Paper 9
Paper 9
Course Material
1|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
Computer
The term ‘computer’ is derived from the word ‘compute’, which means to calculate. A computer is an
electronic machine, devised for performing calculations and controlling operations that can be expressed
either in logical or numerical terms.
Structure of Computer
All types of computers follow the same basic logical structure and perform the following five basic
operations for converting raw input data into information useful to their users.
Control the Directs the manner and sequence in which all of the above
5
workflow operations are performed.
2|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
Input Unit
This unit contains devices with the help of which we enter data into the computer. This unit creates a link
between the user and the computer. The input devices translate the information into a form
understandable by the computer. Ex. Keyboard, scanner, camera, bar code reader, and etc.
1. Arithmetic Section
2. Logic Section
1. Arithmetic Section
Function of arithmetic section is to perform arithmetic operations like addition, subtraction, multiplication,
and division. All complex operations are done by making repetitive use of the above operations.
2. Logic Section
Function of logic section is to perform logic operations such as comparing, selecting, matching, and
merging of data.
Memory Unit
This unit can store instructions, data, and intermediate results. This unit supplies information to other units
of the computer when needed. It is also known as internal storage unit or the main memory or the primary
storage or Random Access Memory (RAM).
Its size affects speed, power, and capability. Primary memory and secondary memory are two types of
memories in the computer. Functions of the memory unit are −
It stores all the data and the instructions required for processing.
It stores intermediate results of processing.
It stores the final results of processing before these results are released to an output device.
All inputs and outputs are transmitted through the main memory.
Control Unit
This unit controls the operations of all parts of the computer but does not carry out any actual data
processing operations.
3|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
It is responsible for controlling the transfer of data and instructions among other units of a
computer.
It manages and coordinates all the units of the computer.
It obtains the instructions from the memory, interprets them, and directs the operation of the
computer.
It communicates with Input/output devices for transfer of data or results from storage.
It does not process or store data.
Output Unit
The output unit consists of devices with the help of which we get the information from the computer. This
unit is a link between the computer and the users. Output devices translate the computer's output into a
form understandable by the users. Ex. Monitor, printer, audio box, etc.
Applications of Computer
1. Business
A computer has high speed of calculation, diligence, accuracy, reliability, or versatility which has made it an
integrated part in all business organizations.
Computer is used in business organizations for −
Payroll calculations
Budgeting
Sales analysis
Financial forecasting
Managing employee database
Maintenance of stocks, etc.
2. Banking
Today, banking is almost totally dependent on computers. Banks provide the following facilities −
Online accounting facility, which includes checking current balance, making deposits and overdrafts,
checking interest charges, shares, and trustee records.
ATM machines which are completely automated are making it even easier for customers to deal
with banks.
3. Insurance
Insurance companies are keeping all records up-to-date with the help of computers. Insurance companies,
finance houses, and stock broking firms are widely using computers for their concerns.
Insurance companies are maintaining a database of all clients with information showing −
Procedure to continue with policies
Starting date of the policies
Next due installment of a policy
Maturity date
4|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
Interests due
Survival benefits
4. Education
The computer helps in providing a lot of facilities in the education system.
The computer provides a tool in the education system known as CBE (Computer Based Education).
CBE involves control, delivery, and evaluation of learning.
Computer education is rapidly increasing the graph of number of computer students.
There are a number of methods in which educational institutions can use a computer to educate the
students.
It is used to prepare a database about performance of a student and analysis is carried out on this
basis.
5. Marketing
In marketing, uses of the computer are following −
Advertising − With computers, adver sing professionals create art and graphics, write and revise
copy, and print and disseminate ads with the goal of selling more products.
Home Shopping − Home shopping has been made possible through the use of computerized
catalogues that provide access to product information and permit direct entry of orders to be filled
by the customers.
6. Healthcare
Computers have become an important part in hospitals, labs, and dispensaries. They are being used in
hospitals to keep the record of patients and medicines. It is also used in scanning and diagnosing different
diseases. ECG, EEG, ultrasounds and CT scans, etc. are also done by computerized machines.
Following are some major fields of health care in which computers are used.
Diagnostic System − Computers are used to collect data and iden fy the cause of illness.
Lab-diagnostic System − All tests can be done and the reports are prepared by computer.
Patient Monitoring System − These are used to check the pa ent's signs for abnormality such as in
Cardiac Arrest, ECG, etc.
Pharma Information System − Computer is used to check drug labels, expiry dates, harmful side
effects, etc.
Surgery − Nowadays, computers are also used in performing surgery.
7. Engineering Design
Computers are widely used for Engineering purpose. One of the major areas is CAD (Computer Aided
Design) that provides creation and modification of images. Some of the fields are −
Structural Engineering − Requires stress and strain analysis for design of ships, buildings, budgets,
airplanes, etc.
Industrial Engineering − Computers deal with design, implementa on, and improvement of
integrated systems of people, materials, and equipment.
Architectural Engineering − Computers help in planning towns, designing buildings, determining a
range of buildings on a site using both 2D and 3D drawings.
5|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
8. Military
Computers are largely used in defence. Modern tanks, missiles, weapons, etc. Military also employs
computerized control systems. Some military areas where a computer has been used are −
Missile Control
Military Communication
Military Operation and Planning
Smart Weapons
9. Communication
Communication is a way to convey a message, an idea, a picture, or speech that is received and
understood clearly and correctly by the person for whom it is meant. Some main areas in this category are
E-mail
Chatting
Usenet
FTP
Telnet
Video-conferencing
10. Government
Computers play an important role in government services. Some major fields in this category are −
Budgets
Sales tax department
Income tax department
Computation of male/female ratio
Computerization of voters lists
Computerization of PAN card
Weather forecasting
ADVANTAGES OF COMPUTER
Compared to traditional systems, computers offer many advantages. This is one reason that traditional
systems are being replaced rapidly by computer-based Systems. The main advantages offered by computers
are as follows:
• High Accuracy
• Superior Speed of Operation
• Large Storage Capacity
• User-friendly Features
• Portability
• Platform independence
• Economical in the long term
6|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
TYPES OF COMPUTER
Computers are classified in a variety of ways depending upon the principles of working, construction, size
and applications. Various types of computers are
ANALOG COMPUTERS and DIGITAL COMPUTER
ANALOG COMPUTERS
The computers that process analog signals are known as Analog Computers. The
analog signal is a continuous signal. For example, sine wave is an analog signal. The analog
quantities are based on decimal number systems. Examples of Analog computers are the
slide rule, ABACUS etc.
DIGITAL COMPUTER
Computers that process digital signals are known as Digital Computers. The Digital signal is a discrete signal
with two states 0 and 1. In practice, the digital computers are used and not analog. Examples of digital
computers are personal computers, supercomputers, mainframe computers etc.
