects it and asks for the driver
disk. If the device has already been installed, the computer activates it and
starts talking to it. USB devices can be connected and disconnected at any time.
Many USB devices come with their own built-in cable, and the cable has an
"A" connection on it. If not, then the device has a socket on it that accepts a
USB "B" connector.
The USB standard uses "A" and "B" connectors to avoid confusion: "A"
connectors connect towards the computer while the "B" connectors connect to
individual devices. By using different connectors it is impossible to ever get
confused. Connect any USB cable's "B" connector into a device and it is sure to
work.
The Universal Serial Bus is the hottest product in the computer market because
of the following features:
• The computer acts as the host.
40
• Up to 127 devices can connect to the host, either directly or by way of
USB hubs.
• Individual USB cables can run as long as 5 meters; with hubs, devices
can be up to 30 meters (six cables' worth) away from the host.
• With USB 2, the bus has a maximum data rate of 480 megabits per
second.
• A USB cable has two wires for power (+5 volts and ground) and a
twisted pair of wires to carry the data.
PS/2 Port
IBM developed the PS/2 port. It is also called a mouse port. It is used to
connect a computer mouse or keyboard. A PS/2 connector is a round connector
with 6 pins. Nowadays few computers have two PS/2 ports, one for keyboard
and one for mouse. A colour code is used to distinguish between the two ports
the keyboard port is green and the mouse has a purple port. In earlier
computers the keyboard was connected using a 5-pin DIN connector with a
small notch on one side. The purpose of keeping the notch was to avoid a
wrong connection. With the advent of the PS/2, this socket has become
obsolete.
41
At the back of the computer system we can find three small sockets of blue,
green and pink colors used to connect speakers, audio input devices and
microphones to the PC respectively. The connectors for microphone and
speakers are color coded to help in troubleshooting.
42
6.Describe the role of keyboard and mouse in computer? What are the
fundamental similarity and differences between them?
7. List the input and output devices.
8.What is the role of memory in computer? Name any two medium, which
serve the purpose of permanent memory.
9.What do you understand by logical operations? Which part of computer
performs arithmetic and logical operations?
10. Describe the term hardware and software. What is program in relation to
computers?
11. Describe the role of control unit in computer.
2.1 Introduction
A computer system is basically combination of hardware and software. For its
functioning it requires different types of hardware devices, electronic
components and various types of software. The term software refers to the
43
instructions that enable the computer to perform its tasks. There are basically
two types of software: the system software and the application software.
44
But the big disadvantage of this is that programs which are specific to the
company’s needs are not available off the shelf and have to be specially written
by a software house, which is a very expensive business.
The normal commercial sector of industry also has great use for general-
purpose packages such as spreadsheets (e.g. Lotus, excel, Quattro) and
databases (e.g. dBase, FileMaker, Access). These packages provide basic
facilities and these are used to put together a system that can be used by
ordinary operators. So, one company might tailor a spreadsheet to provide a
budget program while another company might produce a sales forecasting
program. The most popular general purpose application programs are described
below:
45
• Desktop publishing software, such as Adobe In-Design, helps you use
graphic design techniques to enhance the format and appearance of
documents such as newsletters, brochures, newspapers, and magazines.
• Web authoring software, such as Microsoft FrontPage or Macromedia
Dreamweaver, helps you design and develop customized Web pages
• Spreadsheet software, such as Microsoft Excel, helps you create
worksheets to perform calculations, create “what-if” analyses, and graph
data.
• Database software, such as Microsoft Access, helps you keep track of
related data and records. Other functions include finding, organizing,
updating, and reporting information stored in more than one file.
• Presentation software, such as Microsoft PowerPoint, helps you to
combine text, graphics, animation, and sound into a series of electronic
slides.
• E-mail software, such as Microsoft Outlook, helps you to send and
receive e-mail messages over the Internet.
From chapter three the three general purposes application software will be
discussed, these are Word processing software (MS Word), Spreadsheet
software (MS Excel) and Presentation software (MS PowerPoint)
46
For example, one system program allocates storage for data being entered into
the system; another system program instructs output to be sent to the
appropriate device such as a line printer.
System software appears on all computers in one form or another, the most
common control software includes the Computer’s operating system, device
drivers, and so forth. In the next section we will discuss the Operating system
in detail.
47
2.4.1 What Is Operating System
Operating System is essential software that is required for a computer to
become operational. It provides functionality to computer hardware so that
electro-mechanical components of it perform read, write and processing
functions as human beings do.
48
Internal management functions are the functions that have to be essentially
performed to make the computer work. For example, managing the processor,
memory, devices, input / output functions, data etc
Services are bunch of commands and utilities that operating system provides to
its users to have better control over computer. Block diagram, showing the
basic structure of operating system is shown in figure 2.1. It also depicts its
purpose.
49
ii. It works as a resource manager, it allow several program to share computer
resources. The OS allocates the resource to the programs requesting them
and resolves conflicts that occur when, for example, two or three request
the use of the same tape driver or primary storage location. Not only that
but it perform an accounting function; i.e. it keeps track of all resource
usage so that user fee can be determined and the efficiency of CPU
utilization evaluated.
iii. OS schedule jobs on priority basis although it may seem logical to run
program in the order in they are submitted, this is not the most practical
approach. For instance, assume five programs are submitted for processing
within short period of time. Suppose one program requires one minutes of
the CPU time and the other four require one hour each. It may be
reasonable to process the short program first. Or suppose one program will
provide a vital report and the output of the other is less important. The most
important program should probably be processed first.
50
and commands. However in this course we will concentrate mainly in windows
operating system with highlight on the MS DOS.
