Professional Documents
Culture Documents
What is a Computer?
Components of a Computer?
CPU is the brain of computer. Its basic function is to perform calculations and
various logical functions it consists of three parts:
Input Unit:
This unit is used for entering data and programs into the computer system by
the user for processing.
Output Unit:
This unit is used for storing the result as output produced by the computer
after processing.
RAM
RAM (Random Access Memory) is the place in a computer where the operating
system, application programs, and data in current use are kept so that they can
be quickly reached by the computers processor. RAM is much faster to read from
and write to than the other kinds of storage in a computer, the Hard disk,
floppy disk, and CD-ROM. However, the data in RAM stays there only as long as
your computer is running. When you turn the computer off, RAM lost its data.
When you turn your computer on again, your operating system and other files are
once again loaded into RAM, usually from your hard disk.
Page 2 of 11
ROM
Read-only Memory (ROM) is a type of storage medium that permanently stores data
on personal computers (PCs) and other electronic devices. It contains the
programming needed to start a PC, which is essential for boot-up; it performs
major input/output tasks and hold programs or software instructions. Because
ROM is read-only, it cannot be changed; it is permanent and non-volatile,
meaning it holds its memory even when power is removed.
Non-impact printers are much quieter than impact printers as their printing
heads do not strike the paper.
When you save a document to your hard drive, it becomes a file. A file has two
important features. First, it has a name so that you can tell it apart from
other files. Second, it has place to live, like a home address. However, in the
case of a file, the address is in the form of a chain of folders.
Page 3 of 11
A multi-user operating system has been designed for more than one user to
access the computer at one time. Generally, a network is laid down, so that a
computer can be remotely used. Mainframe and minicomputers work in multiuser
operating systems. These operating systems are complex in comparison to single
user operating systems. Each user is provided with a terminal and all these
terminals are connected to a main computer.
Page 4 of 11
Mail merge is a useful tool that allows you to produce multiple letters, labels
envelopes, name tags, and more using information stored in a list, database or
spreadsheet.
Absolute: This means the cell references stays the same if you copy or move the
cell to another cell. This is done by anchoring the row and column, so it does
not change when copied or moved.
Relative: Relative referencing means that the cell address changes ads you copy
or move it; i.e. the cell reference is relative to its location.
Page 5 of 11
Mixed: This means you can choose to anchor either the row or the column when
you copy or move the cell, so that one changes and the other does not. For
Example, you should anchor the row reference stays the same.
Pivot Table:
A pivot table is a program tool that allows you to reorganize and summarize
selected columns and rows of data in a spreadsheet or database table to obtain
a desired report. A pivot table doesnt actually change the spreadsheet or
database itself. A Pivot table is useful when analyzing a large amount of data,
as it allows users to apply users to apply specific criteria to summarize,
organize and reorganize data tables and create reports.
Normal View: This is the view that you see when you first start PowerPoint and
it has thumbnails on the left the main slide in the middle and a notes area at
the bottom.
Outline View: Here you get to see an outline of the slide structure in the left
hand navigation pane, instead of the thumbnails.
Slide Sorter View: sets all the slide out on the screen so that you can see how
they look as a whole and apply transition effects and design changes to the
whole presentation at once.
Notes Page View: Here you can see just eh speakers notes with a thumbnail of
the slide they belong to.
Reading View: allows you to view the presentation as if were being presented.
Slide Master
Backup and recovery: processes to back up the data regularly and recover data
if a problem occurs.
Integrity: database structure and rules improve the integrity of the data.
The Internet Protocol (IP) is the method or protocol by which data is sent from
one computer on the Internet. Each computer (known as a host) on the Internet
has at least one IP address that uniquely indentifies it from all other
computers on the internet.
TCP/IP is two separate protocols, TCP and IP, that are used together. The
Internet Protocol standard dictates how packets of information are sent out
over networks. IP has a packet- addressing method that lets any computer on the
internet forward a packet to another computer that is step (or more) close to
the packets recipient. The transmission Control Protocol (TCP) ensures the
reliability of data transmission across Internet connected networks. TCP check
packets for errors and submits requests for re-transmissions if errors are
found.
Router
1. Packet Forwarding
2. Packet Switching and
3. Packet Filtering
Types of Networks
LAN: A LAN (Local Area Network) is a group of computers and network devices
connected together, usually within the same building. By Definition, the
connections must be high speed relatively inexpensive (e.g. token ring or
Ethernet).
MAN: A MAN (Metropolitan Area Network) is a larger network that usually spans
several buildings in the same city or town. The IUB network is an example of a
MAN.
An Email consists of three vital components: The envelope, the header(s), and
the body of the message. The envelope is something that an email user will
never see since it is part of the internal process by which an email is routed.
The body is the part that we always see as it is the actual content of the
message contained in the email. The header(s), the third component of an email,
is perhaps a little more difficult to explain, though it arguably the most
interesting part of an email.
The World Wide Web is a system of Internet servers that support specially
formatted documents. The documents are formatted in a markup language HTML
(Hyper Text Markup Language) that supports links to other documents, as well as
graphics, audio, and video files. This means you can jump from one document to
another simply by clicking on hot spots, not all Internet servers are part of
the World Wide Web. There are several applications called web browsers that
make it easy to access the World Wide Web, Two most popular being Google Chrome
and Firefox.
Search Engine
Search Engines are programs that search documents for specified keywords and
return a list of the documents where the keywords were found. A Search engine
is really a general class of programs; however the term is often used to
specifically describe systems like Google, Bing and Yahoo! Search that enable
User to search for documents on the World Wide Web.
E-Commerce
The buying and selling of products and services by businesses and consumers
through an electronic medium, without using any paper documents. E-Commerce is
widely considered the buying and selling of products over the internet, but any
transaction that is completed solely through electronic measures can be
considered e-commerce. E-commerce is subdivided into three categories: business
to business or B2B (CISCO), business to consumer or B2C (AMAZON) and consumer
to consumer or C2C (eBay).
Encryption
The translation of data into a secret code. Encryption is the most effective
way to achieve data security. The read an encrypted file, you must have access
to a secret key or password that enables you to decrypt it. Unencrypted data is
called plain text; encrypted data is referred to as cipher text. There are two
main types of encryption: asymmetric encryption (also called public-key
encryption) and symmetric encryption.
Page 9 of 11
Firewall
Communication Media
1. Wired Network: The wired network is mostly set-up an Ethernet Cable. This
can be done using 3 technologies.
a. Twisted Pair Wires: In this, there is a pair of 2 copper wire, each
1-2 mm thick, enrolled on each other in spiral pattern. These are
used to avoid interference from the nearby similar pairs. There are
number or pair bundled together in a cable by wrapping the pairs in
protective shield. A pair consists of a single communication link.
b. Coaxial Cables: Coaxial Cables same as twisted Wire cables consists
of two copper wire. But in this, the two wires are concentric to
each other. Coaxial cables has a wire conductor in the center, a
circumferential outer conductor known as foil shield, and an
insulated medium called the Di-electric separating these two
conductors. The outer conductor is protected in an outer jacket.
c. Fiber Optics: An optical fiber is a thin, flexible medium that
conducts pulses of light .When each pulse representing a bit your
data. Fiber optics can generate high data rates, so these are used
for long distance communications. That requires high speed and least
data loss. Optical fibers have no electromagnetic interference and
can process data and GB/Sec of speed.
2. Wireless Network: This type of network is usually set-up with radio
waves, communication satellites etc.
Asset: Assets are the things and properties possessed by a businessman not for
the resale but for the use in the business.
Trail Balance: Its a statement of all ledger amount balances prepared at the
end of particular period to verify the accuracy of the entries made in books of
accounts.
Types of Accounts:
Real Account: These are accounts of things, materials, assets and properties.
It has physical existence which can be seen and touch. e.g. Cash, Sale,
Purchase, Furniture, Investment etc.
Vouchers in Tally