Supercomputers Are the most powerful computers in terms of speed of execution and large storage
capacity. NASA uses supercomputers to track and control space explorations.
Mainframe Computers Are next to supercomputers in terms of capacity. The mainframe computers
are multi terminal computers, which can be shared simultaneously by multiple users. Unlike
personal computers, mainframe computers offer time-sharing. For example, insurance companies
use mainframe computers to process information about millions of its policyholders.
Minicomputers These computers are also known as midrange computers. These are desk-sized
machines and are used in medium scale applications. For example, production departments use
minicomputers to monitor various manufacturing processes and assembly-line operations.
Personal Computer PC is the term referred to the computer that is designed for use by a single
person. PCs are also called microcontrollers because these are smaller when compared to
mainframes and minicomputers. The term ‘PC’ is frequently used to refer to desktop computers.
Although PCs are used by individuals, they can also be used in computer networks.
Desktop Computer This is the most commonly used personal computer. It comprises of a keyboard,
mouse, monitor and system unit. The system unit is also known as cabinet or chassis. It is the
container that houses most of the components such as motherboard, disk drives, ports, switch mode
power supply and add-on cards etc. The desktop computers are available in two models- horizontal
model and tower model.
Laptops Are also called notebook computers. These are the portable computers. They have a size of
8.5 x 11 inch and weigh about three-to-four kilos.
7|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
Palmtops Palmtops are also called handheld computers. These are computing devices, which are
small enough to fit into your palm. The size of a palmtop is like an appointment book. The palmtops
are generally kept for personal use such as taking notes, developing a list of friends, keeping track of
dates, agendas etc. The Palmtop can also be connected to a PC for downloading data. It also
provides value-added features such as voice input, Internet, cell phone, camera, movie player and
GPS.
Personal Digital Assistant (PDA) is the palm type computer. It combines pen input, writing
recognition, personal organizational tools and communication capabilities in a small package.
First Generation
The first generation computers were bulky in size. They were able to execute hundreds of instructions per
second and were expensive as well. They used vacuum tubes as their main components. Machine language
is a first generation language, for example EDVAC, UNIVAC etc.
Second Generation
The second-generation computers were smaller in size as compared to the first generation computers.
These were capable of executing thousands of instructions per second, with a transistor as its main
component. Assembly language is the second generation language in which programs were written using
mnemonic codes, for example, PDP (Programmed data processor), PDP1 etc.
Third Generation
The third generation computers were more advanced and used integrated circuits. These computers
contained thousands of components per circuit. They were cheaper than second-generation computers.
The languages used in this generation were BASIC, COBOL etc. for example, IBM 307 Series, PDP II etc.
Fourth Generation
The fourth generation computers used complex circuits like the large-scale integrated circuits called
microprocessors or chips, which surprisingly cost less than the third generation computers. These
computers were able to execute millions of instructions per second. The languages used in this generation
are C++, SQL etc. for example, CRAY 2, IBM 3090/600 Series.
Fifth Generation
These computers work on artificial languages (AI) like LISP, PROLOG etc. They use super/ultra large-scale
integrated circuits, which is also called parallel processing method. They execute billions of instructions per
second, for example, Laptops, Palmtops, PDA (Personal Digital Assistant) etc.
8|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
Input and Output Device
Input Device
Following are some of the important input devices which are used in a computer −
Keyboard
Mouse
Joy Stick
Light pen
Track Ball
Scanner
Graphic Tablet
Microphone
Magnetic Ink Card Reader(MICR)
Optical Character Reader(OCR)
Bar Code Reader
Optical Mark Reader(OMR)
Keyboard
Keyboard is the most common and very popular input device which helps to input data to
the computer. The layout of the keyboard is like that of traditional typewriter, although
there are some additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or
108 keys are also available for Windows and Internet.
The keys on the keyboard are as follows −
S.No Keys & Description
Typing Keys
1 These keys include the letter keys (A-Z) and digit keys (09) which generally give the
same layout as that of typewriters.
Numeric Keypad
It is used to enter the numeric data or cursor movement. Generally, it consists of a
2
set of 17 keys that are laid out in the same configuration used by most adding
machines and calculators.
Function Keys
The twelve function keys are present on the keyboard which are arranged in a row
3
at the top of the keyboard. Each function key has a unique meaning and is used for
some specific purpose.
Control keys
These keys provide cursor and screen control. It includes four directional arrow
4
keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down,
Control(Ctrl), Alternate(Alt), Escape(Esc).
9|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
Mouse
Mouse is the most popular pointing device. It is a very famous cursor-control device
having a small palm size box with a round ball at its base, which senses the movement of
the mouse and sends corresponding signals to the CPU when the mouse buttons are
pressed. Generally, it has two buttons called the left and the right button and a wheel is
present between the buttons. A mouse can be used to control the position of the
cursor on the screen, but it cannot be used to enter text into the computer.
Joystick
Joystick is also a pointing device, which is used to move the cursor position on a monitor
screen. It is a stick having a spherical ball at its both lower and upper ends. The lower
spherical ball moves in a socket. The joystick can be moved in all four directions.
The function of the joystick is similar to that of a mouse. It is mainly used in Computer Aided
Designing (CAD) and playing computer games.
Light Pen
Light pen is a pointing device similar to a pen. It is used to select a displayed menu item or
draw pictures on the monitor screen. It consists of a photocell and an optical system
placed in a small tube. When the tip of a light pen is moved over the monitor screen and
the pen button is pressed, its photocell sensing element detects the screen location and
sends the corresponding signal to the CPU.
Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer, instead of
a mouse. This is a ball which is half inserted and by moving fingers on the ball, the pointer
can be moved. Since the whole device is not moved, a track ball requires less space than a
mouse. A track ball comes in various shapes like a ball, a button, or a square.
Scanner
Scanner is an input device, which works more like a photocopy machine. It is used when
some information is available on paper and it is to be transferred to the hard disk of the
computer for further manipulation. Scanner captures images from the source which are
then converted into a digital form that can be stored on the disk. These images can be
edited before they are printed.
Digitizer
Digitizer is an input device which converts analog information into digital form. Digitizer
can convert a signal from the television or camera into a series of numbers that could be
stored in a computer. They can be used by the computer to create a picture of whatever
the camera had been pointed at. Digitizer is also known as Tablet or Graphics Tablet as it
converts graphics and pictorial data into binary inputs. A graphic tablet as digitizer is
used for fine works of drawing and image manipulation applications.
Microphone
Microphone is an input device to input sound that is then stored in a digital form.The
microphone is used for various applications such as adding sound to a multimedia
presentation or for mixing music.
Output Device
Following are some of the important output devices used in a computer.
Monitors
Printer
Monitors
Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer. It forms
images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the image
depends upon the number of pixels.
There are two kinds of viewing screen used for monitors.
