Computer Literacy
Computer Literacy
Copyright © 2022
All rights reserved. This book or any portion thereof may not be reproduced or used in any
manner whatsoever without the express written permission of the publisher except for the
use of brief quotation in a book review.
Published by:
Agriculture & GK Publishing House
Lucknow – 226101
www.agriculturegk.in
E-mail: [email protected]
Mobile Number – 9473826765
Disclaimer: Despite having taken all possible precautions during editing/proofing to make
this book free from error/s, but it may possible that some may be left. Reader’s discretion is
required.
Computer
A computer is a programmable electronic device that accepts raw data as input and processes it with
a set of instructions (a program) to produce the result as output. It renders output just after
performing mathematical and logical operations and can save the output for future use. It can
process numerical as well as non-numerical calculations. The term "computer" is derived from the
Latin word "computare" which means to calculate.
It is believed that the Analytical Engine was the first computer which was invented by Charles
Babbage in 1837. It used punch cards as read-only memory. Charles Babbage is also known as the
father of the computer.
The basic parts without which a computer cannot work are as follows:
Computers are divided into different types based on different criteria. Based on the size, a
computer can be divided into five types:
1. Micro Computer
2. Mini Computer
3. Mainframe Computer
4. Super Computer
5. Workstations
1. Micro Computer:
It is a single-user computer which has less speed and storage capacity than the other types. It uses a
microprocessor as a CPU. The first microcomputer was built with 8-bit microprocessor chips. The
common examples of microcomputers include laptops, desktop computers, personal digital assistant
(PDA), tablets, and smartphones. Microcomputers are generally designed and developed for general
usage like browsing, searching for information, internet, MS Office, social media, etc.
2. Mini Computer:
Mini-computers are also known as "Midrange Computers." They are not designed for a single. They
are multi-user computers designed to support multiple users simultaneously. So, they are generally
used by small businesses and firms. Individual departments of a company use these computers for
specific purposes. For example, the admission department of a University can use a Mini-computer
for monitoring the admission process.
3. Mainframe Computer:
It is also a multi-user computer capable of supporting thousands of users simultaneously. They are
used by large firms and government organizations to run their business operations as they can store
and process large amounts of data. For example, Banks, universities, and insurance companies use
mainframe computers to store the data of their customers, students, and policyholders,
respectively.
4. Super Computer:
Super-computers are the fastest and most expensive computers among all types of computers. They
have huge storage capacities and computing speeds and thus can perform millions of instructions
per second. The super-computers are task-specific and thus used for specialized applications such as
large-scale numerical problems in scientific and engineering disciplines including applications in
electronics, petroleum engineering, weather forecasting, medicine, space research and more. For
example, NASA uses supercomputers for launching space satellites and monitoring and controlling
them for space exploration.
5. Work stations:
The computer has become a part of our life. There are plenty of things that we do in a day are
dependent on a computer. Some of the common examples are as follows:
1. ATM: While withdrawing cash from an ATM, you are using a computer that enables the ATM
to take instructions and dispense cash accordingly.
2. Digital currency: A computer keeps a record of your transactions and balance in your account
and the money deposited in your account in a bank is stored as a digital record or digital
currency.
3. Trading: Stock markets use computers for day to day trading. There are many advanced
algorithms based on computers that handle trading without involving humans.
4. Smartphone: The smartphone that we use throughout the day for calling, texting, browsing is
itself a computer.
5. VoIP: All voice over IP communication (VoIP) is handled and done by computers.
History of Computers
The first counting device was used by the primitive people. They used sticks, stones and bones as
counting tools. As human mind and technology improved with time more computing devices were
developed. Some of the popular computing devices starting with the first to recent ones are
described below;
The history of computer begins with the birth of abacus which is believed to be the first computer. It
is said that Chinese invented Abacus around 4,000 years ago.
It was a wooden rack which has metal rods with beads mounted on them. The beads were moved by
the abacus operator according to some rules to perform arithmetic calculations. Abacus is still used
in some countries like China, Russia and Japan. An image of this tool is shown below;
Napier's Bones
It was a manually-operated calculating device which was invented by John Napier (1550-1617) of
Merchiston. In this calculating tool, he used 9 different ivory strips or bones marked with numbers to
multiply and divide. So, the tool became known as "Napier's Bones. It was also the first machine to
use the decimal point.
Pascaline
Pascaline is also known as Arithmetic Machine or Adding Machine. It was invented between 1642
and 1644 by a French mathematician-philosopher Biaise Pascal. It is believed that it was the first
mechanical and automatic calculator.
Pascal invented this machine to help his father, a tax accountant. It could only perform addition and
subtraction. It was a wooden box with a series of gears and wheels. When a wheel is rotated one
In the early 1820s, it was designed by Charles Babbage who is known as "Father of Modern
Computer". It was a mechanical computer which could perform simple calculations. It was a steam
driven calculating machine designed to solve tables of numbers like logarithm tables.
Analytical Engine
This calculating machine was also developed by Charles Babbage in 1830. It was a mechanical
computer that used punch-cards as input. It was capable of solving any mathematical problem and
storing information as a permanent memory.
Tabulating Machine
It was invented in 1890, by Herman Hollerith, an American statistician. It was a mechanical tabulator
based on punch cards. It could tabulate statistics and record or sort data or information. This
Differential Analyzer
It was the first electronic computer introduced in the United States in 1930. It was an analog device
invented by Vannevar Bush. This machine has vacuum tubes to switch electrical signals to perform
calculations. It could do 25 calculations in few minutes.
Mark I
The next major changes in the history of computer began in 1937 when Howard Aiken planned to
develop a machine that could perform calculations involving large numbers. In 1944, Mark I
Generations of Computers
A generation of computers refers to the specific improvements in computer technology with time. In
1946, electronic pathways called circuits were developed to perform the counting. It replaced the
gears and other mechanical parts used for counting in previous computing machines.
In each new generation, the circuits became smaller and more advanced than the previous
generation circuits. The miniaturization helped increase the speed, memory and power of
computers. There are five generations of computers which are described below;
The first generation (1946-1959) computers were slow, huge and expensive. In these computers,
vacuum tubes were used as the basic components of CPU and memory. These computers were
mainly depended on batch operating system and punch cards. Magnetic tape and paper tape were
used as output and input devices in this generation;
The second generation (1959-1965) was the era of the transistor computers. These computers used
transistors which were cheap, compact and consuming less power; it made transistor computers
faster than the first generation computers.
In this generation, magnetic cores were used as the primary memory and magnetic disc and tapes
were used as the secondary storage. Assembly language and programming languages like COBOL
and FORTRAN, and Batch processing and multiprogramming operating systems were used in these
computers.
➢ IBM 1620
➢ IBM 7094
➢ CDC 1604
➢ CDC 3600
➢ UNIVAC 1108
The third generation computers used integrated circuits (ICs) instead of transistors. A single IC can
pack huge number of transistors which increased the power of a computer and reduced the cost.
The computers also became more reliable, efficient and smaller in size. These generation computers
used remote processing, time-sharing, multi programming as operating system. Also, the high-level
programming languages like FORTRON-II TO IV, COBOL, PASCAL PL/1, ALGOL-68 were used in this
generation.
➢ IBM-360 series
➢ Honeywell-6000 series
➢ PDP(Personal Data Processor)
➢ IBM-370/168
➢ TDC-316
The fourth generation (1971-1980) computers used very large scale integrated (VLSI) circuits; a chip
containing millions of transistors and other circuit elements. These chips made this generation
computers more compact, powerful, fast and affordable. These generation computers used real
time, time sharing and distributed operating system. The programming languages like C, C++, DBASE
were also used in this generation.
