0% found this document useful (0 votes)
8 views55 pages

Paper 9

The document provides an overview of the fundamentals of information technology, detailing the structure and operations of computers, including input, processing, output, and control units. It also discusses various applications of computers across different sectors such as business, banking, education, and healthcare, highlighting their advantages and types. Additionally, the document outlines the generations of computers and their corresponding languages, as well as various input devices like keyboards and mice.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views55 pages

Paper 9

The document provides an overview of the fundamentals of information technology, detailing the structure and operations of computers, including input, processing, output, and control units. It also discusses various applications of computers across different sectors such as business, banking, education, and healthcare, highlighting their advantages and types. Additionally, the document outlines the generations of computers and their corresponding languages, as well as various input devices like keyboards and mice.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Open Elective Paper 9 Fundamentals of Information Technology

Course Material

Open Elective Paper-9

Fundamentals of Information Technology

1|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology

Computer
The term ‘computer’ is derived from the word ‘compute’, which means to calculate. A computer is an
electronic machine, devised for performing calculations and controlling operations that can be expressed
either in logical or numerical terms.

Structure of Computer
All types of computers follow the same basic logical structure and perform the following five basic
operations for converting raw input data into information useful to their users.

S.No. Operation Description

The process of entering data and instructions into the


1 Take Input
computer system.

Saving data and instructions so that they are available for


2 Store Data
processing as and when required.

Performing arithmetic, and logical operations on data in order


3 Processing Data
to convert them into useful information.

Output The process of producing useful information or results for the


4
Information user, such as a printed report or visual display.

Control the Directs the manner and sequence in which all of the above
5
workflow operations are performed.

2|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
 Input Unit
This unit contains devices with the help of which we enter data into the computer. This unit creates a link
between the user and the computer. The input devices translate the information into a form
understandable by the computer. Ex. Keyboard, scanner, camera, bar code reader, and etc.

 CPU (Central Processing Unit)


CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It
stores data, intermediate results, and instructions (program). It controls the operation of all parts of the
computer.

CPU itself has the following three components −

 ALU (Arithmetic Logic Unit)


This unit consists of two subsections namely,

1. Arithmetic Section
2. Logic Section
1. Arithmetic Section
Function of arithmetic section is to perform arithmetic operations like addition, subtraction, multiplication,
and division. All complex operations are done by making repetitive use of the above operations.

2. Logic Section
Function of logic section is to perform logic operations such as comparing, selecting, matching, and
merging of data.

 Memory Unit
This unit can store instructions, data, and intermediate results. This unit supplies information to other units
of the computer when needed. It is also known as internal storage unit or the main memory or the primary
storage or Random Access Memory (RAM).

Its size affects speed, power, and capability. Primary memory and secondary memory are two types of
memories in the computer. Functions of the memory unit are −

 It stores all the data and the instructions required for processing.
 It stores intermediate results of processing.
 It stores the final results of processing before these results are released to an output device.
 All inputs and outputs are transmitted through the main memory.

 Control Unit
This unit controls the operations of all parts of the computer but does not carry out any actual data
processing operations.

Functions of this unit are –

3|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
 It is responsible for controlling the transfer of data and instructions among other units of a
computer.
 It manages and coordinates all the units of the computer.
 It obtains the instructions from the memory, interprets them, and directs the operation of the
computer.
 It communicates with Input/output devices for transfer of data or results from storage.
 It does not process or store data.

 Output Unit
The output unit consists of devices with the help of which we get the information from the computer. This
unit is a link between the computer and the users. Output devices translate the computer's output into a
form understandable by the users. Ex. Monitor, printer, audio box, etc.

Applications of Computer
1. Business
A computer has high speed of calculation, diligence, accuracy, reliability, or versatility which has made it an
integrated part in all business organizations.
Computer is used in business organizations for −
 Payroll calculations
 Budgeting
 Sales analysis
 Financial forecasting
 Managing employee database
 Maintenance of stocks, etc.

2. Banking
Today, banking is almost totally dependent on computers. Banks provide the following facilities −
 Online accounting facility, which includes checking current balance, making deposits and overdrafts,
checking interest charges, shares, and trustee records.
 ATM machines which are completely automated are making it even easier for customers to deal
with banks.
3. Insurance
Insurance companies are keeping all records up-to-date with the help of computers. Insurance companies,
finance houses, and stock broking firms are widely using computers for their concerns.
Insurance companies are maintaining a database of all clients with information showing −
 Procedure to continue with policies
 Starting date of the policies
 Next due installment of a policy
 Maturity date

4|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
 Interests due
 Survival benefits
4. Education
The computer helps in providing a lot of facilities in the education system.
 The computer provides a tool in the education system known as CBE (Computer Based Education).
 CBE involves control, delivery, and evaluation of learning.
 Computer education is rapidly increasing the graph of number of computer students.
 There are a number of methods in which educational institutions can use a computer to educate the
students.
 It is used to prepare a database about performance of a student and analysis is carried out on this
basis.
5. Marketing
In marketing, uses of the computer are following −
 Advertising − With computers, adver sing professionals create art and graphics, write and revise
copy, and print and disseminate ads with the goal of selling more products.
 Home Shopping − Home shopping has been made possible through the use of computerized
catalogues that provide access to product information and permit direct entry of orders to be filled
by the customers.
6. Healthcare
Computers have become an important part in hospitals, labs, and dispensaries. They are being used in
hospitals to keep the record of patients and medicines. It is also used in scanning and diagnosing different
diseases. ECG, EEG, ultrasounds and CT scans, etc. are also done by computerized machines.
Following are some major fields of health care in which computers are used.
 Diagnostic System − Computers are used to collect data and iden fy the cause of illness.
 Lab-diagnostic System − All tests can be done and the reports are prepared by computer.
 Patient Monitoring System − These are used to check the pa ent's signs for abnormality such as in
Cardiac Arrest, ECG, etc.
 Pharma Information System − Computer is used to check drug labels, expiry dates, harmful side
effects, etc.
 Surgery − Nowadays, computers are also used in performing surgery.
7. Engineering Design
Computers are widely used for Engineering purpose. One of the major areas is CAD (Computer Aided
Design) that provides creation and modification of images. Some of the fields are −
 Structural Engineering − Requires stress and strain analysis for design of ships, buildings, budgets,
airplanes, etc.
 Industrial Engineering − Computers deal with design, implementa on, and improvement of
integrated systems of people, materials, and equipment.
 Architectural Engineering − Computers help in planning towns, designing buildings, determining a
range of buildings on a site using both 2D and 3D drawings.

5|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
8. Military
Computers are largely used in defence. Modern tanks, missiles, weapons, etc. Military also employs
computerized control systems. Some military areas where a computer has been used are −
 Missile Control
 Military Communication
 Military Operation and Planning
 Smart Weapons
9. Communication
Communication is a way to convey a message, an idea, a picture, or speech that is received and
understood clearly and correctly by the person for whom it is meant. Some main areas in this category are
 E-mail
 Chatting
 Usenet
 FTP
 Telnet
 Video-conferencing

10. Government
Computers play an important role in government services. Some major fields in this category are −
 Budgets
 Sales tax department
 Income tax department
 Computation of male/female ratio
 Computerization of voters lists
 Computerization of PAN card
 Weather forecasting

ADVANTAGES OF COMPUTER
Compared to traditional systems, computers offer many advantages. This is one reason that traditional
systems are being replaced rapidly by computer-based Systems. The main advantages offered by computers
are as follows:
• High Accuracy
• Superior Speed of Operation
• Large Storage Capacity
• User-friendly Features
• Portability
• Platform independence
• Economical in the long term

6|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology

TYPES OF COMPUTER
Computers are classified in a variety of ways depending upon the principles of working, construction, size
and applications. Various types of computers are
ANALOG COMPUTERS and DIGITAL COMPUTER

ANALOG COMPUTERS
The computers that process analog signals are known as Analog Computers. The
analog signal is a continuous signal. For example, sine wave is an analog signal. The analog
quantities are based on decimal number systems. Examples of Analog computers are the
slide rule, ABACUS etc.
DIGITAL COMPUTER
Computers that process digital signals are known as Digital Computers. The Digital signal is a discrete signal
with two states 0 and 1. In practice, the digital computers are used and not analog. Examples of digital
computers are personal computers, supercomputers, mainframe computers etc.

 Supercomputers Are the most powerful computers in terms of speed of execution and large storage
capacity. NASA uses supercomputers to track and control space explorations.

 Mainframe Computers Are next to supercomputers in terms of capacity. The mainframe computers
are multi terminal computers, which can be shared simultaneously by multiple users. Unlike
personal computers, mainframe computers offer time-sharing. For example, insurance companies
use mainframe computers to process information about millions of its policyholders.

 Minicomputers These computers are also known as midrange computers. These are desk-sized
machines and are used in medium scale applications. For example, production departments use
minicomputers to monitor various manufacturing processes and assembly-line operations.

 Microcomputers As compared to supercomputers, mainframes and minicomputers,


microcomputers are the least powerful, but these are very widely used and rapidly gaining in
popularity.

 Personal Computer PC is the term referred to the computer that is designed for use by a single
person. PCs are also called microcontrollers because these are smaller when compared to
mainframes and minicomputers. The term ‘PC’ is frequently used to refer to desktop computers.
Although PCs are used by individuals, they can also be used in computer networks.

 Desktop Computer This is the most commonly used personal computer. It comprises of a keyboard,
mouse, monitor and system unit. The system unit is also known as cabinet or chassis. It is the
container that houses most of the components such as motherboard, disk drives, ports, switch mode
power supply and add-on cards etc. The desktop computers are available in two models- horizontal
model and tower model.

 Laptops Are also called notebook computers. These are the portable computers. They have a size of
8.5 x 11 inch and weigh about three-to-four kilos.

