Skill Development Notes
Skill Development Notes
A computer is an electronic device that stores and processes data, and can be
programmed with instructions. It manipulates information, or data.
Charles Babbage, an English mechanical engineer, originated the concept of a
programmable computer. He invented the first mechanical computer in the
early 19th century and considered the “Father of the Computer”.
a) Analog Computer
An analog computer is a form of computer uses continuous
physical phenomena such as electrical, mechanical or hydraulic
quantities to model the problem being solved.
b) Digital Computer
A computer that performs calculations and logical operations
with quantities represented as digits, usually in the binary
number system.
c) Hybrid Computer
A combination of computers those are capable of inputting and
outputting in both digital and analog signals. A hybrid computer
system setup offers a cost effective method of perform in complex
simulations.
b. Mainframe Computers
A very large and expensive computer capable of supporting
hundreds, or even thousands, of users simultaneously. In
some ways, mainframes are more powerful than super
computers because they support more simultaneous programs.
But super computers can execute a single program faster than
a mainframe.
c. Mini Computer
A midsized computer, in size and power, mini computers lie
between work stations and mainframes. Minicomputer is a
multiprocessing system capable of supporting from 4 to
about 200 users simultaneously.
d. Micro Computer
Microcomputers are the fastest growing segment of the
computer industry. There are different types of micro
computer platforms with varying capabilities. The most
common type of micro computer is Personal Computer
that fits on top of a disk.
Desktop Computer
A computer designed for desktop use, usually comprises,
at a minimum, a Central Processing Unit (CPU), a monitor,
and a keyboard as separate units connected by special
cables.
Computer Hardware
Monitor
The primary device for displaying information from the computer.
Keyboard
The primary device for entering information into the computer.
Mouse
The primary device for navigating and interacting with the computer.
Processor
Send and receives information, completes tasks, makes things work
smoothly.
Hard Drive
Stores data in a computer.
RAM
Random Access Memory- makes things easier for the computer
to access.
Types of Software
Operating System Software (OS)
System Software, that enables the computer
hardware to communicate and operate the
Computer software. Without System Software,
the computer would be useless.
Four types of operating systems:
Windows, Mac, Unix, Linux
RAM
RAM is an acronym for Random Access Memory.
RAM is a type of computer data storage. A RAM device makes it possible to access data in
random order, which makes it very fast to find a specific piece of information.
ROM
ROM is ―built – in‖ computer memory containing data that normally can only be read, not
written to.
ROM contains the programming that allows your computer to be ―booted up‖ or
regenerated each time you turn it on.
BIOS
Short for Basic Input/output System, the BIOS, ROM BIOS, or System BIOS is a chip
located on all motherboards that contain instructions and setup for how your system should
boot and how it operates.
CPU
CPU is the abbreviation for Central Processing Unit.
CPU is the brain of computer. It handles all the instructions you give your computer.
The computer CPU is responsible for handling all instructions it receives from hardware
and software running on the computer.
32 bit in Processor
Computers, operating systems, or software programs are capable of transferring data 32-
bits at a time. With computer processors, (e.g. 80386, 80486, and Pentium) they were 32-
bit processors, which means the processor were capable of working with 32 bit binary
numbers (decimal number up to 4,294,967,295). Anything larger and the computer would
need to break up the number into smaller pieces.
ALU in Processor
Short for Arithmetic Logic Unit, ALU is one of the many components within a computer
processor. The ALU performs mathematical, logical, and decision operations in a computer
and is the final processing performed by the processor. After the information has been
processed by the ALU, it is sent to the computer memory.
Motherboard
A motherboard is one of the most essential parts of a computer system.
It holds many crucial components of a computer, including the CPU, RAM, and all other
hardware components and allocates powers to them.
Operating System
An operating system or OS is a software program that enables the computer hardware to
communicate and operate with the computer software. Without a computer operating
system, a computer and software programs would be useless.