➢ DEC 10
In fifth generation (1980-till date) computers, the VLSI technology was replaced with ULSI (Ultra
Large Scale Integration). It made possible the production of microprocessor chips with ten million
electronic components. This generation computers used parallel processing hardware and AI
(Artificial Intelligence) software. The programming languages used in this generation were C, C++,
Java, .Net, etc.
➢ Desktop
➢ Laptop
➢ NoteBook
➢ UltraBook
➢ ChromeBook
Types of Computer
We can categorize computer in two ways: on the basis of data handling capabilities and size.
➢ Analogue Computer
➢ Digital Computer
➢ Hybrid Computer
1) Analogue Computer
Analogue computers are designed to process analogue data. Analogue data is continuous data that
changes continuously and cannot have discrete values. We can say that analogue computers are
used where we don't need exact values always such as speed, temperature, pressure and current.
Analogue computers directly accept the data from the measuring device without first converting it
into numbers and codes. They measure the continuous changes in physical quantity and generally
render output as a reading on a dial or scale. Speedometer and mercury thermometer are examples
of analogue computers.
2) Digital Computer
Digital computer is designed to perform calculations and logical operations at high speed. It accepts
the raw data as input in the form of digits or binary numbers (0 and 1) and processes it with
programs stored in its memory to produce the output. All modern computers like laptops, desktops
including smartphones that we use at home or office are digital computers.
3) Hybrid Computer
Hybrid computer has features of both analogue and digital computer. It is fast like an
analogue computer and has memory and accuracy like digital computers. It can process both
continuous and discrete data. It accepts analogue signals and convert them into digital form before
processing. So, it is widely used in specialized applications where both analogue and digital data is
processed. For example, a processor is used in petrol pumps that converts the measurements of fuel
flow into quantity and price. Similarly, they are used in airplanes, hospitals, and scientific
applications.
1) Supercomputer
Supercomputers are the biggest and fastest computers. They are designed to process huge amount
of data. A supercomputer can process trillions of instructions in a second. It has thousands of
interconnected processors.
Supercomputers are particularly used in scientific and engineering applications such as weather
forecasting, scientific simulations and nuclear energy research. The first supercomputer was
developed by Roger Cray in 1976.
2) Mainframe computer
Mainframe computers are designed to support hundreds or thousands of users simultaneously. They
can support multiple programs at the same time. It means they can execute different processes
simultaneously. These features of mainframe computers make them ideal for big organizations like
banking and telecom sectors, which need to manage and process high volume of data.
3) Miniframe or Minicomputer
It is a midsize multiprocessing computer. It consists of two or more processors and can support 4 to
200 users at one time. Miniframe computers are used in institutes and departments for tasks such
as billing, accounting and inventory management. A minicomputer lies between the mainframe and
microcomputer as it is smaller than mainframe but larger than a microcomputer.
Applications of minicomputers:
A minicomputer is mainly used to perform three primary functions, which are as follows:
➢ Process control: It was used for process control in manufacturing. It mainly performs two
primary functions that are collecting data and feedback. If any abnormality occurs in the
process, it is detected by the minicomputer and necessary adjustments are made accordingly.
➢ Data management: It is an excellent device for small organizations to collect, store and share
data. Local hospitals and hotels can use it to maintain the records of their patients and
customers respectively.
➢ Communications Portal: It can also play the role of a communication device in larger systems
by serving as a portal between a human operator and a central processor or computer.
4) Workstation
Workstation is a single user computer that is designed for technical or scientific applications. It has
a faster microprocessor, a large amount of RAM and high speed graphic adapters. It
generally performs a specific job with great expertise; accordingly, they are of different types such
as graphics workstation, music workstation and engineering design workstation.
Any computer that has the following five features, can be termed as a workstation or can be used as
a workstation.
➢ Multiple Processor Cores: It has more processor cores than simple laptops or computers.
➢ ECC RAM: It is provided with Error-correcting code memory that can fix memory errors before
they affect the system's performance.
➢ RAID (Redundant Array of Independent Disks): It refers to multiple internal hard drives to
store or process data. RAID can be of different types, for example, there can be multiple drives
to process data or mirrored drives where if one drive does not work than other starts
functioning.
➢ SSD: It is better than conventional hard-disk drives. It does not have moving parts, so the
chances of physical failure are very less.
➢ Optimized, Higher end GPU: It reduces the load on CPU. E.g., CPU has to do less work while
processing the screen output.
5) Microcomputer
Characteristics of a microcomputer:
➢ It is the smallest in size among all types of computers.
➢ A limited number of software can be used.
➢ It is designed for personal work and applications. Only one user can work at a time.
➢ It is less expansive and easy to use.
➢ It does not require the user to have special skills or training to use it.
➢ Generally, comes with single semiconductor chip.
➢ It is capable of multitasking such as printing, scanning, browsing, watching videos, etc.
Computer Components-
1.Input Unit
A computer will only respond when a command is given to the device. These commands can be
given using the input unit or the input devices.
For example: Using a keyboard we can type things on a Notepad and the computer processes the
entered data and then displays the output of the same of the screen.
The data entered can be in the form of numbers, alphabet, images, etc. We enter the information
using an input device, the processing units convert it into computer understandable languages and
then the final output is received by a human-understandable language.
1. Keyboard
• A simple device comprising keys and each key denotes either an alphabet, number or
number commands which can be given to a computer for various actions to be
performed.
• It has a modified version of typewriter keys.
• The keyboard is an essential input device and computer and laptops both use keyboards
to give commands to the computer.
2. Mouse
3. Joy Stick
• It is a device which comprises a stick which is attached at an angle to the base so that it
can be moved and controlled.
• Mostly used to control the movement in video games.
• Apart from a computer system, a joystick is also used in the cockpit of an aeroplane,
wheelchairs, cranes, trucks, etc. to operate them well.
4. Light Pen
• It is a wand-like looking device which can directly be moved over the device’s screen
5. Microphone
6. Scanner
• This device can scan images or text and convert it into a digital signal.
• When we place any piece of a document on a scanner, it converts it into a digital signal
and displays it on the computer screen.
7. Barcode Reader
2. Output Unit
When we command a computer to perform a task, it reverts for the action performed and gives us a
result. This result is called output. There are various output devices connected to the computer. The
most basic of which is a monitor. Whatever we write using a keyboard or click using a mouse, is all
displayed on the monitor.
Thus, the output unit gives us the final result once the entire processing is done within the
mechanism of a device.
For example: when we visit an ATM, we enter our details like language, pin, amount to be
withdrawn, etc. and then the final money which the cash dispenser releases is our outcome. In this
case, the cash dispenser acts as an output unit.
1. Monitor
• The device which displays all the icons, text, images, etc. over a screen is called the
Monitor.
• When we ask the computer to perform an action, the result of that action is displayed
on the monitor.
• Various types of monitors have also been developed over the years.
2. Printer
3. Speakers
4. Projector
• An optical device which presents an image or moving images onto a projection screen is
called a projector.
• Most commonly these projectors are used in auditoriums and movie theatres for the
display of the videos or lighting.
• If a projector is connected to a computer, then the image/video displayed on the screen
is the same as the one displayed on the computer screen.
5. Headphones
• They perform the same function as a speaker, the only difference is the frequency of
sound.
• Using speakers, the sound can be heard over a larger area and using headphones, the
sound is only audible to the person using them.
• Also known as earphones or headset.
3. Memory Unit
When we enter the data into the computer using an input device, the entered information
immediately gets saved in the memory unit of the Central Processing Unit (CPU). Because of the
presence of some existing programming, the Memory Unit transmits the data further to the other
parts of the CPU.
Similarly, when the output of our command is processed by the computer, it is saved in the memory
unit before giving the output to the user.
