Important Definitions Aikman
Important Definitions Aikman
1. Computer.
CHAPTER 1
2 Computer les of aching that can take input from user, processes it, convert iamto information, and
stures it for further use
It processes dura.
3. Input devices;
The devices that are used to enter data and programs into the computer are called input devices
Pointing devices
The hardware components that give results of processing are called output devices
There are two types of output devices: Hardcopy output devices: Printers, Plotters
data in the formation of text, sound, images, videos, etc, is called information technology 1. Data
Processing: There are four elements are include in data processing. These are
1. Data
2. Processing
3. Output
4. Storage
9. Main Memory:
The memory placed on main board (motherboard) is called the main memory,
Main memory is used to store data and programs for processing by the processor.
The computer system is used for data processing. It accepts data, processes it and output it in a useful &
meaningful form
Global Village means the entire world and its inhabitants. This term suggests that the information
technology has "shrunk" the world. The world has become a "village" in which all people know one
another as if they are actually living in a village.
The integration of various industries and services with the help of information technology is called digital
convergence.
In direct input, data is entered directly into the computer without using the keyboard. Scanners,
microphones, digital cameras get data and enter it directly into the computer.
17. Source Data Entry Devices:
Devices that receive data from sources other than the keyboard and enter it directly into the computer
system are called
The most commonly used source input devices are scanner, microphones, and digital cameras.
250
AnificialIntelligrace
Web-based applications
Computer animation
The central processing unit (CPU) is an electronic circuit that processes input data into useful
information. It is the hardware component that actually executes instructions given to the computer.
The storage devices that store data and progruns outside the compater system are called secondary
storage devices A secondary storage. Hard disk, loppy diskette, USB storage, and compact disk (CD) are
examples of secondary storage
22. Keyboard:
The keybeard is the most commonly used input device. It is used to input textual data. It is an indirect
input device. Dota entered by pressing keys on the keyboard.
The Caps lock key is pressed to type test in Capital letters. 25. PageUp and PageDown:
Pagelip and PageDown keys are usually used in wond processing or other application programs to move
the screen up or down
The PageUp key moves one full screen backwards The PageDown key moves one full screen forwant
• 26 . Combination Keys:
The keys on the keyboard that are always med in combination with ether keys are called combination
keys. SHIFT, ALT and
CTRL. Keys are always used in combination with other on the keyboard
• The devices that are used to control the position of pointer or cursor on the computer screen, are
called pointing devices.
Mouse
Touch screen
Trackball
Light pen
• Touchpad
• Graphic Tablet
Pointing Stick
Pen-based system
29. Mouse:
The mouse is a pointing device. It is rolled over a flat surface. Rolling of the mouse moves the pointer on
the computer
The trackball is a stationary pointing devices. It has a ball on its top. The ball is rotated to move the
pointer.
31 . Pointing Stick:
The pointing stick is a device positioned on the keyboard. Pushing the stick moves the pointer. It is
usually provided between
GHB keys
32. Light-Pen:
The light-pen is a light-sensitive pointing device. It is pointed at the screen to identify its position on the
screen.
The touch screen is a touch-sensitive display. User interacts with the computer by touching areas directly
on the computer
The pen-based system is used as a normal pen. However, writing with his system appears directly on the
computer screen. It is turned off is called hardcopy output.
35. Hardcopy Output:
The output which is permanent and is not lost when the device generating
•The output which is permanent and is lost when the device generating it is turned off is called softcopy
output. 37. Terminal:
• A terminal is a device that is used for input/output purposes. It consists of a keyboard and a monitor. It
is connected to the
Main computer through a network . It usually does not have any computing power.
38 . SDLC:
SDLC stands for System Development Life Cycle, It is a step-wise approach to system development.
Preliminary
Investigation
Analysis
Design
Maintenance
IMPORTANT DEFINITIONS
Preliminary Investigation:
It is an initial analysis of the system. The system is identified Its scope eix determined and alternative
solutions for developing
251
System analytis is the study of a system. Its purpose is to understand the existing system and to find out
how to improve 4. It system. It also makes recommendations for the new system.
Interviews are held with system users to know their needs. This is a quick and simple method of knowing
the needs of the
45. Coding:
Writing a computer program is called coding. Requirement statements, algorithms, flowcharts and
specifications are used to write programs. Programs are usually written parts. These Parts are then
combined to work like une system.
