Service Hotline:+1(720)689-6035 | E-mail :info@ccu.edu.eu
In today's world, we use computers for all our tasks. Our day-to-day activities: paying bills, buying groceries, using social media, seeking entertainment, working from home, communicating with a friend, etc., can all be done using a computer. So it is important not only to know how to use a computer, but also to understand the components of a computer and what they do.
This topic explains all concepts related to computer in detail, from origin to end. The idea of computer literacy is also discussed, which includes the definition and functions of a computer. You learn about the components of a computer, the concept of hardware and software, representation of data/information, the concept of data processing and applications of IECT.
A computer is an electronic device that accepts data from the user, processes it, produces results, displays them to the users, and stores the results for future usage.
Data is a collection of unorganized facts & figures and does not provide any further information regarding patterns, context, etc. Hence data means “unstructured facts and figures”.
Information is a structured data i.e. organized meaningful and processed data. To process the data and convert into information, a computer is used.
A computer performs the following functions −
Data is fed into computer through various input devices like keyboard, mouse, digital pens, etc. Input can also be fed through devices like CD-ROM, pen drive, scanner, etc.
Operations on the input data are carried out based on the instructions provided in the programs.
After processing, the information gets stored in the primary or secondary storage area.
The processed information and other details are communicated to the outside world through output devices like monitor, printer, etc.
Software can be categorized into two types – System software & Application software
In this chapter, we discussed different components of a computer, and familiarized ourselves with concept of hardware and software, representation of data/information, concept of data processing, and applications of IECT.
The history of the computer dates back to several years. There are five prominent generations of computers. Each generation has witnessed several technological advances which change the functionality of the computers. This results in more compact, powerful, robust systems which are less expensive. The brief history of computers is discussed below −
The first generation computers had the following features and components −
The hardware used in the first generation of computers was: Vacuum Tubes and Punch Cards.
Following are the features of first generation computers −
The memory was of 4000 bits.
The input was only provided through hard-wired programs in the computer, mostly through punched cards and paper tapes.
The examples of first generation computers are −
Several advancements in the first-gen computers led to the development of second generation computers. Following are various changes in features and components of second generation computers −
The hardware used in the second generation of computers were −
It had features like −
The capacity of the memory was 32,000 bits.
The input was provided through punched cards.
The examples of second generation computers are −
Following are the various components and features of the third generation computers −
The hardware used in the third generation of computers were −
The features of the third generation computers are −
The capacity of the memory was 128,000 bits.
The input was provided through keyboards and monitors.
The examples of third generation computers are −
Fourth generation computers have the following components and features −
The Hardware used in the fourth generation of computers were −
It supports features like −
The capacity of the memory was 100 million bits.
The input was provided through improved hand held devices, keyboard and mouse.
The examples of fourth generation computers are −
These are the modern and advanced computers. Significant changes in the components and operations have made fifth generation computers handy and more reliable than the previous generations.
The Hardware used in the fifth generation of computers are −
The capacity of the memory is unlimited.
The input is provided through CDROM, Optical Disk and other touch and voice sensitive input devices.
The examples of fifth generation computers are −
The characteristics of the computer system are as follows −
A computer works with much higher speed and accuracy compared to humans while performing mathematical calculations. Computers can process millions (1,000,000) of instructions per second. The time taken by computers for their operations is microseconds and nanoseconds.
Computers perform calculations with 100% accuracy. Errors may occur due to data inconsistency or inaccuracy.
A computer can perform millions of tasks or calculations with the same consistency and accuracy. It doesn't feel any fatigue or lack of concentration. Its memory also makes it superior to that of human beings.
Versatility refers to the capability of a computer to perform different kinds of works with same accuracy and efficiency.
A computer is reliable as it gives consistent result for similar set of data i.e., if we give same set of input any number of times, we will get the same result.
Automation
Computer performs all the tasks automatically i.e. it performs tasks without manual intervention.
A computer has built-in memory called primary memory where it stores data. Secondary storage are removable devices such as CDs, pen drives, etc., which are also used to store data.
Computers play a role in every field of life. They are used in homes, business, educational institutions, research organizations, medical field, government offices, entertainment, etc.
Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They provide communication through electronic mail. They help to avail work from home facility for corporate employees. Computers help the student community to avail online educational support.
Computers are used in hospitals to maintain a database of patients' history, diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical devices to perform delicate operations, and conduct surgeries remotely. Virtual reality technologies are also used for training purposes. It also helps to monitor the fetus inside the mother's womb.
Computers help to watch movies online, play games online; act as a virtual entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the entertainment industry in recording music with artificial instruments. Videos can be fed from computers to full screen televisions. Photo editors are available with fabulous features.
Computers are used to perform several tasks in industries like managing inventory, designing purpose, creating virtual sample products, interior designing, video conferencing, etc. Online marketing has seen a great revolution in its ability to sell various products to inaccessible corners like interior or rural areas. Stock markets have seen phenomenal participation from different levels of people through the use of computers.
Computers are used in education sector through online classes, online examinations, referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the education field.
In government sectors, computers are used in data processing, maintaining a database of citizens and supporting a paperless environment. The country's defense organizations have greatly benefitted from computers in their use for missile development, satellites, rocket launches, etc.
In the banking sector, computers are used to store details of customers and conduct transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced manual errors and expenses to a great extent through extensive use of computers.
Nowadays, computers are totally integrated into business. The main objective of business is transaction processing, which involves transactions with suppliers, employees or customers. Computers can make these transactions easy and accurate. People can analyze investments, sales, expenses, markets and other aspects of business using computers.
Many organizations use computer-based training to train their employees, to save money and improve performance. Video conferencing through computers allows saving of time and travelling costs by being able to connect people in various locations.
Computers are extensively used in dance, photography, arts and culture. The fluid movement of dance can be shown live via animation. Photos can be digitized using computers.
Computers with high performance are used to stimulate dynamic process in Science and Engineering. Supercomputers have numerous applications in area of Research and Development (R&D). Topographic images can be created through computers. Scientists use computers to plot and analyze data to have a better understanding of earthquakes.
Computer systems consist of three components as shown in below image: Central Processing Unit, Input devices and Output devices. Input devices provide data input to processor, which processes data and generates useful information that's displayed to the user through output devices. This is stored in computer's memory.
The Central Processing Unit (CPU) is called “the brain of computer” as it controls operation of all parts of computer. It consists of two components: Arithmetic Logic Unit (ALU), and Control Unit.
Data entered into computer is sent to RAM, from where it is then sent to ALU, where rest of data processing takes place. All types of processing, such as comparisons, decision-making and processing of non-numeric information takes place here and once again data is moved to RAM.
As name indicates, this part of CPU extracts instructions, performs execution, maintains and directs operations of entire system.
Control unit performs following functions −
This is unit in which data and instructions given to computer as well as results given by computer are stored. Unit of memory is “Byte”.
1 Byte = 8 Bits
Input devices help to get input or data from user. Some of input devices are −
It helps to input text and numbers into computer.
It consists of 104 keys and 12 functional keys.
It also helps to select, highlight content and drag-drop controls.
There are few other input devices which help to feed data to the computer. They are as follows −
A digital pen is also called as a Stylus which helps to write or draw data over pad.
After scanning of printed material, page is represented in memory as an array of pixels.
Barcode readers are most widely used input devices which we can see in most of products in our day to day life.
Output devices help to display output to user. Some of output devices are −
It is also called as “Visual Display Unit”.
The inputs given by keyboard or any other input devices will get displayed on monitor.
Cathode Ray Tube (CRT) and Flat panel display monitors are commonly used monitors.
The two types of printers are impact and non-impact printers.
Non-impact printers such as laser and inkjet printers are less noisy, more reliable and faster and also offer high quality compared to impact printers.
Computer memory refers to storage area where data is stored. It is of two types −
Primary memory is the main memory of computer present in motherboard. Primary memory is of two types as shown in the image below.
RAM is referred as temporary memory, in which, information stored is lost once computer is turned off. It is a volatile memory. Instructions written in this memory can be modified; hence it is also known as programmable memory. The two types of RAM are Static RAM (faster and costlier) and Dynamic RAM.