4. Control Unit
This is the core unit which manages the entire functioning of the computer device. It is one of the
most essential components of the computer system.
The Control Unit collects the data entered using the input unit, leads it on for processing and once
that is done, receives the output and presents it to the user. It can be said to the centre of all
processing actions taking place inside a computer device.
➢ Memory Unit
➢ Control Unit
➢ Arithmetic and Logical Unit
All these three units are elements of CPU and together help in the efficient working and processing
of data. It is also known as the “Brain of Computer” and no action can be conducted by a device
without the execution and permission of the Central Processing Unit.
The device is a close-knit circuit comparison microprocessor which helps in fetching the data and
proving suitable results to the user. Thus, CPU is the main processing unit of the computer.
Hardware, which is abbreviated as HW, refers to all physical components of a computer system,
including the devices connected to it. You cannot create a computer or use software without using
hardware. The screen on which you are reading this information is also a hardware.
A hardware upgrade refers to a new hardware, or a replacement for the old one, or additional
hardware developed to improve the performance of the existing hardware. A common example of a
hardware upgrade is a RAM upgrade that increases the computer's total memory, and video card
upgrade, where the old video card is removed and replaced with the new one.
Some of the commonly used hardware in your computer are described below:
1. Motherboard
2. Monitor
3. Keyboard
4. Mouse
1) Motherboard:
The motherboard is generally a thin circuit board that holds together almost all parts of a computer
except input and output devices. All crucial hardware like CPU, memory, hard drive, and ports for
input and output devices are located on the motherboard. It is the biggest circuit board in a
computer chassis.
It allocates power to all hardware located on it and enables them to communicate with each other.
It is meant to hold the computer's microprocessor chip and let other components connect to it. Each
component that runs the computer or improves its performance is a part of the motherboard or
connected to it through a slot or port.
There can be different types of motherboards based on the type and size of the computers. So, a
specific motherboard can work only with specific types of processors and memory.
Components of a Motherboard:
CPU Slot: It is provided to install the CPU. It is a link between a microprocessor and a motherboard.
It facilitates the use of CPU and prevents the damage when it is installed or removed. Furthermore,
it is provided with a lock to prevent CPU movement and a heat sink to dissipate the extra heat.
RAM Slot: It is a memory slot or socket provided in the motherboard to insert or install the RAM
(Random Access Memory). There can be two or more memory slots in a computer.
Expansion Slot: It is also called the bus slot or expansion port. It is a connection or port on the
motherboard, which provides an installation point to connect a hardware expansion card, for
Capacitor: It is made of two conductive plates, and a thin insulator sandwiched between them.
These parts are wrapped in a plastic container.
Inductor (Coil): It is an electromagnetic coil made of a conducting wire wrapped around an iron core.
It acts as an inductor or electromagnet to store magnetic energy.
Northbridge: It is an integrated circuit that allows communications between the CPU interface, AGP,
and memory. Furthermore, it also allows the southbridge chip to communicate with the RAM, CPU,
and graphics controller.
USB Port: It allows you to connect hardware devices like mouse, keyboard to your computer.
PCI Slot: It stands for Peripheral Component Interconnect slot. It allows you to connect the PCI
devices like modems, network hardware, sound, and video cards.
AGP Slot: It stands for Accelerated Graphics Port. It provides the slot to connect graphics cards.
Heat Sink: It absorbs and disperses the heat generated in the computer processor.
2) Monitor:
A monitor is the display unit of a computer on which the processed data, such as text, images, etc., is
displayed. It comprises a screen circuity and the case which encloses this circuity. The monitor is also
known as a visual display unit (VDU).
Types of Monitors:
1. CRT Monitor: It has cathode ray tubes which produce images in the form of video signals. Its
main components are electron gun assembly, deflection plate assembly, glass envelope,
fluorescent screen, and base.
2. LCD Monitor: It is a flat panel screen. It uses liquid crystal display technology to produce
images on the screen. Advanced LEDs have thin-film transistors with capacitors and use active-
matrix technology, which allows pixels to retain their charge.
3. LED Monitor: It is an advanced version of an LCD monitor. Unlike an LCD monitor, which uses
cold cathode fluorescent light to backlight the display, it has LED panels, each of which has lots
of LEDs to display the backlight.
4. Plasma Monitor: It uses plasma display technology that allows it to produce high resolutions
of up to 1920 X 1080, wide viewing angle, a high refresh rate, outstanding contrast ration, and
more.
It is the most important input device of a computer. It is designed to allow you input text, characters,
and other commands into a computer, desktop, tablet, etc. It comes with different sets of keys to
enter numbers, characters, and perform various other functions like copy, paste, delete, enter, etc.
A keyboards is an input device through which users can input text, numbers, and special characters.
It is an input device with a typical QWERTY keyset. It is an external hardware device that is
connected to the computer. It serves as the user's most fundamental interface with a system. It has
numerous buttons that can be used to generate letters, numbers, and symbols as well as unique
keys like the Windows and Alt keys that can also accomplish other tasks.
Types of Keyboards:
1. QWERTY Keyboards
2. AZERTY Keyboards
3. DVORAK Keyboards
4) Mouse:
Parts of a mouse:
➢ Two buttons: A mouse is provided with two buttons for right click and left click.
➢ Scroll Wheel: A wheel located between the right and left buttons, which is used to scroll up
and down and Zoom in and Zoom out in some applications like AutoCAD.
➢ Battery: A battery is required in a wireless mouse.
➢ Motion Detection Assembly: A mouse can have a trackball or an optical sensor to provide
signals to the computer about the motion and location of the mouse.
The items that are frequently attached to the computer from outside in order to control input or
output functions are known as external hardware components, sometimes known as peripheral
components. These hardware components either serve as input devices for the software or output
devices for the output of the software's operations (output).
➢ Camera: Visual pictures are captured by a camera, which then transmits them to a computer
or a network device. A camera is a piece of equipment that takes photographs with the help of
using photosensitive film or a plate inside of a light-proof housing. The photosensitive film is
exposed to light via the camera's shutter, which opens and close
➢ Touchpad: A touchpad is an input device that is also known as a glide pad, glide point,
pressure-sensitive tablet, or trackpad. It enables finger cursor movement for the user. It can
take the place of a regular mouse. To control the pointer on a display screen, a touchpad can
be either external or incorporated into a laptop. Usually, it serves as a substitute for an
external mouse.
Joysticks, styluses, and scanners are examples of additional input hardware components.
➢ Speaker: One of the most popular output devices is a speaker that connects to a computer to
generate a sound output. While some speakers can only be connected to computers, others
can be used with any type of sound system.
➢ Headphones, earphones, earbuds: These are also output devices much like speakers, which
offer audio that can only be heard by one listener.
Software
Software, which is abbreviated as SW or S/W, is a set of programs that enables the hardware to
perform a specific task. All the programs that run the computer are software. The software can be of
three types: system software, application software, and programming software.
1) System Software
The system software is the main software that runs the computer. When you turn on the computer,
it activates the hardware and controls and coordinates their functioning. The application programs
are also controlled by system software. An operating system is an example of system software.
i) Operating System:
An operating system is the system software that works as an interface to enable the user to
communicate with the computer. It manages and coordinates the functioning of hardware and
software of the computer. The commonly used operating systems are Microsoft Windows, Linux,
and Apple Mac OS X.
➢ BIOS: It stands for basic input output system. It is a type of system software, which is stored in
Read Only Memory (ROM) located on the motherboard. However, in advanced computer
systems, it is stored in flash memory. BIOS is the first software that gets activated when you
turn on your computer system. It loads the drivers of the hard disk into memory as well as
assists the operating system to load itself into the memory.
