0% found this document useful (0 votes)
16 views31 pages

Skill Development Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views31 pages

Skill Development Notes

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Prepared by: Fareed Khan Tareen Page 1

 A computer is an electronic device that stores and processes data, and can be
programmed with instructions. It manipulates information, or data.
 Charles Babbage, an English mechanical engineer, originated the concept of a
programmable computer. He invented the first mechanical computer in the
early 19th century and considered the “Father of the Computer”.

a) Analog Computer
An analog computer is a form of computer uses continuous
physical phenomena such as electrical, mechanical or hydraulic
quantities to model the problem being solved.

b) Digital Computer
A computer that performs calculations and logical operations
with quantities represented as digits, usually in the binary
number system.

c) Hybrid Computer
A combination of computers those are capable of inputting and
outputting in both digital and analog signals. A hybrid computer
system setup offers a cost effective method of perform in complex
simulations.

Prepared by: Fareed Khan Tareen Page 2


a. Super Computer
The fastest type of computer, Super computers are very
expensive and are employed for specialized applications
that requires immense amounts of mathematical calculations.
Other uses of super computers include animated graphics,
fluid dynamic calculations and petroleum exploration.

b. Mainframe Computers
A very large and expensive computer capable of supporting
hundreds, or even thousands, of users simultaneously. In
some ways, mainframes are more powerful than super
computers because they support more simultaneous programs.
But super computers can execute a single program faster than
a mainframe.

c. Mini Computer
A midsized computer, in size and power, mini computers lie
between work stations and mainframes. Minicomputer is a
multiprocessing system capable of supporting from 4 to
about 200 users simultaneously.

d. Micro Computer
Microcomputers are the fastest growing segment of the
computer industry. There are different types of micro
computer platforms with varying capabilities. The most
common type of micro computer is Personal Computer
that fits on top of a disk.

Prepared by: Fareed Khan Tareen Page 3


i. Personal Computer
A small computer intended for use by an individual.
A personal computer will usually fit on top of a disk.
A computer designed for use by a single user.
Personal Computer further divided into two types.
a) Desktop Computer
b) Laptop/ Note book Computer

 Desktop Computer
A computer designed for desktop use, usually comprises,
at a minimum, a Central Processing Unit (CPU), a monitor,
and a keyboard as separate units connected by special
cables.

 Laptop/ Note book Computer


A laptop is a personal computer designed for mobile use,
small and light enough to sit on a person’s lap while in use.

Prepared by: Fareed Khan Tareen Page 4


 A computer is made up of hardware.
 Hardware is the touchable part of the computer.
 Hardware is the physical components of a computer system.
 examples: monitor, keyboard, mouse, processor, Hard drive,
ROM, RAM etc

Computer Hardware
 Monitor
The primary device for displaying information from the computer.

 Keyboard
The primary device for entering information into the computer.

 Mouse
The primary device for navigating and interacting with the computer.

 Processor
Send and receives information, completes tasks, makes things work
smoothly.

 Hard Drive
Stores data in a computer.

 RAM
Random Access Memory- makes things easier for the computer
to access.

Prepared by: Fareed Khan Tareen Page 5


 ROM
Read Only Memory- small memory chip only used at start up.

 A set of programs and procedures that are intended


to perform some tasks on a computer system.
 Makes computer useful
 Software is the untouchable part of the computer.

Types of Software
 Operating System Software (OS)
 System Software, that enables the computer
hardware to communicate and operate the
Computer software. Without System Software,
the computer would be useless.
Four types of operating systems:
 Windows, Mac, Unix, Linux

 Software Application Programs


 Set of instructions that tell the computer what to
do – used to accomplish specific tasks like
manipulating text, numbers and graphics.
Five types of Application Software:
 Microsoft Word, Microsoft Excel, Microsoft PowerPoint,
Movie Maker, Accelerated Reader

Prepared by: Fareed Khan Tareen Page 6


Computer Graphics:
 The term of graphic comes from Greek word ―graphikos‖ which means something written.
 Creation, Manipulation and storage of geometric objects (modeling) and their images
(rendering)
 Display those images on screens or hardcopy devices

Applications of Computer Graphics:


We can classify applications of computer graphics into four main areas:
1. Display of Information:
a) Computational Biology:
 Computational Biology is an interdisciplinary field that applies the
techniques of computer science, applied mathematics and statistics to
address biological problems.
b) Computational Physics:
 Computational Physics is the study and implementation of numerical
algorithm to solve problems in Physics for which a quantitative theory
already exists.
c) Information of Graphics:
Information graphics are visual representations of information, data, or knowledge.
d) Scientific Visualization:
 Producing graphical representations for scientific, engineering, and medical
data sets.
2. Design:
a) Graphic Design:
 The term graphic design can refer to a number of artistic and professional
disciplines which focus on visual communication and presentation.
b) Computer Aided Design:
 It is the use of computer technology for the design of objects, real or virtual.
 Used in design of buildings, automobiles, aircraft, watercraft, spacecraft,
computers, textiles and many other products.
c) Web Design:
 Web design is the skill of designing presentations of content usually
hypertext or hypermedia that is delivered to an end-user through the World
Wide Web, by way of web browser.
3. User Interfaces:
a) Digital Art:
 The impact of Digital technology has transformed traditional activities such
as painting, drawing and sculpture, while new forms such as net art, digital
installation art and virtual reality.
b) Video Game:

Prepared by: Fareed Khan Tareen Page 7


 A video game is an electronic game that involves interaction with a user
interface to generate visual feedback on a raster display device.
c) Virtual Reality:
 Virtual Reality is a technology which allows a user to interact with a
computer simulated environment.
4. Simulation:
a) Computer Simulation:
 A computer simulation, a computer model, or a computational model is a
computer program, or network of computers, that attempts to simulate an
abstract model of a particular system.
b) Education:
 Computer generated models of physical, financial and economic systems are
used as educational aids.
c) Information Visualization:
 Information Visualization is the study of the visual representation of large-
scale collections of non-numerical information, such as files and lines of
code in software systems and the use of graphical techniques to help people
understand and analyze data.

Prepared by: Fareed Khan Tareen Page 8


Computers have become an essential part of modern human life. Life in today’s world would be
unimaginable without computers. They have made human lives better and happier. There are many
computer uses in different fields of work. Engineers, architects, jewelers, and filmmakers all use
computers to design things. Teachers, writers, and most office workers use computers for research,
word processing and emailing. Small businesses can use computers as a point of sale and for general
record keeping.
Computers Aid at Education
 Computers have its dominant use in the education field which can significantly enhance
performance in learning.
 Researchers have massive usage of these computers in their work from the starting to till
the end of their scholarly work.
Computers in our Health and Medicine
 Computation in the field of medicine allows us to offer varied miraculous therapies to the
patients. ECG’s, radiotherapy wasn’t possible without computers.
Aid of Computers at Financial Institutions
 We know well that computers are being used by the financial institutions like banks for
different purposes. The foremost important thing is to store information about different
account holders in a database to be available at any time. Keeping the records of the cash
flow, giving the information regarding your account.
Computers for our Pass time
 Computers are now the major entertainers and the primary pass time machines. We can use
computers for playing games, watching movies, listening to music, drawing pictures.
Computers are a part of our Transport System
 With internet on computers we can know the details of the buses or trains or the flight
available to our desired destination.
 We can book our tickets through online. Staff of the transport system will keep a track of
the passengers, trains or flight details, departure and arrival timings by using computers.
Computer in E-Commerce
 Electronic mail is the revolutionary service offered by the computes.
 Electronic shopping through online shopping added favor to purchaser and merchants.
Electronic banking is now at your hand where every bank has online support for transaction
of monetary issues. You can easily transfer your money anywhere even from your home.
Computer is today’s Designer
 As per the title, computers aid in designing buildings, magazines, prints, newspapers, books
and many others. The construction layouts are designed beautifully on system using
different tools and software’s.

Prepared by: Fareed Khan Tareen Page 9


Government
 Various departments of the Government use computer for their planning, control and law
enforcement activities. To name a few – Traffic, Tourism, Information & Broadcasting,
Education, Aviation and many others.
Defence
 Computers are used to track incoming missiles and help slew weapons systems onto the
incoming target to destroy them.
 Computers are used in helping the military find out where all their assets are (Situational
Awareness) and in Communications/Battle Management Systems.
Sports
 Recording Information
While some scoreboards are manually updated, most professional sports venues have very
modern scoreboards that are programmed to update statistics and information immediately
after the information is entered into the computer
 Analyzing Movements
The best athletes pay close attention to detail. Computers can slow recorded video and
allow people to study their specific movements to try to improve their tendencies and repair
poor habits.
 Recording Information
Official statistics keepers and some scouts use computers to record statistics, take notes and
chat online while attending and working at a sports event.