Functions of RAM are as follows −
ROM is referred as permanent memory, in which information stored is available even if computer is turned off. Instructions stored in this memory can only be read and cannot be modified. Mostly ROM has a start-up instruction which is executed every time when computer is switched on. Types of ROM are PROM (Programmable Read Only Memory), EPROM (Erasable PROM), EEPROM (Electrically Erasable PROM) and flash memory.
The below table jots down the major differences between RAM and ROM −
Sometimes when data to be processed is large, it cannot fit in primary memory as it is limited, in such cases, we use supplement memory or secondary memory. Secondary memory helps to store information permanently and is non-volatile. Examples of secondary storage memory are compact disk, floppy disk, pen drive, external hard drive, etc.
The concept of hardware and software is explained in detail below −
The term hardware refers to mechanical device that makes up computer. Computer hardware consists of interconnected electronic devices that we can use to control computer's operation, input and output. Examples of hardware are CPU, keyboard, mouse, hard disk, etc.
Computer hardware is a collection of several components working together. Some parts are essential and others are added advantages. Computer hardware is made up of CPU and peripherals as shown in image below.
A set of instructions that drives computer to do stipulated tasks is called a program. Software instructions are programmed in a computer language, translated into machine language, and executed by computer. Software can be categorized into two types −
System software operates directly on hardware devices of computer. It provides a platform to run an application. It provides and supports user functionality. Examples of system software include operating systems such as Windows, Linux, Unix, etc.
An application software is designed for benefit of users to perform one or more tasks. Examples of application software include Microsoft Word, Excel, PowerPoint, Oracle, etc.
Differences between Software and Hardware are sorted out below −
A program is a set of instructions that help computer to perform tasks. This set of instructions is also called as scripts. Programs are executed by processor whereas scripts are interpreted. The languages that are used to write a program or set of instructions are called “Programming languages“. Programming languages are broadly categorized into three types −
Machine language is lowest level of programming language. It handles binary data i.e. 0's and 1's. It directly interacts with system. Machine language is difficult for human beings to understand as it comprises combination of 0's and 1's. There is software which translate programs into machine level language. Examples include operating systems like Linux, UNIX, Windows, etc. In this language, there is no need of compilers and interpreters for conversion and hence the time consumption is less. However, it is not portable and non-readable to humans.
Assembly language is a middle-level language. It consists of a set of instructions in a specific format called commands. It uses symbols to represent field of instructions. It is very close to machine level language. The computer should have assembler to translate assembly level program to machine level program. Examples include ADA, PASCAL, etc. It is in human-readable format and takes lesser time to write a program and debug it. However, it is a machine dependent language.
High-level language uses format or language that is most familiar to users. The instructions in this language are called codes or scripts. The computer needs a compiler and interpreter to convert high-level language program to machine level language. Examples include C++, Python, Java, etc. It is easy to write a program using high level language and is less time-consuming. Debugging is also easy and is a human-readable language. Main disadvantages of this are that it takes lot of time for execution and occupies more space when compared to Assembly- or Machine-level languages. Following is a simple example for a high level language −
if age < 18 { printf("You are not eligible to vote"); } else{ printf("You are eligible to vote"); }
Computer does not understand human language. Any data, viz., letters, symbols, pictures, audio, videos, etc., fed to computer should be converted to machine language first. Computers represent data in the following three forms −
We are introduced to concept of numbers from a very early age. To a computer, everything is a number, i.e., alphabets, pictures, sounds, etc., are numbers. Number system is categorized into four types −
Bits − A bit is a smallest possible unit of data that a computer can recognize or use. Computer usually uses bits in groups.
Bytes − group of eight bits is called a byte. Half a byte is called a nibble.
The following table shows conversion of Bits and Bytes −
Text code is format used commonly to represent alphabets, punctuation marks and other symbols. Four most popular text code systems are −
Extended Binary Coded Decimal Interchange Code is an 8-bit code that defines 256 symbols. Given below is the EBCDIC Tabular column
American Standard Code for Information Interchange is an 8-bit code that specifies character values from 0 to 127.
ASCII Tabular column
Extended American Standard Code for Information Interchange is an 8-bit code that specifies character values from 128 to 255.
Extended ASCII Tabular column
Unicode Worldwide Character Standard uses 4 to 32 bits to represent letters, numbers and symbol.
Unicode Tabular Column
Data processing is a process of converting raw facts or data into a meaningful information.
Data processing consists of following 6 stages −
Collection of data refers to gathering of data. The data gathered should be defined and accurate.
Preparation is a process of constructing a dataset of data from different sources for future use in processing step of cycle.
Input refers to supply of data for processing. It can be fed into computer through any of input devices like keyboard, scanner, mouse, etc.
The process refers to concept of an actual execution of instructions. In this stage, raw facts or data is converted to meaningful information.
In this process, output will be displayed to user in form of text, audio, video, etc. Interpretation of output provides meaningful information to user.
In this process, we can store data, instruction and information in permanent memory for future reference.
IECT stands for Information Electronics and Communication Technology. The applications of IECT are as follows −
Electronic governance is application of Information Electronics and Communication Technology in running an effective governance system for people. Communication refers to sharing of information between parties like common people, government, business, etc. Almost every government sector has changed to IECT like rail reservation system, gas subsidy disbursal, etc.
Multimedia refers to combination of text, audio, video, graphics, animation, etc. It is one of applications of IECT. Multimedia is used to improve quality of presentation by incorporating information sharing, usage of graphics and animation, motion capture, etc.
Personal computer has advanced a lot in a short period of time, and much of the advancement is due to ongoing progresses in operating systems. Evolution of operating systems had made PCs easier to use and understand, flexible and reliable. This chapter is the study of primary operating systems currently used in personal computers and network servers, and their basic features.
This topic presents a broad survey of concepts and terminologies related to operating systems like: Basics of operating system, user interface, basic settings of operating system, file & directory management, and types of files.
Operating system is a software that controls system's hardware and interacts with user and application software.
In short, an operating system is computer's chief control program.
Functions of Operating System
The operating system performs the following functions −
This topic had given a detailed description of operating system, user interface, changing simple settings in the operating system, files & directory management and types of files.
There are four types of operating systems −
Real-time operating system is designed to run real-time applications. It can be both single- and multi-tasking. Examples include Abbasi, AMX RTOS, etc.
An operating system that allows a single user to perform only one task at a time is called a Single-User Single-Tasking Operating System. Functions like printing a document, downloading images, etc., can be performed only one at a time. Examples include MS-DOS, Palm OS, etc.
An operating system that allows a single user to perform more than one task at a time is called Single-User Multitasking Operating System. Examples include Microsoft Windows and Macintosh OS.
It is an operating system that permits several users to utilize the programs that are concurrently running on a single network server. The single network server is termed as “Terminal server”. “Terminal client” is a software that supports user sessions. Examples include UNIX, MVS, etc.
We shall discuss about the basic of Operating Systems in this section −
Windows operating system is developed by Microsoft Corporation. It provides Graphical User Interface (GUI), multitasking capability to users. It also provides virtual memory management and several peripheral devices. According to statistics, about 90% of computers have migrated to Windows operating system.
Versions of Windows Operating System
Linux is a multitasking operating system that supports various users and numerous tasks. It is open source, i.e., code for Linux is available for free of cost. Linux can run on any computer and support almost any type of application. Linux uses command-line interface. It also supports windows based GUI environment, called “shells”. The most popular Linux vendors are Red Hat and Novell. Some of the Linux versions include Ubuntu, Fedora, Linux Mint, etc.
While working with a computer, we use a set of items on screen called “user interface”. In simple terms, it acts as an interface between user and software application or program. It accepts inputs from input devices like keyboard, mouse and displays output to computer monitor.
A task bar consists of following three components −
Start menu contains shortcuts for launching programs and opening folders on computer.
It is a special section at left end of task bar where we can add icons to quickly start programs.
Notification area displays icons for system and program features. It also displays system volume and a clock.
A small pictogram displayed on the desktop is called an “icon”. It represents links to the resources on PC or network. Icons actually are tiny graphical symbols that represent programs, files, folders, printers, documents, etc. Icons are also called as “shortcuts”. Using mouse pointer, we can click the icon and then corresponding resource will be launched.
Start menu consists of shortcuts for launching programs and folders. It also consists a list of most recently used documents and provides 'search' option and supports 'help' feature.