➢ Boot Program: Boot refers to starting up a computer. When you switch on the computer, the
commands in the ROM are executed automatically to load the boot program into memory and
execute its instructions. The BIOS program has a basic set of commands that enables the
computer to perform the basic input/output instructions to start the computer.
➢ An assembler: It plays the role of a converter as it receives basic computer instructions and
converts them into a pattern of bits. The processor uses these bits to perform basic
operations.
2) Application Software:
Application software is a set of programs designed to perform a specific task. It does not control the
working of a computer as it is designed for end-users. A computer can run without application
software. Application software can be easily installed or uninstalled as required. It can be a single
program or a collection of small programs. Microsoft Office Suite, Adobe Photoshop, and any other
software like payroll software or income tax software are application software. As we know, they are
designed to perform specific tasks. Accordingly, they can be of different types such as:
➢ Word Processing Software: This software allows users to create, edit, format, and manipulate
the text and more. It offers lots of options for writing documents, creating images, and more.
For example, MS Word, WordPad, Notepad, etc.
➢ Spreadsheet Software: It is designed to perform calculations, store data, create charts, etc. It
has rows and columns, and the data is entered in the cell, which is an intersection of a row
and column, e.g., Microsoft Excel.
➢ Multimedia Software: These software are developed to perform editing of video, audio, and
text. It allows you to combine texts, videos, audio, and images. Thus, you can improve a text
document by adding photos, animations, graphics, and charts through multimedia software.
For example, VLC player, Window Media Player, etc.
➢ Enterprise Software: These software are developed for business operational functions. It is
used in large organizations where the quantum of business is too large. It can be used for
accounting, billing, order processing and more. For example, CRM (Customer Relationship
Management), BI (Business Intelligence), ERP (Enterprise Resource Planning), SCM (Supply
Chain Management), customer support system, and more.
3) Programming Software:
It is a set or collection of tools that help developers in writing other software or programs. It assists
them in creating, debugging, and maintaining software or programs or applications. We can say that
these are facilitator software that helps translate programming language such as Java, C++, Python,
etc., into machine language code. So, it is not used by end-users. For example, compilers, linkers,
debuggers, interpreters, text editors, etc. This software is also called a programming tool or software
development tool.
Operating System-
In the Computer System (comprises of Hardware and software), Hardware can only understand
machine code (in the form of 0 and 1) which doesn't make any sense to a naive user.
We need a system which can act as an intermediary and manage all the processes and resources
present in the system.
An Operating System can be defined as an interface between user and hardware. It is responsible
for the execution of all the processes, Resource Allocation, CPU management, File Management and
many other tasks.
The purpose of an operating system is to provide an environment in which a user can execute
programs in convenient and efficient manner.
➢ The first computer, Z1, was made in 1936 – 1938. Unfortunately, this computer ran without an
operating system.
➢ Twenty years later, the first-ever operating system was made in 1956.
➢ In the 1960s, bell labs started working on building UNIX, the first multitasking operating
system.
➢ In 1977 the apple series came into existence. Apple Dos 3.3 was the first disk operating
system.
➢ In 1981, Microsoft built the first operating system called DOS by purchasing 86 – DOS software
from a Seattle company.
➢ The most famous Microsoft windows came into existence in 1985 when MS-DOS was paired
with GUI, a graphics environment.
There are several different types of operating systems present. In this section, we will discuss the
advantages and disadvantages of these types of OS.
➢ Batch OS
➢ Distributed OS
➢ Multitasking OS
➢ Network OS
➢ Real-OS
➢ Mobile OS
Batch OS
Batch OS is the first operating system for second-generation computers. This OS does not directly
interact with the computer. Instead, an operator takes up similar jobs and groups them together
into a batch, and then these batches are executed one by one based on the first-come, first, serve
principle.
Advantages of Batch OS
Disadvantages of OS
Examples of Batch OS: payroll system, bank statements, data entry, etc.
A distributed OS is a recent advancement in the field of computer technology and is utilized all over
the world that too with great pace. In a distributed OS, various computers are connected through a
single communication channel. These independent computers have their memory unit and CPU and
are known as loosely coupled systems. The system processes can be of different sizes and can
perform different functions. The major benefit of such a type of operating system is that a user can
access files that are not present on his system but in another connected system. In addition, remote
access is available to the systems connected to this network.
Advantages of Distributed OS
➢ Failure of one system will not affect the other systems because all the computers are
independent of each other.
➢ The load on the host system is reduced.
➢ The size of the network is easily scalable as many computers can be added to the network.
➢ As the workload and resources are shared therefore the calculations are performed at a
higher speed.
➢ Data exchange speed is increased with the help of electronic mail.
Disadvantages of Distributed OS
Multitasking OS
The multitasking OS is also known as the time-sharing operating system as each task is given some
time so that all the tasks work efficiently. This system provides access to a large number of users,
and each user gets the time of CPU as they get in a single system. The tasks performed are given by a
single user or by different users. The time allotted to execute one task is called a quantum, and as
soon as the time to execute one task is completed, the system switches over to another task.
Advantages of Multitasking OS
Disadvantages of Multitasking OS
Network OS
Network operating systems are the systems that run on a server and manage all the networking
functions. They allow sharing of various files, applications, printers, security, and other networking
functions over a small network of computers like LAN or any other private network. In the network
OS, all the users are aware of the configurations of every other user within the network, which is
why network operating systems are also known as tightly coupled systems.
Advantages of Network OS
Disadvantages of Network OS
Real-Time OS
Real-Time operating systems serve real-time systems. These operating systems are useful when
many events occur in a short time or within certain deadlines, such as real-time simulations.
➢ Hard real-time OS
The hard real-time OS is the operating system for mainly the applications in which the slightest delay
is also unacceptable. The time constraints of such applications are very strict. Such systems are built
for life-saving equipment like parachutes and airbags, which immediately need to be in action if an
accident happens.
➢ Soft real-time OS
In a soft real-time system, an important task is prioritized over less important tasks, and this priority
remains active until the completion of the task. Furthermore, a time limit is always set for a specific
job, enabling short time delays for future tasks, which is acceptable. For Example, virtual reality,
reservation systems, etc.
Advantages of Real-Time OS
➢ It provides more output from all the resources as there is maximum utilization of systems.
➢ It provides the best management of memory allocation.
➢ These systems are always error-free.
➢ These operating systems focus more on running applications than those in the queue.
➢ Shifting from one task to another takes very little time.
Disadvantages of Real-Time OS
Mobile OS
A mobile OS is an operating system for smartphones, tablets, and PDA’s. It is a platform on which
other applications can run on mobile devices.
Advantages of Mobile OS
Examples of Mobile OS: Android OS, ios, Symbian OS, and Windows mobile OS.
Data and The 32 bit OS can store and manage In contrast, the 64 bit OS has a larger
Compatibility A 32-bit processor system will run only A 64-bit processor system can run either
of System on 32-bit OS and not on 64 bit OS. a 32-bit or 64-bit OS
Performance Performance of 32- bit OS is less Higher performance than the 32-bit
efficient. processor.
1. Microsoft Windows
It is a series of graphical operating systems developed, marketed, and sold by Microsoft. The
first version of Windows was released in 1985 as a GUI add-on to MS-DOS. The first version of
Windows sold as a standalone operating system was Windows 95.
2. MacOS
It is a series of graphical operating systems developed by Apple Inc. It is the successor to Mac
OS X, and it is the operating system that powers Apple’s Mac family of computers.
3. Linux
Linux is built around the Linux kernel and is a free and open-source software OS. It is one of
the most popular operating systems for servers and embedded devices. It is also used by
millions of desktop users around the world.