Prepared by: Fareed Khan Tareen Page 10


There are Five Generations of Computers.
 First Generation of Computers (1942-1955) Vacuum Tubes
 Second Generation Computers (1955-1964) Transistors
 Third Generation Computers (1964-1975) Integrated Circuits
 Fourth Generation Computers (1975-Present) Microprocessors
 Fifth Generation Computers (Present & Beyond) Artificial Intelligence
First Generation of Computers (1942-1955) Vacuum Tubes
• The beginning of commercial computer age is from UNIVAC (Universal Automatic Computer).
It was developed by two scientists Mauchly and Echert at the Census Department of United States
in 1947. The first generation computers were used during 1942-1955. They were based on vacuum
tubes. Examples of first generation computers are ENIVAC and UNIVAC-1.
Second Generation Computers (1955-1964) Transistors
• The second generation computers used transistors. The scientists at Bell laboratories developed
transistor in 1947. These scientists include John Barden, William Brattain and William Shockley.
The size of the computers was decreased by replacing vacuum tubes with transistors. The
examples of second generation computers are IBM 7094 series, IBM 1400 series and CDC 164 etc.
Third Generation Computers (1964-1975) Integrated Circuits
• The Third generation computers used the integrated circuits (IC). Jack Kilby developed the
concept of integrated circuit in 1958. It was an important invention in the computer field. The first
IC was invented and used in 1961. The size of an IC is about ¼ square inch. A single IC chip may
contain thousands of transistors. The computer became smaller in size, faster, more reliable and
less expensive. The examples of third generation computers are IBM 370, IBM System/360,
UNIVAC 1108 and UNIVAC AC 9000 etc.
Fourth Generation Computers (1975-Present) Microprocessors
• The fourth generation computers started with the invention of Microprocessor. The
Microprocessor contains thousands of ICs. Ted Hoff produced the first microprocessor in 1971 for
Intel. It was known as Intel 4004. The technology of integrated circuits improved rapidly. The LSI
(Large Scale Integration) circuit and VLSI (Very Large Scale Integration) circuit was designed. It
greatly reduced the size of computer. The size of modern Microprocessors is usually one square
inch. It can contain millions of electronic circuits. The examples of fourth generation computers
are Apple Macintosh & IBM PC.
Fifth Generation Computers (Present & Beyond) Artificial Intelligence
• Scientists are working hard on the 5th generation computers with quite a few breakthroughs. It is
based on the technique of Artificial Intelligence (AI). Computers can understand spoken words &
imitate human reasoning, Can respond to its surroundings using different types of sensors.

Prepared by: Fareed Khan Tareen Page 11


Scientists are constantly working to increase the processing power of computers. They are trying to
create a computer with real IQ with the help of advanced programming and technologies. IBM
Watson computer is one example that outsmarts Harvard University Students. The advancement in
modern technologies will revolutionize the computer in future.

RAM
 RAM is an acronym for Random Access Memory.
 RAM is a type of computer data storage. A RAM device makes it possible to access data in
random order, which makes it very fast to find a specific piece of information.

ROM
 ROM is ―built – in‖ computer memory containing data that normally can only be read, not
written to.
 ROM contains the programming that allows your computer to be ―booted up‖ or
regenerated each time you turn it on.

BIOS
 Short for Basic Input/output System, the BIOS, ROM BIOS, or System BIOS is a chip
located on all motherboards that contain instructions and setup for how your system should
boot and how it operates.

CPU
 CPU is the abbreviation for Central Processing Unit.
 CPU is the brain of computer. It handles all the instructions you give your computer.
 The computer CPU is responsible for handling all instructions it receives from hardware
and software running on the computer.

32 bit in Processor
 Computers, operating systems, or software programs are capable of transferring data 32-
bits at a time. With computer processors, (e.g. 80386, 80486, and Pentium) they were 32-
bit processors, which means the processor were capable of working with 32 bit binary
numbers (decimal number up to 4,294,967,295). Anything larger and the computer would
need to break up the number into smaller pieces.

Prepared by: Fareed Khan Tareen Page 12


64 bit in Processor
 Replacement for the older x86 or 32-bit platform, 64-bit is a computer or software program
that is capable of transferring 64-bits at a time. With respect to hardware, 64-bit is
referencing the width of the registers on a computer's microprocessor or the computer bus;
sometimes called WOW64 and x64.

ALU in Processor
 Short for Arithmetic Logic Unit, ALU is one of the many components within a computer
processor. The ALU performs mathematical, logical, and decision operations in a computer
and is the final processing performed by the processor. After the information has been
processed by the ALU, it is sent to the computer memory.

Control Unit in Processors


 A control unit is circuitry that directs operations within the computer's processor by
directing the input and output of a computer system. The processor then controls how the
rest of the computer operates (giving directions to the other parts and systems).