Launching Start Menu
The operating system offers an interface between programs and user, as well as programs and other computer resources such as memory, printer and other programs.
Step 1 − Application sends request to operating system.
Step 2 − On encountering the request from an application, operating system sends a response to requested service.
We will learn different settings in Operating System −
We can set system date and time in three ways given below −
Step 1 − One way is to just click the clock on task bar and perform Step 4 and Step 5.
Step 2 − Another alternate way is to go to the “Control Panel” from Start menu and select “Clock, Language and Region“, and select “Date and Time” and perform Step 4 and Step 5.
Step 3 − In the window displayed, select “Change date and time”
Step 4 − Set corresponding date and time, and finally press “OK” button.
Display properties include Desktop Background, Text, Window Color, Sounds, Screensaver, etc. To change these display properties, we have to perform the following steps.
Step 1 − Right click on desktop and select “Personalize” from displaying options.
Step 2 − From the displayed window, select desired action, like changing the background/themes/resolution, and press “Save Changes” button.
Step 3 − Alternate way is to go to the “Control Panel” from Start menu and select “Appearance and Personalization” and select display you want from the listed options and save changes.
In order to add or remove Windows component, follow the below steps −
Step 1 − Type “add or remove programs” in the search box and select “Add or Remove Programs” under control panel and follow Step 3 and Step 4.
Step 2 − Alternate way is to select “Control Panel” from start menu and select “Uninstall a Program” from “Program” and follow Step 3 and Step 4.
Step 3 − Click “Turn Windows features on or off” on left side of programs and features window.
Step 4 − From window displayed, add or remove the program you want, and click “OK” button.
Properties of the mouse can be changed by following steps below −
Step 1 − Go to “Control Panel” from start menu.
Step 2 − Select “Hardware and Sound” and select “Device and Printers” from the listed options.
Step 3 − Click on “Mouse” under Devices and Printers, and change any of the following properties and “Apply” changes.
To add or remove printers we have to execute following steps −
Step 3 − Now under “Devices and Printers“, we can add a printer using “Add a Printer” tab at top of the window.
Step 4 − To remove a printer, “Right Click” by placing the cursor on printer you want to remove, and select “Remove Device” from popped up menu.
Here, we will learn the concepts of File and Directory Management −
File is nothing but a collection of information. The information can be of numbers, characters, graphs, images, etc. Every file should be stored under a unique name for its future reference. Every file should be saved along with an extension. Some of the extensions and their description are given below −
Microsoft videos for Windows movie
dbase II, III, IV data file
Microsoft word for windows
Graphics Interchange Format
Hypertext Markup Language
JPEG graphics file
MPEG video file
MIDI music file
QuickTime movie
File should be represented in address bar along with path of the file, filename and extension.
For example: C:\Windows\system32\Hello.html In which C:\Windows\system32 → path Hello → filename .html → extension.
Directory is a place/area/location where a set of file(s) will be stored. It is a folder which contains details about files, file size and time when they are created and last modified. The different types of directories are discussed below −
Root Directory is created when we start formatting the disk and start putting files on it. In this, we can create new directories called “sub-directories”. Root directory is the highest level directory and is seen when booting a system.
Subdirectory is a directory inside root directory, in turn, it can have another sub-directory in it.
The file management system is a software which is used to create, delete, modify and control access and save files.
The responsibilities of File Management System are as follows −
This provides user to work with or manipulate the files. Manipulation includes open, close, save, copy, delete, move, rename, share, etc.
By supporting authorization, it restricts unauthorized user to log into system and access files. Username and password are required for authorization purpose. It supports file encryption feature and asks for authorization to access those encrypted files.
In support of integrity, file management system will keep track of data manipulations like deletion, modification, addition of data, etc. If the data gets modified, deleted or added, then those changes should be reflected in all the files.
This allocates memory for storing files, deallocates memory of deleted or unused files and maintains backups.
Files in the operating system are of following types −
Ordinary files help to store information like text, graphics, images, etc. These files are used to store information fed by the user. Examples of ordinary files include a notepad, paint, programming applications, etc.
Directory files are nothing but a place/area/location where details of files are stored. It contains details about file names, ownership, file size and time when they are created and last modified.
Device files are also called as special files. They are created by operating system which act as a mediator between the operating system and hardware like printers, plotters, etc., and are stored under a sub-directory, “/dev”.
FIFO files act as an input/output channel between processes. As the name indicates, it maintains order of request and response to files by user or any other device.
Microsoft Word is a popular word processing software. It helps in arranging written text in a proper format and giving it a systematic look. This formatted look facilitates easier reading. It provides spell-check options, formatting functions like cut-copy-paste, and spots grammatical errors on a real-time basis. It also helps in saving and storing documents.
It's also used to add images, preview the complete text before printing it; organize the data into lists and then summarize, compare and present the data graphically. It allows the header and footer to display descriptive information, and to produce personalized letters through mail. This software is used to create, format and edit any document. It allows us to share the resources such as clip arts, drawing tools, etc. available to all office programs.
In this chapter, you will learn about Concepts related to MS Word in detail. You will know about Word Processing Basics, Opening and Closing the Document, Text Creation and Manipulation, Formatting Text, and Table Manipulation.
Word processor is used to manipulate text documents. It is an application program that creates web pages, letters, and reports.
This topic provides us with a clear idea about components of word processing basics, opening and closing the documents, text creation and manipulation, formatting the text, table manipulation, etc.
Word processing package is mostly used in offices on microcomputers. To open a new document, click on “Start” button and go to “All Programs” and click on “Microsoft Word”.
A menu bar is located below the title bar. A menu bar is an application window to furnish application or window-specific menus. Menu bar has File Menu along with Home, Insert, Design, Page Layout, References, Mailings, Review, And View.
You may use a particular menu to give an instruction to the software. Place mouse over menu option and click left mouse button to open drop-down menu. You can use left and right arrows on your keyboard to move left and right across menu bar option. Up and down arrow keys can be used to scroll drop-down menu.
Help menu → By clicking this button, you can get help for any information you need. Help button is located at the top right corner of window. It looks like a question mark, “?”. Shortcut key for help menu is F1.
Using Icons below Menu Bar
The bar located below menu bar is the toolbar. Toolbar provides shortcuts to menu commands. It has icons which represent commonly used functions.
Word automatically starts with a blank page. For opening a new file, click on “New”.
To open an already existing document, follow the below steps.
After finishing our work, we must save the document permanently, as it is useful for future reference.
Save As option is used to rename a file.
In this section, we shall learn how to use cut, copy and paste functions in Word.
We usually type content of documents in different forms such as Lower case, Upper case, Sentence case, etc.
Manipulation of table includes drawing a table, changing cell width and height, alignment of text in the cell, deletion/insertion of rows and columns, and borders and shading.
Tables can be easily inserted at any point of the document. A table is a simple way to arrange lengthy lists. You can use tables to format all parts of your documents into rows and columns. Rows and columns can be added or deleted either at the beginning, end or in the middle of table. For inserting a table, simply click on “Tables” icon on Insert menu. Tables can be formatted to any size, and number of rows and columns can be added as per requirement. Table formatting toolbar contains numerous icons which can be used for different functions related to tables. Spin arrows in the columns and rows help to select a row or a column.
For inserting rows and columns into an existing table, position cursor either before or after the spot where you want to insert.
Right-click mouse button to → Insert/Delete.
After finishing the table, in case you need to insert a column on the right-hand side of a particular column in the table, you may use the following steps −
After finishing the table, in case you want to insert a row in the top of a particular row in table you may use the following steps −
After finishing the table, in case you want to insert a row in the bottom of a particular row in the table, you may use the following steps −
If you want to delete particular columns in a table, use the following steps −
If you want to delete particular rows in a table, use the following steps −
Microsoft Excel is a spreadsheet application which is used to create and manage lists of information. Excel allows to enter, edit, manage and analyze large amount of data in a worksheet and create colorful charts and graphs. It uses formulae to calculate and analyze data. It helps to combine a series of commands using “Macros“, thus saving time. At higher levels, you can use it as a complete development tool catering to many complex requirements.
We shall discuss an example to understand this concept −
To prepare a bar chart.
The given database is created in excel worksheet using the bar chart.