In unit testing, the parts of the system are tested separately. 43. System Testing:
System Testing
In system testing, all individual parts of the program are combined and tested. The system is tested first
with test data and then with actual data. Actual data is used to test working of the system in real
environment.
1. Internet:
CHAPTER 2
• The Intermet is a network of a large number of computer networks around the world
Quickly and at very low cost, 3. Communication Media for the Internet:
The networks and computers use the following communication media to connect to the Internet
Telephone links
The World Wide Web is a collection of millions of documents stored on the computers that are
permanently connected to the Intermet. These documents are linked together and contain data and
information in the form of text, graphics, audios, an
• The file transfer protocol is used to transfer files from one computer to another over a network.
1. Downloading:
• The process of transferring a file from a remote computer to a local computer over the network is
called downloading.
7. Uploading:
• The process of transferring a file from a local computer to a remote computer over a network is called
uploading
2 Telnet:
Telnet is an abbreviation for Terminal Network. It is a software tool that enables a user to connect to a
remote computer.
Gopher:
Gopher is a software application. It provides menu-based facilities for searching and downloading
documents on a compua
Network
10 • Intranet is a network of an organization. It uses the same technologies and protocols that are used
on the Internet. It is called an enterprise network.
. Intranet:
11 . Extranet:
An intranet that can be accessed by authorized users from outside is called extranet.
1
252
Name specifies the name of the person who is the owner of the e-mail
Site address specifies the address of the e-mail server that the user uses to send and receive emails. For
example, I have an e-mail account on G-mail. My user name is Aikman Book Company. The site address
for G-mallis gmail.com. Therefore, my e-mail address is [email protected]
13 . Advantages of Emalls:
Following are three advantages of e-maile: It reaches the destination quickly. It is cheap to use. One
message can be sent to
Bridge
Router
Gateway
15. Interconnection:
• Cables (or wireless communication) that are used to connect devices in a network are called
interconnection.
16 . Interconnection in LAN:
Low-cost LANs me twisted wire pairs. High speed LANs use coaxial or fiber optic cables. In wireless
communication
A wireless LAN has two limitations. They have slower transmission rates. Distance between two devices
should be small
18. Bridge:
19. Gateway:
A gateway is a network component, It consists of hardware and software. It allows a device on a network
to communicate with a device on another network. It is used to connect different types of networks.
20. Router:
A router is a network component. It determines the path on the network through which data is
transmitted from one device a
• The Ethernet uses carrier sense/multiple access/collision detection (CS/MA/CD) technique to transmit
data.
23 . Carrier Sense:
Before transmitting data over a network, a device checks the communication medium to ensure that it is
available for data transmission. The communication medium is called the carrier. The process of checking
for availability of communication medium for data transmission is called "carrier sense."
Usually many devices are attached to a network. These devices have equal access to use the network.
The arrangement in which many devices access and use network is called multiple access.
Collusion occurs when two devices connected to a network transmit data at the same time
26. Methods of Collision Resolution: The methods used for collision resolution in Ethernet networks are:
Collision Detection, Collision Avoidance, Carrier Sense,
The token ring network has the following features: >It uses ring topology.
28. TCP/IP: TCP/IP is short for Transmission Control Protocol/Internet, Protocol. It is a set of protocols for
sending data over networks.
It uses token passing to transmit data. Maximum data transmission speed is 4 Mbps using unshielded
twisted pair-cables and up to 16 Mbps using shielded twisted pair cables.
29. Transmission in TCP/IP: TCP/IP transmitų data by breaking it up into packets. Each packet contains
data, information about the sender and the receiver, and information about sequencing information.
Each packet reaches the destination separately. The packets are then re-assembled by the receiver using
the sequencing information
30. ISDN:
ISDN is short per Integrated Services Digital Network. It is a set of standards for transmission of data over
telephone lines.
IMPORTANT DEFINITIONS
253
31. DSL:
DSL is ADSL for Digital Subscriber Line. It is a new technology. It allows telephone lines to transmit 32.
DSL and ADSL: data at high speed In DSL upload vel download speeds are equal. ADSL is type of DSL. La
ADSL, upkad and downiced speeds are different Download is given more bandwidth than upload.