Motherboard
 A motherboard is one of the most essential parts of a computer system.
 It holds many crucial components of a computer, including the CPU, RAM, and all other
hardware components and allocates powers to them.

Operating System
 An operating system or OS is a software program that enables the computer hardware to
communicate and operate with the computer software. Without a computer operating
system, a computer and software programs would be useless.

Prepared by: Fareed Khan Tareen Page 13


Computer Security
Computer security is also known as IT or Cyber security. Computer security is a process of
protection of computer, hardware and software. In this process,of preventing and detecting un-
authorized use of computer. It involves the process of safeguard against intrades from using your
computer resources form even gaining access to them accidentally.

Malicious Software: Viruses, Worms, Trojan Horses, and


Spyware
Malware
Viruses
 Rogue software program that attaches itself to other software programs or data files in
order to be executed
Worms
 Independent computer programs that copy themselves from one computer to other
computers over a network.
Trojan horses
 Software program that appears to be benign but then does something other than expected.

Computer crime
• Defined as ―any violations of criminal law that involve a knowledge of computer
technology for their perpetration, investigation, or prosecution‖
• Computer may be target of crime, e.g.:
• Breaching confidentiality of protected computerized data
• Accessing a computer system without authority
• Computer may be instrument of crime, e.g.:
• Theft of trade secrets
• Using e-mail for threats or harassment

Prepared by: Fareed Khan Tareen Page 14


Computer Security
Computer security is also known as IT or Cyber security. Computer security is a process of
protection of computer, hardware and software. In this process,of preventing and detecting un-
authorized use of computer. It involves the process of safeguard against intrades from using your
computer resources form even gaining access to them accidentally.

Vulnerabilities and Attacks


Malicious Software: Viruses, Worms, Trojan Horses, and Spyware
Malware
Viruses
 Rogue software program that attaches itself to other software programs or data files in
order to be executed
Worms
 Independent computer programs that copy themselves from one computer to other
computers over a network.
Trojan horses
 Software program that appears to be benign but then does something other than expected.
Click jacking
 Click jacking, also known as "UI redress attack" or "User Interface redress attack", is a
malicious technique in which an attacker tricks a user into clicking on a button or link on
another webpage while the user intended to click on the top level page. This is done using
multiple transparent or opaque layers.

Spoofing
 Redirecting Web link to address different from intended one, with site masquerading as
intended destination

Phishing
 Setting up fake Web sites or sending e-mail messages that look like legitimate businesses
to ask users for confidential personal data

Pharming
 Redirects users to a bogus Web page, even when individual types correct Web page address
into his or her browser
Click fraud
Occurs when individual or computer program fraudulently clicks on online ad without any
intention of learning more about the advertiser or making a purchase

Prepared by: Fareed Khan Tareen Page 15


Countermeasure
In computer security a countermeasure is an action, device, procedure, or technique that reduces a
threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can
cause, or by discovering and reporting it so that corrective action can be taken.
Some common countermeasures are listed in the following sections:

Security by design
 Security by design, or alternately secure by design, means that the software has been
designed from the ground up to be secure. In this case, security is considered as a main
feature.

Security architecture
 The Open Security Architecture organization defines IT security architecture as "the
design artifacts that describe how the security controls (security countermeasures) are
positioned, and how they relate to the overall information technology architecture.

Security Measures
 A state of computer "security" is the conceptual ideal, attained by the use of the three
processes: threat prevention, detection, and response.

Security Operating Systems


 One use of the term "computer security" refers to technology that is used to implement
secure operating systems.

Prepared by: Fareed Khan Tareen Page 16


Network Devices
 NIC
 Network HUB
 Network Switch
 Router
 Firewall
 Access Point
 DSL
 Repeater
 Bridge

NIC
Short for Network Interface Card, a NIC is also commonly referred to as an Ethernet card and
network adapter and is an expansion card that enables a computer to connect to a network such
as a home network or the Internet using an Ethernet cable with a RJ-45 connector.
Hub
When referring to a network, a hub is the most basic networking device that connects multiple
computers or other network devices together.
Switch
On a network, a switch is a hardware device that filters and forwards packets through the
network, but often not capable of much more.
Router
A hardware device designed to take incoming packets, analyze the packets, moving the packets
to another network, converting the packets to another network interface, dropping the packets,
directing packets to the appropriate locations, and performing any other number of other actions.
The picture shows the Linksys BEFSR11 router and is what most home routers resemble.
Firewall
A firewall is a software utility or hardware device that limits outside network access to a
computer or local network by blocking or restricting network ports.
Access point
Alternatively referred to as a base station and wireless router, an access point is the location of a
wireless receiver that enables a user with wireless access to connect to a network or the Internet.
This term can refer to both Wi-Fi and Bluetooth devices.
DSL Device / Router / Switch

Prepared by: Fareed Khan Tareen Page 17


Short for Digital Subscriber Line, DSL is a method for home users and small businesses to have
high speed access to the Internet over standard copper lines. Capable of receiving up to 6.1
megabits per second, DSL is a great solution providing it is available in your area.
Repeater
A repeater is an object that increases a signal's strength, so it can be transmitted and received
over a greater distance without a loss in quality
Bridge
A computer bridge is a device that connects two local-area networks (LANs), or two segments of
the same LAN.