Computer crime
• Defined as ―any violations of criminal law that involve a knowledge of computer
technology for their perpetration, investigation, or prosecution‖
• Computer may be target of crime, e.g.:
• Breaching confidentiality of protected computerized data
• Accessing a computer system without authority
• Computer may be instrument of crime, e.g.:
• Theft of trade secrets
• Using e-mail for threats or harassment
Spoofing
Redirecting Web link to address different from intended one, with site masquerading as
intended destination
Phishing
Setting up fake Web sites or sending e-mail messages that look like legitimate businesses
to ask users for confidential personal data
Pharming
Redirects users to a bogus Web page, even when individual types correct Web page address
into his or her browser
Click fraud
Occurs when individual or computer program fraudulently clicks on online ad without any
intention of learning more about the advertiser or making a purchase
Security by design
Security by design, or alternately secure by design, means that the software has been
designed from the ground up to be secure. In this case, security is considered as a main
feature.
Security architecture
The Open Security Architecture organization defines IT security architecture as "the
design artifacts that describe how the security controls (security countermeasures) are
positioned, and how they relate to the overall information technology architecture.
Security Measures
A state of computer "security" is the conceptual ideal, attained by the use of the three
processes: threat prevention, detection, and response.
NIC
Short for Network Interface Card, a NIC is also commonly referred to as an Ethernet card and
network adapter and is an expansion card that enables a computer to connect to a network such
as a home network or the Internet using an Ethernet cable with a RJ-45 connector.
Hub
When referring to a network, a hub is the most basic networking device that connects multiple
computers or other network devices together.
Switch
On a network, a switch is a hardware device that filters and forwards packets through the
network, but often not capable of much more.
Router
A hardware device designed to take incoming packets, analyze the packets, moving the packets
to another network, converting the packets to another network interface, dropping the packets,
directing packets to the appropriate locations, and performing any other number of other actions.
The picture shows the Linksys BEFSR11 router and is what most home routers resemble.
Firewall
A firewall is a software utility or hardware device that limits outside network access to a
computer or local network by blocking or restricting network ports.
Access point
Alternatively referred to as a base station and wireless router, an access point is the location of a
wireless receiver that enables a user with wireless access to connect to a network or the Internet.
This term can refer to both Wi-Fi and Bluetooth devices.
DSL Device / Router / Switch
Advantages:
1. Information on almost every subject imaginable.
2. Information at various levels of study.
3. The internet provides the ability of emails. Free mail service to anyone in the country.
4. Platform for products like SKYPE, which allow for holding a video conference with anyone
in the world who also has access.
5. Friendships and love connections have been made over the internet by people involved in
love/passion over similar interests.
6. News, of all kinds is available almost instantaneously. Commentary, on that news, from
every conceivable viewpoint is also available.
7. Powerful search engines
8. Internet is an ocean of information.
9. Using Internet one can access millions of articles easily.
10. Online education is possible with the help of internet.
11. On Internet video chatting is possible.
12. One can make friends on internet using social networking websites.
13. Pay bills online over internet.
14. Online internet shopping is possible.
15. With the help of internet online examination is possible.
Disadvantages
1. There is a lot of wrong information on the internet. Anyone can post anything, and much of
it is garbage.
2. There are predators that hang out on the internet waiting to get unsuspecting people in
dangerous situations.
What is PowerPoint?
PowerPoint is a computer program that allows you to create and show slides to support a
presentation.
Uses
With PowerPoint, you can make charts, tables, and macros, and insert images, audio, video, and
other multimedia files, either by embedding them into the file or, if your version doesn’t support
the particular file, linking to it in a slide.
The main purpose of MS PowerPoint is to enable the user to create dynamic, informational slide
shows through the use of text, graphics, and animation. Slide shows created with the software are
often displayed on projection screens for business, training, or educational presentations, although
they can be distributed as stand-alone files. Additionally, the slides can be arranged and printed as
handouts for reference.