In ADSL upload and download speeds are different. Downicad is download more information than they
upload, ADSL, provides better we of telephone lines given more bandwidth than upload. As most users
34. UTP Cables: in UTP cables, cables are twisting to protect them from external interference.
35. WAN: WAN standa for Wide Area Network. It is a network of computers that are located over a large
arca. Computer in & WAN are connected through telephone lines, microwaves, or satellites
36. MAN: MAN stands for Metropolitan Area Network. It is a high-speed network that connects several
local area networks in a such as a city or a town.
The arrangement of computers, devices, and media in a nerwork is called the network modal. It is also
calku network architecture.
In a client/server network, one or more computer act as a server. Other computers connect to the server
and act as clients The server manages network resources. It usually also does the processing, Clients
depend on the server and use its resources
The computer network in which all computers connected to the network are equal and no one computer
is in control is called
In client/server network, une computer (called server) controls network resources and provides central
storage for programs
And data. In peer-to-peer network, all computers are equal and no one computer is in control. Each
computer uses its own resources,
Which the other computers on the network can also use 41. Disadvantages of Client/Server Networks:
The disadvantage of client/server network is its high cost:
The network that has the combined features of both the client/server and poel-to-peer networks is
called the hybrid network Each computer in a hybrid network uses the resources of the server and or its
peers. It also makes its resources available to its
De facto means “by fact” These standards were developed in the early days of computer networking.
They came into being
• De jure means “according to law.” There are the standards that were developed according to certain
principles by
The way is which a number of computer are connected together to form a network is called the network
topology. It is the
In ring topology, each computer is connected to the next computer and the last computer is connected
to the first. This
The tree topology is made by combining bus and star topologies. The bus makes the backbone of the
network, Groups of star- configured computers are connected to the bus.
256
Design products
Control manufacturing
4. Office Automation:
The process of carrying out everyday office jobs with the help of computers is alled office automation.
Advan
Desk
T
1. CBT
ATM
1. Adv
Retrieval
2 Con
RAI
A document management system provides facilities for word processing, desktop publishing, and
document storage and
Vo
DF
E-Commerce stands for electronic commerce. It includes buying, selling and marketing of products and
services over the 4 SB Internet
SD
Video conferencing
Video conferencing is a meeting between two or more persons located at different places who can see
each other on the screen and talk to each other through speakers and microphones
Managing a bank account by using the website of the bank is called electronic banking. It can be used to
transfer money,
Make payments of credit card and utility bill, etc.
13. Robot:
A robot is a programmable machine that moves and performs mechanical tasks. Movements of a robot
are programmed and controlled by the computer. RO
12
• Computer Aided Design (CAD) is a computer system that is used to design products. It provides
facilities to prepare design drawings, parts lists, and other design-related elements of products.
Computer Aided Manufacturing (CAM) is a system in which computer controls manufacturing process.
IMPORTANT DEFINITIONS
With computer aided manufacturing Products can be made accurately Machines can be run around the
clock Product design can be changed easily.
2. Desktop Publishing:
19. CBT:
The process of typing, editing, adding graphics, and formatting a document for printing is called desktop
publishing CBT stands for Computer Based Training. It is the use of computers in education and training.
It consists of tutorials, drill and practice, and computer based testing
20. ATM:
ATM stands for Automatic Teller Machine. It is a machine that provides facilities to draw cash using a
credit card or s bankcard
ATM stands for Automatic Teller Machine. Its main advantage is that cash can be drawn at any time of
the day and night.
1. RAM:
RAM stands for Random Access Memory. It is also called primary memory or main memory. It is used to
store the program
CHAPTER 5
2. Being executed by the computer. It also stores the data being Volatile Memory:
Processed by the computer. RAM cannot store data and instructions permanently. When the computer
power is turned off, all programs and data stored in its memory are erased. It is, therefore, called volatile
memory.
3. DRAM:
DRAM stands for Dynamic Random Access Memory. DRAM stores data in the form of an electric charge.
This charge decreases with time. In order to maintain the charge, the DRAM is recharged frequently
using a small amount of electrical
Current 4. SRAM:
SRAM stands for Static Random Access Memory. SRAM consists of memory cells made from digital gates.