4. Android
It is a mobile OS developed by Google. It is based on the Linux kernel and designed primarily
for touchscreen mobile devices such as smartphones and tablets.
5. Ios
Another example of a mobile OS developed by Apple Inc. iOs is the successor to iPhone OS. It
is an operating system that powers the iPhone, iPad, and iPod Touch products.
There are several advantages of operating systems. We have listed some of them below:
There are several disadvantages of operating systems. We have listed some of them below:
What is RTOS?
An operating system that can execute multi-threaded programmes and adhere to real-time
deadlines is known as a “RTOS.” The majority of RTOSes incorporate device drivers, resource
management, and schedulers. Remember that we don’t always mean “quick” when we talk about
“deadlines.” Instead, this means that we can foresee when specific jobs will run before runtime.
If you’re writing intricate embedded applications, an RTOS can be a great tool. They support task
isolation and enable concurrent operation.
When a user works on the computer system, selecting text, copying, pasting, and deleting are the
basic and frequently done tasks. Instead of using your cursor, you must be practicing Computer
Keyboard Shortcut Keys. All the basic computer shortcut keys to be used on daily basis are
mentioned in the table below. Check out the table given below to know the all basic computer
keyboard shortcut keys from A to Z.
Computer shortcuts are keys or combinations of keys that assist you in an alternative way to do
something that you typically do with a mouse or cursor. All the computer shortcut keys for Microsoft
Windows are given below. Let's have a look at the computer keyboard shortcut keys for Microsoft
Windows from the below table.
The first working network, called ARPANET, was created in the late 1960s and was funded by the
U.S. Department of Defense. Government researchers used to share information at a time when
computers were large and difficult to move. We have come a long way today from that basic kind of
network. Today’s world revolves around the internet, which is a network of networks that connects
billions of devices across the world. Organizations of all sizes use networks to connect their
employees’ devices and shared resources such as printers.
1. Network Devices
Network devices or nodes are computing devices that need to be linked in the network. Some
network devices include:
➢ Computers, mobiles, and other consumer devices: These are end devices that users directly
and frequently access. For example, an email originates from the mailing application on a
laptop or mobile phone.
➢ Servers: These are application or storage servers where the main computation and data
storage occur. All requests for specific tasks or data come to the servers.
➢ Routers: Routing is the process of selecting the network path through which the data packets
traverse. Routers are devices that forward these packets between networks to ultimately
reach the destination. They add efficiency to large networks.
➢ Switches: Repeaters are to networks what transformers are to electricity grids—they are
electronic devices that receive network signals and clean or strengthen them. Hubs are
repeaters with multiple ports in them. They pass on the data to whichever ports are available.
Bridges are smarter hubs that only pass the data to the destination port. A switch is a multi-
port bridge. Multiple data cables can be plugged into switches to enable communication with
multiple network devices.
➢ Gateways: Gateways are hardware devices that act as ‘gates’ between two distinct networks.
They can be firewalls, routers, or servers.
2. Links
➢ Wired: Examples of wired technologies used in networks include coaxial cables, phone lines,
twisted-pair cabling, and optical fibers. Optical fibers carry pulses of light to represent data.
➢ Wireless: Network connections can also be established through radio or other
electromagnetic signals. This kind of transmission is called ‘wireless’. The most common
examples of wireless links include communication satellites, cellular networks, and radio and
technology spread spectrums. Wireless LANs use spectrum technology to establish
connections within a small area.
3. Communication protocols
A communication protocol is a set of rules followed by all nodes involved in the information transfer.
Some common protocols include the internet protocol suite (TCP/IP), IEEE 802, Ethernet, wireless
LAN, and cellular standards. TCP/IP is a conceptual model that standardizes communication in a
modern network. It suggests four functional layers of these communication links:
Most of the modern internet structure is based on the TCP/IP model, though there are still strong
influences of the similar but seven-layered open systems interconnection (OSI) model.
IEEE802 is a family of IEEE standards that deals with local area networks (LAN) and metropolitan
area networks (MAN). Wireless LAN is the most well-known member of the IEEE 802 family and is
more widely known as WLAN or Wi-Fis.
4. Network Defense
While nodes, links, and protocols form the foundation of a network, a modern network cannot exist
without its defenses. Security is critical when unprecedented amounts of data are generated,
moved, and processed across networks. A few examples of network defense tools include firewall,
intrusion detection systems (IDS), intrusion prevention systems (IPS), network access control (NAC),
content filters, proxy servers, anti-DDoS devices, and load balancers.
1. Nanoscale networks: These networks enable communication between minuscule sensors and
actuators.
2. Personal area network (PAN): PAN refers to a network used by just one person to connect
multiple devices, such as laptops to scanners, etc.
3. Local area network (LAN): The local area network connects devices within a limited
geographical area, such as schools, hospitals, or office buildings.
4. Storage area network (SAN): SAN is a dedicated network that facilitates block-level data
storage. This is used in storage devices such as disk arrays and tape libraries.
5. Campus area network (CAN): Campus area networks are a collection of interconnected LANs.
They are used by larger entities such as universities and governments.
6. Metropolitan area network (MAN): MAN is a large computer network that spans across a city.
7. Wide area network (WAN): Wide area network cover larger areas such as large cities, states,
and even countries.
8. Enterprise private network (EPN): An enterprise private network is a single network that a
large organization uses to connect its multiple office locations.
1. Intranet: Intranet is a set of networks that is maintained and controlled by a single entity. It is
generally the most secure type of network, with access to authorized users alone. An intranet
usually exists behind the router in a local area network.
2. Internet: The internet (or the internetwork) is a collection of multiple networks connected by
routers and layered by networking software. This is a global system that connects
governments, researchers, corporates, the public, and individual computer networks.
3. Extranet: An extranet is similar to the intranet but with connections to particular external
networks. It is generally used to share resources with partners, customers, or remote
employees.
4. Darknet: The darknet is an overlay network that runs on the internet and can only be accessed
by specialized software. It uses unique, customized communication protocols.
The Open Systems Interconnection (OSI) model describes seven layers that computer systems use to
communicate over a network. It was the first standard model for network communications, adopted
by all major computer and telecommunication companies in the early 1980s
The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-layer
model is still widely used, as it helps visualize and communicate how networks operate, and helps
isolate and troubleshoot networking problems.
OSI was introduced in 1983 by representatives of the major computer and telecom companies, and
was adopted by ISO as an international standard in 1984.
The OSI model helps network device manufacturers and networking software vendors:
➢ Create devices and software that can communicate with products from any other vendor,
allowing open interoperability
➢ Define which parts of the network their products should work with.
➢ Communicate to users at which network layers their product operates – for example, only at
the application layer, or across the stack.
OSI:
OSI stands for Open Systems Interconnection. It is a reference model that specifies standards for
communications protocols and also the functionalities of each layer. The OSI has been developed
by the International Organization For Standardization and it is 7 layer architecture. Each layer of
OSI has different functions and each layer has to follow different protocols.
The seven abstraction layers of the OSI model can be defined as follows, from top to bottom:
This is the only layer that directly interacts with data from the user. Software applications like web
browsers and email clients rely on the application layer to initiate communications. But it should be
made clear that client software applications are not part of the application layer; rather the
application layer is responsible for the protocols and data manipulation that the software relies on
to present meaningful data to the user. Application layer protocols include HTTP as well as
SMTP (Simple Mail Transfer Protocol is one of the protocols that enables email communications).
This layer is primarily responsible for preparing data so that it can be used by the application layer;
in other words, layer 6 makes the data presentable for applications to consume. The presentation
layer is responsible for translation, encryption, and compression of data.
Two communicating devices communicating may be using different encoding methods, so layer 6 is
responsible for translating incoming data into a syntax that the application layer of the receiving
device can understand.