7|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
 Palmtops Palmtops are also called handheld computers. These are computing devices, which are
small enough to fit into your palm. The size of a palmtop is like an appointment book. The palmtops
are generally kept for personal use such as taking notes, developing a list of friends, keeping track of
dates, agendas etc. The Palmtop can also be connected to a PC for downloading data. It also
provides value-added features such as voice input, Internet, cell phone, camera, movie player and
GPS.

 Personal Digital Assistant (PDA) is the palm type computer. It combines pen input, writing
recognition, personal organizational tools and communication capabilities in a small package.

Generations of Computers and Computer Languages


Using size and features as the bases, computers are classified into various generations. These generations of
computers are discussed below:

First Generation
The first generation computers were bulky in size. They were able to execute hundreds of instructions per
second and were expensive as well. They used vacuum tubes as their main components. Machine language
is a first generation language, for example EDVAC, UNIVAC etc.

Second Generation
The second-generation computers were smaller in size as compared to the first generation computers.
These were capable of executing thousands of instructions per second, with a transistor as its main
component. Assembly language is the second generation language in which programs were written using
mnemonic codes, for example, PDP (Programmed data processor), PDP1 etc.

Third Generation
The third generation computers were more advanced and used integrated circuits. These computers
contained thousands of components per circuit. They were cheaper than second-generation computers.
The languages used in this generation were BASIC, COBOL etc. for example, IBM 307 Series, PDP II etc.

Fourth Generation
The fourth generation computers used complex circuits like the large-scale integrated circuits called
microprocessors or chips, which surprisingly cost less than the third generation computers. These
computers were able to execute millions of instructions per second. The languages used in this generation
are C++, SQL etc. for example, CRAY 2, IBM 3090/600 Series.

Fifth Generation
These computers work on artificial languages (AI) like LISP, PROLOG etc. They use super/ultra large-scale
integrated circuits, which is also called parallel processing method. They execute billions of instructions per
second, for example, Laptops, Palmtops, PDA (Personal Digital Assistant) etc.

8|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
Input and Output Device
 Input Device
Following are some of the important input devices which are used in a computer −
Keyboard
Mouse
Joy Stick
Light pen
Track Ball
Scanner
Graphic Tablet
Microphone
Magnetic Ink Card Reader(MICR)
Optical Character Reader(OCR)
Bar Code Reader
Optical Mark Reader(OMR)

Keyboard
Keyboard is the most common and very popular input device which helps to input data to
the computer. The layout of the keyboard is like that of traditional typewriter, although
there are some additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or
108 keys are also available for Windows and Internet.
The keys on the keyboard are as follows −
S.No Keys & Description

Typing Keys
1 These keys include the letter keys (A-Z) and digit keys (09) which generally give the
same layout as that of typewriters.

Numeric Keypad
It is used to enter the numeric data or cursor movement. Generally, it consists of a
2
set of 17 keys that are laid out in the same configuration used by most adding
machines and calculators.

Function Keys
The twelve function keys are present on the keyboard which are arranged in a row
3
at the top of the keyboard. Each function key has a unique meaning and is used for
some specific purpose.

Control keys
These keys provide cursor and screen control. It includes four directional arrow
4
keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down,
Control(Ctrl), Alternate(Alt), Escape(Esc).

Special Purpose Keys


5 Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock,
Num Lock, Space bar, Tab, and Print Screen.

9|Pa g e
Open Elective Paper 9 Fundamentals of Information Technology
Mouse
Mouse is the most popular pointing device. It is a very famous cursor-control device
having a small palm size box with a round ball at its base, which senses the movement of
the mouse and sends corresponding signals to the CPU when the mouse buttons are
pressed. Generally, it has two buttons called the left and the right button and a wheel is
present between the buttons. A mouse can be used to control the position of the
cursor on the screen, but it cannot be used to enter text into the computer.

Joystick
Joystick is also a pointing device, which is used to move the cursor position on a monitor
screen. It is a stick having a spherical ball at its both lower and upper ends. The lower
spherical ball moves in a socket. The joystick can be moved in all four directions.
The function of the joystick is similar to that of a mouse. It is mainly used in Computer Aided
Designing (CAD) and playing computer games.
Light Pen
Light pen is a pointing device similar to a pen. It is used to select a displayed menu item or
draw pictures on the monitor screen. It consists of a photocell and an optical system
placed in a small tube. When the tip of a light pen is moved over the monitor screen and
the pen button is pressed, its photocell sensing element detects the screen location and
sends the corresponding signal to the CPU.
Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer, instead of
a mouse. This is a ball which is half inserted and by moving fingers on the ball, the pointer
can be moved. Since the whole device is not moved, a track ball requires less space than a
mouse. A track ball comes in various shapes like a ball, a button, or a square.
Scanner
Scanner is an input device, which works more like a photocopy machine. It is used when
some information is available on paper and it is to be transferred to the hard disk of the
computer for further manipulation. Scanner captures images from the source which are
then converted into a digital form that can be stored on the disk. These images can be
edited before they are printed.
Digitizer
Digitizer is an input device which converts analog information into digital form. Digitizer
can convert a signal from the television or camera into a series of numbers that could be
stored in a computer. They can be used by the computer to create a picture of whatever
the camera had been pointed at. Digitizer is also known as Tablet or Graphics Tablet as it
converts graphics and pictorial data into binary inputs. A graphic tablet as digitizer is
used for fine works of drawing and image manipulation applications.

Microphone
Microphone is an input device to input sound that is then stored in a digital form.The
microphone is used for various applications such as adding sound to a multimedia
presentation or for mixing music.

Magnetic Ink Card Reader (MICR)


MICR input device is generally used in banks as there are large number of cheques to be
processed every day. The bank's code number and cheque number are printed on the
cheques with a special type of ink that contains particles of magnetic material that are
10 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
machine readable. This reading process is called Magnetic Ink Character Recognition (MICR). The main
advantages of MICR is that it is fast and less error prone.

Optical Character Reader (OCR)


OCR is an input device used to read a printed text. OCR scans the text optically, character
by character, converts them into a machine readable code, and stores the text on the
system memory.

Bar Code Readers


Bar Code Reader is a device used for reading bar coded data (data in the form of light
and dark lines). Bar coded data is generally used in labelling goods, numbering the
books, etc. It may be a handheld scanner or may be embedded in a stationary scanner.
Bar Code Reader scans a bar code image, converts it into an alphanumeric value, which
is then fed to the computer that the bar code reader is connected to.
Optical Mark Reader (OMR)
OMR is a special type of optical scanner used to recognize the type of mark made
by pen or pencil. It is used where one out of a few alternatives is to be selected and
marked.It is specially used for checking the answer sheets of examinations having
multiple choice questions.

 Output Device
Following are some of the important output devices used in a computer.
Monitors
Printer
Monitors
Monitors, commonly called as Visual Display Unit (VDU), are the main output device of a computer. It forms
images from tiny dots, called pixels that are arranged in a rectangular form. The sharpness of the image
depends upon the number of pixels.
There are two kinds of viewing screen used for monitors.
Cathode-Ray Tube (CRT)
Flat-Panel Display

Cathode-Ray Tube (CRT) Monitor


The CRT display is made up of small picture elements called pixels. The smaller the
pixels, the better the image clarity or resolution. It takes more than one illuminated
pixel to form a whole character, such as the letter ‘e’ in the word help.
A finite number of characters can be displayed on a screen at once. The screen can be
divided into a series of character boxes - fixed location on the screen where a standard
character can be placed. Most screens are capable of displaying 80 characters of data
horizontally and 25 lines vertically.
There are some disadvantages of CRT −
Large in Size
High power consumption

11 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Flat-Panel Display Monitor
The flat-panel display refers to a class of video devices that have reduced volume, weight
and power requirement in comparison to the CRT. You can hang them on walls or wear
them on your wrists. Current uses of flat-panel displays include calculators, video games,
monitors, laptop computer, and graphics display.

Printers
Printer is an output device, which is used to print information on paper. There are two types of printers −
1. Impact Printers
2. Non-Impact Printers
1. Impact Printers
Impact printers print the characters by striking them on the ribbon, which is then pressed on the paper.
Characteristics of Impact Printers are the following −
Very low consumable costs
Very noisy
Useful for bulk printing due to low cost
There is physical contact with the paper to produce an image

These printers are of two types −


a. Character printers
b. Line printers
a. Character Printers
Character printers are the printers which print one character at a time. These are further divided into two
types:
i. Dot Matrix Printer(DMP)
ii. Daisy Wheel

i. Dot Matrix Printer


In the market, one of the most popular printers is Dot Matrix Printer. These printers
are popular because of their ease of printing and economical price. Each character
printed is in the form of pattern of dots and head consists of a Matrix of Pins of size
(5*7, 7*9, 9*7 or 9*9) which come out to form a character which is why it is called
Dot Matrix Printer.

Advantages
Inexpensive
Widely Used
Other language characters can be printed
Disadvantages
Slow Speed
Poor Quality
ii. Daisy Wheel
Head is lying on a wheel and pins corresponding to characters are like petals of Daisy
(flower) which is why it is called Daisy Wheel Printer. These printers are generally
used for word-processing in offices that require a few letters to be sent here and
there with very nice quality.