These gates can hold data without any need for frequent recharging.
DRAM stores data in the form of an electric charge. As the charge decreares with time, DF AM is
recharged frequently
During the recharging process, the processor cannot access DRAM. This slows down the speed of
computer operations. ➤ SRAM does not need any recharging. No time is wasted and the SRAM is always
available for read and write operations.
6. Non-volatile Memory:
ROM stores data and instructions permanently. When the power is turned off, the instructions stored in
the ROM are not lost.
7. Cache Memory:
A cache (pronounced as cash) memory is a small but very fast memory within the CPU. It is used for
speeding up transfer of data between the RAM and the CPU.
8. Types of ROM:
• Following are the various types of ROM used in computer systems: ROM PROM EPROM EEPROM
9. Bus Interconnection:
The internal communication channel of the computer system through which various devices exchange
data is called the bus
• The computer system has three types of buses. These are system bus, address bus, and expansion bus.
• The part of the computer bus that is used to transmit information from one device to another is called
data bus.
13. Address Bus:
The part of the computer bus that is used to specify the source or destination of the data being
transmitted on the data bus is called address bus.
F10
258
The part of the computer has that is used by the CPU tu control the sequence e of operations while a
program is being exec
Al devices connected to the computer system. Expantionhus allows the processor to communicate with
external d
Of the computer system System bus coects the processor with the main memory and under coтролетта
16. Register Aster is a special purpose high-speed memory inside the CPU. It is small in size. It is used for
temporary storage of day 12.
IMPOR
31
The site of registers is usually 8, 16, 24, or 32 bits. Is more advanced computers, the size of registers is
16-bit, 24-bit, 32-4 33.
Accumulator Register
Decoding and execution of instructions Temporary storage of data being worked upen by the CPLU
20. Instruction Register.
21. Memory Buffer Register: The memory buffer register holde data coming from or going to the
memory
Execution by
The CPU
The memory address register (MAR) holds address of the main memory location being accessed by the
CPU
23. Accumulator:
The accumulator is a general purpose registre. It is used to bold values during aritufictic, logical, and dass
transfer operaticp
The segment registers in a CPU are code segment (CS), data segment, (05), extra segment (ES), and stack
segment (55)
The CPU carits-out the following four types of Instruction Data Transfer Instructions
Arithmetic and Logical Instructions
Arithmetic and logic instructions are used to perform arithmetic and logic operations. Arithmetic
operations include addition subtraction, multiplication and division operations Legical operations include
comparison of two data items. Tex
The mstructions that are used to transfer the execution control from one part of the program to another
during program execution are called control transfer instructions.
28. Micro-operations:
CPU carries out an operation in a series of steps. Each step is very simple and accomplishes very little.
For example, one step may be to
Increment a register,
Each of these simple steps is called a micro-operation. CPU carries out a number of micro-operations to
execute on operating
F9
F10
F11
F12
PrtScr Insert
Delete
Backspace
IMPORTANT DEFINITIONS
25
The zero-address instructions are usually writen to manipulace a stack. Such instructions do not specify
any address. For example, the instruction ADD can be used without specifying any address in this format,
it takes two values from the rack,
Adds them and returns the result to the stack 31. Instruction Execution by CPU:
Instructions
CPU instructions that bring a program instruction from the main memory to the CPU registers for
execution ars called fetch
CPU instructions that interpret a program instruction fetched from the main memory to the CPU
registers for execution are
CPU instructions that instruct various components of the computer system to take actions according to
the decoded program
Scheduling
The two types of user interfaces provided by operating systems are: command-line interface and
graphical user interface (GUI)
37. Interpreter:
38 . Compiler:
A compiler is a type of translators. It translates a source program written in a high level language into the
machine language
As a whole.
CHAPTER 6
1. Boot Sector:
The first sector on a disk is called the boot sector. When the computer is turned on, the program in the
boot sector is automatically loaded into the computer memory. This program then loads the operating
system.
2. Boot Sector Virus:
Boot sector viruses reside in the boot sector of a disk. They change the boot sector in such a way that
they are loaded into the memory whenever the computer is turned on. From memory, they spread to
every disk that the system uses. These viruses. Usually attack executable files, ie, file with exe, .com or dil
extensions.