If the devices are communicating over an encrypted connection, layer 6 is responsible for adding the
encryption on the sender’s end as well as decoding the encryption on the receiver's end so that it
can present the application layer with unencrypted, readable data.
Finally the presentation layer is also responsible for compressing data it receives from the
application layer before delivering it to layer 5. This helps improve the speed and efficiency of
communication by minimizing the amount of data that will be transferred.
This is the layer responsible for opening and closing communication between the two devices. The
time between when the communication is opened and closed is known as the session. The session
The session layer also synchronizes data transfer with checkpoints. For example, if a 100 megabyte
file is being transferred, the session layer could set a checkpoint every 5 megabytes. In the case of a
disconnect or a crash after 52 megabytes have been transferred, the session could be resumed from
the last checkpoint, meaning only 50 more megabytes of data need to be transferred. Without the
checkpoints, the entire transfer would have to begin again from scratch.
Layer 4 is responsible for end-to-end communication between the two devices. This includes taking
data from the session layer and breaking it up into chunks called segments before sending it to layer
3. The transport layer on the receiving device is responsible for reassembling the segments into data
the session layer can consume.
The transport layer is also responsible for flow control and error control. Flow control determines an
optimal speed of transmission to ensure that a sender with a fast connection does not overwhelm a
receiver with a slow connection. The transport layer performs error control on the receiving end by
ensuring that the data received is complete, and requesting a retransmission if it isn’t.
The data link layer is very similar to the network layer, except the data link layer facilitates data
transfer between two devices on the same network. The data link layer takes packets from the
network layer and breaks them into smaller pieces called frames. Like the network layer, the data
link layer is also responsible for flow control and error control in intra-network communication (The
transport layer only does flow control and error control for inter-network communications).
This layer includes the physical equipment involved in the data transfer, such as the cables
and switches. This is also the layer where the data gets converted into a bit stream, which is a string
of 1s and 0s. The physical layer of both devices must also agree on a signal convention so that the 1s
can be distinguished from the 0s on both devices.
Microsoft Office is a software which was developed by Microsoft in 1988. This Office suite comprises
various applications which form the core of computer usage in today’s world.
What is MS Word?
Used to make professional-quality documents, letters, reports, etc., MS Word is a word processor
developed by Microsoft. It has advanced features which allow you to format and edit your files and
documents in the best possible way.
MS Word enables users to do write-ups, create documents, resumes, contracts, etc. This is one of
the most commonly used programs under the Office suite.
To create an MS Word doc, follow the steps mentioned above to open Microsoft Word. Then once
the program is open, click on “File” followed by “New”. This opens a new doc where something new
can be created.
Since it is used by people of all age groups, in schools, in colleges and for official purposes, having
proper knowledge of Microsoft Word is a must. The preview of the MS Doc file once it is opened is
given below:
Features of MS Word
Now let us read more about the features and components of an MS Word doc file in detail.
The image given below shows the different elements and categories which are available in MS Word
doc:
➢ Home
This has options like font colour, font size, font style, alignment, bullets, line spacing, etc. All the
basic elements which one may need to edit their document is available under the Home option.
➢ Insert
Tables, shapes, images, charts, graphs, header, footer, page number, etc. can all be entered in the
document. They are included in the “Insert” category.
➢ Design
The template or the design in which you want your document to be created can be selected under
the Design tab. Choosing an appropriate tab will enhance the appearance of your document.
➢ Page Layout
Under the Page Layout tab comes options like margins, orientation, columns, lines, indentation,
spacing, etc.
➢ Review
Spell check, grammar, Thesaurus, word count, language, translation, comments, etc. can all be
tracked under the review tab. This acts as an advantage for those who get their documents reviewed
on MS Word.
Apart from all the above-mentioned features, the page can be set in different views and layouts,
which can be added and optimised using the View tab on the Word document. Margins and scales
are also available for the benefit of the users.
Uses of MS Word
Given below are the different fields in which MS Word is used and simplifies the work of an
individual:
➢ In Education: It is considered as one of the simplest tools which can be used by both teachers
and students. Creating notes is easier using MS Word as they can be made more interactive by
adding shapes and images. It is also convenient to make assignments on MS Word and
submitting them online
➢ In Workplace: Submitting letters, bills, creating reports, letterheads, sample documents, can
all easily be done using MS Word
➢ Creating & Updating Resume: One of the best tools to create your resumes and is easy to edit
and make changes in it as per your experience
➢ For Authors: Since separate options are available for bibliography, table of contents, etc., it is
the best tool which can be used by authors for writing books and adjusting it as per the layout
and alignment of your choice
2. MS Excel
What is MS Excel?
➢ Click on Start
➢ Then All Programs
➢ Next step is to click on MS Office
➢ Then finally, choose the MS-Excel option
Alternatively, you can also click on the Start button and type MS Excel in the search option available.
What is a cell?
A spreadsheet is in the form of a table comprising rows and columns. The rectangular box at the
intersection point between rows and columns forms a cell. Given below is an image of a cell:
The cell address is the name by which is cell can be addressed. For example, if row 7 is interested in
column G, then the cell address is G7.
Features of MS Excel
Various editing and formatting can be done on an Excel spreadsheet. Discussed below are the
various features of MS Excel.
➢ Home
• Comprises options like font size, font styles, font colour, background colour, alignment,
formatting options and styles, insertion and deletion of cells and editing options.
➢ Insert
• Comprises options like table format and style, inserting images and figures, adding
graphs, charts and sparklines, header and footer option, equation and symbols.
➢ Page Layout
• Themes, orientation and page setup options are available under the page layout option.
➢ Formulas
• Since tables with a large amount of data can be created in MS excel, under this feature,
you can add formulas to your table and get quicker solutions.
• Adding external data (from the web), filtering options and data tools are available under
this category.
➢ Review
• Proofreading can be done for an excel sheet (like spell check) in the review category and
a reader can add comments in this part
➢ View
• Different views in which we want the spreadsheet to be displayed can be edited here.
Options to zoom in and out and pane arrangement are available under this category
MS Excel is widely used for various purposes because the data is easy to save, and information can
be added and removed without any discomfort and less hard work.
➢ Easy To Store Data: Since there is no limit to the amount of information that can be saved in a
spreadsheet, MS Excel is widely used to save data or to analyse data. Filtering information in
Excel is easy and convenient.
➢ Easy To Recover Data: If the information is written on a piece of paper, finding it may take
longer, however, this is not the case with excel spreadsheets. Finding and recovering data is
easy.
➢ Application of Mathematical Formulas: Doing calculations has become easier and less time-
taking with the formulas option in MS excel
➢ More Secure: These spreadsheets can be password secured in a laptop or personal computer
and the probability of losing them is way lesser in comparison to data written in registers or
piece of paper.
➢ Data at One Place: Earlier, data was to be kept in different files and registers when the
paperwork was done. Now, this has become convenient as more than one worksheet can be
added in a single MS Excel file.
➢ Neater and Clearer Visibility of Information: When the data is saved in the form of a table,
analysing it becomes easier. Thus, information is a spreadsheet that is more readable and
understandable.
There are certain things which one must know with respect to MS Excel, its applications and usage:
3. MS PowerPoint
➢ The program was created in a software company named Forethought, Inc. by Robert
Gaskins and Dennis Austin.
➢ It was released on April 20, 1987, and after 3 months of its creation, it was acquired by
Microsoft.
➢ The first version of this program, when introduced by Microsoft was MS PowerPoint 2.0
(1990).
➢ It is a presentation-based program that uses graphics, videos, etc. to make a
presentation more interactive and interesting.