Advantages
More reliable than DMP
Better quality
12 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Fonts of character can be easily changed
Disadvantages
Slower than DMP
Noisy
More expensive than DMP

b. Line Printers
Line printers are the printers which print one line at a time. These are of two types −
i. Drum Printer
ii. Chain Printer

i. Drum Printer
This printer is like a drum in shape hence it is called drum printer. The surface of the drum is divided into a
number of tracks. Total tracks are equal to the size of the paper, i.e. for a paper width of 132 characters,
drum will have 132 tracks. A character set is embossed on the track. Different character sets available in the
market are 48 character set, 64 and 96 characters set. One rotation of drum prints one line. Drum printers
are fast in speed and can print 300 to 2000 lines per minute.
Advantages
Very high speed
Disadvantages
Very expensive
Characters fonts cannot be changed
ii. Chain Printer
In this printer, a chain of character sets is used, hence it is called Chain Printer. A standard character set
may have 48, 64, or 96 characters.
Advantages
Character fonts can easily be changed.
Different languages can be used with the same printer.
Disadvantages
Noisy

2. Non-impact Printers
Non-impact printers print the characters without using the ribbon. These printers print a complete page at a
time, thus they are also called as Page Printers.
Chain printers are of two types −
a. Laser Printers
b. Inkjet Printers
Characteristics of Non-impact Printers
Faster than impact printers
They are not noisy
High quality
Supports many fonts and different character size

a. Laser Printers
These are non-impact page printers. They use laser lights to produce the dots needed to
form the characters to be printed on a page.
Advantages
Very high speed
13 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Very high quality output
Good graphics quality
Supports many fonts and different character size
Disadvantages
Expensive
Cannot be used to produce multiple copies of a document in a single printing
Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new technology.
They print characters by spraying small drops of ink onto paper. Inkjet printers produce
high quality output with presentable features. They make less noise because no
hammering is done and these have many styles of printing modes available. Color
printing is also possible. Some models of Inkjet printers can produce multiple copies of
printing also.
Advantages
High quality printing
More reliable
Disadvantages
Expensive as the cost per page is high
Slow as compared to laser printer

Computer - Memory
A memory is just like a human brain. It is used to store data and instructions. Computer memory is the
storage space in the computer, where data is to be processed and instructions required for processing are
stored. The memory is divided into large number of small parts called cells. Each location or cell has a
unique address, which varies from zero to memory size minus one. For example, if the computer has 64k
words, then this memory unit has 64 * 1024 = 65536 memory locations. The address of these locations
varies from 0 to 65535.
Memory is primarily of three types −
Cache Memory
Primary Memory/Main Memory
Secondary Memory

Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up the
CPU. It acts as a buffer between the CPU and the main memory. It is used to hold those
parts of data and program which are most frequently used by the CPU. The parts of
data and programs are transferred from the disk to cache memory by the operating
system, from where the CPU can access them.

Advantages
The advantages of cache memory are as follows −
Cache memory is faster than main memory.
It consumes less access time as compared to main memory.
It stores the program that can be executed within a short period of time.
It stores data for temporary use.
Disadvantages
Cache memory has limited capacity.
14 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
It is very expensive.

Primary Memory (Main Memory)


Primary memory holds only those data and instructions on which the computer is currently
working. It has a limited capacity and data is lost when power is switched off. It is generally
made up of semiconductor device. These memories are not as fast as registers. The data
and instruction required to be processed resides in the main memory. It is divided into two
subcategories RAM and ROM.
Characteristics of Main Memory
These are semiconductor memories.
It is known as the main memory.
Usually volatile memory.
Data is lost in case power is switched off.
It is the working memory of the computer.
Faster than secondary memories.
A computer cannot run without the primary memory.
Secondary Memory
This type of memory is also known as external memory or non-volatile. It is slower than
the main memory. These are used for storing data/information permanently. CPU
directly does not access these memories, instead they are accessed via input-output
routines. The contents of secondary memories are first transferred to the main
memory, and then the CPU can access it. For example, disk, CD-ROM, DVD, etc.
Characteristics of Secondary Memory
These are magnetic and optical memories.
It is known as the backup memory.
It is a non-volatile memory.
Data is permanently stored even if power is switched off.
It is used for storage of data in a computer.
Computer may run without the secondary memory.
Slower than primary memories.

Computer – Hardware

Hardware represents the physical and tangible components of a computer, i.e. the
components that can be seen and touched. Examples of Hardware are the following −
Input devices − keyboard, mouse, etc.
Output devices − printer, monitor, etc.
Secondary storage devices − Hard disk, CD, DVD, etc.
Internal components − CPU, motherboard, RAM, etc.

Computer – Software
Software is a set of programs, which is designed to perform a well-defined function. A program is a
sequence of instructions written to solve a particular problem. There are two types of software −
a. System Software
b. Application Software

15 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

a. System Software
The system software is a collection of programs designed to operate, control, and extend the processing
capabilities of the computer itself. System software is generally prepared by the computer manufacturers.
These software products comprise of programs written in low-level languages, which interact with the
hardware at a very basic level. System software serves as the interface between the hardware and the end
users. Some examples of system software are Operating System, Compilers, Interpreter, Assemblers, etc.
Here is a list of some of the most prominent features of a system software −
Fast in speed
Difficult to design
Difficult to understand
Less interactive
Smaller in size
Difficult to manipulate
Generally written in low-level language
b. Application Software
Application software products are designed to satisfy a particular need of a particular environment. All
software applications prepared in the computer lab can come under the category of Application software.
Application software may consist of a single program, such as Microsoft's notepad for writing and editing a
simple text. It may also consist of a collection of programs, often called a software package, which work
together to accomplish a task, such as a spreadsheet package.
Examples of Application software are the following −
Payroll Software
Student Record Software
Inventory Management Software
Income Tax Software
Railways Reservation Software
Microsoft Office Suite Software
Microsoft Word
Microsoft Excel
Microsoft PowerPoint

Features of application software are as follows −


Close to the user
Easy to design
More interactive
Slow in speed
Generally written in high-level language
Easy to understand
Easy to manipulate and use
Bigger in size and requires large storage space

16 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Operating System
The Operating System is a program with the following features −
An operating system is a program that acts as an interface between the software and the computer
hardware. It is an integrated set of specialized programs used to manage overall resources and operations
of the computer. It is a specialized software that controls and monitors the execution of all other programs
that reside in the computer, including application programs and other system software.

Objectives of Operating System


The objectives of the operating system are −
 To make the computer system convenient to use in an efficient manner.
 To hide the details of the hardware resources from the users.
 To provide users a convenient interface to use the computer system.
 To act as an intermediary between the hardware and its users, making it easier for the
users to access and use other resources.
 To manage the resources of a computer system.
 To keep track of who is using which resource, granting resource requests, and mediating
conflicting requests from different programs and users.
 To provide efficient and fair sharing of resources among users and programs.

Functions/ Characteristics of Operating System

Here is a list of some of the most prominent characteristic features of Operating Systems −
Memory Management − Keeps track of the primary memory, i.e. what part of it is in use by whom, what
part is not in use, etc. and allocates the memory when a process or program requests it.
Processor Management − Allocates the processor (CPU) to a process and deallocates the processor when it
is no longer required
.
Device Management − Keeps track of all the devices. This is also called I/O controller that decides which
process gets the device, when, and for how much time.

File Management − Allocates and de-allocates the resources and decides who gets the resources.

Security − Prevents unauthorized access to programs and data by means of passwords and other similar
techniques.

Job Accounting − Keeps track of me and resources used by various jobs and/or users.

Control Over System Performance − Records delays between the request for a service and from the system.
Interaction with the Operators − Interac on may take place via the console of the computer in the form of
instructions. The Operating System acknowledges the same, does the corresponding action, and informs the
operation by a display screen.

Error-detecting Aids − Produc on of dumps, traces, error messages, and other debugging and error-
detecting methods.

17 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Coordination Between Other Software and Users − Coordina on and assignment of compilers,
interpreters, assemblers, and other software to the various users of the computer systems.

Types of Operating Systems


Some of the widely used operating systems are as follows-
1. Batch operating System
This type of operating system do not interact with the computer directly. There is an operator which takes
similar jobs having same requirement and group them into batches. It is the responsibility of operator to
sort the jobs with similar needs.

Advantages of Batch Operating System:


It is very difficult to guess or know the time required by any job to complete.
Processors of the batch systems know how long the job would be when it is in queue.
Multiple users can share the batch systems
The idle time batch system is very less.
It is easy to manage large work repeatedly in batch systems

Disadvantages of Batch Operating System:


The computer operators should be well known with batch systems
Batch systems are hard to debug
It is sometime costly
The other jobs will have to wait for an unknown time if any job fails
Examples of Batch based Operating System: Payroll System, Bank Statements etc.

2. Time-Sharing Operating Systems


Each task has given some time to execute, so that all the tasks work smoothly. Each user gets time of CPU as
they use single system. These systems are also known as Multitasking Systems. The task can be from single
user or from different users also. The time that each task gets to execute is called quantum. After this time
interval is over OS switches over to next task.

Advantages of Time-Sharing OS:


Each task gets an equal opportunity
Less chances of duplication of software
CPU idle time can be reduced

Disadvantages of Time-Sharing OS:


Reliability problem
One must have to take care of security and integrity of user programs and data
18 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Data communication problem
Examples of Time-Sharing OSs are: Multics, Unix etc.

3. Distributed Operating System


These types of operating system is a recent advancement in the world of computer technology and are
being widely accepted all-over the world and, that too, with a great pace. Various autonomous
interconnected computers communicate each other using a shared communication network. Independent
systems possess their own memory unit and CPU. These are referred as loosely coupled systems or
distributed systems. These systems processors differ in sizes and functions. The major benefit of working
with these types of operating system is that it is always possible that one user can access the files or
software which are not actually present on his system but on some other system connected within this
network i.e., remote access is enabled within the devices connected in that network.

Advantages of Distributed Operating System:


Failure of one will not affect the other network communication, as all systems are independent from
each other
Electronic mail increases the data exchange speed
Since resources are being shared, computation is highly fast and durable
Load on host computer reduces
These systems are easily scalable as many systems can be easily added to the network
Delay in data processing reduces
Disadvantages of Distributed Operating System:
Failure of the main network will stop the entire communication
To establish distributed systems the language which are used are not well defined yet
These types of systems are not readily available as they are very expensive. Not only that the
underlying software is highly complex and not understood well yet
Examples of Distributed Operating System are- LOCUS etc.