You can combine text, graphics and multi-media content to create professional presentations. As a
presentation tool PowerPoint can be used to:
organize and structure your presentation;
create a professional and consistent format;
provide an illustrative backdrop for the content of your presentation;
Animate your slides to give them greater visual impact.
Network Topology
The way in which the network connections are made is called network topologies.
In communication networks, a topology is a usually schematic description of the arrangement
of a network, including its nodes and connecting lines.
Following are the main topologies of network:
1. Bus Topology
Bus Topology is the simplest of network topologies.
In this type of topology, all the nodes (computers as well as servers) are connected to
the single cable (called bus), by the help of interface connectors.
This central cable is the backbone of the network and is known as Bus (thus the name).
Working of Bus Topology
Before the transmission of data on bus network, the process of hand shaking is
performed between sending and receiving computers.
2. Star Topology
In Star topology, all the components of network are connected to the central device
called ―hub‖ which may be a hub, a router or a switch.
OSI Model
OSI stands for Open System Interconnections
Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary
standards for networking and for operating system involved in networking functions.
Layers of Computer Network
It consists of seven layers, which describes the flow of data from one computer to another
computer. The seven layers of OSI Model are as under:
1) Application Layer (Provide end-user services, like e-mail)
2) Presentation Layer (Data compression, and other data conversion)
3) Session Layer (Authentication/Authorization)
4) Transport Layer (Guarantee end-to-end data transfer—from machine to machine)
5) Network Layer (Routing, accounting).
6) Data Link Layer (Transmit/receive packets, resolve hardware addresses)
7) Physical Layer (Physical cable, medium, air)
LAYER 7: APPLICATION
The application layer is the OSI layer that is closest to the user.
It provides network services to the user’s applications.
It differs from the other layers in that it does not provide services to any other OSI layer, but
rather, only to applications outside the OSI model.
Examples of such applications are spreadsheet programs, word processing programs, and bank
terminal programs.
LAYER 6: PRESENTATION
Provides encryption and compression of data.
Examples: - JPEG, MPEG, ASCII, EBCDIC, HTML
2) Software Requirement
In order to access to internet sites at least one web browser should be installed in the
computer.
Web browser such as internet explorer, makes it possible to have access to different
web sites.
3) ISP (Internet Service Provider)
Apart from hardware and software requirement, an ISP connection is also required.
Internet Service Provider provides a user name and password to a user to access the
internet.
Services or Component of Internet
1) WWW
WWW stands for World Wide Web are simply referred to as Web.
It is a network that is spread over the entire world connecting the whole world
together; therefore WWW can also be called as Internet because nearly 70 percent of
all the information searches are handled through the World Wide Web.
2) Email
Email is an electronic message from sender to a recipient or multiple recipients.
Compared to postal Email is the fastest and reliable way to send messages from one
location of the world to another.
You can also send documents, pictures, audio and video files via email by attaching
the file with email.
Types of Connections
i. Dial-up Connection/Access
Dial-up or Access connection is cheap but slow.
A modem internal or external connection to the internet after the computer
dials a phone number.
The modem speed in dial-up connection transmits data at the rate of 56 kilo
bytes per second (kbps).
ii. High Speed/Broad Band Connection
The High Speed service is also called Broad Band connection because they
media that can handle multiple signal at once. i.e. Fiber, Optics, Microwaves
and other advance technologies
iii. Cable-TV Line
It provides a high speed internet connection through the cable television
network.
A cable modem sends and receives data over cable television line.
Its data transmission speed is from 128 Kbps to 3Mbps.
iv. Satellite Connections
Satellite access the internet with a satellite in earth orbit.
Prepared by: Fareed Khan Tareen Page 25
The distance that a signal and back again provides a connection compare to
cable and DSL (Digital Subscriber Line).
The satellite connection speed is around 512 Kbps to 20 Mbps.
v. Digital Subscriber Line (DSL)
It also requires a special type of DSL modem that connection between
telephone and PC (Personal Computer) at the same time.
The standard transmission speed of DSL range from 128 Kbps to 30 Mbps.
vi. Cellular Network
Cellular technology provides wireless internet access through cell phones.
The speed varies depending on the provider but the most common are 3G, 4G.
The 3G is a term that describes 3rd generation cellular network obtaining
mobile speeds of around 2.0 Mbps
The 4G is a 4th generation of cellular wireless standard network. The goal of
4G is to achieve mobile network speeds of 100 Mbps but the reality is about
21 Mbps currently.
Spreadsheet
Spreadsheet is a guide of rows and columns that holds a large amount of data.
A spreadsheet interface provides a menu bar, tool bar and a special formula bar, by
which we can create or add data and formulae in a worksheet.
Worksheet
A worksheet is made up of rows and columns into which we enter and add data.
Each worksheet has 256 columns and 65536 rows.
Workbook
In MS Excel a workbook is a file in which we work and store data.
Each workbook consists of many sheets. A maximum number of sheets are 255
sheets.
Cells
Where rows and columns meet that is called cells.
Data Validation in Excel
Data validation is a feature available in Microsoft Excel. It allows you to do the
following:
create a drop down list of items in a cell
restrict entries, such as a date range or whole numbers only
create custom rules for what can be entered
Create messages that appear when incorrect data has been entered.
Set a range of numeric values that can be entered in a cell.
How to apply Data Validation on a cell:
Open an Excel worksheet where you want to apply data validation. Select
a Table similar to the example in the next slide and list the options in the
area of excel which is outside the table that you are using and list the
options that you want to restrict the users.
Select a cell where you want to set validation.
In the "Data Tools" tab click on "Data validation".
The Data Validation window will be shown.
From the Data Validation window you can choose list.
Select the options that you have already listed outside the table and click
on OK button
Protect a Workbook
To prevent other users from viewing hidden worksheets, adding, moving, deleting
or hiding worksheets, and renaming worksheets, you can protect the structure of
your Excel workbook with a password.
To protect the structure of your workbook, follow these steps:
i. Click Review Protect Workbook Protect Structure and Windows
ii. Enter a password in the Password box
iii. In Excel for Windows, click OK, and reenter the password to confirm it, and
then click OK.
Protect a Worksheet
To prevent other users from accidentally changing, moving, or deleting data in a
worksheet you can lock the cells on your excel worksheet and then protect the
sheet with a password.
Given below are the steps to protect your sheet:
i. Click on the Review tab, and then click Protect Sheet.
ii. In the Allow all users of this worksheet to list, select the elements you want
people to be able to change.
iii. Optionally, enter a password in the Password to unprotect sheet box and click
OK. Reenter the password in the Confirm Password dialog box and click OK.
2. =(cell+cell+cell)
For example:
=(12+12+12)
36 answer
3. =(10+10+10)
30 answer
Subtraction Formulas
1. =(cell-cell-cell)
For example:
=(20-10-5)
5 answer
2. =(20-12-6)
2 answer
Multiplication Formulas
1. =product(criteria)
For example:
=product(10:10)
100 answer
2. =(C5*C10)
For example:
=(10*10)
100 answer
Average Formulas
1. =Average(C1:C2)
2. =min(C12:C15)
3. =max(C20:C22)
SmartArt
SmartArt allows you to communicate information with graphics instead of just using text.
There are a variety of styles to choose from which you can use to illustrate many different
types of ideas.
To insert a SmartArt graphics:
Select the slide where you want the SmartArt graphic to appear.
From the Insert tab, select the SmartArt command in the Illustrations group.
A dialogue box will appear. Select a category on the left, choose the desired SmartArt
graphic and click OK.
The SmartArt graphic will appear on the current slide.
You can also click the Insert a SmartArt Graphic command in a placeholder to add
SmartArt.
To insert a video
Power point allows you to insert a video onto a slide and play it during your presentation.
You can even edit the video within Power point and customize its appearance.
To insert a video from a file
From the Insert tab, click the Video drop-down arrow, and then select Video on My PC.
Locate and select the desired video file, then click Insert.