MS-DOS
MS-DOS is one of the most popular, powerful and useful operating system. It
was designed and developed in the initial days of Personal Computers (PC) by
Microsoft Corporation of USA. Due to its versatility and ease of operations, it
became quite popular, within short span of time.
Windows OS
Windows is the most popular operating system of modern times. It has been
designed and developed by Microsoft Corporation of USA. Windows not only
activates computer and makes its devices functional, it also provides
applications for performing wide variety of tasks on computer. For example, its
Notepad program enables you to write letters and notes. Using its Paint
program you can draw pictures on computer and color them too. Likewise there
51
are many more programs in Windows; in our case we will focus on windows
OS. Generally windows OS have the following features:
52
Drag and Drop
Drag and Drop is a powerful feature of Windows operating system. Using this
feature, you can drag objects like files, folders etc. from their original location
and drop them at some other place, so that they could either be copied or
moved there. For example, dragging the file A from folder F1 and dropping it
on folder F2 will move the file A from F1 to F2.
53
Object Embedding
This is one of the most powerful features of Windows operating system. It
enables two or more programs to exchange objects like text, graphics etc.
among them. For example, a drawing made in Paint program could be brought
into the document, created through WordPad program so that figure could be
embedded in the text.
Object Linking
Object Linking is yet another powerful feature of Windows operating system.
Using this feature, one object can be linked to the other object. Thus whenever
linked object is modified or changed, modifications/changes get visible in other
object also. For example, you may type the description of Personal Computer
in WordPad program and draw its figure in Paint program. Using Object
Linking feature you may link the computer figure to computer description so
that it appears in the document. Now whenever you will make
modifications/changes in computer figure they will automatically get reflected
in the description. You may note that overall effect of Object Embedding and
Object Linking is same but automatic reflection of changes/modifications does
not take place in case of Object Embedding.
Plug and Play
It is an important feature of Windows operating system. It makes the operating
system, slightly intelligent. Whenever a new device is attached to the computer,
operating system automatically senses its attachment and loads its device
54
driver. Thus due to plug and play feature, new devices become automatically
operational in Windows operating system.
Command Prompt
Using this feature, Windows provides MS-DOS working environment, within
Windows environment. Thus all MS-DOS commands could be executed from
Windows.
55
Figure 2.2 Loading the windows OS
Desktop Icons
Icons are graphical pictures. They represent objects like programs, files, folders
etc. Initially few icons appear on desktop. Later, if the need be, more icons are
placed on the desktop. To activate any icon, you need to double click the
mouse on it.
Start Button
Start button is the starting point of Windows menu system. When you click the
mouse on "Start" button, Start menu, as shown in figure 2.3 appears on the
screen.
56
Figure 2.3 Start button Popup menu
Refer Start menu, shown in figure 2.3 and note the following points:
1. Some of the options in Start menu have an arrow marked in front of them.
This arrow indicates that when you click the mouse on the option, a
submenu will appear on the screen.
2. Some of the options have few dots (…) marked in front of them. These
dots indicate that when you click the mouse on the option, a dialog box
will appear on the screen.
57
3. Those options that neither have arrow nor dots marked in front of them
get directly executed when you click the mouse on them.
Task Manager
Initially, Task Manager appears as blank area but when you execute any
program, a button for that program gets created in this area. This button
identifies the program and provides means for performing different operations
on the running program. For example, using the button you could terminate the
program.
System Tray
Initially system tray displays few icons and system time in it. Each icon of the
system tray represents a program, which is invisibly running in the background.
To operate upon a background program, you can double click the mouse on its
icon. For example, to set the system date and time, you can double click the
mouse on system time icon.
58
2.4.5 Windows Applications
Windows is a powerful operating system. It not only makes the computer
functional, it also provides many useful programs using, which you can
perform, different types of operations. Following are commonly used programs
of Windows:
WordPad- This program is used for creating large text files. It also provides
many formatting options, using which the document could be formatted and
made attractive.
Paint: It is basically a drawing and coloring program. Using this program, you
can create shapes and drawings and color them with attractive colors.
Calculator: Using this program, you can use your computer as calculator and
perform arithmetic and scientific calculations.
Media Player: Using this program, you can play audio and video files on your
computer.
Movie Maker: Using this program, you can put graphical pictures in sequence
and prepare multimedia presentations.
59
Windows Explorer: Windows Explorer is a program, using which file and
folder maintenance activities are performed on computer. Creating new folders,
deleting old folders, moving or copying files from one folder to another are the
activities, which are easily performed with the help of Windows Explorer.
Program Icons
All those icons that represent program are called Program icons. Some of the
program icons are illustrated in figure 2.4. To run the program, you need to
double click the mouse on its program icon. For example, to execute Date/Time
program, you will have to double click the mouse on its icon.
60
Figure 2.4 program icon
Objects Icons
All those icons that represent objects like devices, files, folders etc. are called
object icons.
Some of the object icons are illustrated below.
To select an option from the bar menu, you need to either click the mouse on
the option or press underlined key along with ALT key. For example, to select
Edit option from the bar menu, you can either click the mouse on Edit option or
press ALT and E keys together. This combination of ALT and underlined key
is called hot key.
Pull Down Menu
Pull down menus appear as submenu, when you select an option from some
other menu. For example, when you select any option (say Edit) from the bar
61
menu, a pull down menu appears on the monitor screen. To select an option
from the pull down menu, you need to click the mouse on it.
Popup Menu
These menus appear as independent menus, when you click the left button of
your mouse on some object. They automatically disappear when you click the
mouse at some other place. For example, when you click the mouse on "Start"
button, Start menu pops up as an independent menu. These menus do not
appear everywhere but remain available at some special location. A popup
menu is illustrated in figure 2.3.