4. Network Operating System


These systems runs on a server and provides the capability to manage data, users, groups, security,
applications, and other networking functions. These type of operating systems allows shared access of files,
printers, security, applications, and other networking functions over a small private network. One more
important aspect of Network Operating Systems is that all the users are well aware of the underlying
configuration, of all other users within the network, their individual connections etc. and that’s why these
computers are popularly known as tightly coupled systems.

Advantages of Network Operating System:


Highly stable centralized servers
Security concerns are handled through servers
New technologies and hardware up-gradation are easily integrated to the system
Server access are possible remotely from different locations and types of systems
Disadvantages of Network Operating System:
Servers are costly
User has to depend on central location for most operations
Maintenance and updates are required regularly
Examples of Network Operating System are: Microsoft Windows Server 2003, Microsoft Windows
Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD etc.

19 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
5. Real-Time Operating System
These types of OSs serves the real-time systems. The time interval required to process and respond to
inputs is very small. This time interval is called response time. Real-time systems are used when there are
time requirements are very strict like missile systems, air traffic control systems, robots etc.
Two types of Real-Time Operating System which are as follows:

Hard Real-Time Systems:


These OSs are meant for the applications where time constraints are very strict and even the shortest
possible delay is not acceptable. These systems are built for saving life like automatic parachutes or air bags
which are required to be readily available in case of any accident. Virtual memory is almost never found in
these systems.
Soft Real-Time Systems:
These OSs are for applications where for time-constraint is less strict.
Advantages of RTOS:

Maximum Consumption: Maximum utilization of devices and system, thus more output from resources
Task Shifting: Time assigned for shifting tasks in these systems are very less. For example in older systems it takes about
10 micro seconds in shifting one task to another and in latest systems it takes 3 micro seconds .
Focus on Application: Focus on running applications and less importance to applications which are in queue.
Real time operating system in embedded system: Since size of programs are small, RTOS can also use in embedded
Systems like in transport and others.
Error Free: These types of systems are error free.
Memory Allocation: Memory allocation is best managed in these types of systems.
Disadvantages of RTOS:

Limited Tasks: Very few task run at the same time and their concentration is very less on few applications to avoid errors.
Use heavy system resources: Sometimes the system resources are not so good and they are expensive as well.
Complex Algorithms: The algorithms are very complex and difficult for the designer to write on.
Device driver and interrupt signals: It needs specific device drivers and interrupts signals to response earliest to interrupts.
Thread Priority: It is not good to set thread priority as these systems are very less prone to switching tasks.
Examples of Real-Time Operating Systems are: Scientific experiments, medical imaging systems, industrial control systems,

Computer – Networking
Computer Network
A computer network is a system in which multiple computers are connected to each other to share information and resources.
Characteristics of a computer network
 Share Resources from one computer to another.
 Create files and store them in one computer.
 Access those files from the other computer(s) connected over the network.

Types of Computer Network:


The figure depicts all the three network topologies viz. LAN, MAN and WAN.
LAN:
LAN stands for Local Area Network. LAN has smaller coverage range within the house or
office premises or can at least connect from one building to the nearby building. Most of
the LANs usually will have about 10 to 100 users. Multiple users in LAN time share the
system. LAN has been developed to allow sharing of common resource such as printer,
hard disk and modem to more than one PCs. In this scenario PC connected with common
resource is called as controller through which all the users will access the resource. As the
days evolve people started using LAN for e-mail system for corporate network, here one
system is configured as server storing mail boxes of all the users.

20 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
MAN:
MAN stands for Metropolitan Area Network. MAN occupies coverage in between LANs and WANs. MAN has distance coverage
and data rate higher than LAN, but less than WAN. This is the major difference between LAN and MAN. MAN overlaps to some
extent to geographical coverage requirement of WAN. A typical example of MAN is Local Cable TV system. Here cable TV
company picks up programs from satellite and delivers to individual homes via coaxial cable. Each home is a node in this network
of nodes.

WAN:
WAN stands for Wide Area Network. WAN has coverage larger than LAN and mainly used for cellular applications supporting both
voice and data applications. Larger network covering entire country or state is referred as WANs. Most WANs are telephone
systems. Various technologies are existing to support WAN such as WiMAX, GSM, CDMA, HSPA, LTE, fiber optics, ATM and more.
Covers distance upto 1000-10 kilo-meters and also goes upto 100km.
Following table compares LAN, MAN and WAN with respect to various networking parameters.

Parameters LAN MAN WAN

Metropolitan Area
Full Form Local Area Network Wide Area Network
Network

• Systems are close to each


other in LAN • Two or more LANs
• Large network which
• contained in one office or connected
What is it? connects different
building • Located over large
organizations
• one organization can have geographical area
several LANs

Unlimited (usually in 1000Km)


Limited coverage,
Distance Limited coverage, about upto 2 range, uses repeater and other
about upto 100
coverage miles(or 2500 meters) connectivity for range
miles(or 200 km)
extension

Slow, about 1.5 Mbps (May


Speed of High, typically 10, 100 and 1000 High, typically 100
vary based on wireless
operation Mbps Mbps
technologies used)

Locally installed and Locally installed and based on


Technologies Locally installed, twisted pair, based on common common carrier e.g. twisted
used for fiber optic cable, wireless (e.g. carrier e.g. twisted pair wires, fiber, coaxial cable,
medium WLAN, Zigbee) pair, fiber optic cable wireless including wireless and
etc. cellular network based

Used mainly by fixed desktop


computers and portable
Used mainly by Can be used by any devices,
computers (e.g. laptops) . Now-
Applications desktop and mini but desktop devices are mainly
a-days it is used by smart
computers. using this network type.
phones due to emergence of
WLAN network

21 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Internet
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network
of networks in which users at any one computer can, if they have permission, get information from any
other computer (and sometimes talk directly to users at other computers). It was conceived by the
Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as
the ARPANet.

The Internet contains billions of web pages created by people and companies from around the world,
making it a limitless place to locate information and entertainment. The Internet also has thousands of
services that help make life more convenient. For example, many financial institutions offer online banking
that enables a user to manage and view their account online.

Internet: Applications
The Internet has many important applications. Of the various services available via the Internet, the
following are the areas where internet use:

1. Communication: It is used for sending and receiving message from one and other through internet by
using electronic mail. Some of the web sites providing this service are yahoomail.com Hotmail.com
rediffmail.com etc.

2. Job searches: Getting information regarding availability of job in different sectors and areas. You can
publish your resume in online for prospective job. Some of the web sites providing this service are
naukri.com, monster.com, summerjob.com, recuritmentindia.com etc.

3. Finding books and study material: Books and other study material stored around the world can be easily
located through internet. Latest encyclopedias are available online.

4. Health and medicine: Internet provides information and knowledge about field of health medicine people
can have information about various disease and can receive help .patient can be taken to virtual check room
where they can meet doctors. Some of the web sites providing this service are

5. Travel: One can use internet to gather information about various tourist place . it can be used for booking
Holiday tours , hotels, train and flights. Some of the web sites providing this service are indiatravelog.com,
rajtravel.com, makemytrip.com.

6. Entertainment: one can down load jokes, songs movies, latest sports updates through internet Some of
the web sites providing this service arecricinfo.com, movies.com espn.com

7. Shopping: Internet is also used for online shopping. By just giving accounts details you can perform the
transaction. You can even pay your bills and perform bank related transaction.

8. Stock market updates : You can sell or buy shares while sitting on computer through internet. Several
websites like ndtvprofit.com, moneypore.com, provide information regarding investment

22 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

9. Research: A large number of people are using internet for research purposes you can download any kind
information by using internet

Internet Service Provider


1. ISP Stands for "Internet Service Provider." An ISP provides access to the Internet. Whether you're at
home or work, each time you connect to the Internet, your connection is routed through an ISP.

Early ISPs provided Internet access through dial-up modems. This type of connection took place over regular
phone lines and was limited to 56 Kbps. In the late 1990s, ISPs began offering faster broadband Internet
access via DSL and cable modems. Some ISPs now offer high-speed fiber connections, which provide
Internet access through fiber optic cables. Companies like Comcast and Time Warner provide cable
connections while companies like AT&T and Verizon provide DSL Internet access.

2. An ISP (Internet service provider) is a company that provides individuals and other companies access to
the Internet and other related services such as Web site building. An ISP has the equipment and the
telecommunication line access required to have a point-of-presence on the Internet for the geographic area
served. The larger ISPs have their own high-speed leased lines so that they are less dependent on the
telecommunication providers and can provide better service to their customers. Among the largest national
ISPs are AT&T WorldNet, IBM Global Network, MCI, Netcom, UUNet, and PSINet.
ISPs also include regional providers such as Reliance Gio, Airtel, Bsnl etc. They also include thousands of
local providers.
An ISP is also sometimes referred to as an IAP (Internet access provider). ISP is sometimes used as an
abbreviation for independent service provider to distinguish a service provider that is an independent,
separate company from a telephone company.

Connecting to Internet

To connect to an ISP, you need a modem and an active account. When you connect a modem to the
telephone or cable outlet in your house, it communicates with your ISP. The ISP verifies your account and
assigns your modem an IP address. Once you have an IP address, you are connected to the Internet. You can
use a router (which may a separate device or built into the modem) to connect multiple devices to the
Internet. Since each device is routed through the same modem, they will all share the same public IP
address assigned by the ISP.

What is an IP Address
Internet Protocol Address (or IP Address) is an unique address that computing devices such as personal
computers, tablets, and smartphones use to identify itself and communicate with other devices in the IP
network. Any device connected to the IP network must have an unique IP address within the network. An IP
address is analogous to a street address or telephone number in that it is used to uniquely identify an
entity.
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer,
printer) participating in a computer network that uses the Internet Protocol for communication. An IP
23 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
address serves two principal functions: host or network interface identification and location addressing. Its
role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A
route indicates how to get there."