Cathode-Ray Tube (CRT)
Flat-Panel Display
11 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Flat-Panel Display Monitor
The flat-panel display refers to a class of video devices that have reduced volume, weight
and power requirement in comparison to the CRT. You can hang them on walls or wear
them on your wrists. Current uses of flat-panel displays include calculators, video games,
monitors, laptop computer, and graphics display.
Printers
Printer is an output device, which is used to print information on paper. There are two types of printers −
1. Impact Printers
2. Non-Impact Printers
1. Impact Printers
Impact printers print the characters by striking them on the ribbon, which is then pressed on the paper.
Characteristics of Impact Printers are the following −
Very low consumable costs
Very noisy
Useful for bulk printing due to low cost
There is physical contact with the paper to produce an image
Advantages
Inexpensive
Widely Used
Other language characters can be printed
Disadvantages
Slow Speed
Poor Quality
ii. Daisy Wheel
Head is lying on a wheel and pins corresponding to characters are like petals of Daisy
(flower) which is why it is called Daisy Wheel Printer. These printers are generally
used for word-processing in offices that require a few letters to be sent here and
there with very nice quality.
Advantages
More reliable than DMP
Better quality
12 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Fonts of character can be easily changed
Disadvantages
Slower than DMP
Noisy
More expensive than DMP
b. Line Printers
Line printers are the printers which print one line at a time. These are of two types −
i. Drum Printer
ii. Chain Printer
i. Drum Printer
This printer is like a drum in shape hence it is called drum printer. The surface of the drum is divided into a
number of tracks. Total tracks are equal to the size of the paper, i.e. for a paper width of 132 characters,
drum will have 132 tracks. A character set is embossed on the track. Different character sets available in the
market are 48 character set, 64 and 96 characters set. One rotation of drum prints one line. Drum printers
are fast in speed and can print 300 to 2000 lines per minute.
Advantages
Very high speed
Disadvantages
Very expensive
Characters fonts cannot be changed
ii. Chain Printer
In this printer, a chain of character sets is used, hence it is called Chain Printer. A standard character set
may have 48, 64, or 96 characters.
Advantages
Character fonts can easily be changed.
Different languages can be used with the same printer.
Disadvantages
Noisy
2. Non-impact Printers
Non-impact printers print the characters without using the ribbon. These printers print a complete page at a
time, thus they are also called as Page Printers.
Chain printers are of two types −
a. Laser Printers
b. Inkjet Printers
Characteristics of Non-impact Printers
Faster than impact printers
They are not noisy
High quality
Supports many fonts and different character size
a. Laser Printers
These are non-impact page printers. They use laser lights to produce the dots needed to
form the characters to be printed on a page.
Advantages
Very high speed
13 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Very high quality output
Good graphics quality
Supports many fonts and different character size
Disadvantages
Expensive
Cannot be used to produce multiple copies of a document in a single printing
Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new technology.
They print characters by spraying small drops of ink onto paper. Inkjet printers produce
high quality output with presentable features. They make less noise because no
hammering is done and these have many styles of printing modes available. Color
printing is also possible. Some models of Inkjet printers can produce multiple copies of
printing also.
Advantages
High quality printing
More reliable
Disadvantages
Expensive as the cost per page is high
Slow as compared to laser printer
Computer - Memory
A memory is just like a human brain. It is used to store data and instructions. Computer memory is the
storage space in the computer, where data is to be processed and instructions required for processing are
stored. The memory is divided into large number of small parts called cells. Each location or cell has a
unique address, which varies from zero to memory size minus one. For example, if the computer has 64k
words, then this memory unit has 64 * 1024 = 65536 memory locations. The address of these locations
varies from 0 to 65535.
Memory is primarily of three types −
Cache Memory
Primary Memory/Main Memory
Secondary Memory
Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up the
CPU. It acts as a buffer between the CPU and the main memory. It is used to hold those
parts of data and program which are most frequently used by the CPU. The parts of
data and programs are transferred from the disk to cache memory by the operating
system, from where the CPU can access them.
Advantages
The advantages of cache memory are as follows −
Cache memory is faster than main memory.
It consumes less access time as compared to main memory.
It stores the program that can be executed within a short period of time.
It stores data for temporary use.
Disadvantages
Cache memory has limited capacity.
14 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
It is very expensive.
Computer – Hardware
Hardware represents the physical and tangible components of a computer, i.e. the
components that can be seen and touched. Examples of Hardware are the following −
Input devices − keyboard, mouse, etc.
Output devices − printer, monitor, etc.
Secondary storage devices − Hard disk, CD, DVD, etc.
Internal components − CPU, motherboard, RAM, etc.
Computer – Software
Software is a set of programs, which is designed to perform a well-defined function. A program is a
sequence of instructions written to solve a particular problem. There are two types of software −
a. System Software
b. Application Software
15 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
a. System Software
The system software is a collection of programs designed to operate, control, and extend the processing
capabilities of the computer itself. System software is generally prepared by the computer manufacturers.
These software products comprise of programs written in low-level languages, which interact with the
hardware at a very basic level. System software serves as the interface between the hardware and the end
users. Some examples of system software are Operating System, Compilers, Interpreter, Assemblers, etc.
Here is a list of some of the most prominent features of a system software −
Fast in speed
Difficult to design
Difficult to understand
Less interactive
Smaller in size
Difficult to manipulate
Generally written in low-level language
b. Application Software
Application software products are designed to satisfy a particular need of a particular environment. All
software applications prepared in the computer lab can come under the category of Application software.
Application software may consist of a single program, such as Microsoft's notepad for writing and editing a
simple text. It may also consist of a collection of programs, often called a software package, which work
together to accomplish a task, such as a spreadsheet package.
Examples of Application software are the following −
Payroll Software
Student Record Software
Inventory Management Software
Income Tax Software
Railways Reservation Software
Microsoft Office Suite Software
Microsoft Word
Microsoft Excel
Microsoft PowerPoint
16 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Operating System
The Operating System is a program with the following features −
An operating system is a program that acts as an interface between the software and the computer
hardware. It is an integrated set of specialized programs used to manage overall resources and operations
of the computer. It is a specialized software that controls and monitors the execution of all other programs
that reside in the computer, including application programs and other system software.
Here is a list of some of the most prominent characteristic features of Operating Systems −
Memory Management − Keeps track of the primary memory, i.e. what part of it is in use by whom, what
part is not in use, etc. and allocates the memory when a process or program requests it.
Processor Management − Allocates the processor (CPU) to a process and deallocates the processor when it
is no longer required
.
Device Management − Keeps track of all the devices. This is also called I/O controller that decides which
process gets the device, when, and for how much time.
File Management − Allocates and de-allocates the resources and decides who gets the resources.
Security − Prevents unauthorized access to programs and data by means of passwords and other similar
techniques.
Job Accounting − Keeps track of me and resources used by various jobs and/or users.