This topic had given detailed description about the concepts of opening new and existing worksheets, renaming the work sheet, organizing spread sheet, printing spread sheet, saving workbooks, manipulation of cells, entering text, numbers and dates, creating text, number and date series, editing worksheet data, inserting and deleting rows & columns, changing cell height and width, using formulas, and creating a chart. This chapter also focused on cell address, numbers and text, title bar, menu bar, formula bar, and functions & charts.
Manipulation of cells is entering and modifying the contents of the cells.
In this topic, we are going to learn how to enter text.
Num Lock (to “on” or “off” Number keypad) can be used to make data entry easy. To enter numeric values in the spreadsheet, follow the below steps −
Returns the sequential serial number that represents a particular date. Cell format remains normal before function gets entered in the cell. Result is formatted as a date, once the function gets executed.
DATE (year, month, date)
=DATE (2018,4,18)
18/4/2018
Here, we will look into creating text, number and data series −
Modifying or adding text or using cut, copy, paste operations to an existing document is known as editing.
Instead of retyping the same text, Copy function is used which reduces time and effort. By using copy option, you can copy the text from one location to another. Information stored on clipboard stays there until new information is either cut or copied. When you execute cut or copy, you replace old information on the clipboard with whatever you have just cut or copied.
After finishing our table, in case we want to insert a column on the left hand side of a particular column. We may use the following steps.
After finishing our table, in case, we want to insert a column on the right hand side of a particular column, follow below steps −
After finishing the table, in case we want to insert a row on top of a particular row, follow below steps −
If you want to delete a particular column in a table, use the following steps −
When we create a table, all the columns may have equal column width or different widths. If you want to change the row height, simply select the row and right click. Then select the Row Height option.
We shall learn how to use functions and charts in Microsoft Excel −
You can use formulas to perform basic mathematical calculations, such as addition, subtraction, multiplication, and division of numbers. The following examples demonstrate how to use formulas to carry out mathematical calculations.
Addition helps to add two or more values. By using “= SUM(cell1+cell2)” formula, we can calculate the sum of values.
Examples
Subtraction helps to subtract two or more values. By using “= SUM(cell1 – cell2)” formula, we can calculate the difference between the values of cell 1 and cell 2.
Example
Multiplication helps to multiply two or more values. By using “= SUM(cell1 * cell2)” formula, we can calculate multiplication
A chart is a graphical representation of worksheet data. Charts can make data interesting, attractive and easy to read and evaluate. They can also help you to analyze and compare data.
The easiest way to create charts in excel is by using the chart wizard. Chart wizard icon appears on the insert menu. Chart wizard is a program which consists of different types of charts; it helps user through the process of creation of charts. Icons or symbols present at the side of chart help to add or remove elements to the chart, change chart style and add a filter to the chart. After completing a chart, you can still make changes to it or just start from the beginning.
Internet is a global communication system that links together thousands of individual networks. It allows exchange of information between two or more computers on a network. Thus internet helps in transfer of messages through mail, chat, video & audio conference, etc. It has become mandatory for day-to-day activities: bills payment, online shopping and surfing, tutoring, working, communicating with peers, etc.
In this topic, we are going to discuss in detail about concepts like basics of computer networks, Local Area Network (LAN), Wide Area Network (WAN), concept of internet, basics of internet architecture, services on internet, World Wide Web and websites, communication on internet, internet services, preparing computer for internet access, ISPs and examples (Broadband/Dialup/Wi-Fi), internet access techniques, web browsing software, popular web browsing software, configuring web browser, search engines, popular search engines/search for content, accessing web browser, using favorites folder, downloading web pages and printing web pages.
This topic summarized the concepts of internet like LAN, WAN, internet architecture, internet services, WWW, communications on the internet, internet service providers, internet access techniques, web browsers, search engines, favourites folder, configuration of web browsers, and downloading & printing web pages.
Computer network is an interconnection between two or more hosts/computers. The connectivity can be physical by using cables or virtual using wireless network. Different types of networks include LAN, WAN, MAN, etc., as shown below −
Local Area Network (LAN) provides data communication within shorter distance and connects several devices such as computers and printers. This type of network contains computers that are relatively closer and are physically connected with cables and wireless media. Any network that exists within a single building, or even a group of adjacent buildings, is considered as LAN. It is often used to connect separate LANs together so they can communicate and exchange data.
Wide Area Network is connecting two or more LANs together, generally across a wide geographical area.
A company may have its corporate headquarters and manufacturing plant located in one city and marketing office in another city. Each site needs resources, data and programs locally, but it also needs to share data with other sites. To accomplish this, the company can attach devices that connect over public utilities to create a WAN.
Metropolitan Area Network (MAN) is an extensive network that connects numerous corporate LANs together. Usually MANs are not owned by sole organization. Their communication devices and equipment are maintained by a group or single network provider that sells its networking services to corporate customers. MANs often take the role of high-speed network that allows sharing of regional resources. MANs also can provide a mutual connection to other networks using a WAN link.
Internet is called the network of networks. It is a global communication system that links together thousands of individual networks. In other words, internet is a collection of interlinked computer networks, connected by copper wires, fiber-optic cables, wireless connections, etc. As a result, a computer can virtually connect to other computers in any network. These connections allow users to interchange messages, to communicate in real time (getting instant messages and responses), to share data and programs and to access limitless information.
Internet architecture is a meta-network, which refers to a congregation of thousands of distinct networks interacting with a common protocol. In simple terms, it is referred as an internetwork that is connected using protocols. Protocol used is TCP/IP. This protocol connects any two networks that differ in hardware, software and design.
TCP/IP provides end to end transmission, i.e., each and every node on one network has the ability to communicate with any other node on the network.
Internet architecture consists of three layers −
In order to communicate, we need our data to be encapsulated as Internet Protocol (IP) packets. These IP packets travel across number of hosts in a network through routing to reach the destination. However IP does not support error detection and error recovery, and is incapable of detecting loss of packets.
TCP stands for “Transmission Control Protocol”. It provides end to end transmission of data, i.e., from source to destination. It is a very complex protocol as it supports recovery of lost packets.
Third layer in internet architecture is the application layer which has different protocols on which the internet services are built. Some of the examples of internet services include email (SMTP facilitates email feature), file transfer (FTP facilitates file transfer feature), etc.
Internet acts as a carrier for numerous diverse services, each with its own distinctive features and purposes.
World Wide Web is being used on internet right now. WWW is the name given to all resources of the internet, which you can access with a web browser. It was created as a method for incorporating footnotes, figures and cross-references into online documents in the European Particle Physics Laboratory in Geneva, Switzerland in 1989. The web makers wanted to make a simple method to access documents that are stored on a network, without searching through indexes or directories of files, and without physically copying documents from one computer to another before viewing them. To do this, they made a way to “connect” documents that were stored in different locations on a single computer, or different computers on a network.
Web documents can be linked together, and are called “Hypertext”. Hypertext systems offer an easy approach to manage huge collections of data, which includes text files, pictures, sounds, movies and more. In a hypertext system, when you view a document or your computer screen, you can also access all the data that is linked to it. To support hypertext documents, web uses a protocol called “Hypertext Transfer Protocol” (HTTP). A hypertext document is a specially encoded file that uses “Hypertext Markup Language” (HTML). HTTP and Links are foundation for WWW. Web page is displayed in the web browser. It is a kind of word processing document which contains pictures, sounds and even movies along with text.
A collection of associated web pages is called “Website”. Websites are housed on the web servers. Copying a page onto a server is called “publishing” the page, which is also called “posting or uploading”.
We shall discuss how communication happens through the use of Internet in this section −
Electronic mail or email is one of the key parts of e-revolution which is specially designed for communication purpose. Once you have an email account, you can start sending electronic messages to anyone if you have the recipient's email address. The format of an email address is “username, @ symbol, domain name (yahoo.com, gmail.com, etc.)”. For example: name@yahoo.com.
IRC is a form of real-time internet chat or synchronous conferencing. It is mainly used for group communication in discussion forums called channels, also allows one-to-one communication via private message, and both chats and data transfers via Direct Client-to-Client protocol.
IRC client software is available for every operating system.