Advantages:
1. Information on almost every subject imaginable.
2. Information at various levels of study.
3. The internet provides the ability of emails. Free mail service to anyone in the country.
4. Platform for products like SKYPE, which allow for holding a video conference with anyone
in the world who also has access.
5. Friendships and love connections have been made over the internet by people involved in
love/passion over similar interests.
6. News, of all kinds is available almost instantaneously. Commentary, on that news, from
every conceivable viewpoint is also available.
7. Powerful search engines
8. Internet is an ocean of information.
9. Using Internet one can access millions of articles easily.
10. Online education is possible with the help of internet.
11. On Internet video chatting is possible.
12. One can make friends on internet using social networking websites.
13. Pay bills online over internet.
14. Online internet shopping is possible.
15. With the help of internet online examination is possible.

Disadvantages
1. There is a lot of wrong information on the internet. Anyone can post anything, and much of
it is garbage.
2. There are predators that hang out on the internet waiting to get unsuspecting people in
dangerous situations.

Prepared by: Fareed Khan Tareen Page 18


3. Some people are getting addicted to the internet and thus causing problems with their
interactions of friends and loved ones.
4. Pornography that can get in the hands of young children too easily.
5. Easy to waste a lot of time on the internet.
6. Internet has a lot of "cheater" sites. People can buy essays and pass them off as their own far
more easily than they used to be able to do.
7. Hackers can create viruses that can get into your personal computer and ruin valuable data.
8. Hackers can use the internet for identity theft.
9. Now a days people only meet on (Internet) social networking websites on internet. Face to
face contact is reduced hence no direct contact with friends and family.
10. All information shared on internet is not 100% accurate. (Spamming)
11. Cyber Crime is common now a days on internet.

What is PowerPoint?
PowerPoint is a computer program that allows you to create and show slides to support a
presentation.

Uses
With PowerPoint, you can make charts, tables, and macros, and insert images, audio, video, and
other multimedia files, either by embedding them into the file or, if your version doesn’t support
the particular file, linking to it in a slide.
The main purpose of MS PowerPoint is to enable the user to create dynamic, informational slide
shows through the use of text, graphics, and animation. Slide shows created with the software are
often displayed on projection screens for business, training, or educational presentations, although
they can be distributed as stand-alone files. Additionally, the slides can be arranged and printed as
handouts for reference.
You can combine text, graphics and multi-media content to create professional presentations. As a
presentation tool PowerPoint can be used to:
 organize and structure your presentation;
 create a professional and consistent format;
 provide an illustrative backdrop for the content of your presentation;
 Animate your slides to give them greater visual impact.

Prepared by: Fareed Khan Tareen Page 19


Computer Network
 Two or more than two inter-connected computers/nodes that share the resources or the
information are known as a computer network.
 Computer network consists of a computer, some other devices, the physical or logical
connections between them and the software required to enable them to communicate each other
and share the resources.
 Sources of Computer Network
 Server
 Computer on the network that offers or shares their resources for other computers is
known as a server.
 For Example: Google, Encyclopedia
 Client Computer
 Computer on the network that accesses resources, which are being shared by other
computer, is known as a client computer or simply client.
 Types of Network
It is categorized into three main types:
 Server based
 Peer to peer
 W.r.t Area

 Server Based Network


 It is also called as dedicated or special server.
 In a dedicated server network, one or more computers are dedicated to act as servers and
provide quick access to shared resources. Dedicated server networks provide centralized
control of data and other resources.
 Peer to Peer Network
 In a peer to peer network, every computer can act as a client server or both at the same
time.
 In this type of network each computer is referred to ―peer to peer computer‖, so each
peer computer can share files with other computer and it can also access other shared
data/resources on the network.