Shortcut Menu
Shortcut menus appear when you right click the mouse. For example, when
right click the mouse on desktop; a shortcut menu appears on the monitor
screen. To select an option from the shortcut menu, you need to click the
mouse on the option. When you select the option, corresponding activity takes
place and popup menu disappears from the screen.
Toolbars
A row of small buttons, with icons in them forms a toolbar. Each button
performs a specific task when you click the mouse on it. To find out, what a
button of toolbar does, rest the mouse pointer on the button for a while. Don't
click on it, a label called tool tip will appear near the button. Generally labels
are such that they give idea of button's function.
Dialog Box
A dialog box is special type of window that allows you to enter specifications
for performing a task, as per your choice. For example, when you open a file, a
62
dialog box, appears on the screen. Using this dialog box, you can specify drive,
folder, file name etc. of the file, which you wish to open.
Menu Bar
Bar menu appears in the form of a horizontal strip, with options written inside.
A typical bar menu, is illustrated in figure 2.5. To select an option from the bar
menu, you need to either click the mouse on the option or press underlined key
along with ALT key. For example, to select Edit option from the bar menu, you
can either click the mouse on Edit option or press ALT and E keys together.
This combination of ALT and underlined key is called hot key.
63
able to do a lot of these things, but also learn how to learn the other features by
yourself, using Help Menu.
A key advantage of word processing software is that users easily can make
changes in documents.
Word-wrap
This feature enables Automatic arrangement of text in lines of specified length
without the necessity of touching the return key. The word processor
automatically moves to the next line when you have filled one line with text,
64
and it will readjust text if you change the margins. The following diagram
shows an example of word wrap in word 2007. When the sentences reaches the
end it automatically start another line.
Hyphenation
Option of inserting a hyphen to break a word that ends a line: the hyphen does
not print if later editing moves the word to the middle of a line. The following
figure shows the hyphenation at word necessity that is ne-cessity
65
Alignment:
Positioning text or numbers to specified margin and tab settings. there are four
alignment options- left, right, center and justification (or full justification). In
justification the text is aligned in both the left and right margins. See the figure
below
Decimal Alignment:
Positioning columns of numbers with the decimal points vertically aligned.
This figure shows how decimal alignment works. The arrow in diagram shows
the decimal alignment.
66
Indents and adjustments
The setting of temporary margins within a document differing from the primary
margins used. Indents determine how close each line of a paragraph comes to
the margin. Adjustments realign of text to new margin and tab settings. Using
this feature it possible to align different paragraph using different margin. The
following shows the four paragraph with different adjustments
67
Page size and margins
Allows you to define various page sizes and margins, and the word processor
will automatically readjust the text so that it fits. See the figure for page size
and margin features.
Layout:
68
Allows you to specify different margins within a single document and to
specify various methods for indenting paragraphs. The figure below describes
the layout in Microsoft word 2007
69
Search and Replace:
Allows you to direct the word processor to search for a particular word or
phrase. You can also direct the word processor to replace one group of
characters with another everywhere that the first group appears. You go from
edit menu -->Find & Replace.
70
Template (Boilerplate)
This are predesigned documents that have preset margin, fonts, paragraph
formats, heading etc from which standard documents can be built. When you
define your template make sure you save it as a template and not a normal
document. The figure below shows how you can save in template in MS Word
2007. The highlighted option saves a document as template
Sections
Word processor allows you to divide a document into sections and apply a
different format to each section. The following figure shows the document with
two sections
71
Column
The pages can be divided into different columns. This can be used when
creating a newsletter.
72
Form Letter Merging
Automatic combining of a form letter with a mailing list to generate multiple
copies of the letter with the different addresses and other variable information
filled in. This is particularly useful for generating many files that have the same
format but different data. Generating mailing labels is the classic example of
using merges. See the figure below.
File management
Many word processors contain file management capabilities that allow you to
create, delete, move, and search for files.
Font specifications
73
Allows you to change fonts within a document For example, you can specify
bold, italics, and underlining. Most word processors also let you change the
font size and even their typeface. In Ms Word there is Font group for this task.
See the figure below.
Graphics
This allows you to embed illustrations and graphs into a document. Some word
processors let you create the illustrations within the word processor; others let
you insert an illustration produced by a different program. In MS Word an
illustration group gives this feutres.
74
Macros
A macro is a character or word that represents a series of keystrokes. The
keystrokes can represent text or commands. The ability to define macros allows
you to save yourself a lot of time by replacing common combinations of
keystrokes. In Ms Word this feature is not enabled by default. The Screenshot
below shows how macro looks like in MS Word.
Language tools
The word processors contain spellchecker, grammar checkers and thesaurus
utilities to manage the language. Spellchecker is a utility that allows you to
check the spelling of words. It compares words in the text against an on-line
dictionary, flagging items not found in the dictionary by highlight any words
that it does not recognize and offers alternative spellings and a means of
correcting the errors. Grammar Checkers utility works like spellchecker, but
they inspect sentences with grammatical errors. This tool compares yours
sentences against the standard one and notifies you whenever grammatically
sentence is found. Thesaurus is a built-in thesaurus that allows you to search
for synonyms without leaving the word processor.
75
Tables of contents and indexes generators
Allows you to automatically create a table of contents and index based on
special codes that you insert in the document
Windows
Allows you to edit two or more documents at the same time. Each document
appears in a separate window. This is particularly valuable when working on a
large project that consists of several different files.
Print:
Allows you to send a document to a printer to get hardcopy.