A video conference is a telecommunication technology, which permits two or more people in different locations to interact via mutual video or audio transmission simultaneously. It is also called visual collaboration and is a type of groupware. Video conferencing uses telecommunication technology to bring people at different sites together for a meeting/conversation. This can be as simple as a conversation between two people in private offices, or involves several sites with more than two people. It can also be used to share documents, computer displayed information, whiteboards, etc.
VOIP stands for voice over IP, where IP refers to the Internet Protocol which is a base for all internet communications. This phenomenon began as an optional mutual voice extension to some of the instant messaging systems that took off around the year 2000. In recent years, VOIP systems are easy to use and as convenient as a traditional telephone. Voice quality can still differ from call to call but is often equal to and can even beat the traditional calls.
Instant Messaging (IM) is a process of transferring real-time messages between users. It facilitates private chat room atmosphere. IM alerts users when some of their peers are online, so the users can start chatting with them.
Online conversations in which you are immediately able to send messages back and forth to one another is called “chat”.
Internet permits computer users to connect to other computers across the world and to store information effortlessly. This can be done with or without any security, authentication and encryption technologies depending on the requirements which encourages work from home culture.
Low cost and rapid sharing of ideas, knowledge and skills has made collaborative work easy. It is a convenient way to stay in touch with colleagues through group chat or private messaging. Email is also an easy way to communicate. Collaboration helps voice and video chat between team members and to work with shared set of documents.
Many existing radio and television presenters provide internet “feeds” of their live audio and video streams. An internet-connected device, such as a computer or something more specific, can be used to access on-line media in much the same way, as television or radio receiver.
File Transfer Protocol is a network protocol which is used to transfer data from one computer to another over any TCP/IP based network. It helps to manipulate files on another computer regardless of the operating system involved.
TELNET means TELecommunication NETwork. It is a network protocol used on the internet or LAN connections. It helps to provide text oriented mutual communication using virtual terminal connection.
A forum on the Usenet service for the discussion of a particular topic. Newsreader software is used to read newsgroups.
There are many ways to obtain access to the internet. The method varies according to the type of devices (computer, laptop, mobile) being used and type of connections offered.
Internet Service Provider (ISP) is the gateway to access internet. It is an organization that gives access to the internet. ISPs provide services for home, large industries, government sectors, etc. There are two types of connections −
Broadband connections are considered as high speed connections, as they use modes that can handle several signals at once, such as fiber optics, twisted pair cables, coaxial cables and other technologies.
In dial-up connection, the computer uses its modem to dial a telephone number given to user by an Internet Service Provider. This launches a connection between personal computer and ISP server. The dial-up connections are temporary, as the connection ends once the session gets completed.
Wireless LAN has become popular for use these days which is based on the technology called Wi-Fi (Wireless Fidelity). This uses radio waves to transmit signals and provides access to the internet within a short distance.
Below is the list of Internet Service Providers −
Internet can be accessed using following methods −
In dial-up connection, computer uses its modem to dial a telephone number given to the user by an Internet Service Provider. This launches a connection between personal computer and ISP server. The process begins when the ISP server answers, and ceases when your computer or the server “hangs up”. This is similar to a traditional telephone call. Most ISP servers disconnect automatically after a certain period of inactivity. Once a connection is configured on the user's computer, he/she can use the connection. It is secure and de-allocates unused memory automatically.
Broadband connections are considered as high speed connections, as they use modes that can handle several signals at once, such as fiber optics, twisted pair cables, coaxial cable and other technologies. Even with hundreds of users on the network, these connections allow large files and complex web pages to download quickly. To be considered as a broadband, the connection must be able to transmit data at a rate faster than is possible with the fastest dial-up connection. Downloading and uploading content will be fast.
Integrated Services Digital Network (ISDN) is a digital service that simultaneously transmits voice & data, and controls signals over a single telephone line. ISDN service operates on a standard telephone line, but requires a special modem and phone service, which adds to the cost. An ISDN data connection can transfer data up to 128,000 bits per second (128 Kbps). It helps to connect a PC, telephone and fax to a single ISDN line and use them simultaneously.
Digital Subscriber Line is similar to that of ISDN in using telephone network, but it uses more advanced digital signal processing and algorithms to squeeze maximum number of signals through telephone lines. DSL also requires changes in components of telephone network before it can be offered in any area. Like ISDN, DSL provides simultaneous data, voice and fax transmission on the same line. Several versions of DSL services are available for home and business use; each version provides 24/7 full-time connection at different levels of service, speed, bandwidth and distance.
Now-a-days many cable television companies use some percentage of their network's bandwidth to provide internet access through prevailing cable television connections. Since this connection uses a special cable modem, it is called “Cable Modem Service”. Cable television systems transmit data via coaxial cable, which can transmit data as much as 100 times faster than common telephone lines. Coaxial cable allows transmission via several channels simultaneously, i.e., the internet data can be transmitted on one channel, while audio, video and control signals are transmitted separately. The user can access internet and watch television concurrently, with two non-interfering data streams.
Wireless LAN connections are very common these days, which are based on the technology that is often cited as Wi-Fi (Wireless Fidelity). The distance covered by WLAN is usually measured in meters rather than miles. Therefore, this is not a technology that connects directly to an ISP but can be used to connect to another LAN or device through which internet access is achieved.
A WWAN is a digital network that spans over a large geographical area. A WWAN accepts and transmits data using radio signals via cellular sites and satellites. At the switching center, the WWAN divides off into segments and then connects to either isolated or public network through telephone or other high speed communication links. The data is then linked to an organization's existing LAN/WAN infrastructure. The coverage area for WWAN is normally measured in miles (kilometers) with a data transmission rate of 100 Mbps.
Satellite services provide a mutual (two-way) communication between user and the internet. This provides a full-time connection which is used in armed forces, business, etc. It includes two parts −
Transceiver − A satellite dish that is placed outdoors in direct line of sight to one of the several satellites in geostationary orbit.
Modem-like device − It is connected to a dish, placed indoors and connected to a LAN or computer.
“World Wide Web” or simple “Web” is the name given to all the resources of internet. The special software or application program with which you can access web is called “Web Browser”.
Web browser is an application that is located on a computer's disk. Once you have an internet connection, you can launch a web browser using the following methods −
Step 1 − Go to “Start Menu”.
Step 2 − From the menu opened, click on the web browser (Mozilla, Google Chrome, Internet Explorer).
Method 2 − Alternate way is to click the shortcut icon on the taskbar or desktop.
The most popular web browsing software includes −
Google Chrome is a web browsing software developed in the year 2008 by Google Inc. First, it was designed for windows platform, and later adopted to Linux, Macintosh, and even Android. It is written using C++, Assembly, Python, and JavaScript.
Mozilla Firefox is a web browsing software developed in the year 2002 by the Mozilla Foundation. It is designed to work on all operating systems like Windows, Macintosh, Linux, and Android. It is written using C++, JavaScript, Rust, C, CSS, XUL, and XBL.
Opera is a web browsing software developed in the year 1995 by Opera Software. It is designed to work on all operating systems like Windows, Macintosh, and Linux and is written using C++ language.
Internet Explorer is a web browsing software developed in the year 1995 by Microsoft. It is designed to work on all operating systems like Windows, Macintosh, Linux and Android and is written using C++ language.
Configuring a web browser is organizing or changing the settings of the browser in a format presentable to the user.
Configuring Microsoft Edge includes the following steps −
Step 1 − Open Microsoft Edge via shortcut icon in the task bar or “Start Menu”.
Step 2 − Select Microsoft Edge.
OR
Step 3 − Click “Settings” from the “Settings and more” menu.
Step 4 − From window opened, make changes to the settings.
Step 1 − Open Google Chrome via icon in the task bar or “Start Menu”.
Step 2 − Click three vertical dots icon () present at upper right corner of the window and go to “Settings” option from the menu displayed.
Step 3 − From the window opened, change settings of people, appearance, search engine, default browser, startup and advanced tabs.
Search Engine is an application that allows you to search for content on the web. It displays multiple web pages based on the content or a word you have typed.
The most popular search engines are listed below.
Google is the most popular and robust search engine launched in the year 1997 by Google Inc. It was developed by Larry Page and Sergey Brin. It is written using C, C++ and Python. Beyond searching content, it also provides weather forecasts, sports score, temperatures, area codes, language translation, synonyms, etc. Now-a-days the advancement is still more, that it displays maps in a touch. It is used by 4+ million users across the world.