Control Over System Performance − Records delays between the request for a service and from the system.
Interaction with the Operators − Interac on may take place via the console of the computer in the form of
instructions. The Operating System acknowledges the same, does the corresponding action, and informs the
operation by a display screen.
Error-detecting Aids − Produc on of dumps, traces, error messages, and other debugging and error-
detecting methods.
17 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Coordination Between Other Software and Users − Coordina on and assignment of compilers,
interpreters, assemblers, and other software to the various users of the computer systems.
19 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
5. Real-Time Operating System
These types of OSs serves the real-time systems. The time interval required to process and respond to
inputs is very small. This time interval is called response time. Real-time systems are used when there are
time requirements are very strict like missile systems, air traffic control systems, robots etc.
Two types of Real-Time Operating System which are as follows:
Maximum Consumption: Maximum utilization of devices and system, thus more output from resources
Task Shifting: Time assigned for shifting tasks in these systems are very less. For example in older systems it takes about
10 micro seconds in shifting one task to another and in latest systems it takes 3 micro seconds .
Focus on Application: Focus on running applications and less importance to applications which are in queue.
Real time operating system in embedded system: Since size of programs are small, RTOS can also use in embedded
Systems like in transport and others.
Error Free: These types of systems are error free.
Memory Allocation: Memory allocation is best managed in these types of systems.
Disadvantages of RTOS:
Limited Tasks: Very few task run at the same time and their concentration is very less on few applications to avoid errors.
Use heavy system resources: Sometimes the system resources are not so good and they are expensive as well.
Complex Algorithms: The algorithms are very complex and difficult for the designer to write on.
Device driver and interrupt signals: It needs specific device drivers and interrupts signals to response earliest to interrupts.
Thread Priority: It is not good to set thread priority as these systems are very less prone to switching tasks.
Examples of Real-Time Operating Systems are: Scientific experiments, medical imaging systems, industrial control systems,
Computer – Networking
Computer Network
A computer network is a system in which multiple computers are connected to each other to share information and resources.
Characteristics of a computer network
Share Resources from one computer to another.
Create files and store them in one computer.
Access those files from the other computer(s) connected over the network.
20 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
MAN:
MAN stands for Metropolitan Area Network. MAN occupies coverage in between LANs and WANs. MAN has distance coverage
and data rate higher than LAN, but less than WAN. This is the major difference between LAN and MAN. MAN overlaps to some
extent to geographical coverage requirement of WAN. A typical example of MAN is Local Cable TV system. Here cable TV
company picks up programs from satellite and delivers to individual homes via coaxial cable. Each home is a node in this network
of nodes.
WAN:
WAN stands for Wide Area Network. WAN has coverage larger than LAN and mainly used for cellular applications supporting both
voice and data applications. Larger network covering entire country or state is referred as WANs. Most WANs are telephone
systems. Various technologies are existing to support WAN such as WiMAX, GSM, CDMA, HSPA, LTE, fiber optics, ATM and more.
Covers distance upto 1000-10 kilo-meters and also goes upto 100km.
Following table compares LAN, MAN and WAN with respect to various networking parameters.
Metropolitan Area
Full Form Local Area Network Wide Area Network
Network
21 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Internet
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network
of networks in which users at any one computer can, if they have permission, get information from any
other computer (and sometimes talk directly to users at other computers). It was conceived by the
Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as
the ARPANet.
The Internet contains billions of web pages created by people and companies from around the world,
making it a limitless place to locate information and entertainment. The Internet also has thousands of
services that help make life more convenient. For example, many financial institutions offer online banking
that enables a user to manage and view their account online.
Internet: Applications
The Internet has many important applications. Of the various services available via the Internet, the
following are the areas where internet use:
1. Communication: It is used for sending and receiving message from one and other through internet by
using electronic mail. Some of the web sites providing this service are yahoomail.com Hotmail.com
rediffmail.com etc.
2. Job searches: Getting information regarding availability of job in different sectors and areas. You can
publish your resume in online for prospective job. Some of the web sites providing this service are
naukri.com, monster.com, summerjob.com, recuritmentindia.com etc.
3. Finding books and study material: Books and other study material stored around the world can be easily
located through internet. Latest encyclopedias are available online.
4. Health and medicine: Internet provides information and knowledge about field of health medicine people
can have information about various disease and can receive help .patient can be taken to virtual check room
where they can meet doctors. Some of the web sites providing this service are
5. Travel: One can use internet to gather information about various tourist place . it can be used for booking
Holiday tours , hotels, train and flights. Some of the web sites providing this service are indiatravelog.com,
rajtravel.com, makemytrip.com.
6. Entertainment: one can down load jokes, songs movies, latest sports updates through internet Some of
the web sites providing this service arecricinfo.com, movies.com espn.com
7. Shopping: Internet is also used for online shopping. By just giving accounts details you can perform the
transaction. You can even pay your bills and perform bank related transaction.
8. Stock market updates : You can sell or buy shares while sitting on computer through internet. Several
websites like ndtvprofit.com, moneypore.com, provide information regarding investment
22 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
9. Research: A large number of people are using internet for research purposes you can download any kind
information by using internet
Early ISPs provided Internet access through dial-up modems. This type of connection took place over regular
phone lines and was limited to 56 Kbps. In the late 1990s, ISPs began offering faster broadband Internet
access via DSL and cable modems. Some ISPs now offer high-speed fiber connections, which provide
Internet access through fiber optic cables. Companies like Comcast and Time Warner provide cable
connections while companies like AT&T and Verizon provide DSL Internet access.
2. An ISP (Internet service provider) is a company that provides individuals and other companies access to
the Internet and other related services such as Web site building. An ISP has the equipment and the
telecommunication line access required to have a point-of-presence on the Internet for the geographic area
served. The larger ISPs have their own high-speed leased lines so that they are less dependent on the
telecommunication providers and can provide better service to their customers. Among the largest national
ISPs are AT&T WorldNet, IBM Global Network, MCI, Netcom, UUNet, and PSINet.
ISPs also include regional providers such as Reliance Gio, Airtel, Bsnl etc. They also include thousands of
local providers.
An ISP is also sometimes referred to as an IAP (Internet access provider). ISP is sometimes used as an
abbreviation for independent service provider to distinguish a service provider that is an independent,
separate company from a telephone company.
Connecting to Internet
To connect to an ISP, you need a modem and an active account. When you connect a modem to the
telephone or cable outlet in your house, it communicates with your ISP. The ISP verifies your account and
assigns your modem an IP address. Once you have an IP address, you are connected to the Internet. You can
use a router (which may a separate device or built into the modem) to connect multiple devices to the
Internet. Since each device is routed through the same modem, they will all share the same public IP
address assigned by the ISP.