76
b. Easy formatting of document - for example centering and right
justification. You can also specify fonts, bold, italics etc. You can make
use of the many formatting features available with the software e.g.
borders, text layout
c. You can save your current work, close the document and come back to it
later time
d. Editing your work several times is possible in word processor and you
can save different versions and go back to an earlier one.
e. You can make use of large number of templates available or you could
create your own template and house style
h. Ability to make templates for your work. If you have lab reports to do
every week, for example, you can create the form that is required and
save it as a template. Then, all you need to do is fill in the blanks.
77
j. The cut/copy and paste facility makes it easier to copy from one
document to another, or to make a new document by making changes in
copy of another one.
c. If you want to write something quickly, it takes more time to switch the
computer on, open the word processor and set up the document.
sometimes pen and paper is faster
d. People can become on using word processor and their handwriting skills
can deteriorate
e. People can become reliant on spell checker and not proof reed their work
properly
78
3.5 Review Questions
1. What is word processor?
7. Explain the kind of formatting that you can do on text in word processor
10. How do I modify text? Bold, Italic, Underline Change the font and size of
text? Change the color of text? Highlight text?
11. How do I make corrections to a mistake which I find later after typing?
12. What is difference between a text file .txt and a formatted document?
14. When would you use up and down arrows with a document? When do
you use backspace or delete button ?
79
16. If you opened a long document, how would you find a certain word in
that document quickly without looking through the entire document
A spreadsheet allows you to enter rows and columns of information and then to
manipulate the data in a variety of ways. The power of the spreadsheet lies in
the ability to experiment with your data and to see immediately the results of
the changes thus making it easy to perform ‘What if?’ analyses.
4. Dates - shows when was created and can be used in calculation like late loan
repayment
81
The spreadsheet is composed by rows and columns. The intersection of row
and column forms the cell where the data can be inserted. The rows are
identified by numbers while the column are identified by letters
Dynamic calculation
A spreadsheet is very fast on a modern computer, so you can set up a powerful
model with thousands of calculations and yet you can expect an answer very
quickly. For example a chart in which whenever the cell contents changes, then
they are reflected to a graph.
Use of formulas
A model needs to be able to do mathematics on the input values and this is just
what formulas can do. Usually the formulas are defined by the individual user
to solve his/her mathematical problem.
Use of functions
This is a real time-saver as spreadsheets have hundreds of functions you can
use for building up the model - for instance there is a function that can do
compound interest calculations. If it did not support functions then you would
have to do all the hard calculations yourself by using formulas. The function
are predefined formulas that come with excel. The following shows how the
functions are included in Ms Excel. The next figure show the use of functions
82
Cell Formatting
Cells may be formatted using the format pages, which let you specify the font
style, borders, text and background colors, the size of cells and text alignment
within the cells. Through cell formatting it is also possible to specify height and
width of the cell. The number, alignment and styles can be applicable to cell to
give it an impressive view. The following screen shot shows the groups in Ms
Excel that can be used to format the cell.
Conditional formatting
This feature provides the spreadsheet to apply a certain formatting to particular
data item when certain condition is met. Suppose you have a list of students
who did an exam, through this feature it be easily to locate the student who
failed by making their names font color to be in red. The figure below is dialog
in ms Excel that can be used to make this kind of formatting.
83
Multiple Worksheets
Spreadsheet provides support for multiple sheets within a workbook. When you
press the worksheet button, worksheets are presented in a horizontally
scrollable page, allowing you to quickly flick between all the worksheets in the
workbook. A worksheet may be selected simply by tapping on it. You can
create new worksheets and delete or rename existing worksheets. You can also
create cross-sheet formulas and copy and paste between sheets.
84
Graphs and Charts
Graphs and charts let you present the data in a visual or pictorial form. Humans
find it easier to spot trends and analyses data in a graph rather than in a table of
numbers.
Data Analysis
Spreadsheet software gives you the ability to analyze your data in ways other
than simply looking at grids and lines. Most spreadsheet software can
automatically create graphs and charts from your data, giving you different
ways of comparing and analyzing information. These visual representations can
also be printed and emailed, or exported into slide shows for presentations.
Examples of analysis are what-if analysis and goal-seeking analysis. Besides
the graphs and charts, spreadsheet provides features for filtering and sorting.
Also using What-if analysis feature it possible to have advanced way of
analyzing your data. The figure below shows some the analysis tools that are
present in MS excel 2007
85
Protect and password cells
To give the security to your content, spreadsheets provides the password
facility to protect an individual cell or the whole document.
Look Up tables
86
All spreadsheets support lookup functions, tools that return a value from a table
by looking up another value in the table.
Formula Basics
Formulas in Microsoft Excel begin with an equal sign. The equal sign tells
Excel that the succeeding characters constitute a formula. If you don't enter the
equal sign, Excel will treat your entry as text and the calculation will fail.
To show how formulas work, we'll begin with a simple exercise by selecting
blank cell A1. Then type =5+5, and press Enter. Excel performs the calculation
and produces a result of 10 in cell A1.
Notice the formula bar shows the formula you just
typed. What appears in the cell is the result; what
appears in the formula bar is the underlying value,
which is a formula in this case.
Order of Operation
87
When performing calculations in a formula, Excel follows certain rules of
precedence: Excel calculates expressions within parentheses first. Excel
calculates multiplication and division before addition and subtraction. Excel
calculates consecutive operators with the same level of precedence from left to
right.
If you want to overrule the precedence order in which Excel calculates, use
parentheses. Parentheses also make your formulas easier to read.
You can include or reference other cells in a formula. When you do, the result
of the formula depends on the values in the referenced cells and changes
automatically when the values in the referenced cells change. This is extremely
powerful in what-if scenarios.
To see how this works, enter 10 in cell A1. Now select cell A2 and type
=A1*2, and press ENTER. The value in cell A2 is 20. If you change the value
in cell A1 from 10 to any value, the value in cell A2 will also change. Cell
references are especially helpful when you create complex formulas, or
conduct what-if analysis.