Bing is also a popular search engine launched by Microsoft in the year 2009. It is written using ASP .Net language. It is used to search web content, video, images, maps, etc.
Yahoo is a common search engine launched by Yahoo in the year 1995. It is a multilingual search engine and written using PHP language.
Ask is the most popular search engine and application for e-business which was launched by IAO in the year 1996. It was developed by Garrett Gruener, David Warthen, and Douglas Leeds.
America Online is a popular search engine launched in the year 1993 by AOL Inc. At first, it was called as control Video Corporation. The founders of AOL are Marc Seriff, Steve Case, and Jim Kimsey.
Search Engine helps to search for content on web using the following steps.
Step 1 − Launch your web browser.
Step 2 − In “Address bar/Location”, type the search engine you want to use and press enter.
Step 3 − Type the content you want to search in the “search text box” and press enter.
Step 4 − It displays a list of web pages from which you can select corresponding content/web page you want.
There are several ways to access a web page like using URLs, hyperlinks, using navigating tools, search engine, etc.
URL refers to “Uniform Resource Locator”. Each and every website can be recognized using a unique address called “Uniform Resource Locator” or simply a URL. Once you provide URL of a specific page in address bar, web browser will find the corresponding page and displays result to the user.
“Hyperlink” is a part of web page that is linked to URL. Hyperlink can be text, image, button, arrow, etc. By clicking on a hyperlink you can move to different URL specified in the link from the current URL. Hyperlinked text is an underlined blue color text which is represented using hand symbol.
Web browsers offer a variety of tools to help you move around the web. These tools help you to quickly go back and forth through web pages.
Back Button − Helps to move back to the previous page from current page.
Forward Button − Helps to move to the next page from current page.
Refresh Button − Helps to refresh a current page.
Close Button − Helps to close a web page.
Web browsers allow you to bookmark pages that you visit most frequently. This helps you to go to web page directly by selecting from a list of bookmarks instead of typing the URL multiple times. This is displayed as an icon with star symbol in the top right corner of the page.
When you type any URL in address bar, the browser saves that URL automatically, thus creating a history list for current session. You can choose the URL you want from the history list instead of typing it again.
Search engine is an application that allows you to search for content on web. It displays multiple web pages based on the content or a word you have typed. The most popular search engines include Google, Yahoo, Ask, etc. Below are the steps to use a search engine.
Step 4 − It displays a list of web pages from which you can select the content/web page you want.
Web browsers allow you to bookmark the pages that you visit most frequently. The Favorites folder is called Bookmarks. This helps you to go to the web page directly by selecting from the list of bookmarks instead of typing the URL again and again. Adding and removing the pages to the favorite's folder include the following steps.
Step 1 − Click star icon present at the top right corner of the page.
Step 2 − In order to add the web page, type the page you want to add as favorite and click “Done” button or you can click the three vertical dots () icon on top right corner of the screen and select “Bookmark this page” option from the displayed menu to bookmark the current page.
Step 3 − In order to remove the web page, select a page and press “Remove” button or you can click the three vertical dots icon() on top right corner of the screen and select the web page you want to delete and “Right click” and click “Delete” option.
Alternately, we can use the below screenshots −
Downloading is saving a file or document or web page on your hard disk. It consists of following steps.
Step 1 − Open a web browser and navigate to the webpage which you want to download.
Step 2 − Right-click on the file and choose Save as.
Step 3 − Choose where you want to save the file, then click Save.
Step 4 − When the file is downloaded, you'll see it at the bottom of your Chrome window. Click the file name to open it.
At the bottom of the screen, you can see the downloading file. Click the arrow next to the file name at the bottom of your screen. Click Pause, Resume or Cancel, whatever action you want to perform.
Printing is creating hard copy of a document which can be a web page or any other content. It includes the following steps −
Step 1 − After launching web browser, open the page, image, or file you want to print.
Step 2 − Click on three vertical dots icon () on the top right corner of the screen or use a keyboard shortcut: Ctrl + P.
Step 3 − In the window that appears, select destination and change any print settings you want; when ready, click Print.
Communication refers to exchange of information between persons through internet. Internet provides a basis for communication and collaboration which can be done using mail, chat, skype, etc. When dealing with official matters, electronic mail helps in the exchange of messages text documents, web pages, audio, video, etc.
In this topic, we are going to discuss in detail about basics of email, email addressing, configuring email client, using emails, opening email client, mailbox, creating and sending a new email, replying to an email message, forwarding an email message, sorting and searching emails, advance email features, sending documents by email, activating spell check, using address book, sending softcopy as attachment, handling spam, instant messaging and collaboration, using emoticons and some of the internet etiquettes.
Electronic mail is an application that supports interchange of information between two or more persons. Usually text messages are transmitted through email. Audio and video transfer through email depends on the browser in use. This provides a faster way of communication in an affordable cost.
Functionalities like attachment of documents, data files, program files, etc., can be enabled. This is a faster way of communication at an affordable cost.
If the connection to the ISP is lost, then you can't access email. Once you send an mail to a recipient, you have to wait until she/he reads and replies to your mail.
Email address is a unique address given to the user that helps to identify the user while sending and receiving messages or mails.
Username − Name that identifies any user's mailbox
Domain name − Represents the Internet Service Provider (ISP).
@ Symbol − Helps to concatenate username and domain name.
For example − user_name@domain_name
Username − user, Domain name − gmail.com
This chapter has given a clear idea about the electronic mail and its features. Thus, we gained a deep understanding about the basics of email, email addressing, configuring email client, using emails, opening email client, mailbox, creating and sending a new email, replying to an email message, forwarding an email message, sorting and searching emails, advance email features like sending document by email, activating spell check, using address book, sending softcopy as an attachment, handling SPAM, Instant Messaging and Collaboration, using smiley/emoticons and some internet etiquettes.
Configuring email client is setting up a client which includes the following steps −
Step 1 − Open Outlook Express using “Start Menu” or using search option under the start menu. Once the outlook window is open, press “Next” button at the bottom of the outlook express window.
Step 2 − Then “Add an email account” window pops up showing “Do you want to set up outlook to connect to an email account?”
Check mark the 'Yes' radio button and hit NEXT.
Step 3 − Then “Auto account set up” window opens showing the details of the mail account to be configured. After providing corresponding details, press “Next” button.
Step 4 − The server will verify your email and then an email client will get configured once you press the finish button.
The main purpose of using email is to exchange information between persons. The process starts with opening of client email and ends with sending and verifying mail to recipients.
In order to interchange messages between people, the first step is to open or create an email account. Follow steps below to create an email account.
Step 1 − Go to Gmail homepage and select “More options → Create account” option.
Step 2 − In the window displayed, fill mandatory details and press “Next“.
Step 3 − Then mobile verification code will be sent to the mobile number you have entered, upon verification, your email account will be created.
Step 4 − Enter details to setup the account.
Inbox − Inbox is an area where you can see all the received mails.
Outbox − Outbox is an area where the outgoing messages or messages which are in process of sending or which are failed to send are stored.
Sent mail − Sent mail is an area to view all the sent or successfully delivered mails.
In order to send a new text message to the user, first create or compose the message which includes the following steps.
Step 1 − Open your mail account by providing correct User name and Password.
Step 2 − Compose or create your message by selecting “compose” option shown in the window.
Step 3 − In the window displayed, enter recipient's address in “To” textbox and add “Subject” of message, then add a “Body” of the message and press “Send” button. Remember, the subject of the mail should be explicit and short.
Replying is giving response to the received mail which includes the following steps.
Step 1 − Open an email to which you want to reply and press the “Reply” button or press “Shift+R” on the keyboard.
Step 2 − In the window displayed, enter “Body” of the mail and click “Send” button. The mail will be sent automatically to the corresponding person without having to re-type the “To” address.
Forwarding is a process of resending an email message that you received from another email id. This option saves time as the user doesn't have to re-type the same message again. It includes the following steps.
Step 1 − Open the email which you want to forward and click on “Forward” option or press “Shift + F” on the keyboard.
Step 2 − In the window displayed, enter the recipient address in “To” textbox and press “Send” button. The mail will be forwarded to the corresponding person.
Here, we will discuss about how to sort and search the existing emails −
Sorting helps you to arrange mails or messages in an orderly fashion. It includes the following steps.