3. Logic Bombs:
Logic bombs are viruses that execute on a certain date or in response to a certain action.
• A Trojan horse virus is a computer program that executes without the knowledge of the computer user.
It provide
Unauthorized access to the infected computer when the computer connects to the Internet.
6 . Antivirus Software:
Commonly used antivirus software are:
260
Norton Antivirus
MacAfee Antivirus
6. Data Security:
Data security is the practice of ensuring that data is only accensed and used by people who have the
right to use it
B . Chernobyl Virus:
• The Chemoby! Virus deletes all Microsoft office files. It also deletes the partition information from the
disk
The execution of virus program on infected computer is called activation of the virus. A virus program
unually executes activates) in response to some action by the computer uier. Some viruses are activated
on a specified date
Accidental threats
<
15. Hacker:
MPOR
Adr
Mu
Getting personal or confidential information about a person without his or her knowledge or consent is
called information
Theft
17. Privacy:
Privacy is the right of a person to keep his or her personal information away from other people.
Data protection law defines rules for protection of datz. They also ensure privacy of data.
Copyright is the exclusive right to use and get benefit from a creative work. It allows the creator to
benefit from his work
• The ideas and creative works in literature, engineering, music, films, etc. are called intellectual
properties.
Copyright laws protect intellectual property rights. They prohibit use of intellectual properties without its
owner’s
Permission
10
11
13
CHAPTER 7
1. Multi-processing:
• The capability of an operating system to use two or more processors in parallel in a single computer
system is called multiprocessing
F12
PrtScr
Insert
Delete
IMPORTANT DEFINITIONS
2. Advantage of Multiprocessing:
3. Multitasking:
261
• In multiprocessing, a task is divided into a number of independent sub-tasks. These sub-tasks are run
on-several processort In this way the task is completed more quickly
In a multitasking, several taska can be performed at the same time
4. Advantage of Multitasking:
Multitasking saves time in doing a job on the, computer. R. It also enables maximum utility of [computer
resources.
5. Multi-user Operating System: A multi-user operating system allows more than one user to use
the computer system at the same time or at different times.
• Plug and play is the capability of an operating system to automatically detect and install a device
attached to the computer
➤ Multitasking
Multiprocessing Multiuser
Networking Supporting
7. Desktop:
• The background area on the computer screen when window operating system is running is called the
desktop
8. Purpose of Desktop:
The desktop provides an entry point into the Windows operating system. It contains all objects of the
Windows operating system: icons, application programs, dialog boxes, tool bars, etc.
The My Computer object can be used to display contents of a disk attached to the computer.
The Recycle Bin is a special folder. It is used to temporarily hold items that have been deleted from the
hard disk. When an item is deleted, it goes to the recycle bin. From where, it can be either deleted
permanently or restored.
The Windows Explorer is a utility program. It is used to browser contents of directories and to manage
files and folder on
The Internet Explorer is a web browser. It is used to access and view websites when the computer is
connected to the
Internet 14. Control Panel:
• The Control Panel folder contains tools for management and maintenance of the Windows operating
system. These tools are
Used to configure the operating system and various devices attached to the computer.
The Start Menu provides access to all the available resources of the computer system
The action that is started with the mouse is called mouse event.
• There are three types of mouse events: Pointing, Clicking, and Dragging
The left click is used to execute a command associated with an object. For example, it is used to:
The partition of a hard disk that can be used to install operating system is called primary partition. An
operating system starts from a primary partition. Primary partition is usually the first division of a hard
disk. If a hard disk has no partitions, the
The partition of the hard disk that can contain other partitions is called the extended partition.
262
The disk management utility is used for maintenance of disks installed on the computer system. It
provides tools for carrying out such tasks as viewing the status of disks, creation and deletion of
partitions, formatting of disks, etc
CHAPTER 8
The bar that contains buttons for drop-down menus is called menu bar. It is placed below the title bar. It
contains drop down menus. The dropdown menus contain all the commands that are available in the
software.
The bar at the bottom of Word application window is called status bar. This bar provides some basic
information about the current document, such as current page number, total pages in the document,
position of cursor, etc.