 Types of Network (w.r.t Area)


Depending upon the geographical area covered by a network, it is classified as:
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
Personal Area Network (PAN)
Desktop Area Network (DAN)

Prepared by: Fareed Khan Tareen Page 20


1. Local Area Network (LAN)
 It is a type of network spread over a limited area of some meters to a kilometer. Usually a
LAN is spread within an organization. In other words we can say that a network within a
building.
2. Metropolitan Area Network (MAN)
 An area network, that is a link between offices, buildings in a city or town. It covers a
smaller area of land.
 For Example: Radio 105
3. Wide Area Network (WAN)
 It is a type of network connecting the cities, states and countries. It is a best
example of internet.
 Computers in a WAN are connected with each other through physical cables and
wireless media like microwaves.
4. Personal Area Network (PAN)
 A PAN is a network that is used for communicating among computers and
computer devices (including telephones) in close proximity of around a few meters
within a room.
 PAN is a personal devices network equipped at a limited area.
 A PAN is a network, which is used for personal use.
5. Desktop Area Network (DAN)
 DAN consists the connectivity limited to a desktop.

Network Topology
 The way in which the network connections are made is called network topologies.
 In communication networks, a topology is a usually schematic description of the arrangement
of a network, including its nodes and connecting lines.
Following are the main topologies of network:
1. Bus Topology
 Bus Topology is the simplest of network topologies.
 In this type of topology, all the nodes (computers as well as servers) are connected to
the single cable (called bus), by the help of interface connectors.
 This central cable is the backbone of the network and is known as Bus (thus the name).
Working of Bus Topology
 Before the transmission of data on bus network, the process of hand shaking is
performed between sending and receiving computers.
2. Star Topology
 In Star topology, all the components of network are connected to the central device
called ―hub‖ which may be a hub, a router or a switch.

Prepared by: Fareed Khan Tareen Page 21


 Unlike Bus topology (discussed earlier), where nodes were connected to central cable,
here all the workstations are connected to central device with a point-to-point
connection.
 Star topologies can connect 4 to 48 computers at a time.
3. Ring Topology
 Ring Topology has a shape of a ring.
 It is made up of an unbroken circle of network computer/nodes.
4. Mesh Topology
 A mesh topology is also known as completely connected network as a separate physical
lane for connecting each node to any other node.
 It is a combination of bus topology, star topology and ring topology.
 It is the best connecting topology.

OSI Model
 OSI stands for Open System Interconnections
 Open Systems Interconnection (OSI) is a set of internationally recognized, non-proprietary
standards for networking and for operating system involved in networking functions.
 Layers of Computer Network
 It consists of seven layers, which describes the flow of data from one computer to another
computer. The seven layers of OSI Model are as under:
1) Application Layer (Provide end-user services, like e-mail)
2) Presentation Layer (Data compression, and other data conversion)
3) Session Layer (Authentication/Authorization)
4) Transport Layer (Guarantee end-to-end data transfer—from machine to machine)
5) Network Layer (Routing, accounting).
6) Data Link Layer (Transmit/receive packets, resolve hardware addresses)
7) Physical Layer (Physical cable, medium, air)

LAYER 7: APPLICATION
 The application layer is the OSI layer that is closest to the user.
 It provides network services to the user’s applications.
 It differs from the other layers in that it does not provide services to any other OSI layer, but
rather, only to applications outside the OSI model.
 Examples of such applications are spreadsheet programs, word processing programs, and bank
terminal programs.
LAYER 6: PRESENTATION
 Provides encryption and compression of data.
 Examples: - JPEG, MPEG, ASCII, EBCDIC, HTML

Prepared by: Fareed Khan Tareen Page 22


LAYER 5: SESSION
 The session layer defines how to start, control and end conversations (called sessions)
between applications. This includes the control and management of multiple bi-directional
messages using dialogue control.
 The session layer offers provisions for efficient data transfer.
 Examples: - SQL, ASP(AppleTalk Session Protocol)
LAYER 4: TRANSPORT
 The transport layer regulates information flow to ensure end-to-end connectivity between host
applications reliably and accurately.
 Layer 4 protocols include TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol).
LAYER 3: NETWORK
 Defines end-to-end delivery of packets.
 Defines logical addressing so that any endpoint can be identified.
 Routers operate at Layer 3
 Examples :- IP, IPX, AppleTalk
LAYER 2: DATA LINK
 The data link layer provides access to the networking media and physical transmission across
the media and this enables the data to locate its intended destination on a network.
 Examples :- Ethernet, Frame Relay, FDDI
LAYER 1: PHYSICAL
 The physical layer deals with the physical characteristics of the transmission medium.
 It defines the electrical, mechanical, procedural, and functional specifications for activating,
maintaining, and deactivating the physical link between end systems.
 Examples :- EIA/TIA-232, RJ45, NRZ

Prepared by: Fareed Khan Tareen Page 23


Internet
 The internet sometimes called simply the net is a worldwide system of computer networks.
 The internet is a global system of inter-connecting computer networks that use the internet
protocol suite (TCP/IP) to link devices worldwide.
 The internet has no centralization governess in either technological implementation or policies
for access or usages.