Step 1 − Click arrow adjacent to “Sort by date“, a default sort option visible at the top of the window.
Step 2 − Click on any of the options from dropdown list displayed.
Searching email is a process of finding the desired email without going through all the emails.
Step 1 − Type the name, email id or key-term in the search box displayed on top of the window.
Step 2 − From the list of displayed mails, select desired mail or message.
Email provides many advanced features which includes sending attachments like documents, videos, images, audio, etc. Apart from this, you can proofread your mail via feature of spell check, address book, etc.
We can communicate with a person by sending and receiving emails. To send an email with the document as an attachment, follow the steps below −
Step 1 − Compose a mail providing “To” address, “Subject” and “Body” of the message, then click on attachment() button and select “Attach files from computer” option in order to add documents to the mail.
Step 2 − In the window opened, browse document you wish to send and click “Open” button.
Step 3 − Document gets uploaded and will be an attachment to that mail. Finally click “Send” button to send mail to the recipient.
Activating spell check helps to avoid spelling mistakes while inserting the body of the mail. It includes the following steps −
Step 1 − Start composing or creating a message by providing “To” address, “Subject“, “Body” of the message.
Step 2 − The second step is to “Right click” on mouse and select “Spell check” and from the list displayed, select “Check the spelling of text fields“, then the spell check feature gets activated.
Address book helps to add an address of recipient for future reference. Instead of typing the address again and again this helps to include a recipient address from the address book. The process includes following steps.
Step 1 − Go to “Settings” at the top right corner of your web page and from dropdown list, select “Settings“.
Step 2 − Click “Writing email” tab and mark the check box that shows “Automatically add new recipients to contacts“, now new addresses get added to the contacts or address book.
Softcopy is a digital document or a file that is stored in a computer unlike a written or printed document like papers or notebooks. Attaching softcopy is similar to that of attaching documents to the mail. The steps involved are given below.
Step 1 − Compose mail providing “To” address, “Subject“, “Body” of the message, then click on attachment () button and select “Attach files from computer” option in order to add softcopy of a document to the mail.
Step 2 − In the window opened, select document or file you need to send and click “Open” button.
Step 3 − Once the document or file gets attached to mail, click “Send” button to send mail to the recipient.
Spam is a folder where unwanted or suspected mails get stored.
We can mark email as spam using the following steps.
Step 1 − Select the email that you want to move to spam folder and click “Move to” option.
Step 2 − From the displayed menu, click any one of the following options.
Step 3 − Now, when you check the spam folder, you can see the mail that you marked as spam is added to the spam folder.
We can mark emails as not spam using the following steps.
Step 1 − Go to spam folder and mark the mail that you don't want to be displayed in the spam folder.
Step 2 − Click “Not spam” option at the top of the page.
Step 3 − Now go to “Inbox“, you can see the email that you removed from the spam folder is shifted to the “Inbox” folder.
Instant messaging is real time mutual communication between persons via internet. This is a private chat. Once the recipient is online, you can start sending messages to him/her. Unlike emails, where you have wait for the reply from the recipient, collaboration uses instant messaging technique. This also supports the usage of add-on features like smiley or emoticons with the text message. Examples of instant messaging applications include Facebook, We Chat, Twitter, LinkedIn, etc.
Smileys are otherwise called as emoticons. Emoticons are graphical representation of emotions. There are 300+ emoticons in instant messaging. Emoticons are pictorial representation of facial expressions that showcase emotions like happiness, sorrow, crying, exclamation, etc.
To add an emoticon to the message, follow the below steps.
Step 1 − Go to instant messenger and open your chat window.
Step 2 − At the bottom of chat window, you can see emoticon symbol, on clicking that, a list or group of emoticons is displayed. You can choose the desired emoticon by selecting it.
Microsoft PowerPoint is one of the powerful tools of MS-Office, which helps in creating and designing presentations. PowerPoint Presentation is an array of slides that convey information to people in an attractive manner.
In this chapter, we are going to discuss in detail about the applications of presentation using Microsoft PowerPoint, opening and saving a presentation, creating presentation using templates and a blank presentation, entering and editing text, inserting and deleting slides in a presentation, preparing slides, inserting word table or an excel worksheet and other objects, adding clip arts, resizing and scaling of objects, providing aesthetics by enhancing text presentation, working with colors and line style, adding movie and sound, header and footer, viewing a presentation, choosing a set up for presentation, printing slides and handouts, Slide Show, running a Slide Show, transition and slide timings, automating a Slide Show.
You can create a new presentation by choosing File → New → Presentation.
To open an existing PowerPoint, select File → Open → Recent Presentations → and select the presentation you want to open.
A presentation is made up of number of slides that are displayed in a sequence. Each slide has sub-topics and different content related to the given topic.
A template is a presentation that has a pre-defined theme and format. Templates are readily available design structures. There are two types of templates: design and content templates. A design template automatically gives final look of your presentation. The content template is used to include text and graphics.
To create a presentation using template, select File → New → and select desired template.
To create a new slide, follow the below steps −
To delete a slide, go to the corresponding slide and right click on it to select Delete slide option.
The below topics explain the preparation of slides −
First we will learn how to resize an object below −
This feature helps our Powerpoint presentation to look more attractive and interesting.
Enhancing text can be done by altering font style, font color, font size, and using font case options.
You can highlight the text by changing it to upper, lower or mixed case.
Draw shapes and fill color, follow the below steps −
Giving background color to PowerPoint image makes the presentation more appealing and beautiful. To apply background, go to Design menu and select Color option.
We will look at the following example −
To create a simple presentation with at least 5 slides to introduce a friend and include audio in slides.
We shall learn various features present in
Slide Show view of the presentation is used to display content of presentation to the audience.
Editing is not possible in the Slide Show view.
First, we will learn the Transition feature −
Automation of Slide Show can be done in two ways.
In today's world, everything is digitized, which means we can access or get every service in digital format through mobile phones, computers, tablets, etc. The invention of computers and smartphones has created a huge impact on financial services. Today using computers and mobile phones, a person can access his/her bank account, verify account details, transfer funds, deposit cash, renew deposit, pay bills, book tickets, etc. Also, the invention of ATMs reduced the time taken to withdraw money from banks. Digital services help to save time by providing services in a single touch. The introduction of digital wallets has also made a big positive impact on financial services.
In this topic, we are going to discuss in detail the importance of savings, importance of bank, banking products like accounts, deposits, loans, procedure for opening an account, banking services through a bank branch, ATM, internet banking, mobile banking, mobile wallets, insurance and various schemes introduced by the Prime Minister of India.
Savings is the percentage of income which is not spent on present expenditures, instead conserved for future use. Being totally unaware of the future happenings, one should be ready to face any kind of unpredictable events. In such tough situations, our savings will be very helpful and beneficial to us.
Emergencies may come at anytime and we should always have a backup to handle such situations. Some examples of emergencies from our day to day life are −
Few future needs are listed below −
Retirement
The main purpose to save money is for your retirement. The earlier you start saving for retirement, the less you have to save in future. Saving for retirement makes you self-dependent and financially secure.
Own a property
Everyone dreams of owning a house. Though it is not an easy task, saving from early stages can help in fulfilling this dream.
Own your own vehicle
In today's scenario, transportation has become difficult in metropolitan cities. To explore places with ease and comfort, a person needs a car.
Education
Cost of education has become a burden these days, especially for higher studies. In order to attain higher degrees, one should save money.
To rescue debts and large expenses
We should start saving to deal with large expenses like −
Drawbacks of keeping cash at home
Here, we list certain drawbacks of maintaining cash at home −
Unsafe
It is unsafe to keep cash at home as there is a chance of theft or robbery.
Loss of Growth Opportunity
Keeping cash at home causes huge loss to the country's economy as it does not participate in national growth.
No Credit Eligibility
Bank is an official financial institution that accepts money from public and lends money to public.
Bank functions in various ways. Few of them are listed below −
Secure Money
Earn interest
Banks provide us with interest if we save money through RD and FD. In any of the schemes provided by the bank there will be an opportunity of growth in our money.