What is an IP Address
Internet Protocol Address (or IP Address) is an unique address that computing devices such as personal
computers, tablets, and smartphones use to identify itself and communicate with other devices in the IP
network. Any device connected to the IP network must have an unique IP address within the network. An IP
address is analogous to a street address or telephone number in that it is used to uniquely identify an
entity.
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer,
printer) participating in a computer network that uses the Internet Protocol for communication. An IP
23 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
address serves two principal functions: host or network interface identification and location addressing. Its
role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A
route indicates how to get there."
The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known
as Internet Protocol Version 4 (IPv4), is still in use today. However, because of the growth of the Internet
and the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address,
was developed in 1995.[3]IPv6 was standardized as RFC 2460 in 1998,[4] and its deployment has been
ongoing since the mid-2000s.
IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.1 (IPv4),
and 2001:db8:0:1234:0:567:8:1 (IPv6).
24 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Domain name
A domain name is a unique name that identifies a website. For example, the domain name of the Tech
Terms Computer Dictionary is "techterms.com." Each website has a domain name that serves as an address,
which is used to access the website.
Whenever you visit a website, the domain name appears in the address bar of the web browser. Some
domain names are preceded by "www" (which is not part of the domain name), while others omit the
"www" prefix. All domain names have a domain suffix, such as .com, .net, or .org. The domain suffix helps
identify the type of website the domain name represents. For example, ".com" domain names are typically
used by commercial website, while ".org" websites are often used by non-profit organizations. Some
domain names end with a country code, such as ".dk" (Denmark) or ".se" (Sweden), which helps identify the
location and audience of the website.
Domain names are relatively cheap to register, though they must be renewed every year or every few years.
The good news is that anyone can register a domain name, so you can purchase a unique domain name for
your blog or website. The bad news is that nearly all domain names with common words have already been
registered. Therefore, if you want to register a custom domain name, you may need to think of a creative
variation. Once you decide on a domain name and register it, the name is yours until you stop renewing it.
When the renewal period expires, the domain name becomes available for others to purchase.
NOTE: When you access a website, the domain name is actually translated to an IP address, which defines
the server where the website located. This translation is performed dynamically by a service called DNS.
25 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Web browser
A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and
traversing information resources on the World Wide Web. An information resource is identified by
a Uniform Resource Identifier (URI/URL) and may be a web page, image, video or other piece of content.
Hyperlinks present in resources enable users easily to navigate their browsers to related resources.
Although browsers are primarily intended to use the World Wide Web, they can also be used to access
information provided by web servers in private networks or files in file systems.
The major web browsers are Firefox, Google Chrome, Internet Explorer/Microsoft Edge, Opera, and Safari.
Firefox
Mozilla Firefox (or simply Firefox) is a free and open-source web browser developed by the Mozilla
Foundation and its subsidiary, the Mozilla Corporation. Firefox is available
for Windows, macOS and Linux operating systems, with its Firefox for Android available
for Android (formerly Firefox for mobile, it also ran on the discontinued Firefox OS); where all of these
versions use the Gecko layout engine to render web pages, which implements current and anticipated web
standards. An additional version, Firefox for iOS, was released in late 2015, but this version doesn't use
Gecko due to Apple's restrictions limiting third-party web browsers to the WebKit-based layout engine built
into iOS.
Google Chrome
Google Chrome is a freeware web browser developed by Google. It was first released in 2008, for Microsoft
Windows, and was later ported to Linux, macOS, iOS and Android. Google Chrome is also the main
component of Chrome OS, where it serves a platform for running web apps.
Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly
abbreviated IE or MSIE) is a discontinued series of graphical web browsers developed by Microsoft and
included as part of the Microsoft Windows line of operating systems, starting in 1995. It was first released
as part of the add-on package Plus! for Windows 95that year. Later versions were available as free
downloads, or in service packs, and included in the original equipment manufacturer (OEM) service releases
of Windows 95 and later versions of Windows.
26 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Google
Google is an American multinational technology company specializing in Internet-related services and
products that include online advertising technologies, search, cloud computing, software, and hardware..
Google was founded in 1996 by Larry Page and Sergey Brin while they were Ph.D. students at Stanford
University, California. Together, they own about 14 percent of its shares and control 56 percent of the
stockholder voting power through supervoting stock. They incorporated Google as a privately held company
on September 4, 1998. An initial public offering (IPO) took place on August 19, 2004, and Google moved to
its new headquarters in Mountain View, California, nicknamed the Googleplex.
Bing
Bing is a web search engine owned and operated by Microsoft. The service has its origins in Microsoft's
previous search engines: MSN Search, Windows Live Search and later Live Search. Bing provides a variety of
search services, including web, video, image and map search products. It uses the ASP.NET programming
language and follows the design principles of Microsoft's "Metro"design language.
Bing, Microsoft's replacement for Live Search, was unveiled by Microsoft CEO Steve Ballmer on May 28,
2009, at the All Things Digital conference in San Diego, California, for release on June 1, 2009. Notable new
features at the time included the listing of search suggestions while queries are entered and a list of related
searches (called "Explore pane") based on semantic technologyfrom Powerset, which Microsoft had
acquired in 2008.
Baidu
Baidu, Inc. (Chinese: 百度; pinyin: Bǎidù, anglicized /ˈbaɪduː/ "by-doo"), incorporated on January 18, 2000,
is a Chinese web services company headquartered at the Baidu Campus in Beijing's Haidian District.
Baidu offers many services, including a Chinese search engine for websites, audio files and images. Baidu
offers 57 search and community services including Baidu Baike (an online, collaboratively
built encyclopedia) and a searchable, keyword-based discussion forum. Baidu was established in 2000
by Robin Li and Eric Xu. Both of the co-founders are Chinese nationals who studied and worked overseas
before returning to China. In March 2015, Baidu ranked 4th overall in the Alexa Internet rankings.
Yahoo!
Yahoo Inc. (also known simply as Yahoo!, styled as YAHOO!) is an American multinational technology
company headquartered in Sunnyvale, California. Yahoo was founded by Jerry Yang and David Filo in
January 1994 and was incorporated on March 2, 1995. Yahoo was one of the pioneers of the early internet
era in the 1990s. Marissa Mayer, a former Google executive, serves as CEO and President of the company.
27 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
URL
URL stands for Uniform Resource Locator. A URL is nothing more than the address of a given unique resource
on the Web. In theory, each valid URL points to a unique resource. Such resources can be an HTML page, a
CSS document, an image, etc.
With Hypertext and HTTP, URL is one of the key concepts of the Web. It is the mechanism used by browsers
to retrieve any published resource on the web. Here is some examples of URLs:
https://www.google.com/
Any of those URLs can be typed into your browser's address bar to tell it to load the associated page
(resource).