➢ The file extension of a saved Powerpoint presentation is “.ppt”.
➢ A PowerPoint presentation comprising slides and other features is also known as PPT.
Gradually, with each version, the program was more creative and more interactive. Various other
features were added in PowerPoint which massively increased the requirement and use of this MS
Office program.
Basics of MS PowerPoint
Discussed below are a few questions that one must be aware of while discussing the basics of MS
PowerPoint. Once this is understood, using the program and analysing how to use it more creatively
shall become easier.
Answer: PowerPoint (PPT) is a powerful, easy-to-use presentation graphics software program that
allows you to create professional-looking electronic slide shows.
The image given below shows the main page of MS PowerPoint, where a person lands when the
program is opened on a computer system:
A blank presentation is open on the screen. According to the requirement, a person can modify the
template for a presentation and start using the program.
Answer: A combination of various slides depicting a graphical and visual interpretation of data, to
present information in a more creative and interactive manner is called a PowerPoint presentation
or PPT.
Answer: When all the slides of a PowerPoint presentation are set in series and then presented to a
group of people, where each slide appears one after the other, is a set pattern, this is known as a
PowerPoint slide show.
1. Clip Art
2. Graphs
3. Tables
4. Photographs
5. Charts
All these elements are mainly used to enhance presentation skills and make the slide more
interactive.
Features of MS PowerPoint
There are multiple features that are available in MS PowerPoint which can customise and optimise a
presentation. The same have been discussed below.
➢ Slide Layout
Multiple options and layouts are available based on which a presentation can be created. This option
is available under the “Home” section and one can select from the multiple layout options provided.
The image below shows the different slide layout options which are available for use:
➢ Slide Design
MS PowerPoint has various themes using which background colour and designs or textures can be
added to a slide. This makes the presentation more colourful and attracts the attention of the
people looking at it.
This feature can be added using the “Design” category mentioned on the homepage of MS
PowerPoint. Although there are existing design templates available, in case someone wants to add
➢ Animations
During the slide show, the slides appear on the screen one after the other. In case, one wants to add
some animations to the way in which a slide presents itself, they can refer to the “Animations”
category.
Apart from all these options; font size, font style, font colour, word art, date and time, etc. can also
be added to a PPT.
PowerPoint presentations are useful for both personal and professional usage. Given below are a
few of the major fields where PPT is extremely useful:
➢ Education – With e-learning and smart classes being chosen as a common mode of education
today, PowerPoint presentations can help in making education more interactive and attract
students towards the modified version of studying
➢ Marketing – In the field of marketing, PowerPoint presentations can be extremely important.
Using graphs and charts, numbers can be shown more evidently and clearly which may be
ignored by the viewer if being read
➢ Business – To invite investors or to show the increase or decrease in profits, MS PowerPoint
can be used
➢ Creating Resumes – Digital resumes can be formed using MS PowerPoint. Different patterns,
photograph, etc. can be added to the resume
➢ Depicting Growth – Since both graphics and text can be added in a presentation, depicting the
growth of a company, business, student’s marks, etc. is easier using PPT
5. MS Outlook
6. MS OneNote
➢ Microsoft Office 3.0 Version was started in- August 30, 1992.
➢ Microsoft Office 2003 Version was launched in- October 21, 2003.
➢ Microsoft Office 2016 Version was started in- September 22, 2015.
➢ Microsoft Office 2019 Version was started in- September 24, 2018.
Word processing – the use of a program (software application) running on a computer that allows
users to create, edit, format, and store documents.
Create a Document
Edit a Document
Editing a document – making revisions to a document, focusing on correcting errors, improving the
accuracy of language, rearranging, making words and sentences clearer and more effective, etc.
Select Text
Before editing text, you’ll need to select it. This is also sometimes called “highlighting text.”
2. Go to the location where stores your file or folder (hard drive, USB, etc.).
a right-pointing arrow , then triple-click. Or click the Home tab, under Editing,
click Select, and then click Select All.
Method 1
Method 2
1. Move the I-beam pointer to the text you want to delete. Click to set the insertion point there
(a blinking vertical line).
2. To delete text to the left of the insertion point, press the Backspace key on the keyboard. (On
a Mac keyboard, press the Delete key.)
3. To delete text to the right of the insertion point, press the Delete key on the keyboard. (On a
Mac keyboard, press the fn key plus the Delete key.)
➢ Copy – duplicates the selected item (text, symbol, table, image, etc.).
➢ Cut – removes the selected item from its original position.
➢ Copy and paste – duplicates the selected item. The selected item can be found in both original
and the new, pasted location(s).
➢ Cut and paste – duplicates the selected item then deletes the original. The selected data can
be found only at the new, pasted location (the item has moved from one location to another).
Method 1
5. Right-click and click the Paste icon. You can also use your keyboard by
pressing Cntr + v (On a Mac, it is Cmd + v).
Method 2
Review a Document
Method 1
3. Select the correct spelling from the suggestion list to correct the spelling error. For each error,
Word will offer one or more suggestions.
Method 2
Find Synonyms
Method 1
Method 2
MS Windows
Developer Microsoft
Initial Release 20th November 1985
Marketing Target Personal Computing
Languages Available in 138 languages
Default User Interface Windows Shell
Official Website microsoft.com
By definition, an Operating System is a group of several GUIs (Graphical User Interface) families, all
of which are developed, sold and marketed by Microsoft.
The latest version of Microsoft Operating System which is being widely used across the world is
Windows 10.
It was 1983 when work on “Interface Manager” was started by Microsoft but it was in November
1995, when the first Windows 1.0 was introduced. Later on, with developments in technology, the
requirement of the people and increased demand for Graphical User Interface, Microsoft kept
releasing revised versions of Operating Systems.
Let us understand the different versions of Windows Operating System along with the features of
each of them individually.
1. Windows 1.0
2. Windows 2.0
Note* – None of the above mentioned Windows was Operating Systems. They all came under the
category of Windows, working based on a graphical operating environment. It was Windows 95,
which was the first Operating System released by Microsoft.
4. Window 95
5. Windows 98
6. Windows 2000
➢ It was officially released on February 17, 2000. However, its manufacturing had begun in late
1999
➢ While the manufacturing started on August 24, 2001, the official product was released on
October 25, 2001
➢ Advanced portable PC support
➢ Automatic wireless connection support
➢ Fast start-up
➢ Better Graphical User Interface (GUI)
➢ Help and support centre
8. Windows Vista
9. Windows 7
10. Windows 8
11. Windows 10
Applications in Windows
There are all kinds of applications which are available at the Windows store and people can easily
access them and download them for their personal or professional usage.
➢ Web Browsers
➢ Adobe Photoshop
➢ Adobe Reader
➢ Messenger
➢ Media Players
➢ Games
➢ Audio/ Video Chatting Apps
➢ Maps & Calendar and this list goes on
Since Computers run over a set of commands which are entered in the form of input, which with the
advancement of Operating Systems can be entered through various Hardware devices.
A global system of interconnected computers, using a standardised Internet Protocol suite for
communication and sharing information is called the Internet.
➢ The first development was the introduction of host-to-host network interactions. This was first
observed in ARPANET in 1969. It was developed by Advanced Research Projects Agency
(APRA) of the Department of Defence, U.S. It was one of the first general usage of computer
networks.
➢ Next step was commercialising the usage and making the transistors and transmitters fit in
smaller devices for convenient Internet usage for the general public. This was introduced in
the 1970s.
➢ Moving forward, satellites and wireless communication was the main target. Defence
Advanced Research Projects Agency (formerly ARPA), supported satellite-based radio packets
for mobile usage of networks.