Get Loan
Bank will provide several kinds of loans if we satisfy the criteria issued by a bank and submit all necessary documents. Types of loans provided by bank are −
Remittance is defined as the transfer of money or funds from one bank to another, either the same bank or different. Remittance can be done using Demand draft by Cheque, Pay slip, Mail Transfer, etc. A demand draft or “DD” is a popular mode of money transfer, where most of the banks in India use this for the effective transfer of money. Demand draft is usually issued on request of the client, for bill payments, and for transfer of property of deceased to legal heirs, etc. DD form requires the following details to be filled by the customer −
Using banks to save money, we can avoid the below stated risks −
Chit Fund
Chit funds are local bodies which help to save money. It is run by one or more people of that area. Chit fund is purely based on trust. It is easy to join the chit fund because no proper background is needed except some paperwork. If you deposit money in chit fund you can take out that money whenever you need. Instead, in banks you must wait until the time period get completed.
Risk in saving money in chit funds or Sahukars
We shall learn various banking products −
An agreement with a bank, where an account holder can deposit and withdraw money or savings as needed.
There are three types of accounts avaliable, namely −
Personal account
Account that represents an individual or an organization is termed as “Personal account”. Examples: Mr. Rama's account → Individual persons account; Samsung's account → Organization's account.
Real account
The account that represent tangible assets, that is, which can be physically sensed, is termed as “Real account”. Examples include: cash, goods, stock accounts, etc.
Nominal account
Account that represents expenses and incomes is termed as “Nominal account”. Examples include: salary, loss of asset accounts, etc.
Accumulation of money in the bank is termed as deposits. There are two types of deposits: Time deposit and Demand deposit. Time deposit is defined as money deposited for a particular period of time which cannot be withdrawn before the time gets lapsed.
Demand deposit is the scheme where the customer can withdraw money on demand without earlier notice to the bank. Demand deposit may or may not provide interest to the customer. Examples of demand deposits include current account and a savings account.
Loan is termed as the fund lent to a person on having a promise that he/she will return the money within a certain period with interest. Loan falls under the following categories.
Secure Loan is a loan where the borrower pledges any of his/her assets like house, land, jewel or any of the belongings as security. The financial institution has a right to sell these if repayment is not done on time.
Unsecure Loan is where the borrower does not submit any of the belongings as security to the bank. The example includes peer-peer lending, personal loans, credit debts, etc.
Demand Loan is a loan where a person borrows money on demand. It doesn't fix return time.
Educational Loan is money borrowed to support one's education. He/she doesn't have to repay the money while studying.
Personal Loan is a loan that is borrowed based on personal interest for marriage, world tour, other expenses, etc.
Commercial Loan is lent to an organization for improvement purposes.
An overdraft is a condition that occurs when a person attempts to withdraw money from zero balance account. The types of overdraft include −
We will separately learn how to fill cheques and demand drafts below −
Filling up of Cheque
You must provide the following details while filling a cheque.
You must provide the following details while filling a demand draft.
You need the below documents to open account in banks −
Know your Customer is a process in which banks acquire details about the identity and address of the customers. It is practice accomplished by banks when you open an account with that bank. Banks in regular intervals will update their customer details. The KYC process helps to make sure that the bank services are not misused.
RBI issues a certain norm to be followed while opening an account. One of that is KYC during account opening. We should be providing ID proof and Address proof during the KYC process.
We shall learn different banking service delivery channels in this section −
Bank branch is one of the easiest and simplest ways of providing banking services. Every area has one or more bank branches depending on the space coverage of the area through which we can access bank services. We can go to the branch physically and avail services like money deposit or withdrawal, salary update, pension withdrawal, etc.
Automatic Teller Machine has reduced lot of human workload. This is one of the cheapest sources of bank delivering 24/7 service. This facilitates us with the service of money withdrawal. We also have cash deposit machines, passbook update machines, etc.
Bank Mitra is also called as “Customer Service Point”. Mitra provides services like account opening, cash deposit, cash withdrawal, fund transfer, etc., and is a representative of mini bank which provides services to rural areas. It especially provides services to villages where no bank branches are available.
Point of Sales (POS) support for real-time transactions. Suppose if you are purchasing anything in shops and decided to use your debit card, the consumer will be having a POS machine in which your debit/credit card is swiped to deduct the amount for your purchase. This provides cashless transaction facility.
This section deals with online delivery channels −
Internet banking helps to save your time by providing digital services like −
National Electronic Fund Transfer is a nationwide fund transfer system formulated and maintained by RBI. It helps to transfer funds between customers of the bank across the country. It was started in the year 2005. NEFT follows batch wise fund transfer process that it works from 8.00 AM to 6.30 PM on Monday to Saturday excluding 2nd, 4th Saturday and government holidays.
Real Time Gross Settlement (RTGS) is a real-time electronic fund transfer system between banks. Unlike NEFT which follows a batch process, RTGS helps to transfer funds in real-time and gross basis. Real-time settlement refers to that there is no waiting time for the money to get transferred. Gross refers to one-to-one transaction. The minimum amount to be transferred through RTGS is 2,00,000 rupees. Apart from money this helps to transfer securities (tradable financial asset).
Immediate Payment Services (IMPS) was launched in the year 2010. IMPS is available 24/7 and even on holidays. IMPS is managed by National Payments Corporation of India. It offers interbank electronic fund transfers and it is accepted by almost all banks and financial institutions.
Insurance is an agreement to deliver a compensation amount by the financial institution for certain loss, destruction, ailment, or demise in return for payment of a specified premium.
Insurance is protection for financial loss and provides medical support in case of severe ailments. It provides safety and security to human life as well as business. It generates financial resources, encourages savings by investing regular premium and promotes economic growth by mobilizing domestic savings. Insurance. Insurance accelerates economic growth by collecting and investing funds in industrial development. Insurance helps to get loans. Insurance helps in medical emergencies.
In the subsequent section, we shall discuss various about various Life Insurance schemes and various other schemes −
An agreement to deliver compensation amount by the financial institution on demise of an insured person in return for payment of a specified premium.
Necessity for Life Insurance
General or non-life insurance saves individual against uncertainties, loss, destruction and damage caused by natural events.
Necessity for Non-Life Insurance
Pradhan Mantri Jan-Dhan Yojana (PMJDY) is launched by Prime Minister of India, Narendra Modi on 28 August 2014.PMJDY is a National Mission for Financial Inclusion to ensure access to financial services, namely, Banking/Savings & Deposit Accounts, Remittance, Credit, Insurance and Pension in an affordable manner. Account can be opened in any bank branch or Business Correspondent outlet. PMJDY accounts are being opened with zero balance. However, if the account-holder wishes to get cheque book, he/she will have to fulfill minimum balance criteria.
There are lots of social security schemes launched by the Prime Minister “Narendra Modi”. Some of the important schemes are described in detail below.
The scheme offers to provide you or your family a cover of up to Rs. 2 lakhs in case of any accidents, resulting in death or disability of the insured. In case of death or full disability, you or your family will get Rs. 2 lakhs and in case of partial disability, you will get Rs.1 lakh. Full disability means loss of both eyes, both legs, both hands, whereas partial disability means loss of one eye or leg or hand.
Age of the Insured – Savings bank account holders aged between 18 years and 70 years are eligible to apply for this scheme. People aged more than 70 years will not be able to get the benefits of this scheme.
Premium Amount – It costs you just Rs. 12 in annual premiums for having an accidental death or disability cover of Rs. 2 lakhs under this scheme. It works out to be just Re. 1/month, which is extraordinarily low. Again, your age has nothing to do with the premium payable for your insurance cover under this scheme as the premium is fixed at Rs. 12 for a cover of Rs. 2 lakhs.
Period of Insurance – You will remain insured for a period of one year from June 1, 2015 to May 31, 2016. Next year onwards, the risk cover period will remain to be June 1 to May 31.
Administrators for PMSBY– The scheme would be offered/administered by many general insurance companies, both in the public sector as well as in the private sector. Participating banks will be free to engage any such general insurance company for implementing the scheme for their subscribers. National Insurance Company Limited, Oriental Insurance Company Limited and ICICI Lombard are some of the companies which would be offering this scheme.
Auto Debit Facility – You will be required to provide your consent for auto debit of Rs. 12 as the annual premium from any one of your bank accounts at the time of enrolling for this scheme. This premium of Rs. 12 will get deducted from your savings bank account through auto debit facility every year between May 25 and June 1.