The designers of the Internet Protocol defined an IP address as a 32-bit number[1] and this system, known
as Internet Protocol Version 4 (IPv4), is still in use today. However, because of the growth of the Internet
and the predicted depletion of available addresses, a new version of IP (IPv6), using 128 bits for the address,
was developed in 1995.[3]IPv6 was standardized as RFC 2460 in 1998,[4] and its deployment has been
ongoing since the mid-2000s.
IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.1 (IPv4),
and 2001:db8:0:1234:0:567:8:1 (IPv6).

IP Address is of two types IPv4 and IPv6

24 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Domain name
A domain name is a unique name that identifies a website. For example, the domain name of the Tech
Terms Computer Dictionary is "techterms.com." Each website has a domain name that serves as an address,
which is used to access the website.

Whenever you visit a website, the domain name appears in the address bar of the web browser. Some
domain names are preceded by "www" (which is not part of the domain name), while others omit the
"www" prefix. All domain names have a domain suffix, such as .com, .net, or .org. The domain suffix helps
identify the type of website the domain name represents. For example, ".com" domain names are typically
used by commercial website, while ".org" websites are often used by non-profit organizations. Some
domain names end with a country code, such as ".dk" (Denmark) or ".se" (Sweden), which helps identify the
location and audience of the website.

Domain names are relatively cheap to register, though they must be renewed every year or every few years.
The good news is that anyone can register a domain name, so you can purchase a unique domain name for
your blog or website. The bad news is that nearly all domain names with common words have already been
registered. Therefore, if you want to register a custom domain name, you may need to think of a creative
variation. Once you decide on a domain name and register it, the name is yours until you stop renewing it.
When the renewal period expires, the domain name becomes available for others to purchase.

NOTE: When you access a website, the domain name is actually translated to an IP address, which defines
the server where the website located. This translation is performed dynamically by a service called DNS.

World Wide Web


The World Wide Web (abbreviated WWW or the Web) is an information space where documents and
other web resourcesare identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and
can be accessed via the Internet. English scientist Tim Berners-Lee invented the World Wide Web in 1989.
He wrote the first web browser computer programme in 1990 while employed at CERN in Switzerland.
The World Wide Web has been central to the development of the Information Age and is the primary tool
billions of people use to interact on the Internet. Web pages are primarily text documents formatted and
annotated with Hypertext Markup Language (HTML). In addition to formatted text, web pages may
contain images, video, audio, and software components that are rendered in the user's web browser as
coherent pages of multimedia content. Embedded hyperlinks permit users to navigate between web pages.
Multiple web pages with a common theme, a common domain name, or both, make up a website. Website
content can largely be provided by the publisher or interactive where users contribute content or the
content depends upon the user or their actions. Websites may be mostly informative, primarily for
entertainment, or largely for commercial, governmental, or non-governmental organizational purposes.

25 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Web browser
A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and
traversing information resources on the World Wide Web. An information resource is identified by
a Uniform Resource Identifier (URI/URL) and may be a web page, image, video or other piece of content.
Hyperlinks present in resources enable users easily to navigate their browsers to related resources.
Although browsers are primarily intended to use the World Wide Web, they can also be used to access
information provided by web servers in private networks or files in file systems.
The major web browsers are Firefox, Google Chrome, Internet Explorer/Microsoft Edge, Opera, and Safari.
Firefox
Mozilla Firefox (or simply Firefox) is a free and open-source web browser developed by the Mozilla
Foundation and its subsidiary, the Mozilla Corporation. Firefox is available
for Windows, macOS and Linux operating systems, with its Firefox for Android available
for Android (formerly Firefox for mobile, it also ran on the discontinued Firefox OS); where all of these
versions use the Gecko layout engine to render web pages, which implements current and anticipated web
standards. An additional version, Firefox for iOS, was released in late 2015, but this version doesn't use
Gecko due to Apple's restrictions limiting third-party web browsers to the WebKit-based layout engine built
into iOS.

Google Chrome
Google Chrome is a freeware web browser developed by Google. It was first released in 2008, for Microsoft
Windows, and was later ported to Linux, macOS, iOS and Android. Google Chrome is also the main
component of Chrome OS, where it serves a platform for running web apps.

Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly
abbreviated IE or MSIE) is a discontinued series of graphical web browsers developed by Microsoft and
included as part of the Microsoft Windows line of operating systems, starting in 1995. It was first released
as part of the add-on package Plus! for Windows 95that year. Later versions were available as free
downloads, or in service packs, and included in the original equipment manufacturer (OEM) service releases
of Windows 95 and later versions of Windows.

Opera (web browser)


Opera is a web browser developed by Opera Software. The latest version is available for Windows, macOS,
and Linuxoperating systems, and uses the Blink layout engine. An earlier version using the Presto layout
engine is still available, and additionally runs on FreeBSD systems.

26 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Web search engine


A web search engine is a software system that is designed to search for information on the World Wide
Web. The search results are generally presented in a line of results often referred to as search engine
results pages (SERPs). The information may be a mix of web pages, images, and other types of files. Some
search engines also mine data available in databases or open directories. Unlike web directories, which are
maintained only by human editors, search engines also maintain real-time information by running
an algorithm on a web crawler.
Web search engine Types:

Google
Google is an American multinational technology company specializing in Internet-related services and
products that include online advertising technologies, search, cloud computing, software, and hardware..
Google was founded in 1996 by Larry Page and Sergey Brin while they were Ph.D. students at Stanford
University, California. Together, they own about 14 percent of its shares and control 56 percent of the
stockholder voting power through supervoting stock. They incorporated Google as a privately held company
on September 4, 1998. An initial public offering (IPO) took place on August 19, 2004, and Google moved to
its new headquarters in Mountain View, California, nicknamed the Googleplex.
Bing
Bing is a web search engine owned and operated by Microsoft. The service has its origins in Microsoft's
previous search engines: MSN Search, Windows Live Search and later Live Search. Bing provides a variety of
search services, including web, video, image and map search products. It uses the ASP.NET programming
language and follows the design principles of Microsoft's "Metro"design language.
Bing, Microsoft's replacement for Live Search, was unveiled by Microsoft CEO Steve Ballmer on May 28,
2009, at the All Things Digital conference in San Diego, California, for release on June 1, 2009. Notable new
features at the time included the listing of search suggestions while queries are entered and a list of related
searches (called "Explore pane") based on semantic technologyfrom Powerset, which Microsoft had
acquired in 2008.
Baidu

Baidu, Inc. (Chinese: 百度; pinyin: Bǎidù, anglicized /ˈbaɪduː/ "by-doo"), incorporated on January 18, 2000,
is a Chinese web services company headquartered at the Baidu Campus in Beijing's Haidian District.
Baidu offers many services, including a Chinese search engine for websites, audio files and images. Baidu
offers 57 search and community services including Baidu Baike (an online, collaboratively
built encyclopedia) and a searchable, keyword-based discussion forum. Baidu was established in 2000
by Robin Li and Eric Xu. Both of the co-founders are Chinese nationals who studied and worked overseas
before returning to China. In March 2015, Baidu ranked 4th overall in the Alexa Internet rankings.
Yahoo!
Yahoo Inc. (also known simply as Yahoo!, styled as YAHOO!) is an American multinational technology
company headquartered in Sunnyvale, California. Yahoo was founded by Jerry Yang and David Filo in
January 1994 and was incorporated on March 2, 1995. Yahoo was one of the pioneers of the early internet
era in the 1990s. Marissa Mayer, a former Google executive, serves as CEO and President of the company.

27 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

URL
URL stands for Uniform Resource Locator. A URL is nothing more than the address of a given unique resource
on the Web. In theory, each valid URL points to a unique resource. Such resources can be an HTML page, a
CSS document, an image, etc.
With Hypertext and HTTP, URL is one of the key concepts of the Web. It is the mechanism used by browsers
to retrieve any published resource on the web. Here is some examples of URLs:
https://www.google.com/

Any of those URLs can be typed into your browser's address bar to tell it to load the associated page
(resource).

A URL is composed of different parts, some mandatory and others optional. Let's see the most important parts
using the following URL:

http://www.example.com:80/path/to/myfile.html?key1=value1&key2=value2#SomewhereInTheDocument

http:// is the protocol. It indicates which protocol the browser must use. Usually it is the HTTP
protocol or its secured version, HTTPS. The Web requires one of these two, but browsers also know
how to handle other protocols such as mailto: (to open a mail client) or ftp: to handle file transfer, so
don't be surprised if you see such protocols.

www.example.com is the domain name. It indicates which Web server is being requested. Alternatively,
it is possible to directly use an IP address, but because it is less convenient, it is not often used on the
Web.

:80 is the port. It indicates the technical "gate" used to access the resources on the web server. It is
usually omitted if the web server use the standard ports of the HTTP protocol (80 for HTTP and 443 for
HTTPS) to grant access to its resources. Otherwise it is mandatory.

28 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

/path/to/myfile.html is the path to the resource on the Web server. In the early days of the Web, a
path like this represented a physical file location on the Web server. Nowadays, it is mostly an
abstraction handled by Web servers without any physical reality.

?key1=value1&key2=value2 are extra parameters provided to the Web server. Those parameters are a
list of key/value pairs separated with the & symbol. The Web server can use those parameters to do
extra stuff before returning the resource. Each Web server has its own rules regarding parameters, and
the only reliable way to know if a specific Web server is handling parameters is by asking the Web
server owner.

#SomewhereInTheDocument is an anchor to another part of the resource itself. An anchor represents a


sort of "bookmark" inside the resource, giving the browser the directions to show the content located at
that "bookmarked" spot. On an HTML document, for example, the browser will scroll to the point where
the anchor is defined; on a video or audio document, the browser will try to go to the time the anchor
represents. It is worth noting that the part after the #, also known as fragment identifier, is never sent to
the server with the request.