➢ The next was the development of Transmission Control Protocol (TCP). This enabled different
machines and networks across the world to assemble data packets. It was in the 1980s that
the TCP/IP approach was adapted by researchers and technologists, following the footsteps of
the U.S. Department of Defence.
➢ With the introduction of personal computers, the demand for commercial Internet usage
increased. This was the time when Ethernet and other Local Area Networks cam in the
foreground.
➢ In 1993, the web browser was introduced, which followed the point-and-click approach and is
now a widely used operation for Internet users.
➢ The late 1990s was the time when thousands of Internet Service Providers has taken up the
market and most of them were from the U.S.
➢ And then the 21st century brought in an amalgamation of technology and wireless Internet
accessibility for its users. Wherein, wireless broadband services came in as a boon for Internet
users.
The different ways in which one can connect to the Internet are discussed below in brief:
➢ Dial-Up – In such connections, users are required to link their phone line to a computer to
access the Internet. Under this connection, the user cannot make or receive phone calls
through tier home phone service.
➢ Broadband – Provided either through cable or phone companies, Broadband is a high-speed
internet connection which is widely used today.
➢ Wireless Connection – Wi-fi and Mobile service providers fall under this category. Internet
connectivity is made via radio waves and the Internet can be connected anywhere,
irrespective of the location. Given below are a few examples of wireless connection:
Protocols are a set of rules that help in governing the way in which any particular body or technology
works.
➢ TCP/IP Network Model – Transmission Control Protocol (TCP) and Internet Protocol (IP) are
the most widely used protocols for connecting networks. It divides any message into a series
of packets which are sent from source to destination.
➢ File Transfer Protocol – Program files, multimedia files, text files, documents, etc. can be
transferred from one device to another, using FTP.
➢ Hypertext Transfer Protocol – Used for transferring a hypertext from one device to two or
more devices. HTML tags are used for creating links and these links may be in the form of text
or images.
Intentionally or unintentionally, Internet usage is a part in the day to day lives of every individual.
The Internet has made lives easy and comfortable, but at the same time made human being
dependable for the smallest or biggest of information. Discussed below are the uses of the internet,
along with a few cons that it brings along.
Pros of Internet
➢ Easy Access to Information – Information on anything and everything are available online. The
Internet makes it convenient to learn about new things at any point in time and get details on
various subjects, irrespective of time and place.
➢ Platform for Online Education – With the advanced technology, even students and adults
wish to learn new things and gaining knowledge at various online portals has become more
accessible.
➢ Job Hunting – Employers can look for employees on the internet and the job seekers can
apply online for jobs using the Internet.
➢ Platform to become an Entrepreneur – Today, thousands of people have started their own
websites and getting good business and users/customers by making their own websites and
selling products or services. This has become accessible due to Internet connectivity.
Cons of Internet
➢ Dependency – The dependency of people for looking things and information online has
increased massively since the introduction of Internet and its easy access.
➢ Cyber Crime – People do not just use internet for learning purposes, cybercrime has also been
at a distinctive high because of effortless availability of resources.
➢ Distraction – People can easily find online games, interesting information, etc. online which
may be a cause of distraction for may.
➢ Bullying and Trolls – Online platforms are being used for unethical practises like bullying
people and trolling them.
➢ AAC : Advanced Audio Coding (audio compression format defined by the MPEG-2
standad)
➢ ABI : Application Binary Interface
➢ ABR : Area Border Router
➢ ABR : Available Bit Rate
➢ AD : Active Directory
➢ ADC : Analog – To – Digital Converter
➢ ADC : Apple Display Connector (DVI variant)
➢ AH : Active Hub
➢ AHA : Accelerated Hub Architecture
➢ Ajax : Asynchronous Java Script and XML
➢ AL : Active Link
➢ ALGOL : Algorithmic Language
➢ ALU : Algorithmic and Logical Unit
➢ AM : Active Monitor
➢ AMD : Advanced Micro Devices
➢ AMR : Audio Modem Riser
➢ AoE : ATA over Ethernet
➢ APCI : Application- Layer Protocol Control Information
➢ API : Application Programming Interface
➢ APIPA : Automatic Private IP Addressing
➢ ASCH : American Standard Code for Information Inter change
➢ ASG : Abstract Semantic Graph
➢ ASP : Application Service Provider
➢ AST : Abstract Syntax Tree
➢ ATA : Advanced Technology Attachment
➢ ATM : Asynchronous Transfer Mode
➢ AVC : Advanced Video Interleaved
➢ AWT : Abstract Windowing Toolkit
➢ BASIC : Beginner’s All-Purpose Symbolic Instruction Code
➢ BCD : Binary Coded Decimal
➢ BEEP : Blocks Extensible Exchange Protocol
➢ BER : Bit Error Rate
➢ BFD : Binary File Descriptor
➢ BGP : Border Gateway Protocol
➢ Bin : binary
➢ BINAC : Binary Automatic Computer
➢ BIOS : Basic Input Output System
➢ Bit : binary digit
➢ Blob : Binary large object
➢ Blog : Web Log
➢ BMP : Basic Multilingual Plane
➢ BOOTP : Bootstrap Protocol
➢ BPEL : Business Process Execution Language
➢ Bps : bits per second
➢ CAD : Computer- Aided Design
➢ CAE : Computer- Aided Engineering
➢ CAI : Computer- Aided Instruction
➢ CAT : Computer- Aided Translation
➢ CAQ : Computer- Aided Quality Assurance
➢ Cc : C Compiler
A computer virus is a kind of malicious computer program, which when executed, replicates itself
and inserts its own code, which spreads a harmful virus in the system. This computer virus ultimately
affects the functioning and programming of the device.
➢ Boot sector virus: This virus infects the boot sector of the computer and runs every time the
computer boots and before the operating system loads. Floppy discs and other bootable
media become infected. They are sometimes referred to as memory viruses because they do
not infect the file system.
➢ File Virus: Infects the system by appending itself to the end of a file. It changes the start of a
program such that the control jumps to its code.
➢ Email-Virus: They are comprised of malicious code that is propagated through email
messages and can be activated when a user clicks on a link in an email message, opens an
email attachment, or interacts in any manner with the infected email message.
➢ Polymorphic Virus: Poly means many and morphic means forms. So this virus changes its
form every time. A virus signature is a pattern that can be used to assess whether a virus
exists or not (a series of bytes that make up virus code). This virus changes itself every time
when it is installed so that it can avoid detection by antivirus software. Here, only the
signature of this virus is updated, the functionality remains the same.
➢ Macro Virus: These viruses are activated when a program capable of performing a macro is
executed. Macro viruses, for example, can be found in spreadsheet files.
➢ Multipartite Virus: This virus has the power to infect a computer’s boot sector, memory,
and files, among other areas. This complicates its detection and containment.
➢ Encrypted Virus: To avoid detection by antivirus software, this type of virus is encrypted.
There’s also a decryption algorithm included. As a result, before running, the virus decrypts.
➢ Stealth Virus: This virus is difficult to detect because it modifies the code used to detect it.
As a result, virus detection is extremely difficult.
➢ Resident Virus: A virus that saves itself in the computer’s memory before infecting
additional files and programs after the original software stops working. Because it is hidden
in the computer memory and difficult to remove, this virus can easily infect other files.
Anti-Virus-
An anti-virus is a software which comprises programs or set of programs which can detect and
remove all the harmful and malicious software from your device. This anti-virus software is designed
in a manner that they can search through the files in a computer and determine the files which are
heavy or mildly infected by a virus.
Given below is a list of few of the major antivirus software which is most commonly used:
➢ Norton Antivirus
➢ F-Secure Antivirus
➢ Kaspersky Antivirus
➢ AVAST Antivirus
➢ Comodo Antivirus
➢ McAfee Antivirus