Requirements to access Internet through DIAL-UP Connection


1) Hardware Requirement
 Telephone connection
 User should have a telephone connection to connect with internet.
 Modem
 Since the transmission over telephone line should be in the form of analog
signals so Modem is required to convert the digital data to analog signals
and vice versa.
 USB (Evo)

2) Software Requirement
 In order to access to internet sites at least one web browser should be installed in the
computer.
 Web browser such as internet explorer, makes it possible to have access to different
web sites.
3) ISP (Internet Service Provider)
 Apart from hardware and software requirement, an ISP connection is also required.
 Internet Service Provider provides a user name and password to a user to access the
internet.
 Services or Component of Internet
1) WWW
 WWW stands for World Wide Web are simply referred to as Web.
 It is a network that is spread over the entire world connecting the whole world
together; therefore WWW can also be called as Internet because nearly 70 percent of
all the information searches are handled through the World Wide Web.
2) Email
 Email is an electronic message from sender to a recipient or multiple recipients.
 Compared to postal Email is the fastest and reliable way to send messages from one
location of the world to another.
 You can also send documents, pictures, audio and video files via email by attaching
the file with email.

Prepared by: Fareed Khan Tareen Page 24


3) Newsgroups
 Newsgroups are electronic discussion groups on the internet through which people
with same interest exchange information and ideas.
 You can leave messages or answer messages left by other members of the group.
4) FTP
 FTP stand for File Transfer Protocol.
 It is a protocol used to transfer files from web servers to the computer.
5) Chatting
 Internet also provides the facility to internet users to chat with people online all over
the world.
 Different programs like MSN messenger, Yahoo messenger, Skype etc are available
for chatting on the internet.
 Some programs also support voice and video chat as well.
6) Telnet
 Telnet is an Internet service or tool that is used to log on and run commands on a
remote server on the internet.
 Telnet provides a prompt on the screen through which you can access the host
computer and can give commands to that computer.
 You will feel that you are sitting in front of the host computer and operating it.

Types of Connections
i. Dial-up Connection/Access
 Dial-up or Access connection is cheap but slow.
 A modem internal or external connection to the internet after the computer
dials a phone number.
 The modem speed in dial-up connection transmits data at the rate of 56 kilo
bytes per second (kbps).
ii. High Speed/Broad Band Connection
 The High Speed service is also called Broad Band connection because they
media that can handle multiple signal at once. i.e. Fiber, Optics, Microwaves
and other advance technologies
iii. Cable-TV Line
 It provides a high speed internet connection through the cable television
network.
 A cable modem sends and receives data over cable television line.
 Its data transmission speed is from 128 Kbps to 3Mbps.
iv. Satellite Connections
 Satellite access the internet with a satellite in earth orbit.
Prepared by: Fareed Khan Tareen Page 25
 The distance that a signal and back again provides a connection compare to
cable and DSL (Digital Subscriber Line).
 The satellite connection speed is around 512 Kbps to 20 Mbps.
v. Digital Subscriber Line (DSL)
 It also requires a special type of DSL modem that connection between
telephone and PC (Personal Computer) at the same time.
 The standard transmission speed of DSL range from 128 Kbps to 30 Mbps.
vi. Cellular Network
 Cellular technology provides wireless internet access through cell phones.
 The speed varies depending on the provider but the most common are 3G, 4G.
 The 3G is a term that describes 3rd generation cellular network obtaining
mobile speeds of around 2.0 Mbps
 The 4G is a 4th generation of cellular wireless standard network. The goal of
4G is to achieve mobile network speeds of 100 Mbps but the reality is about
21 Mbps currently.

Prepared by: Fareed Khan Tareen Page 26


MS Excel
 Excel is a computer program used to create electronic spreadsheets.
 MS Excel is a spreadsheet lies in a category of general purpose application software.
 Within Excel, users can organize data, create charts, and perform calculations.

 Spreadsheet
 Spreadsheet is a guide of rows and columns that holds a large amount of data.
 A spreadsheet interface provides a menu bar, tool bar and a special formula bar, by
which we can create or add data and formulae in a worksheet.
 Worksheet
 A worksheet is made up of rows and columns into which we enter and add data.
 Each worksheet has 256 columns and 65536 rows.
 Workbook
 In MS Excel a workbook is a file in which we work and store data.
 Each workbook consists of many sheets. A maximum number of sheets are 255
sheets.
 Cells
 Where rows and columns meet that is called cells.
 Data Validation in Excel
 Data validation is a feature available in Microsoft Excel. It allows you to do the
following:
 create a drop down list of items in a cell
 restrict entries, such as a date range or whole numbers only
 create custom rules for what can be entered
 Create messages that appear when incorrect data has been entered.
 Set a range of numeric values that can be entered in a cell.
 How to apply Data Validation on a cell:
 Open an Excel worksheet where you want to apply data validation. Select
a Table similar to the example in the next slide and list the options in the
area of excel which is outside the table that you are using and list the
options that you want to restrict the users.
 Select a cell where you want to set validation.
 In the "Data Tools" tab click on "Data validation".
 The Data Validation window will be shown.
 From the Data Validation window you can choose list.
 Select the options that you have already listed outside the table and click
on OK button

Prepared by: Fareed Khan Tareen Page 27


 We can also Input the Message.
 Go to Data tab
 Select Data Validation
 Select Input Message
 Type in the message and select 'show input message when cell is selected
 Select Error
 Select the type of error message you want to show "Stop, Warning or
Information
 Type in your error message and click on OK button

 Protect a Workbook
 To prevent other users from viewing hidden worksheets, adding, moving, deleting
or hiding worksheets, and renaming worksheets, you can protect the structure of
your Excel workbook with a password.
 To protect the structure of your workbook, follow these steps:
i. Click Review  Protect Workbook  Protect Structure and Windows
ii. Enter a password in the Password box
iii. In Excel for Windows, click OK, and reenter the password to confirm it, and
then click OK.
 Protect a Worksheet
 To prevent other users from accidentally changing, moving, or deleting data in a
worksheet you can lock the cells on your excel worksheet and then protect the
sheet with a password.
 Given below are the steps to protect your sheet:
i. Click on the Review tab, and then click Protect Sheet.
ii. In the Allow all users of this worksheet to list, select the elements you want
people to be able to change.
iii. Optionally, enter a password in the Password to unprotect sheet box and click
OK. Reenter the password in the Confirm Password dialog box and click OK.

Prepared by: Fareed Khan Tareen Page 28


 Addition Formulas
1. =sum(criteria) 
For example:
=sum(C5:C6) 
=sum(10:10) 
20 answer

2. =(cell+cell+cell) 
For example:
=(12+12+12) 
36 answer

3. =(10+10+10) 
30 answer
 Subtraction Formulas
1. =(cell-cell-cell) 
For example:
=(20-10-5) 
5 answer

2. =(20-12-6) 
2 answer
 Multiplication Formulas
1. =product(criteria) 
For example:
=product(10:10) 
100 answer

2. =(C5*C10) 
For example:
=(10*10) 
100 answer
 Average Formulas
1. =Average(C1:C2) 
2. =min(C12:C15) 
3. =max(C20:C22) 

Prepared by: Fareed Khan Tareen Page 29


 Count Formulas
1. =count(C11:C33) 
2. =countblank(C7:C9) 
 Percentage Formulas
1. =(obt.marks/total.marks*100) 
For example:
=(490/600*100) 
81.66%
 Division Formulas
1. =(C15/C17) 
For example:
=(16/8) 
2 answer

 SmartArt
 SmartArt allows you to communicate information with graphics instead of just using text.
 There are a variety of styles to choose from which you can use to illustrate many different
types of ideas.
 To insert a SmartArt graphics:
 Select the slide where you want the SmartArt graphic to appear.
 From the Insert tab, select the SmartArt command in the Illustrations group.
 A dialogue box will appear. Select a category on the left, choose the desired SmartArt
graphic and click OK.
 The SmartArt graphic will appear on the current slide.
 You can also click the Insert a SmartArt Graphic command in a placeholder to add
SmartArt.
 To insert a video
 Power point allows you to insert a video onto a slide and play it during your presentation.
 You can even edit the video within Power point and customize its appearance.
 To insert a video from a file
 From the Insert tab, click the Video drop-down arrow, and then select Video on My PC.
 Locate and select the desired video file, then click Insert.

Prepared by: Fareed Khan Tareen Page 30


 The video will be added to the slide.
 To insert an audio
 Power point allows you to add audio to your presentation.
 To insert an audio from a file
 From the Insert tab, click the Audio drop-down arrow, and then select Audio on My PC.
 Locate and select the desired audio file, then click Insert.
 The audio will be added to the slide.

Prepared by: Fareed Khan Tareen Page 31

You might also like