89
i.e., if you copy a formula =C2+D2 from E2 to the cell F2, the formula in F2
adjusts in such a way that when the cell F2 is dragged downwards by one row,
the formula automatically changes to C3+D3 and places the resulting value of
C3+D3 in cell F3.
In case, if you wish to maintain the original references as they were, then you
should make use of the absolute references. If you want to make the above
example retain the original reference when it is copied, then you should
precede the columns A2 and B2 and the row number by a Dollar ($) symbol.
i.e., you should use the formula as =$C$2+$B$2 so that when you copy the
formula the original reference is retained.
To make the cell appear in absolute format ($) click on the cell you would like
to edit and press [F4] and press enter. You will observe the cell A1 turn into
=$A$1.
For example, if you copy or fill an absolute reference in cell B2 to cell B3, it
stays the same in both cells =$A$1.
In some situations, you may need to make the cell reference as ‘Mixed’
reference, so that you can lock either a column or a row by preceding it with a
Dollar ($) symbol. For example, if you use a formula as =$D4+E4, then you
are making the value that is present in cell D4 as absolute and the value in cell
E4 as Relative.
90
Understand Error Values
• ##### The column is not wide enough to display the content. Increase
column width, shrink contents to fit the column, or apply a different
number format.
• #REF! A cell reference is not valid. Cells may have been deleted or
pasted over.
AVERAGE Function
The AVERAGE function, one of Excel's statistical functions, is used to find the
average or arithmetic mean of a given list of arguments.
MAX Function
The MAX function, one of Excel's statistical functions, is used to find the
largest or maximum number in a given list of values or arguments.
91
The syntax for the MAX function is: =MAX( argument1, argument2, ...
argument30 )
Argument1 ... argument 30: The arguments can be numbers, named ranges,
arrays, or cell references. Up to 30 arguments can be entered.
MIN Function
The MIN function, one of Excel's statistical functions, is used to find the
smallest or minimum value in a list of numbers or arguments.
The syntax for the MIN function is: =MIN ( argument1, argument2, …
argument30 )
Argument1 ... argument 30: Arguments can be numbers, named ranges, arrays,
or cell references. Up to 30 arguments can be entered.
PRODUCT Function
The syntax for the PRODUCT function is: =PRODUCT( Number1, Number2,
… Number255 )
92
COUNT Function
Excel's COUNT function is one of a group of Count Functions that can be used
when you need to total the number of cells in a selected range. The COUNT
function's job is to only add up the cells in a selected range that contain
numbers. It ignores empty cells or those contain text. If a number is later added
to an empty cell the function will be automatically updated to include this new
data.
Be aware that dates, times, functions, and formulas are stored as numbers in
Excel. The COUNT function will, therefore, include any cells containing these
types of data in the total.
COUNTA Function
The syntax for the COUNTA function is: = COUNTA ( Value1, Value2, ...
Value255 )
93
Tip: Up to 255 values can be entered into the function.
COUNTBLANK Function
COUNTIF Function
94
The syntax for the COUNTIF function is: =COUNTIF ( Range, Criteria)
SUMIF Function
The SUMIF function is used to add up the values in cells in a selected range
that meet certain criteria.
The syntax for the SUMIF function is: = SUMIF (Range, Criteria, Sum Range)
• Sum Range - the data range that is summed if the first range meets the
specified criteria. If this range is omitted, the first range is summed
instead
Excel's VLOOKUP function, which stands for vertical lookup, is used to find
specific information that has been stored in a spreadsheet table. Note: The data
in the table should be sorted in ascending order (alphabetically A to Z).
95
The syntax for the VLOOKUP function is: = VLOOKUP ( lookup_value ,
table_array , col_index_num, range_lookup ).
• lookup _value: The value you want to find in the first column of the
table_array.
• table_array: This is the table of data that VLOOKUP searches to find the
information you are after.
The table_array must contain at least two columns of data. The first column
contains the lookup_values.
TRANSPOSE Function
• Array - the range of cells to be copied from the horizontal to the vertical
or vertical to the horizontal.
96
The curly braces " { } " surrounding the function indicate that it is an array
function.
The NETWORKDAYS function, one of Excel's Date and Time functions, can
be used to count the number of working days between two dates - such as the
start and end dates for a project. The function automatically removes weekend
days from the total. Specific holidays can also be omitted.
• Holidays - can be used to exclude one or more dates from the total
number of working days (optional).
The DAYS360 function, one of Excel's Date and Time functions, can be used
in accounting systems to calculate the number of days between two dates based
on a 360-day year (twelve 30-day months).
97
The syntax for the DAYS360 function is: = DAYS360 ( Start_date , End_date ,
Method )
• If TRUE -- the function uses the U.S. method of calculating start and end
dates.
WORKDAY Function
The WORKDAY function can be used to calculate the end date or start date of
a project for a given number of business days. The number of business days
cannot include weekend days. Specific holidays can also be omitted.
The syntax for the WORKDAY function is: = WORKDAY ( Start_date , Days ,
Holidays )
• Days - the number of days work on the project occurred after the
Start_date.
98
• Holidays - can be used to exclude one or more dates from the total
number of working days (optional).
NOW Function
The NOW function, one of Excel's date and time functions, is used to add the
current time and date to a spreadsheet.
5 Excel can perform both simple and complex calculations, filter data from
a database or spreadsheet list and chart data in a wide range of formats;
99
6 The grid encasing the cells in the spreadsheet can either be visible or
hidden in print outs, enabling reports to be formatted from the display of
the spreadsheet.