3. Text Editing:
Typing and making changes in a text document is called text editing. It includes, correcting spelling,
adding new text
• The Word allows the entry of text in a document in two modes: Insert mode and Overtype mode.
5 . Overtype Mode:
⚫In Overtype Mode, new text that is typed is written over the existing text. In other words, new text
replaces the existing text
Hold down the shift key on the keyboard and use the right arrow key to select the text. B. Keys to Delete
Text: Two keys on the keyboard are used to delete text. These keys are: Del key and Backspace key.
• The Delete key deletes characters to the right up the cursor. The Backspace key deletes characters to
the left of the cursor.
Canceling or reversing an action is called undoing of an action. The command or option that is used to
cancel an action in called undo command.
The appearance of text on the screen or on the printout is called text formatting. It includes typeface of
font, size of font
The layout of a page of a document on the screen or the printout is called document formatting. It is also
called page formatting. It consists of page size, page margin, page orientation, headers & footers, etc.
12. Characteristics of Fonts: Some basic characteristics of fonts used in text formatting are font size,
font style, font color, and font effects
. The formatting applied to a paragraph includes: text alignment, tabs &indents, line spacing, and
paragraph spacing 17. Indent:
The distance between a margin and all lines of text of a paragraph is called indent.
The arrangement of lines of a paragraph with respect to the margin is called text alignment.
There are four types of alignments. These are: Left alignment, Right alignment, Center alignment, and
Justified alignment.
The size of page, its orientation, borders, headers & footers, and page margins are called page formatting
Es
COMPUTER
PRACTICAL
IMPORTANT DEFINITIONS
263
21. Footer.
The information that is printed in the bottom margin of a page in a text document called footer. It usually
contains page numbers and footnotes
The blank spaces on all sides of the paper are called margins. These are used to print page numbers,
headers, footers, footnotes, etc.
In portrait page orientation the text is printed across the shorter side of the paper
25. Cilpboard:
The clipboard is the temporary storage location in the computer memory. When a selected text or an
object is copied or cut, it is placed in the clipboard. When paste command is used, the contents of the
clipboard are placed into the document
• Graphics that are made up of pixels are called bitmap graphics or bitmaps. These are like painted
pictures
27. Vector Graphics:
• Graphics that are made up of lines and curves are called vector graphics. They are like drawings.
1. Spreadsheet Program:
CHAPTER 9
A spreadsheet program is an application program for entering, calculating, manipulating and presenting
numerical data
2. Important Spreadsheet Programs: Two commonly used spreadshect programs are: MS Excel and
Lotus 123.
3. Spreadsheet:
A spreadsheet is a grid of rows and columns. Each row is assigned a number (1, 2, 3,) and cach column a
letter (A, D, C….). The Intersection of a row and a column is called a cell. Data is stored In cells.
Mathematical operations can be
• In MS Excel, the spreadsheet is called worksheet. It is a grid of rows and columns in which data is
entered and processed
4. Workbook:
The intersection of a column and a row in a worksheet is called a cell. It is the basic unit in a worksheet.
Data is entered into
6. Cell Address:
The location of a cell in a worksheet is specified by its cell address. It is specified by the column letter,
and the row number of cell. For example, the cell at the intersection of column B and row 9 has the cell
address B9
A function is used to evaluate values and perform certain operations. For example, a function is used to
find out average of values
9. Linking of Worksheets:
• Two worksheets are linked when a formula in one worksheet uses a value from another worksheet.
The SUM function is used to find the sum of values in cells. The addresses of cells whose sum is to be
computed are
Specified as argument of the function. For example-SUM(A1:A9) finds sum of all values in cells A1, A2, A9
13. MAX Function: The MAX function is used to find the maximum value in cells. The addresses of
cells whose maximum is to be found are specified as argument of the function. For example -
MAX(AI:A9) finds the maximum value in cells A1, A2, A
The MIN function is used to find the minimum value in cells. The addresses of cells whose minimum
value is to be found are specified as argument of the function. For example -MIN(A1:A9) finds the
minimum value in cells A1, A2,…, A9.
The absolute reference of a cell does not change when a formula is copied to another cell.
264
In relative cell reference, the address of referenced cell changes when formula is copied
To enter an absolute cell reference of a cell, 5 (the dollar sign) is used before and after column ictter of
cell address, For example, in the formula -C3+5D$3, SD$3 is absolute cell reference to cell whose address
is D3.