You might think of a URL like a regular postal mail address: the protocol represents the postal service you want
to use, the domain name is the city or town, and the port is like the zip code; the path represents the building
where your mail should be delivered; the parameters represent extra information such as the number of the
apartment in the building; and, finally, the anchor represents the actual person to whom you've addressed your
mail.

29 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

E-mail
E-mail is Short form of electronic mail. e-mail or email is information stored on a computer that is exchanged
between two users over telecommunications. More plainly, e-mail is a message that may
contain text, files, images, or other attachments sent through a network to a specified individual or group of
individuals. The first e-mail was sent by Ray Tomlinson in 1971. By 1996, more electronic mail was being sent
than postal mail.

E-mail address breakdown


support@computerhope.com

 The first portion all e-mail addresses, the part before the @ symbol, contains the alias, user, group, or
department of a company. In our above example support is the Technical Support department at
Computer Hope.
 Next, the @ (at sign) is used as a divider in the e-mail address; it is required for all SMTP e-mail
addresses since the first message was sent by Ray Tomlinson.
 Finally, computerhope.com is the domain name to which the user belongs.

How to send and receive e-mail


E-mail Program
To send and receive e-mail messages, you can use an e-mail program, also known as an e-mail client, such
as Microsoft Outlook or Mozilla Thunderbird. When using an e-mail client, you must have a server that stores and
delivers your messages, which is provided by your ISP or in some cases, another company. An e-mail client
needs to connect to a server to download new e-mail, whereas email stored online (see next section) updates
automatically when you visit the site.
E-mail Online
An alternative way of sending and receiving e-mail (and the more popular solution for most people) is an online e-
mail service or webmail. Examples include Hotmail (now Outlook.com), Gmail, and Yahoo Mail. Many of the
online e-mail services, including the ones we just mentioned, are free or have a free account option.

30 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Writing an e-mail
When writing an e-mail message, it should look something like the example window below. As you can see,
several fields are required when sending an e-mail:

 The To field is where you type the e-mail address of the person who is the recipient of your message.
 The From field should contain your e-mail address.
 If you are replying to a message, the To and From fields are automatically filled out; if it's a new message,
you'll need to enter them manually.
 The CC or Carbon Copy field allows you to send a copy of the message to another e-mail address, but is
not mandatory.
 The Subject Line, although not required, should consist of a few words describing the e-mail's contents.
 Finally, the Message Body is the location you type your main message. It often contains
your signature at the bottom; similar to a hand-written letter.

31 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Website
A website, or Web site, is not the same thing as a Web page. Though the two terms are often used
interchangeably, they should not be. So what's the difference? To put it simply, a Web site is a collection of
Web pages. For example, Amazon.com is a Web site, but there are millions of Web pages that make up the
site. Knowing the difference between these two terms can save you a lot of embarrassment.

E-government
E-government (short for electronic government) is the use of electronic communications devices, computers and
the Internet to provide public services to citizens and other persons in a country or region. According to Jeong,
2007 the term consists of the digital interactions between a citizen and his or her government (C2G), between
governments and other government agencies (G2G), between government and citizens (G2C), between
government and employees (G2E), and between government and businesses/commerces (G2B). E-government
delivery models can be broken down into the following categories:[1] This interaction consists of citizens[clarification
needed]
communicating with all levels of government (city, state/province, national, and international), facilitating
citizen involvement in governance using information and communication technology (ICT) (such as computers
and websites) and business process re-engineering (BPR).

Advantages
The ultimate goal of the e-government is to be able to offer an increased portfolio of public services to citizens in
an efficient and cost effective manner. E-government allows for government transparency. Government
transparency is important because it allows the public to be informed about what the government is working on as
well as the policies they are trying to implement. Simple tasks may be easier to perform through electronic
government access. Many changes, such as marital status or address changes can be a long process and take a
lot of paper work for citizens. E-government allows these tasks to be performed efficiently with more convenience
to individuals. E-government is an easy way for the public to be more involved in political campaigns. It could
increase voter awareness, which could lead to an increase in citizen participation in elections. It is convenient and
cost-effective for businesses, and the public benefits by getting easy access to the most current information
available without having to spend time, energy and money to get it.
E-government helps simplify processes and makes government information more easily accessible for public
sector agencies and citizens. The anticipated benefits of e-government include efficiency, improved services,
better accessibility of public services, sustainable community development and more transparency and
accountability.

Disadvantages
The main disadvantages concerning e-government is the lack of equality in public access to computers and the
internet (the "digital divide", a reference to the fact that people who have low incomes, who are homeless and/or
who live in remote regions may have little or no access to the Internet), reliability of information on the web, and
issues that could influence and bias public opinions. There are many considerations and potential implications of
implementing and designing e-government, including disintermediation of the government and its citizens,
impacts on economic, social, and political factors, vulnerability to cyber-attacks, and disturbances to the status
quo in these areas.

32 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Microsoft office word 2007


To open a new word document (CTRL+N)
1.Click on Start button.
2.Then go to Program.
Select Microsoft Office.
4.Click on Microsoft word.
5.Click the Microsoft Office Button.
6.Click New, and then in the New Document window, double-click Blank document.

To save a new word document for the first time(CTRL+SAVE)


1. Click on Start button.
2 .Then go to Program.
3. Select Microsoft Office.
4 Click the Microsoft Office Button,
5.Then click the Save button or Save As button.
6. In the File name box, type a name for the document, and then click Save.

To print a document with the default settings


1. Click the Microsoft Office Button,
2. point to Print,
3.and then click Quick Print.

To copy(CTRL+C) or cut(CTRL+X) and paste(CTRL+V) text


1. Select the text, and then on the Home tab, in the Clipboard group, click the Copy
or Cut button.
2. Click where you want to paste the text, and then in the Clipboard group, click the
Paste button.

To undo an action(CTRL+Z)
➜ On the Quick Access Toolbar, click the Undo button.

To Redo an action(CTRL+Y)
➜ On the Quick Access Toolbar, click the Redo button.

To insert a picture block in a document


➜ Click where you want to insert the picture
Then go to Insert tab.
select the picture from the Quick Part gallery.

To insert the date and time


1. Click where you want the date or time to appear, and then on the Insert tab, in the
Text group, click the Date & Time button.
2. In the Date and Time dialog box, under Available formats, click the format you
want, and then click OK.

To translate a word or phrase into another language


1. Select the word or phrase, and then on the Review tab, in the Proofing group, click
33 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
the Translate button.
2. In the Translation area of the Research task pane, select the desired languages in
the From and To boxes to display the translation.

To find text(CTRL+F)
1. On the Home tab, in the Editing group, click the Find button.
2. On the Find tab of the Find and Replace dialog box, specify the text you want to
find, and then click Find Next.

To replace text(CTRL+H)
1. On the Home tab, in the Editing group, click the Replace button.
2. On the Replace tab of the Find and Replace dialog box, specify the text you want
to find and the text you want to replace it with, and then click Find Next.
3. Click Replace to replace the first instance of the text, Replace All to replace all instances,

To check spelling and grammar.(F7)


1. On the Review tab, in the Proofing group, click the Spelling & Grammar button.
2. In the Spelling and Grammar dialog box, click the appropriate buttons to correct
the errors Word finds or to add words to the custom dictionary or AutoCorrect list.
3. Click OK when Word reaches the end of the Spelling and Grammar check, and
then click Close.

To change the font.(CTRL+SHIFT+F)


➜ Select the text. Then on the Home tab, in the Font group, click the Font arrow, and
click the font you want.

To change the font size. (CTRL+SHIFT+P)


➜ Select the text. Then on the Home tab, in the Font group, click the Font Size arrow,
and click the font size you want.

To change the color of text


➜ Select the text. Then on the Home tab, in the Font group, click the Font Color
arrow, and in the color palette, click the color you want.

To highlight text with a color


➜ Select the text. Then on the Home tab, in the Font group, click the Highlight
arrow, and click the color you want.

To insert a line break


➜ Click at the right end of the text where you want the line break to appear. Then on
the Page Layout tab, in the Page Setup group, click the Breaks button, and click
Text Wrapping.

To add a background color to a document


➜ On the Page Layout tab, in the Page Background group, click the Page Color
button, and then in the palette, click the background color you want.

To insert a header or footer in a document

34 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
1. On the Insert tab, in the Header & Footer group, click the Header or Footer button.
2. In the Header or Footer gallery, click the style you want to use.
3. In the placeholders, type the text you want.
4. On the Design contextual tab, in the Close group, click the Close Header and
Footer button.

To insert only a page number


1. On the Insert tab, in the Header & Footer group, click the Page Number button.
2. Point to a position option in the list, and in the gallery, select a page number style.

To insert a table
1. Click where you want to insert the table. Then on the Insert tab, in the Tables
group, click the Table button.
2. In the grid, point to the upper-left cell, move the pointer across and down to select
the number of columns and rows you want, and click the lower-right cell in the
selection.

To merge table cells


➜ Select the cells you want to merge. Then on the Layout contextual tab, in the
Merge group, click the Merge Cells button.

To add rows to a table


➜ Click in the row above or below which you want to add a single row, and then on
the Layout tab, in the Rows & Columns group, click the Insert Above or Insert
Below button; or select the number of rows you want to insert, and then in the
Rows & Columns group, click the Insert Above or Insert Below button.

To draw a table
1. Click where you want to draw the table. Then on the Insert tab, in the Tables
group, click the Table button, and then click Draw Table.
2. Drag the pointer (which has become a pencil) across and down to create a cell.
3. Point to the upper-right corner of the cell, and drag to create another cell, or draw
column and row boundaries inside the first cell.
6 Working with Graphics, Symbols, and Equations

To insert a picture
1. Click where you want to insert the picture. Then on the Insert tab, in the Illustrations group, click the
Picture button.
2. Navigate to the folder where the picture is stored, and then double-click the picture
to insert it.