A URL is composed of different parts, some mandatory and others optional. Let's see the most important parts
using the following URL:
http://www.example.com:80/path/to/myfile.html?key1=value1&key2=value2#SomewhereInTheDocument
http:// is the protocol. It indicates which protocol the browser must use. Usually it is the HTTP
protocol or its secured version, HTTPS. The Web requires one of these two, but browsers also know
how to handle other protocols such as mailto: (to open a mail client) or ftp: to handle file transfer, so
don't be surprised if you see such protocols.
www.example.com is the domain name. It indicates which Web server is being requested. Alternatively,
it is possible to directly use an IP address, but because it is less convenient, it is not often used on the
Web.
:80 is the port. It indicates the technical "gate" used to access the resources on the web server. It is
usually omitted if the web server use the standard ports of the HTTP protocol (80 for HTTP and 443 for
HTTPS) to grant access to its resources. Otherwise it is mandatory.
28 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
/path/to/myfile.html is the path to the resource on the Web server. In the early days of the Web, a
path like this represented a physical file location on the Web server. Nowadays, it is mostly an
abstraction handled by Web servers without any physical reality.
?key1=value1&key2=value2 are extra parameters provided to the Web server. Those parameters are a
list of key/value pairs separated with the & symbol. The Web server can use those parameters to do
extra stuff before returning the resource. Each Web server has its own rules regarding parameters, and
the only reliable way to know if a specific Web server is handling parameters is by asking the Web
server owner.
You might think of a URL like a regular postal mail address: the protocol represents the postal service you want
to use, the domain name is the city or town, and the port is like the zip code; the path represents the building
where your mail should be delivered; the parameters represent extra information such as the number of the
apartment in the building; and, finally, the anchor represents the actual person to whom you've addressed your
mail.
29 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
E-mail
E-mail is Short form of electronic mail. e-mail or email is information stored on a computer that is exchanged
between two users over telecommunications. More plainly, e-mail is a message that may
contain text, files, images, or other attachments sent through a network to a specified individual or group of
individuals. The first e-mail was sent by Ray Tomlinson in 1971. By 1996, more electronic mail was being sent
than postal mail.
The first portion all e-mail addresses, the part before the @ symbol, contains the alias, user, group, or
department of a company. In our above example support is the Technical Support department at
Computer Hope.
Next, the @ (at sign) is used as a divider in the e-mail address; it is required for all SMTP e-mail
addresses since the first message was sent by Ray Tomlinson.
Finally, computerhope.com is the domain name to which the user belongs.
30 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Writing an e-mail
When writing an e-mail message, it should look something like the example window below. As you can see,
several fields are required when sending an e-mail:
The To field is where you type the e-mail address of the person who is the recipient of your message.
The From field should contain your e-mail address.
If you are replying to a message, the To and From fields are automatically filled out; if it's a new message,
you'll need to enter them manually.
The CC or Carbon Copy field allows you to send a copy of the message to another e-mail address, but is
not mandatory.
The Subject Line, although not required, should consist of a few words describing the e-mail's contents.
Finally, the Message Body is the location you type your main message. It often contains
your signature at the bottom; similar to a hand-written letter.
31 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Website
A website, or Web site, is not the same thing as a Web page. Though the two terms are often used
interchangeably, they should not be. So what's the difference? To put it simply, a Web site is a collection of
Web pages. For example, Amazon.com is a Web site, but there are millions of Web pages that make up the
site. Knowing the difference between these two terms can save you a lot of embarrassment.
E-government
E-government (short for electronic government) is the use of electronic communications devices, computers and
the Internet to provide public services to citizens and other persons in a country or region. According to Jeong,
2007 the term consists of the digital interactions between a citizen and his or her government (C2G), between
governments and other government agencies (G2G), between government and citizens (G2C), between
government and employees (G2E), and between government and businesses/commerces (G2B). E-government
delivery models can be broken down into the following categories:[1] This interaction consists of citizens[clarification
needed]
communicating with all levels of government (city, state/province, national, and international), facilitating
citizen involvement in governance using information and communication technology (ICT) (such as computers
and websites) and business process re-engineering (BPR).
Advantages
The ultimate goal of the e-government is to be able to offer an increased portfolio of public services to citizens in
an efficient and cost effective manner. E-government allows for government transparency. Government
transparency is important because it allows the public to be informed about what the government is working on as
well as the policies they are trying to implement. Simple tasks may be easier to perform through electronic
government access. Many changes, such as marital status or address changes can be a long process and take a
lot of paper work for citizens. E-government allows these tasks to be performed efficiently with more convenience
to individuals. E-government is an easy way for the public to be more involved in political campaigns. It could
increase voter awareness, which could lead to an increase in citizen participation in elections. It is convenient and
cost-effective for businesses, and the public benefits by getting easy access to the most current information
available without having to spend time, energy and money to get it.
E-government helps simplify processes and makes government information more easily accessible for public
sector agencies and citizens. The anticipated benefits of e-government include efficiency, improved services,
better accessibility of public services, sustainable community development and more transparency and
accountability.
Disadvantages
The main disadvantages concerning e-government is the lack of equality in public access to computers and the
internet (the "digital divide", a reference to the fact that people who have low incomes, who are homeless and/or
who live in remote regions may have little or no access to the Internet), reliability of information on the web, and
issues that could influence and bias public opinions. There are many considerations and potential implications of
implementing and designing e-government, including disintermediation of the government and its citizens,
impacts on economic, social, and political factors, vulnerability to cyber-attacks, and disturbances to the status
quo in these areas.
32 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
To undo an action(CTRL+Z)
➜ On the Quick Access Toolbar, click the Undo button.
To Redo an action(CTRL+Y)
➜ On the Quick Access Toolbar, click the Redo button.
To find text(CTRL+F)
1. On the Home tab, in the Editing group, click the Find button.
2. On the Find tab of the Find and Replace dialog box, specify the text you want to
find, and then click Find Next.
To replace text(CTRL+H)
1. On the Home tab, in the Editing group, click the Replace button.
2. On the Replace tab of the Find and Replace dialog box, specify the text you want
to find and the text you want to replace it with, and then click Find Next.
3. Click Replace to replace the first instance of the text, Replace All to replace all instances,
34 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
1. On the Insert tab, in the Header & Footer group, click the Header or Footer button.
2. In the Header or Footer gallery, click the style you want to use.
3. In the placeholders, type the text you want.
4. On the Design contextual tab, in the Close group, click the Close Header and
Footer button.
To insert a table
1. Click where you want to insert the table. Then on the Insert tab, in the Tables
group, click the Table button.
2. In the grid, point to the upper-left cell, move the pointer across and down to select
the number of columns and rows you want, and click the lower-right cell in the
selection.
To draw a table
1. Click where you want to draw the table. Then on the Insert tab, in the Tables
group, click the Table button, and then click Draw Table.
2. Drag the pointer (which has become a pencil) across and down to create a cell.
3. Point to the upper-right corner of the cell, and drag to create another cell, or draw
column and row boundaries inside the first cell.