18. Range of a Worksheet:
18 . Range Reference:
Upper left and lower right comer cells, if it consists of several rows and columns.
>For example, a range of cells consisting of cells D3, D4, D5, D6 is referred to as D3 D6. Similarly, a range
of cells consisting of cells D3, E3, D4, E4 is referred to as D3:E4.
19. Function:
A function is a built-in tool that is used to perform an operation and return a value. A function gets one
or more values as input and retums a single value as output.
The cell in a worksheet that is not currently selected is called a passive cell.
A cell in a worksheet that is currently selected is called the active cell. The active cell has a dark border.
Data is entered in the
The value of a cell is the number entered in it. It can be a whole number, decimal, negative number,
currency, etc.
The title given to a cell is called its label. It is used to identify a cell or range of cells in a worksheet.
The address of a cell used in a formula that is relative to the location of the formula cell is called the
relative cell reference. The relative address changes when the formula is copied to another cell.
The address of a cell used in a formula that does not change when the formula is copied to another cell
is called the absolute cell reference.
CHAPTER 10
The two early networks of computers were ARPA Net and NSF Net.
2. Internet:
• The Internet is a collection of millions of computers and networks linked together to form a network of
networks.
3. Connect to the Internet:
A cable
A T1 line can handle approximately 1.5 million bits per second of data. While a normal phone line using a
modem can
Usually handle 30,000 to 50,000 bits per second. 5. Internet Addressing Schemes:
• Two types of addressing schemes are used on the Internet. These are: IP Addressing and DNS
Addressing.
5. IP Address:
Each computer on the Internet is assigned a unique identifier. This unique identifier or number is called
the IP address. 7. Description of IP Addresses:
In IP address consists of 32 bits. These bits are subdivided into four groups of 8 bits each. A group of 8-
bits is called an octet. For example, an IP address many look like this:
00010000
00001001
-ries
IMPORTANT DEFINITIONS
265
Series
To make the represented by itseque, they are usually represented in dotted decimal betation. In this
notation, cach octet of an IP address is its equivalent decimal number. The decimal number of each octet
is separated by using a dot For example, an IP address in this notation is written as: 1981680
DNS Addressing :
DNS stands for Domain Name System. In this system an IP address is associated with a domain name This
information is stored on a DNS server. When a user uses a domain name, the DNS serverledes the
domain name into its associated IP
There are two advantages of using DNS. These are > They are easy to remember
IP address of a domain can be changed without changing the domain name. When an IP address
changes, new IP address is specified in domain name server
11. World Wide Web: Millions of linked documents stored on computers permanently connected to the
Internet throughout the world is called the Wide Web.
12. Web Server:
World The computers permanently connected to the Internet that can be accessed by users are called
servers. The servers on which World Wide Web documents are stored are called web servers.
11. Webpage:
A webpage is a document written in hypertext markup language (HTML). It is also called a hypertext
document.
14. Website:
URL: Every web page on the World Wide Web has a unique address. It is called the URL. It stands for
Uniform Resource Locator
18. Uploading: The process of copying data from one’s computer to a remote computer is called
uploading
16. Downloading: The process of copying data from a remote computer to one’s computer is called
downloading
18 Web Publishing:
The process of developing a webpage and placing it on a web server so that users can assess it on the
World Wide Web is called web publishing.
Some of the facilities available on the Internet are: WWW, E-mail, FTP, and Telnet.
21. ISP:
⚫ISP stands for Internet Service Provider. It is a company that provides facilities to connect a computer
to the Internet.
• The process of finding information on the World Wide Web and displaying it on the user’s computer is
called web browsing.
A search engine is a website that provides facilities for finding information on the World Wide Web.
14. Email: • Email stands for electronic mail. It is a message that is sent and received through the
Internet.
25. Emall Attachment: A computer file enclosed or attached to an e-mail message is called an
attachment. It can be a word document, excel
• A newsgroup is a discussion group where people exchange ideas, opinion and views. It is like a big
message board on which
4. Newsgroup:
People post questions, news, and comments.
26. News Server. A news server is a host computer that exchanges articles with other computers. It
uses Network News Transfer Protocol