To insert clip art


1. Click where you want to insert the clip art. Then on the Insert tab, in the Illustrations group, click the Clip
Art button.
2. In the Clip Art task pane, in the Search for box, type a word describing what you
are looking for, and then click Go.
3. In the task pane, click a clip art image to insert it in the document, and then close
the task pane.

To insert a chart
35 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
1. On the Insert tab, in the Illustrations group, click Chart.
2. In the Insert Chart dialog box, click the category of chart you want, click the style you want, and then click
OK.

To protect a document with a password


1. Click the Microsoft Office Button, and then click Save As.
2. In the Save As dialog box, navigate to the folder where you want to save the fi le,
and then in the File name box, type a name for the document.
3. At the bottom of the dialog box, click Tools, and then click General Options.
4. In the General Options dialog box, in the Password to open or Password to modify
box, type a password.
5. Click OK to close the General Options dialog box.
6. In the Confirm Password dialog box, in the Reenter password to modify box, type
the password again, and then click OK.
7. Back in the Save As dialog box, click Save.

To remove a password
1. Click the Microsoft Office Button, click Save As, click Tools, and then click General
Options.
2. In the General Options dialog box, select the contents of the Password to open or
Password to modify box, press A, click OK, and then click Save.

How to perform mail merge operation

Part 1 of 3: Adding Recipients


1. Understand what the Mail Merge function allows you to accomplish.
2.Create a recipient spreadsheet (optional).
3.Click the "Mailings" tab to open the Mail Merge tools
4.Click the "Start Mail Merge" button and select your format.
5.Click "Select Recipients" and select how you want to add recipients to the
Mail Merge
Part 2 of 3: Creating the Document
1.Start creating your document as you normally would
2.Click the "Greeting Line" button to create a custom greeting
3.Click the "Insert Merge Field" button and select the field that you want to
insert in the document
4.Click the "Highlight Merge Fields" button to make the inserted fields stand out.
5.Click the "Preview Results" button to see how the final product will look.
Part 3 of 3: Completing the Mail Merge
1.Check for errors.
2.Finish the merge process

36 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Microsoft office Excel 2007

1. Excelbasics:createanewfile
 Open Microsoft Excel
 With the mouse, go to the Excel menu bar and left-click the File menu
 Within the File menu find and left-click New
 There should now be a New Workbook pane on the right side of your Excel program
 Left-click Blank Workbook to create a new workbook
2. Excelbasics: savea newfile
 Add some data to your currently blank spreadsheet
 On the keyboard push Ctrl + S (press and hold the control key then push S key while still
holding down control) to save your work!
 If this is the first time saving the current file then you will be greeted with a Save As popup
 At the bottom of this popup is a field labeled File name and currently contains the text
"Book1.xls". Replace this with any name you want to give your file, we have chosen
"TizagBasics" for this example
 Before you press Save, pay attention to where you are saving your file to. The default
location Excel saves to is the My Documents folder and we suggest you save there if you
are not very comfortable with navigating the Windows File System.
3. Excelbasics:openan existing file
 Go to the Excel menu bar and left-click the File menu
 Within the File menu find and click the Open choice
 If this is the first time saving the current file then you will be greeted with a Open popup
 You should currently be in the "My Documents" folder, if not please navigate there.
 Find your file "TizagBasics.xls" and double-click the file to open it.

4. Excelbasics:closea file

There are two options for closing your Excel file. You can close your file but keep Excel open or
you can close your file along with Excel. To only close your file follow these steps:

 Click the lower of the two X's that appear in the top right.
 If you have made any changes to your file you will be prompted to save before you quit, you
should do so.

To close both your file and Excel follow these steps:


37 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
 Click the upper X that appears in the top right. Notice that this X rests on a raised gray
square.
 If you have made any changes to your file you will be prompted to save before you quit, you
should do so.
5. Excelbasics: undo changes
 Make a bunch of mistake in your Excel spreadsheet (this may be easier for some)
 Using the keyboard press Ctrl + Z (press and hold the control key and press the Z key while
still holding down control)
 Notice that your last change was just undone!
 Continue to press Ctrl + Z until all your mistakes have been undone
6. Excelbasics: redo changes
 Undo something you don't want to undo
 Using the keyboard press Ctrl + Y (press and hold the control key and press the Y key while
still holding down control)
 Notice that your last undo was just reverted!
 Continue to press Ctrl + Y until all your accidental undos have been "redone".
7.Thespreadsheet,thecontainer
The spreadsheet (or worksheet) contains or will contain all the data that you enter. When you start
up Excel, you should be greeted with a blank spreadsheet like the one we have below.

partsofthespreadsheet

38 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Nearly every part of the spreadsheet has its own term and it is quite useful to know your
spreadsheet vocabulary to make using Excel that much easier. There are three basic parts of an
Excel Spreadsheet:

Column - The vertical segments that you see on the spreadsheet are called columns.

Row - The horizontal segments are referred to as rows.

Cell - Each box that is created from a row and column intersecting is referred to as a cell

8. Excelfunctions: your firstfunction

Using our soccer goal Excel spreadsheet from the previous lessons, let's use Excel functions to
figure out what the total number of goals scored by our team. Open up the soccer goal spreadsheet
and follow these steps:

In cell A9 enter the text Total and make it bold

Select cell B9 and locate the formula bar (it's right under the Excel menu bar) and notice that it
contains the content of cell B9, which just so happens to be nothing! Let's fix that

Notice the little fx to the left of the formula bar. This is the insert function button.

Left-click the fx button to bring up the insert function popup

39 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Using the Excel "Search for a function" feature type in the text "Sum" and click Go

Make sure SUM is selected and click OK to bring up the Function Arguments Window

Before we go any further let's make sure you understand what we have done so far. First we
selected a cell that we wanted to have our total goal count appear in. Next we inserted a function
and chose the SUM function.

We've done quite a lot and the only thing that remains is to select whichnumbers we want to sum
up. So let's finish this up!

Move the Function Arguments Window so you can see the goals scored.

We want to sum up all the goals scored, so we need to select all the cells that contain goals
scored.

Starting at the top of the list, Tim's goals, left-click and hold in Cell B2 then drag down to cell B7,
Jason's goals and finally release left-click. Your screen should now look like this:

40 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Click OK and admire your work!

9. Excelformulas:
Now that we have created separate revenues for both Candy and Vegetable it would be nice to somehow
combine these two values to get the Total Revenue. Although both Vegetable Revenue and Candy Revenue
contain formulas, we can still use these cells as we have been doing and add them together to get our total.
Select cell D5 (directly below "Total")
Type the equal sign "="
Left-click cell D2
Type the plus sign "+"
Left-click cell D3. Cell D5 should now contain this formula "=D2+D3":

Press Enter to complete your Total Revenue!

10.Excel shortcuts:

Ctrl+S: Save your Excel workbook

Ctrl+O: Open an existing Excel workbook


41 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Ctrl+N: Create a new Excel workbook

Ctrl+C: Copy the current selection to the clipboard. After you copy something, you can paste it with
the paste shortcut.

Ctrl+V: Paste the current item from the clipboard.

Ctrl+X: Cut the current selection and place it on the clipboard, which can be pasted. The difference
between cut and copy is that cut will delete your selection, while copy will not.

Ctrl+Z: Undo your last change. This is can be repeated to remove again and again to undo many
changes.

Ctrl+Y: Redo your last Undo. This only is available if you have just issued an Undo command.

Backspace: Deletes the current cell and enters edit mode for that cell. This will only delete one cell
and not a selection.

Delete: Deletes the current selection. Use the delete key when you want to delete more than one
cell at a time.

Page Up: Move one page up in your worksheet

Page Down: Move one page down in your worksheet. Note: The number of rows moved in both
page up and page down depend on how many rows are currently displayed. The more rows you
have displayed the greater amount the row jump will be when you do a page up/down.

Ctrl+Home: Move to the beginning of your worksheet

Ctrl+End: Move to the end of your worksheet

Tab: Move right one column

Shift+Tab: Move left one column

Ctrl+Page Up: Go back one worksheet

Ctrl+Page Down: Go forward one worksheet. Note: If you are not using multiple worksheets in your
workbook you will probably not use this shortcut!

Ctrl+B: Toggles bold on and off for your selection

Ctrl+I: Toggles italic on and off for your selection

Ctrl+U: Toggles underline on and off for your selection

Alt+F: Accesses the File menu

Alt+E: Accesses the Edit menu

Alt+V: Accesses the View menu

42 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Alt+I: Accesses the Insert menu

Alt+T: Accesses the Tools menu

Alt+D: Accesses the Data menu

Alt+W: Accesses the Window menu

Alt+H: Accesses the Help menu

Shift+Spacebar: Select the current Row

Ctrl+Spacebar: Select the current column

Ctrl+A: Select All, will select everything on the current worksheet. This is most often used in
conjunction with the copy shortcut.

F1: Opens up the quick help feature

Ctrl+P: Print your worksheet

11.Excelsort

Excelsorting:alphabeticalorder (ascending)
The most common type of sorting, and one that is applicable to our situation, is alphabetical
ordering. This kind of ordering places the cells that start with the early letters of the alphabet (a, b,
c...) at the top and the later letters (t, u, v...) at the bottom of the list.
First we need to select all the data so we can begin to sort it. Because each name has a
corresponding score we need to select both columns to preserve the students' correct scores.
Left-click and hold on cell A1 then drag down-right to cell B10 to highlight all the data for sorting!
Your spreadsheet should look like this:

Left-click the "sort ascending" button, located near the top, on the shortcut bar (it has a
blue A on top and a red Z on bottom with a downward pointing arrow).

43 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Your spreadsheet should now be sorted.

Notice that your column titles (Name and Score) have not been included for sorting because
Excel is smart enough to know that you do not want these special cells (A1 and B1)
included.
reversealphabeticalorder(descending)
The steps for reverse alphabetical order are the same as above, except that you need to
click the "sort descending" button instead.
Select the data you wish to sort (left-click in cell A1 and drag down-right to B10)

Left-click the "sort descending" button, located near the top, on the shortcut bar (it has a
red Z on top and a blue A on bottom downward pointing arrow).