6 Working with Graphics, Symbols, and Equations
To insert a picture
1. Click where you want to insert the picture. Then on the Insert tab, in the Illustrations group, click the
Picture button.
2. Navigate to the folder where the picture is stored, and then double-click the picture
to insert it.
To insert a chart
35 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
1. On the Insert tab, in the Illustrations group, click Chart.
2. In the Insert Chart dialog box, click the category of chart you want, click the style you want, and then click
OK.
To remove a password
1. Click the Microsoft Office Button, click Save As, click Tools, and then click General
Options.
2. In the General Options dialog box, select the contents of the Password to open or
Password to modify box, press A, click OK, and then click Save.
36 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Microsoft office Excel 2007
1. Excelbasics:createanewfile
Open Microsoft Excel
With the mouse, go to the Excel menu bar and left-click the File menu
Within the File menu find and left-click New
There should now be a New Workbook pane on the right side of your Excel program
Left-click Blank Workbook to create a new workbook
2. Excelbasics: savea newfile
Add some data to your currently blank spreadsheet
On the keyboard push Ctrl + S (press and hold the control key then push S key while still
holding down control) to save your work!
If this is the first time saving the current file then you will be greeted with a Save As popup
At the bottom of this popup is a field labeled File name and currently contains the text
"Book1.xls". Replace this with any name you want to give your file, we have chosen
"TizagBasics" for this example
Before you press Save, pay attention to where you are saving your file to. The default
location Excel saves to is the My Documents folder and we suggest you save there if you
are not very comfortable with navigating the Windows File System.
3. Excelbasics:openan existing file
Go to the Excel menu bar and left-click the File menu
Within the File menu find and click the Open choice
If this is the first time saving the current file then you will be greeted with a Open popup
You should currently be in the "My Documents" folder, if not please navigate there.
Find your file "TizagBasics.xls" and double-click the file to open it.
4. Excelbasics:closea file
There are two options for closing your Excel file. You can close your file but keep Excel open or
you can close your file along with Excel. To only close your file follow these steps:
Click the lower of the two X's that appear in the top right.
If you have made any changes to your file you will be prompted to save before you quit, you
should do so.
partsofthespreadsheet
38 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Nearly every part of the spreadsheet has its own term and it is quite useful to know your
spreadsheet vocabulary to make using Excel that much easier. There are three basic parts of an
Excel Spreadsheet:
Column - The vertical segments that you see on the spreadsheet are called columns.
Cell - Each box that is created from a row and column intersecting is referred to as a cell
Using our soccer goal Excel spreadsheet from the previous lessons, let's use Excel functions to
figure out what the total number of goals scored by our team. Open up the soccer goal spreadsheet
and follow these steps:
Select cell B9 and locate the formula bar (it's right under the Excel menu bar) and notice that it
contains the content of cell B9, which just so happens to be nothing! Let's fix that
Notice the little fx to the left of the formula bar. This is the insert function button.
39 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Using the Excel "Search for a function" feature type in the text "Sum" and click Go
Make sure SUM is selected and click OK to bring up the Function Arguments Window
Before we go any further let's make sure you understand what we have done so far. First we
selected a cell that we wanted to have our total goal count appear in. Next we inserted a function
and chose the SUM function.
We've done quite a lot and the only thing that remains is to select whichnumbers we want to sum
up. So let's finish this up!
Move the Function Arguments Window so you can see the goals scored.
We want to sum up all the goals scored, so we need to select all the cells that contain goals
scored.
Starting at the top of the list, Tim's goals, left-click and hold in Cell B2 then drag down to cell B7,
Jason's goals and finally release left-click. Your screen should now look like this:
40 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Click OK and admire your work!
9. Excelformulas:
Now that we have created separate revenues for both Candy and Vegetable it would be nice to somehow
combine these two values to get the Total Revenue. Although both Vegetable Revenue and Candy Revenue
contain formulas, we can still use these cells as we have been doing and add them together to get our total.
Select cell D5 (directly below "Total")
Type the equal sign "="
Left-click cell D2
Type the plus sign "+"
Left-click cell D3. Cell D5 should now contain this formula "=D2+D3":
10.Excel shortcuts:
Ctrl+C: Copy the current selection to the clipboard. After you copy something, you can paste it with
the paste shortcut.
Ctrl+X: Cut the current selection and place it on the clipboard, which can be pasted. The difference
between cut and copy is that cut will delete your selection, while copy will not.
Ctrl+Z: Undo your last change. This is can be repeated to remove again and again to undo many
changes.
Ctrl+Y: Redo your last Undo. This only is available if you have just issued an Undo command.
Backspace: Deletes the current cell and enters edit mode for that cell. This will only delete one cell
and not a selection.
Delete: Deletes the current selection. Use the delete key when you want to delete more than one
cell at a time.
Page Down: Move one page down in your worksheet. Note: The number of rows moved in both
page up and page down depend on how many rows are currently displayed. The more rows you
have displayed the greater amount the row jump will be when you do a page up/down.
Ctrl+Page Down: Go forward one worksheet. Note: If you are not using multiple worksheets in your
workbook you will probably not use this shortcut!
42 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Alt+I: Accesses the Insert menu
Ctrl+A: Select All, will select everything on the current worksheet. This is most often used in
conjunction with the copy shortcut.
11.Excelsort
Excelsorting:alphabeticalorder (ascending)
The most common type of sorting, and one that is applicable to our situation, is alphabetical
ordering. This kind of ordering places the cells that start with the early letters of the alphabet (a, b,
c...) at the top and the later letters (t, u, v...) at the bottom of the list.
First we need to select all the data so we can begin to sort it. Because each name has a
corresponding score we need to select both columns to preserve the students' correct scores.
Left-click and hold on cell A1 then drag down-right to cell B10 to highlight all the data for sorting!
Your spreadsheet should look like this:
Left-click the "sort ascending" button, located near the top, on the shortcut bar (it has a
blue A on top and a red Z on bottom with a downward pointing arrow).
43 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Notice that your column titles (Name and Score) have not been included for sorting because
Excel is smart enough to know that you do not want these special cells (A1 and B1)
included.
reversealphabeticalorder(descending)
The steps for reverse alphabetical order are the same as above, except that you need to
click the "sort descending" button instead.
Select the data you wish to sort (left-click in cell A1 and drag down-right to B10)
Left-click the "sort descending" button, located near the top, on the shortcut bar (it has a
red Z on top and a blue A on bottom downward pointing arrow).
44 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Your spreadsheet should now be sorted in reverse alphabetical order.
12.Charts
A simple chart in Excel can say more than a sheet full of numbers. As you'll see, creating
charts is very easy.
Create a Chart
To create a line chart, execute the following steps.
1. Select the range A1:D7.
2. On the Insert tab, in the Charts group, choose Line, and select Line with Markers.
45 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Result:
2. On the Insert tab, in the Charts group, choose Column, and select Clustered Column.
46 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Result:
47 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Start PowerPoint
To open PowerPoint, click on the Start menu, select Programs, select Microsoft Office, and
select
Microsoft Office PowerPoint 2007.
Or, click on the PowerPoint 2007 icon in the taskbar or on the desktop.
When you open PowerPoint, it starts with the title slide of a blank presentation.
The circular button in the top, left-hand corner of the screen Quick Access
Toolbar
is the Office Button. This is where you can open, save and
print your presentation.
48 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
3
The Ribbon
The Ribbon is the area at the top of screen that contains menu tabs that in turn contain groups
of command buttons. The menu tabs, groups and command buttons may change depending
on what you have selected on the slide in your presentation.
Live Preview
Live Preview shows you what the various design choices look like on your slide before you
actually select them from the list of choices in the ribbon. When you hold your mouse
pointer over a preset style, that style is displayed on your slide exactly how it would look if
you were to select it.
The Normal View of PowerPoint Quick Access is made up of the Office Button, Quick
Access Toolbar and Ribbon at Toolbar the top, with the Slide View Pane down the
left hand side, the Notes Pane at the bottom, and the Slide
in the middle of the screen.
Office Button
Ribbon
Slide
Notes
Pane
49 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
4
The different view options can be accessed by clicking on the View tab in the ribbon.
The Slide Sorter View shows the slides in your presentation in numerical order and
allows you to change the order of your slides and add transition effects.
The Slide Show View shows you presentation on the full screen, either from the current
slide, or from the first slide (F5). The Escape (ESC) key gets you back to your previous view
from the full screen slide show.
The Notes Page View shows a preview of your printed notes page for each slide. Each notes
page will have a graphic representation of the slide with the notes area below it. The text of
50 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
your notes can also be added on the Notes Page View.
The Master View provides access to the design template for each preset slide layout,
handout layout, and notes page. Changes made to the text formatting, background, and
placeholders in the Master View will affect all of the slides, handouts and notes pages in the
presentation.
Add a new slide
To add a new slide to your presentation, open the Home tab in the ribbon and click on the
New Slide button in the Slides group. You can select from a list of new slide layout choices by
clicking on the New Slide drop-down list. PowerPoint will add a Title and Content preset slide
when you click on the New Slide button.
To select the text for formatting, click inside the text box to make the placeholder visible and
then click on the outline of the placeholder. The outline will change from a dotted line to a
solid line. When the placeholder is a solid line it means the textbox is selected and its
contents are ready for editing.
You can also click and drag the cursor over the text to select the text for editing.
When your text is selected, you can change the font, color, and format of the text.
51 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Images
PowerPoint enables you to insert shapes, charts, SmartArt, clip-art, and digital photos
into your presentation. Shapes and SmartArt are made in PowerPoint, charts and
graphs can be made in PowerPoint or imported from Microsoft Excel, and clip-art or
digital photos can be inserted into PowerPoint from your computer, network drive, or the
internet.
Clip-art files will usually be .wmf or .gif files and digital photos will usually be .jpg files.
Digital photos may also be .tiff or .bmp files.
High
pixels wide by 768 pixels high, so if you have 600
a digital photo that is 1024 by 768, it will fill up
a PowerPoint slide without resizing it. A photo
0
that is 600 by 400 will take up about ¼ of the
slide without resizing. Photos that are larger
or smaller than 1024 by 768 can be resized to
fit in a slide, but photos that are very small will
be poor quality if they are resized larger by a
large amount.
52 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
7
From the Insert tab on the ribbon, select Picture from the Illustration group.
Click on the image to select the picture. The ribbon will change to show the Picture Tools,
Format tab, and handles will appear on the corners and edges of the picture.
To resize the picture, click and hold the mouse pointer on a handle on the corner of the
picture. Drag the handle diagonally toward or away from the center of the picture to resize it
smaller or bigger. Release the mouse button to let go of the handle.
To move the picture, click and hold the mouse pointer anywhere on the picture. Drag the
picture to where you want it on the slide, and release the mouse button to place the picture
in its new location.
Using Internet Explorer, go to http://www.google.ca/ and select Images in the top left corner.
Select a topic for an image search and search images. The images will be displayed with
their name, dimensions, file size, file type and web address.
Click on a .jpg image that is several hundred pixels wide. This will open the web page that
contains the image. Click on the phrase; See full size image to see the full size image. This will
bring up the full size image in a window. This is the version of the image that you want to copy
to your computer and insert into your presentation.
To copy the image to your computer, right click on the image, select Save Picture As, and
select a location on your computer to save the image. Once the image is saved on your
computer, you can insert it into your presentation as you did with slide 4.
53 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
If you use an image from a web site you must credit the source by displaying the web address
the image is from in your presentation. This is done by copying the web address from the
Internet Explorer address bar and pasting it in a textbox on the slide with the image. Ask a
librarian if you have questions about copyright permissions and how to cite your sources
properly.
Slide Design
Changes to the design of you presentation can be made by opening the Design tab on the
ribbon. This gives you access to a variety of preset themes, color combinations, fonts and
effects. Use the drop-down menus to see all the possible choices and holding the mouse
pointer over the example to preview the selection. Each theme can be modified with an
assortment of color combinations, fonts and effects. Use a slide design that is appropriate for
your topic and has enough contrast between the text and background to make it easy to read
from the back of the room.
Slide Transitions
Transitions are the effects between slides and are located in the Animations tab in the
ribbon. The transitions can be previewed by holding the mouse pointer over the transition icon
in the drop-down list of transitions. The transition can be applied to the selected slide or to all
slides in the presentation. It’s best to use simple transitions, like a fade or wipe, as more
complicated transitions can distract your audience from your message.
Custom Animation
Custom Animations are movements that can be applied to text, objects or pictures on an
individual slide. The Custom Animations button in the Animations tab of the ribbon will open a
task pane on the right side of the screen that gives you access to Entrance effects, Emphasis
effects, Exit effects and Motion Paths. To animate an object, select the text box, shape or
picture, then select an effect from the Add Effect drop-down list. Animation effects can start on
a mouse click, with the previous mouse click, or after a specified amount of time. The speed
and direction of the effect can also be modified.
As with transitions, it’s best to use simple animations so you don’t distract your audience
from your message.
54 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
To view your slide show, open the Slide Show tab in the ribbon and select From Beginning or
From Current Slide. The keyboard shortcut to view your slide show from the beginning is the
F5 key.
To advance to the next slide:
Left mouse click
Space bar
Page up/down
Arrow up/down, foreword/back
N key = next
P key = previous
Type a slide number and press enter to go to that slide
The B key will black out the screen and the W key will white out the screen.
The escape key (Esc) will close the full screen slide show
55 | P a g e