8 “What If” Analysis - allow you to change one or more value, view the
results, before the final decision is made on keeping (saving) the
spreadsheet
100
5. The results depend on how good the model is and how much data was
used to create it in the first place.
101
CHAPTER FIVE: COMPUTER NETWORKING
5.1 Introduction
When two or more objects of same kind join together to work in co-ordination
with each other, they form a network. For example, when many marketing
persons unite together to sell a product, they form a marketing network.
Similarly, when two or more computers connected together with the objective
communicating with each other and sharing their resources, they form a
computer network.
Refer to the figure 5.1 above and note that in this network, four computers are
connected together to form a computer network. In this network, any computer
can communicate with any other computer. For example, computer-1 can send
message to computer-4 and computer-4 can replay back. Similarly, computer -2
and computer-4 can exchange data among them. In computer network,
computers share their resources among them. For example, computer- 3 can
102
print its documents on the printer that is attached to computer-4. Similarly
computer- 1, computer -3 and computer-4 can store their data on computer- 2's
disk.
103
Local Area Network, as the name suggests, is a network built in a limited area
by using LAN cables, switches and LAN cards. One example is a network of a
university or a business office at one location. The computers on a Local Area
Network are connected to a network switch. You can either make this network
a workgroup (share limited resources) or domain (share all kind of resources
and services). On domain, you have the privilege to grant permissions to users
to share resources or limit them to use certain services. As LAN can only work
within a certain distance, we need WAN to connect institutions and offices at
different locations.
LANs are used in many offices, schools, colleges and hospitals. Because of the
short distances involved they are typically (though not necessarily) faster than
WANs in that it is cheap to use high quality communications media such as
coaxial cable and optical fibre. They can carry data at very high speeds e.g.
from 10 Mbps to 100 Mbps being very common speeds, while speeds of up to
1000 Mbps are possible.
105
Unique user ID's control access to the files and settings on the network
while passwords prevent unauthorized users from logging onto the
network. Data may also have to be encrypted so that it is meaningless if
intercepted.
• If the server fails, all the workstations are affected. Work stored on shared
hard disk drives will not be accessible and it will not be possible to use
network printers either.
• The cost of installing the equipment is greater. Cabling can be expensive
to buy and to install.
• Damage to cables can isolate computers. Some sections of the network
can become isolated and will not be able to communicate with the rest of
the network.
• Because networks can be complicated to maintain, a network manager
may be need to be employed to run the system.
106
example, when computers of different localities, cities, states or countries are
connected together, they form Wide Area Network.
There are many ways to build a Wide area network. You can either lay down
your own cables between two or more locations or you can use leased lines.
Most companies use leased lines as very limited companies can bear the cost of
thousands dollars for it.
Advantages of WANs:
• These are similar to those of LAN's except the scale of sharing etc.
becomes far greater and can be world-wide.
Disadvantages of WANs:
• Again these are similar to those of LAN's except that issues such as
security become even more important as potential hackers could break
into a computer system from anywhere in the world rather than having to
physically be in a building.
• Encryption of secure data such as financial transactions is necessary
because it is even easier to intercept data.
107
if one crashes, users can still access their data and the network services. This is
a decentralised computing system whereby users can avail of local processing
on their own machines as well as the shared services of the network.
A good example is a LAN with a file server. The users store files access
software on the file server, but use their own PCs for processing. Dedicated
servers may also be used for email or for printing: mail servers and print
servers.
Initially the size of Internet was small; it was limited to few geographical
locations only. But soon, people become aware of its utility and advantages.
Within short span of time, numerous computers and networks got themselves
connected to Internet. Its size increased multi fold within few years of its birth.
Today Internet comprises of many million computers. There is hardly any
country of the world and important city of the country, where Internet is not
there. A conceptual diagram of Internet is given in figure 11.2.
109
Figure 8.2 Conceptual for the internet
Internet is basically a large computer network, which extends all across the
globe. In Internet, millions of computers remain connected together through
well-laid communication system. Recall that telephone communication system
is well-defined, time proven system. Computers of Internet are connected to
each other through this system. Thus like a telephone, any computer of any city
can establish a connection with any other computer of any other city and
exchange data or messages with it.
110
Web Servers
Those computers of Internet, which provide information or services to other
computers, are called web servers. For example, if a computer in an
organization named Hotmail provides electronic mail services to Internet users
then that computer will be categorized as web server.
Web Clients
Those computers of Internet, which take information or services from web
servers, are called web clients. For example, if you make use of Hotmail's web
server to send electronic mail to your friends or relatives then your computer
will be termed as web client. Since web clients interact with web servers on
one-to-one basis and that too when service/information is required hence they
possess following characteristics:
1. They need not be very fast computer.
2. They need not have large memory and disk space as servers have.
111
3. They get connected to Internet, when they need information/service from
it. After taking it, they disconnect from Internet.
4. They generally make use of slow connection like telephone lines, to get
connected to Internet.
112
Domain name comprises of two or more strings of characters separated by dots
(.). First string of characters is called domain name. It identifies the name of the
web site, For example, in suanet.ac.tz, suanet identifies the name of the web
site. Second string of characters identifies the nature of the web site. For
example in hotmail.com, com indicates that it is commercial web site. Standard
strings that are used at second place in the domain name are as follows:
113
graphics, sound, animation video and hyper links in it.
A web site may consist of interlinked multiple web pages. When
you access a web site, its first page gets displayed on your
computer. Since web pages of a web site remain interlinked
through hyperlinks hence you can always access other web
pages, after accessing the first web page.
Hyperlink
When a link between two objects, is maintained in such a way
that when you click the mouse on first object, second object gets
displayed then such a link is called hyperlink.
Hypertext
The text that remains linked to other objects like text, graphics,
audio etc. through hyperlink is called hypertext.
Web Browser
The software, using which you traverse over Internet and access
web sites, is called web browser. Internet Explorer, Netscape,
Mozila, google chrome, etc. are few famous web browsers. Most
of the Internet operations are done, using web browser.
114
availed by visiting the web site Now the questions is, there are millions of web
sites on Internet so how do you come to know, which information is available
on which site and what is its domain name? Well, Internet itself provides
solution for this problem. There are certain web sites, which provide search
facility for searching the content on Internet. For example, yahoo.com is a web
site, which provides search facility. To get the information on any desired
topic, perform following steps:
1. Enter the search term in text box. For example, if you wish to get the
information on "Examination Taking Techniques" enter this term (called,
search term) in the text box and click the mouse on "Search" button.
2. When you do so, a program called Search Engine will search its
information database and find the links to the information. Found links
will get displayed in the form of a list. In technical term, this list is called
"Hit List".
Title Meaning
Sender It signifies the name of the person who has sent the e-mail.
Subject This is the title of the letter, which gives an idea of the contents of
the letter.
Date It specifies the date, on which the e-mail was received.
Size It signifies the size of the mail in Kilobytes.
116
2. News group is very popular service of Internet, in which a person has to
become a member of a predefined group. Each group relates to a specific
topic like wind surfing, multimedia, physics, video gaming, vintage cars
etc. Members of the group exchange information, news, problems,
solutions etc. among them.
Due to the categorization of group, likeminded people become the
member of the group. This keeps the discussion inline and helps members
in seeking solutions for their questions and problem from other group
members.
3. These are various web sites on Internet, which provide electronic greeting
cards for all occasions and all reasons. These cards are generally very
colorful, attractive and often animated. People access these web sites and
send card to their friends and relatives.
4. There are various web sites on Internet, which provide facility for reading
newspapers, magazines and articles on Internet.
5. Astrological web sites of Internet provide horoscope, future predictions
and suggestions to the visitors, who visit the web site.
6. There are various web sites on Internet, which provide job opportunities
to the persons seeking job. They also help employers in searching the
right candidate.
7. Music, songs and radio can also be enjoyed over Internet.
8. There are various web sites, which sell different kinds of products. These
web sites can be visited and products can be purchased from there. These
117
web sites are often referred to as e-mall. Payment for the purchased items
is made on-line through credit cards.
9. Numerous, free and paid computer games are available on Internet. They
can be downloaded and played.
10. Advance booking in hotels, trains, aero planes etc. can be done
through Internet.
119
CHAPTER SIX: COMPUTER VIRUSES
6.1 Background
Traditional computer viruses we`re first widely seen in the late 1980s, and they
came about because of several factors. The first factor was the spread of
personal computers (PCs). Prior to the 1980s, home computers were nearly
non-existent or they were toys. Real computers were rare, and they were locked
away for use by "experts." During the 1980s, real computers started to spread
to businesses and homes because of the popularity of the IBM PC (released in
1982) and the Apple Macintosh (released in 1984). By the late 1980s, PCs were
widespread in businesses, homes and college campuses.
The second factor was the use of computer bulletin boards. People could dial
up a bulletin board with a modem and download programs of all types. Games
were extremely popular, and so were simple word processors, spreadsheets, etc.
Bulletin boards led to the precursor of the virus known as the Trojan horse. A
Trojan horse is a program that sounds really cool when you read about it. So
you download it. When you run the program, however, it does something
which is not cool like erasing your disk. So you think you are getting a neat
game but it wipes out your system. Trojan horses only hit a small number of
people because they are discovered quickly. Either the bulletin board owner
would erase the file from the system or people would send out messages to
warn one another.
The third factor that led to the creation of viruses was the floppy disk. In the
1980s, programs were small, and you could fit the operating system, a word
120
processor (plus several other programs) and some documents onto a floppy
disk or two. Many computers did not have hard disks, so you would turn on
your machine and it would load the operating system and everything else off of
the floppy disk.
Viruses took advantage of these three facts to create the first self-replicating
programs.
6.2 Origins
People create viruses. A person has to write the code, test it to make sure it
spreads properly and then release the virus. A person also designs the virus's
attack phase, whether it's a silly message or destruction of a hard disk. So why
do people do it?
There are at least three reasons. The first is the same psychology that drives
vandals and arsonists. Why would someone want to bust the window on
someone else's car, or spray-paint signs on buildings or burn down a beautiful
forest? For some people that seems to be a thrill. If that sort of person happens
to know computer programming, then he or she may funnel energy into the
creation of destructive viruses.
The second reason has to do with the adventure of watching things blow up.
Many people have a interest with things like explosions and car wrecks. When
you were growing up, there was probably a kid in your neighborhood who
learned how to make gunpowder and then built bigger and bigger bombs until
he either got bored or did some serious damage to himself. Creating a virus that
121
spreads quickly is a little like that -- it creates a bomb inside a computer, and
the more computers that get infected the more "fun" the explosion.
The third reason probably involves bragging rights, or the thrill of doing it. Sort
of like Mount Everest. The mountain is there, so someone is compelled to
climb it. If you are a certain type of programmer and you see a security hole
that could be exploited, you might simply be compelled to exploit the hole
yourself before someone else beats you to it. "Sure, I could TELL someone
about the hole. But wouldn't it be better to SHOW them the hole???" That sort
of logic leads to many viruses.
Of course, most virus creators seem to miss the point that they cause real
damage to real people with their creations. Destroying everything on a person's
hard disk is real damage. Forcing the people inside a large company to waste
thousands of hours cleaning up after a virus is real damage. Even a silly
message is real damage because a person then has to waste time getting rid of
it. For this reason, the legal system is getting much harsher in punishing the
people who create viruses.
6.3 Introduction
Computer viruses tend to grab our attention. On the one hand, viruses show us
how vulnerable we are. A properly engineered virus can have an amazing
effect on the worldwide Internet. On the other hand, they show how
sophisticated and interconnected human beings have become. There are two
key aspects of a virus:
122
4. They are self executing. Typically, a virus will attach itself to another
program on your computer, so that it is activated when that program is
used.
For example, experts estimate that the Mydoom worm infected approximately
a quarter-million computers in a single day in January 2004. Back in March
1999, the Melissa virus was so powerful that it forced Microsoft and a number
of other very large companies to completely turn off their e-mail systems until
the virus could be contained. The ILOVEYOU virus in 2000 had a similarly
devastating effect. That is impressive when you consider that the Melissa and
ILOVEYOU viruses are incredibly simple.
When you listen to the news, you hear about many different forms of electronic
infection. The most common are:
123
20. Viruses - A virus is a small piece of software that piggybacks on
real programs. For example, a virus might attach itself to a program such
as a spreadsheet program. Each time the spreadsheet program runs, the
virus runs, too, and it has the chance to reproduce (by attaching to other
programs) or wreak havoc.
6.4.1 Viruses
Computer viruses are called viruses because they share some of the traits of
biological viruses. A computer virus passes from computer to computer like a
biological virus passes from person to person.
Although there are a large number of viruses, they fall into three main types:
File viruses normally affect program files and are usually transferred
by disk, file transfer or e-mail attachments
Boot sector viruses infect parts of your computer that are used when it
starts up, typically the floppy disc and the hard disc. In doing so, the
very act of starting a PC will activate the virus.
125
6.4.2 Worm
A worm is a computer program that has the ability to copy itself from machine
to machine. Worms normally move around and infect other machines through
computer networks. Worms are often used to drain computer resources such as
memory and network access, simply by replicating on a large scale. In addition,
worms sometimes delete data and spread rapidly via e-mail. Using a network, a
worm can expand from a single copy incredibly quickly. For example, the
Code Red worm replicated itself over 250,000 times in approximately nine
hours on July 19, 2001.
A worm usually exploits some sort of security hole in a piece of software or the
operating system. For example, the Slammer worm (which caused mayhem in
January 2003) exploited a hole in Microsoft's SQL server.
The critical difference between a Trojan horse and a virus is that a Trojan horse
cannot replicate itself. The only way that a Trojan horse can spread is if you
help it. For example, saving the program from an e-mail attachment, or
downloading it from the Internet.
Just because Trojan horse programs are not self-replicating, it does not mean
that they are less destructive than a virus. Some common features of Trojan
horse programs include:
126
f. Making configuration changes
The latest thing in the world of computer viruses is the e-mail virus, and the
Melissa virus in March 1999 was spectacular. Melissa spread in Microsoft
Word documents sent via e-mail, and it worked like this:
The ILOVEYOU virus, which appeared on May 4, 2000, was even simpler. It
contained a piece of code as an attachment. People who double clicked on the
attachment allowed the code to execute. The code sent copies of itself to
everyone in the victim's address book and then started corrupting files on the
victim's machine. This is as simple as a virus can get. It is really more of a
Trojan horse distributed by e-mail than it is a virus.
127
6.5 An Ounce of Prevention
Computer viruses implant instructions in other programs or storage devices and
can attack, scramble, or erase computer data. The danger of computer viruses
lies in their ability to replicate themselves and spread from system to system.
Few computing systems are immune to infection.
The following activities are among the most common ways of getting computer
viruses. Minimizing the frequency of these activities will reduce your risk of
getting a computer virus:
• Using your personal disk space (e.g., floppy disks, flash disks) with
public computers or other computers that are used by more than one
person
• Opening email attachments from people you don't know or without first
scanning them for viruses
128
6.6 Signs of a virus infection
129
software. Software manufacturers frequently release patches for such
holes.
4. Back up your files. Viruses are one more very good reason to always
back up your files.
Note: If you back up a file that is already infected with a virus, you can
re-infect your system by restoring files from the backup copies. Check
your backup files with virus scanning software before using them.
5. Keep your original application and system disks locked (or write-
protected). This will prevent the virus from spreading to your original
disks.
6. If you must insert one of your application disks into an unknown
computer, lock (write-protect) it first, and unlock your application disk
only after verifying that the machine is virus-free.
7. Check newly downloaded software thoroughly using reputable virus
detection software on a locked floppy disk for any signs of infection
before you copy it to a hard disk. This can also help protect you from
Trojan horse programs.
8. Quarantine infected systems. If you discover that a system is infected
with a virus, immediately isolate it from other systems. In other words,
disconnect it from any network it is on and don't allow anyone to move
files from it to another system. Once the system has been disinfected, you
can copy or move files.
2. You should make sure that Macro Virus Protection is enabled in all
Microsoft applications, and you should NEVER run macros in a document
130
unless you know what they do. There is seldom a good reason to add
macros to a document, so avoiding all macros is a great policy.
Select the Macro option under Tool menu and click Security in
Microsoft Word and make sure that the High option is enabled, as shown.
• Besides viruses, what are other types of destructive programs are there?
• How are viruses transmitted?
• How has the influence of the online world (the Internet, networks,
bulletin board systems, and e-mail) affected the world of viruses?
• Will you get in trouble if you report a virus?
• What can viruses and other destructive software do to your system?
• How do you prevent viruses?
131
• How do you know if you have a virus?
• How do you stop a virus once you discover you have one?
• Why do people write viruses and other destructive software?
132