44 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Your spreadsheet should now be sorted in reverse alphabetical order.

12.Charts
A simple chart in Excel can say more than a sheet full of numbers. As you'll see, creating
charts is very easy.
Create a Chart
To create a line chart, execute the following steps.
1. Select the range A1:D7.
2. On the Insert tab, in the Charts group, choose Line, and select Line with Markers.

45 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
Result:

Change Chart Type

You can easily change to a different type of chart at any time.

1. Select the chart.

2. On the Insert tab, in the Charts group, choose Column, and select Clustered Column.

46 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Result:

47 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Microsoft office PowerPoint 2007

Start PowerPoint

To open PowerPoint, click on the Start menu, select Programs, select Microsoft Office, and
select
Microsoft Office PowerPoint 2007.
Or, click on the PowerPoint 2007 icon in the taskbar or on the desktop.

When you open PowerPoint, it starts with the title slide of a blank presentation.

The Office Button

The Office Button and the Quick Access Toolbar

The circular button in the top, left-hand corner of the screen Quick Access
Toolbar

is the Office Button. This is where you can open, save and
print your presentation.

The Quick Access Toolbar is beside the Office


Button, and allows you to save your presentation or
undo the last changes you made.

48 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
3

The Ribbon

The Ribbon is the area at the top of screen that contains menu tabs that in turn contain groups
of command buttons. The menu tabs, groups and command buttons may change depending
on what you have selected on the slide in your presentation.

Live Preview

Live Preview shows you what the various design choices look like on your slide before you
actually select them from the list of choices in the ribbon. When you hold your mouse
pointer over a preset style, that style is displayed on your slide exactly how it would look if
you were to select it.

Explore PowerPoint Views

The Normal View of PowerPoint Quick Access is made up of the Office Button, Quick
Access Toolbar and Ribbon at Toolbar the top, with the Slide View Pane down the
left hand side, the Notes Pane at the bottom, and the Slide
in the middle of the screen.

Office Button

Ribbon

Slide View Pane

Slide

Notes
Pane

49 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
4

Create the title slide (Slide 1)

To create a title slide, click in the


placeholder or text box and type in your title
text:
My presentation

Click in the subtitle text box to add your


subtitle text:
By (Your Name)

Save your presentation

To save a new presentation, or save a


different version of an existing presentation,
click on the Office Button and select Save
As. You can save your presentation as a
PowerPoint 2007 Presentation (.pptx), a
PowerPoint Show (.ppsx), or as a Windows
97-2003 Presentation (.ppt). Remember to
save your presentation after adding each new
slide and whenever you make changes.

The different view options can be accessed by clicking on the View tab in the ribbon.

The Slide Sorter View shows the slides in your presentation in numerical order and
allows you to change the order of your slides and add transition effects.

The Slide Show View shows you presentation on the full screen, either from the current
slide, or from the first slide (F5). The Escape (ESC) key gets you back to your previous view
from the full screen slide show.

The Notes Page View shows a preview of your printed notes page for each slide. Each notes
page will have a graphic representation of the slide with the notes area below it. The text of

50 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
your notes can also be added on the Notes Page View.

The Master View provides access to the design template for each preset slide layout,
handout layout, and notes page. Changes made to the text formatting, background, and
placeholders in the Master View will affect all of the slides, handouts and notes pages in the
presentation.
Add a new slide

To add a new slide to your presentation, open the Home tab in the ribbon and click on the
New Slide button in the Slides group. You can select from a list of new slide layout choices by
clicking on the New Slide drop-down list. PowerPoint will add a Title and Content preset slide
when you click on the New Slide button.

Add a new slide to your presentation. (Slide 2)

In the title textbox, enter the text:


PowerPoint Tips

In the content placeholder, enter the following bulleted list:


Use key words
Limit text per slide
Keep it simple

To select the text for formatting, click inside the text box to make the placeholder visible and
then click on the outline of the placeholder. The outline will change from a dotted line to a
solid line. When the placeholder is a solid line it means the textbox is selected and its
contents are ready for editing.
You can also click and drag the cursor over the text to select the text for editing.

When your text is selected, you can change the font, color, and format of the text.

To create sub-text, create a new


line after “Limit text per slide” and
type in:
3-5 words per line
6 lines per page

Select the two new lines and click


on the Increase Indent button in
the Paragraph group in the Home
menu. The indent will increase
and the bullet style will change.
o 3-5 words per
line o 6 lines per
page

51 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Images

PowerPoint enables you to insert shapes, charts, SmartArt, clip-art, and digital photos
into your presentation. Shapes and SmartArt are made in PowerPoint, charts and
graphs can be made in PowerPoint or imported from Microsoft Excel, and clip-art or
digital photos can be inserted into PowerPoint from your computer, network drive, or the
internet.
Clip-art files will usually be .wmf or .gif files and digital photos will usually be .jpg files.
Digital photos may also be .tiff or .bmp files.

It’s important to be aware of the size of a


digital photo, both the size of the digital file, 1024 pixels wide
measured in bytes, and the size of the image
measured in pixels. The size of the image will
be measured in the number of pixels in width
by the number of pixels in height. The image
size of a standard computer screen is 1024

High
pixels wide by 768 pixels high, so if you have 600
a digital photo that is 1024 by 768, it will fill up
a PowerPoint slide without resizing it. A photo

0
that is 600 by 400 will take up about ¼ of the
slide without resizing. Photos that are larger
or smaller than 1024 by 768 can be resized to
fit in a slide, but photos that are very small will
be poor quality if they are resized larger by a
large amount.

Add another new slide to your presentation (Slide 3)

In the Title text-box, enter the text:


Image Guidelines

In the content placeholder, enter the following bulleted list:


Restrict final file size
Use compressed files - .jpg, .gif,
.wmf Don’t enlarge small images
by much

52 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
7

Add another new slide to your presentation (Slide 4)

From the Insert tab on the ribbon, select Picture from the Illustration group.

The Insert Picture dialog box will open.

Select the location on your hard drive or network


drive that contains the image you want to insert.

Select the image file and click the Insert button.

Resize and position the photo

Click on the image to select the picture. The ribbon will change to show the Picture Tools,
Format tab, and handles will appear on the corners and edges of the picture.

To resize the picture, click and hold the mouse pointer on a handle on the corner of the
picture. Drag the handle diagonally toward or away from the center of the picture to resize it
smaller or bigger. Release the mouse button to let go of the handle.

To move the picture, click and hold the mouse pointer anywhere on the picture. Drag the
picture to where you want it on the slide, and release the mouse button to place the picture
in its new location.

Insert a picture from the internet

Using Internet Explorer, go to http://www.google.ca/ and select Images in the top left corner.
Select a topic for an image search and search images. The images will be displayed with
their name, dimensions, file size, file type and web address.

Click on a .jpg image that is several hundred pixels wide. This will open the web page that
contains the image. Click on the phrase; See full size image to see the full size image. This will
bring up the full size image in a window. This is the version of the image that you want to copy
to your computer and insert into your presentation.

To copy the image to your computer, right click on the image, select Save Picture As, and
select a location on your computer to save the image. Once the image is saved on your
computer, you can insert it into your presentation as you did with slide 4.

53 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology
If you use an image from a web site you must credit the source by displaying the web address
the image is from in your presentation. This is done by copying the web address from the
Internet Explorer address bar and pasting it in a textbox on the slide with the image. Ask a
librarian if you have questions about copyright permissions and how to cite your sources
properly.

Slide Design

Changes to the design of you presentation can be made by opening the Design tab on the
ribbon. This gives you access to a variety of preset themes, color combinations, fonts and
effects. Use the drop-down menus to see all the possible choices and holding the mouse
pointer over the example to preview the selection. Each theme can be modified with an
assortment of color combinations, fonts and effects. Use a slide design that is appropriate for
your topic and has enough contrast between the text and background to make it easy to read
from the back of the room.

Slide Transitions

Transitions are the effects between slides and are located in the Animations tab in the
ribbon. The transitions can be previewed by holding the mouse pointer over the transition icon
in the drop-down list of transitions. The transition can be applied to the selected slide or to all
slides in the presentation. It’s best to use simple transitions, like a fade or wipe, as more
complicated transitions can distract your audience from your message.

Custom Animation

Custom Animations are movements that can be applied to text, objects or pictures on an
individual slide. The Custom Animations button in the Animations tab of the ribbon will open a
task pane on the right side of the screen that gives you access to Entrance effects, Emphasis
effects, Exit effects and Motion Paths. To animate an object, select the text box, shape or
picture, then select an effect from the Add Effect drop-down list. Animation effects can start on
a mouse click, with the previous mouse click, or after a specified amount of time. The speed
and direction of the effect can also be modified.
As with transitions, it’s best to use simple animations so you don’t distract your audience
from your message.

54 | P a g e
Open Elective Paper 9 Fundamentals of Information Technology

Printing Slides, Handouts or Speaker Notes

The Print dialog box can be opened by clicking on


the Office Button and selecting the Print option.
Select what you want to print from the Print what:
drop-down menu. You have a choice of printing your
slides, handout pages, notes pages or the outline
view of your slides. When printing handouts, you
have a choice of how many slides on each page.

View Your Slide Show

To view your slide show, open the Slide Show tab in the ribbon and select From Beginning or
From Current Slide. The keyboard shortcut to view your slide show from the beginning is the
F5 key.
To advance to the next slide:
Left mouse click
Space bar
Page up/down
Arrow up/down, foreword/back
N key = next
P key = previous
Type a slide number and press enter to go to that slide
The B key will black out the screen and the W key will white out the screen.

The escape key (Esc) will close the full screen slide show

55 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy