Sie sind auf Seite 1von 60

COMPUTER FUNDAMENTALS

Introduction
A computer is a programmable device that can store, retrieve, and process data. The term
‘computer’ was originally given to humans (human computers) who performed numerical
calculations using mechanical calculators, such as the abacus and slide rule. The term was
later given to a mechanical device as they began replacing the human computers. Today's
computers are electronic devices that accept data (input), process that data, produce output,
and store the results.

Evolution
The history of computers dates back to the invention of a mechanical adding machine in
1642. ABACUS, an early computing tool, the invention of logarithm by John Napier and the
invention of slide rules by William Oughtred were significant events in the evolution of
computers from these early computing devices. Here's introducing you to the ancestors of
modern computers.
 Abacus was invented in 2400 BC.
 Pingala introduced the binary number system, which would later form the core of
computing systems.
 Later in 60 AD, Heron of Alexandria invented machines that could follow
instructions. Who knew back then that this idea would evolve into intelligent
machines!
 The 1600s witnessed the invention of slide rules, the system of movable rods based on
logarithms used to perform basic mathematical calculations, and a mechanical adding
machine, which in some way, laid the foundation of modern-day calculating machines
or computers.
1800s saw some remarkable feats in the history of computers. They included:
 A punching card system was devised by Joseph Marie Jacquard in 1801.
 Charles Babbage designed the first mechanical computer in 1822 and the Analytical
Engine in 1834.
 Morse code was invented in 1835 by Samuel Morse.
 George Boole invented the Boolean algebra in 1848, which would later be at the heart
of programming.
The first digital computer and what most people think of as a computer was called
the ENIAC. It was built during World War II (1943-1946) and was designed to help automate
the calculations being done by human computers. By doing these calculations on a computer,
they could achieve results much faster and with fewer errors.
Early computers like the ENIAC used vacuum tubes and were large (sometimes room size)
and only found in businesses, Universities, or governments. Later, computers began
utilizing transistors as well as smaller and cheaper parts that allowed the ordinary person to
own a computer.

The term Computer, originally meant a person capable of performing numerical calculations
with the help of a mechanical computing device. The foundation stone of the development of
computers was laid way back in the era before Christ. Binary arithmetic is at the core of
computer systems.
Generations of Computer

Till the 1950s all computers that were used were vacuum tube based. In the 1960s, transistor-
based computers replaced vacuum tubes. Transistors made computers smaller and cheaper.
They made computers energy-efficient. But transistors led to emission of large amounts of
heat from the computer, which could damage them. The use of transistors marked the second
generation of computers. Computers of this generation used punched cards for input. They
used assembly language.

The use of Integrated circuits ushered in the third generation of computers. Their use
increased the speed and efficiency of computers. Operating systems were the human interface
to computing operations and keyboards and monitors became the input-output devices.
COBOL, one of the earliest computer languages, was developed in 1959-60. BASIC came
out in 1964. It was designed by John George Kemeny and Thomas Eugene Kurtz. Douglas
Engelbart invented the first mouse prototype in 1963. Computers used a video display
terminal (VDT) in the early days. The invention of Color Graphics Adapter in 1981 and that
of Enhanced Graphics Adapter in 1984, both by IBM added 'color' to computer displays. All
through the 1990s, computer monitors used the CRT technology. LCD replaced it in the
2000s. Computer keyboards evolved from the early typewriters. The development of
computer storage devices started with the invention of Floppy disks, by IBM again.
Thousands of integrated circuits placed onto a silicon chip made up a microprocessor.
Introduction of microprocessors was the hallmark of fourth generation computers.

The fifth generation computers are in their development phase. They would be capable of
massive parallel processing, support voice recognition and understand natural language. The
current advancements in computer technology are likely to transform computing machines
into intelligent ones that possess self organizing skills. The evolution of computers will
continue, perhaps till the day their processing powers equal human intelligence.

Classification

Types of Computers
1. Analog Computers
Analog computers are used to process continuous data. Analog computers represent variables
by physical quantities. Thus any computer which solve problem by translating physical
conditions such as flow, temperature, pressure, angular position or voltage into related
mechanical or electrical related circuits as an analog for the physical phenomenon being
investigated in general it is a computer which uses an analog quantity and produces analog
values as output. Thus an analog computer measures continuously. Analog computers are
very much speedy. They produce their results very fast. But their results are approximately
correct. All the analog computers are special purpose computers.

2. Digital Computers
Digital computer represents physical quantities with the help of digits or numbers. These
numbers are used to perform Arithmetic calculations and also make logical decision to reach
a conclusion, depending on, the data they receive from the user.

3. Hybrid Computers
Various specifically designed computers are with both digital and analog characteristics
combining the advantages of analog and digital computers when working as a system. Hybrid
computers are being used extensively in process control system where it is necessary to have
a close representation with the physical world. The hybrid system provides the good precision
that can be attained with analog computers and the greater control that is possible with digital
computers, plus the ability to accept the input data in either form.

Classification of Computers According to Size

1. Super Computers
Large scientific and research laboratories as well as the government organizations have extra
ordinary demand for processing data which required tremendous processing speed, memory
and other services which may not be provided with any other category to meet their needs.
Therefore very large computers used are called Super Computers. These computers are
extremely expensive and the speed is measured in billions of instructions per seconds.

2. Main Frame Computers


The most expensive, largest and the most quickest or speedy computer are called mainframe
computers. These computers are used in large companies, factories, organizations etc. the
mainframe computers are the most expensive computers, they cost more than 20 million
rupees. In this computers 150 users are able to work on one C.P.U. The mainframes are able
to process 1 to 8 bits at a time. They have several hundreds of megabytes of primary storage
and operate at a speed measured in nano second.

3. Mini Computers
Mini computers are smaller than mainframes, both in size and other facilities such as speed,
storage capacity and other services. They are versatile that they can be fitted where ever they
are needed. Their speeds are rated between one and fifty million instructions per second
(MIPS). They have primary storage in hundred to three hundred megabytes range with direct
access storage device.

4. Micro Computers
These are the smallest range of computers. They were introduced in the early 70’s having less
storing space and processing speed. Micro computers of todays are equivalent to the mini
computers of yesterday in terms of performing and processing. They are also called
“computer of a chip” because its entire circuitry is contained in one tiny chip. The micro
computers have a wide range of applications including uses as portable computer that can be
plugged into any wall.

5. Laptop Computers
The smallest computer in size has been developed. This type of small computers look like an
office brief case and called “LAPTOP” computer. The laptops are also termed as
“PORTABLE COMPUTERS.” Due to the small size and light weight, they become popular
among the computer users. The businessmen found laptop very useful, during traveling and
when they are far away frm their desktop computers. A typical laptop computer has all the
facilities available in microcomputer. The smallest laptops are called “PALMTOP”.
Physical Size

Computers range in size and capability. At one end of the scale are supercomputers, very
large computers with thousands of linked microprocessors that perform extremely complex
calculations. At the other end are tiny computers embedded in cars, TVs, stereo systems,
calculators, and appliances. These computers are built to perform a limited number of tasks.

The personal computer, or PC, is designed to be used by one person at a time. This section
describes the various kinds of personal computers: desktops, laptops, handheld computers,
and Tablet PCs.

Desktop computers
Desktop computers are designed for use at a desk or table. They are typically larger and more
powerful than other types of personal computers. Desktop computers are made up of separate
components. The main component, called the system unit, is usually a rectangular case that
sits on or underneath a desk. Other components, such as the monitor, mouse, and keyboard,
connect to the system unit.

Laptop computers
Laptop computers are lightweight mobile PCs with a thin screen. They are often called
notebook computers because of their small size. Laptops can operate on batteries, so you can
take them anywhere. Unlike desktops, laptops combine the CPU, screen, and keyboard in a
single case. The screen folds down onto the keyboard when not in use.

Handheld computers
Handheld computers, also called personal digital assistants (PDAs), are battery-powered
computers small enough to carry almost anywhere. Although not as powerful as desktops or
laptops, handhelds are useful for scheduling appointments, storing addresses and phone
numbers, and playing games. Some have more advanced capabilities, such as making
telephone calls or accessing the Internet. Instead of keyboards, handhelds have touch screens
that you use with your finger or a stylus (a pen-shaped pointing tool).

Tablet PCs
Tablet PCs are mobile PCs that combine features of laptops and handhelds. Like laptops,
they’re powerful and have a built-in screen. Like handhelds, they allow you to write notes or
draw pictures on the screen, usually with a tablet pen instead of a stylus. They can also
convert your handwriting into typed text. Some Tablet PCs are “convertibles” with a screen
that swivels and unfolds to reveal a keyboard underneath

Functional Components
Computer systems ranging from a controller in a microwave oven to a large supercomputer
contain components providing five functions. A typical personal computer has hard, floppy
and CD-ROM disks for storage, memory and CPU chips inside the system unit, a keyboard
and mouse for input, and a display, printer and speakers for output. The arrows represent the
direction information flows between the functional units.

 Input Unit :The input unit consists of input devices that are attached to the computer.
These devices take input and convert it into binary language that the computer
understands. Some of the common input devices are keyboard, mouse, joystick, scanner
etc.
 Central Processing Unit (CPU0 : Once the information is entered into the computer
by the input device, the processor processes it. The CPU is called the brain of the
computer because it is the control center of the computer. It first fetches instructions
from memory and then interprets them so as to know what is to be done. If required,
data is fetched from memory or input device. Thereafter CPU executes or performs the
required computation and then either stores the output or displays on the output device.
The CPU has three main components which are responsible for different functions –
Arithmetic Logic Unit (ALU), Control Unit (CU) and Memory registers
 Arithmetic and Logic Unit (ALU) : The ALU, as its name suggests performs
mathematical calculations and takes logical decisions. Arithmetic calculations include
addition, subtraction, multiplication and division. Logical decisions involve comparison
of two data items to see which one is larger or smaller or equal.
 Control Unit : The Control unit coordinates and controls the data flow in and out of
CPU and also controls all the operations of ALU, memory registers and also
input/output units. It is also responsible for carrying out all the instructions stored in the
program. It decodes the fetched instruction, interprets it and sends control signals to
input/output devices until the required operation is done properly by ALU and memory.
 Memory Registers : A register is a temporary unit of memory in the CPU. These are
used to store the data which is directly used by the processor. Registers can be of
different sizes(16 bit, 32 bit, 64 bit and so on) and each register inside the CPU has a
specific function like storing data, storing an instruction, storing address of a location in
memory etc. The user registers can be used by an assembly language programmer for
storing operands, intermediate results etc. Accumulator (ACC) is the main register in
the ALU and contains one of the operands of an operation to be performed in the ALU.
 Memory : Memory attached to the CPU is used for storage of data and instructions and
is called internal memory The internal memory is divided into many storage locations,
each of which can store data or instructions. Each memory location is of the same size
and has an address. With the help of the address, the computer can read any memory
location easily without having to search the entire memory. when a program is
executed, it’s data is copied to the internal memory ans is stored in the memory till the
end of the execution. The internal memory is also called the Primary memory or Main
memory. This memory is also called as RAM, i.e. Random Access Memory. The time
of access of data is independent of its location in memory, therefore this memory is also
called Random Access memory (RAM). Read this for different types of RAMs
 Output Unit : The output unit consists of output devices that are attached with the
computer. It converts the binary data coming from CPU to human understandable form.
The common output devices are monitor, printer, plotter etc.
Characteristics

The characteristics of computer are:

(a) Efficiency: The computer processed data in nano second which is beyond of human
capacity.

(b) Speed: It is with very high processing speed. The computer can process more than 50
million instructions in one second. Now a day, very high speed computers are available with
Pentium IV or Pentium v microprocessor chips.

(c) Storage Capacity: It can stores vast amount of information in the form of books,
graphics, charts, animation, audio, video etc. Now a day, the hard disk of 1024 GB is
common, and hard disk of more than 1 TB is also available in market.

(d) Versatility: It has capacity of multitasking. You can enjoy multimedia, word processing,
printing, and communicating jobs from one platform without closing other. This type of
facilities has made it versatile and popular.

(e) Reliability: The computer is a reliable electronic multipurpose and multiprocessing


machine. It processes data with high accuracy without any mistakes.

(g) Decision Making: The computer has capability to perform task and managing processing
schedules when there are many jobs available and Waiting own turns. The Operating system
has capability to manage files, executing utilities software and many others.

The game, weather forecasting, weaponary systems, aviation’s, space shuttles etc are
controlled by computer and the controlling actions are performed by its decision making
capacity based on stored related database.

(h) Accuracy: The computer is applied in scientific and industrial calculation where long
range data is used for information.

It ranges 10-33 to 10-38, but result is astonishingly accurate.

(i) Artificial Intelligence: The fifth generation computer which recognizes voice is based on
artificial intelligence. The AI is applied in gaming software, and robotics from many years,
but operating system based on AI is also in process which can recognize not only voice, but
read mood of users also. It gives suggestion and decision on complex problems.

Hardware
 Input Devices

Following are some of the important input devices which are used in a computer −

 Keyboard
Keyboard is the most common and very popular input device which helps to input data
to the computer. The layout of the keyboard is like that of traditional typewriter,
although there are some additional keys provided for performing additional functions.
 Mouse
Mouse is the most popular pointing device. It is a very famous cursor-control device
having a small palm size box with a round ball at its base, which senses the movement
of the mouse and sends corresponding signals to the CPU when the mouse buttons are
pressed.
 Joy Stick
Joystick is also a pointing device, which is used to move the cursor position on a
monitor screen. It is a stick having a spherical ball at its both lower and upper ends.
The lower spherical ball moves in a socket. The joystick can be moved in all four
directions.
 Light pen
Light pen is a pointing device similar to a pen. It is used to select a displayed menu
item or draw pictures on the monitor screen. It consists of a photocell and an optical
system placed in a small tube.
 Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer,
instead of a mouse. This is a ball which is half inserted and by moving fingers on the
ball, the pointer can be moved.
 Scanner
Scanner is an input device, which works more like a photocopy machine. It is used
when some information is available on paper and it is to be transferred to the hard disk
of the computer for further manipulation.
 Microphone
Microphone is an input device to input sound that is then stored in a digital form.
 Magnetic Ink Card Reader(MICR)
MICR input device is generally used in banks as there are large number of cheques to
be processed every day. The bank's code number and cheque number are printed on
the cheques with a special type of ink that contains particles of magnetic material that
are machine readable.
 Optical Character Reader(OCR)
OCR scans the text optically, character by character, converts them into a machine
readable code, and stores the text on the system memory.
 Bar Code Reader
Bar Code Reader is a device used for reading bar coded data (data in the form of light
and dark lines). Bar coded data is generally used in labelling goods, numbering the
books, etc. It may be a handheld scanner or may be embedded in a stationary scanner.
 Optical Mark Reader(OMR)
OMR is a special type of optical scanner used to recognize the type of mark made by
pen or pencil. It is used where one out of a few alternatives is to be selected and
marked.

 Output Devices
 Monitor – This is the most common computer output device. It creates a visual
display for users to view processed data. Monitors come in various sizes and
resolutions.
Common Types of Monitors
 Cathode Ray Tube – use phosphorescent dots to generate the pixels that
constitute displayed images.

 Flat Panel Screen – use liquid crystals or plasma to produce output. Light is
passed through liquid crystals to generate the pixels.
All monitors depend on a video card that is positioned on the computer motherboard or in a
special expansion slot. The video card sorts out the computer data into image details that the
monitors can show.
 Printer – generates a hard copy version of processed data such as documents and
photographs. The computer transmits the image data to the printer, which then
physically recreates the image, usually on paper.
Types of Printers

 Ink Jet – sprays tiny dots of ink on a surface to form an image.


 Laser – utilises toner drums that roll through magnetized pigment and then
transfer the pigment to a surface.
 Dot Matrix – utilises a print head to set in images on a surface, using an ink
ribbon. This is commonly used from 1980 to 1990.

 Speakers – are attached to computers for the output of sound. Sound cards are
required in the computer for speakers to function. Speakers range from simple, two-
speaker output devices to surround-sound multi-channel units.
 Headset – is a combination of speakers and microphone. It is mostly used by gamers
and is also great tool for communicating with family and friends over the internet using
a VOIP software.
 Projector – is a display device that projects a computer-created image. The computer
transmits the image data to its video card, which then sends the video image to
the projector. It is usually used for presentations or for viewing videos.
 Plotter – generates a hard copy of a digitally depicted design. The design is sent to the
plotter through a graphics card and forms the design using a pen. It is generally used
with engineering applications. It basically draws an image using a series of straight
lines.

Software
 System Software
System software is a type of computer program that is designed to run a computer’s hardware
and application programs. If we think of the computer system as a layered model, the
system software is the interface between the hardware and user applications.

The operating system (OS) is the best-known example of system software. The OS manages
all the other programs in a computer.
Other examples of system software and what each does:

 The BIOS (basic input/output system) gets the computer system started after you turn it
on and manages the data flow between the operating system and attached devices such as
the hard disk, video adapter, keyboard, mouse, and printer.

 The boot program loads the operating system into the computer's main memory or
random access memory (RAM).

 An assembler takes basic computer instructions and converts them into a pattern of bits
that the computer's processor can use to perform its basic operations.

 A device driver controls a particular type of device that is attached to your computer,
such as a keyboard or a mouse. The driver program converts the more general
input/output instructions of the operating system to messages that the device type can
understand.

 According to some definitions, system software also includes system utilities, such as the
disk defragmenter and System Restore, and development tools such
as compilers and debuggers.

 Application Software
Application software, or simply applications, are often called productivity programs or end-
user programs because they enable the user to complete tasks, such as creating documents,
spreadsheets, databases and publications, doing online research, sending email, designing
graphics, running businesses, and even playing games! Application software is specific to the
task it is designed for and can be as simple as a calculator application or as complex as a
word processing application. When you begin creating a document, the word processing
software has already set the margins, font style and size, and the line spacing for you. But you
can change these settings, and you have many more formatting options available. For
example, the word processor application makes it easy to add colour, headings, and pictures
or delete, copy, move, and change the document's appearance to suit your needs.
 Utility Software

Utility software is system software designed to help analyze, configure, optimize or maintain
a computer.

Utility software usually focuses on how the computer infrastructure (including the computer
hardware, operating system, software and data storage) operates. Utility software, along with
operating system software, is a type of system software, distinguishing it from application
software.

 Utility software
 Anti-virus utilities scan for computer viruses.
 Archivers output a stream or a single file when provided with a directory or a set of
files. Archive utilities, unlike archive suites, usually do not include compression or
encryption capabilities. Some archive utilities may even have a separate un-archive
utility for the reverse operation.
 Backup software can make copies of all information stored on a disk and restore either
the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event of
accidental deletion).
 Clipboard managers expand the clipboard functionality of an operating system .
 Cryptographic utilities encrypt and decrypt streams and files.
 Data compression utilities output a shorter stream or a smaller file when provided
with a stream or file.
 Data synchronization utilities establish consistency among data from a source to a
target data storage and vice versa. There are several branches of this type of utility:
o File synchronization utilities maintain consistency between two sources. They
may be used to create redundancy or backup copies but are also used to help
users carry their digital music, photos and video in their mobile devices.
o Revision control utilities are intended to deal with situations where more than
one user attempts to simultaneously modify the same file.
 Debuggers are used to test and “debug” other programs, mainly to solve programming
errors. Also utilized for reverse engineering of software or systems.
 Disk checkers can scan operating hard drive.
 Disk cleaners can find files that are unnecessary to computer operation, or take up
considerable amounts of space. Disk cleaner helps the user to decide what to delete
when their hard disk is full.
 Disk compression utilities can transparently compress/uncompress the contents of a
disk, increasing the capacity of the disk.
 Disk defragmenters can detect computer files whose contents are scattered across
several locations on the hard disk, and move the fragments to one location to increase
efficiency.
 Disk partitions can divide an individual drive into multiple logical drives, each with
its own file system which can be mounted by the operating system and treated as an
individual drive.
 Disk space analyzers for the visualization of disk space usage by getting the size for
each folder (including sub folders) & files in folder or drive. Showing the distribution
of the used space.
 Disk storage utilities
 File managers provide a convenient method of performing routine data management
tasks, such as deleting, renaming, cataloging, uncataloging, moving, copying, merging,
generating and modifying data sets.
 Hex editors directly modify the text or data of a file. These files could be data or an
actual program.
 Memory testers check for memory failures.
 Network utilities analyze the computer’s network connectivity, configure network
settings, check data transfer or log events.
 Package managers are used to configure, install or keep up to date other software on a
computer.
 Registry cleaners clean and optimize the Windows Registry by removing old registry
keys that are no longer in use.
 Screensavers were desired to prevent phosphor burn-in on CRT and plasma computer
monitors by blanking the screen or filling it with moving images or patterns when the
computer is not in use. Contemporary screensavers are used primarily for entertainment
or security.
 System monitors for monitoring resources and performance in a computer system.
 System profilers provide detailed information about the software installed and
hardware attached to the computer.
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

Definition

ICT is defined as ‘any technology used to support information gathering, processing,


distribution and use’ (Beckinsale and Ram, 2006). The definition taken in this paper classifies
ICT into information technologies, telecommunications technologies and networking
technologies (Nicol, 2003). This covers all forms of technologies such as computers, Internet,
websites as well as fixed - line telephones, mobile phones and other wireless communications
devices, networks, broadband and various specialized devices (Manueli et al., 2007).
Tools Used In ICT
 Informative Tools
Informative tools are applications that provide large amounts of information in various
formats such as text, graphics, sound, or video. Informative tools can be regarded as a passive
repository of information (Chen & Hsu, 1999). Examples include tools and information
resources of the existing multimedia encyclopedia of the Internet. The Internet is a huge
electronic database, and researchers consider the Internet as the most significant ICT tools in
e-learning environments. Pew Internet & American Life Project did a survey in 2002 showed
them three out of five children under the age of 18 and more than 78% of children between
the ages of 12 and 17 lines. Key findings from this study are found in Levin & Arafeh (2002)
shows that students rely on the internet to help them do their homework. In short, students
consider the Internet as a virtual textbook, reference library, virtual tutor, learn to study
shortcuts and virtual study groups (McNeely, 2005).
 Situating Tools
Situating tools is a system that lay the students in the environment where it involve
a context and the occurrence of a situation. Examples of such systems include
simulation, virtual reality and multi-user domain. Situating tools software tools such as CD-
ROM. CD-ROM offers hypermedia application which gives better opportunities for teachers
to enhance learning environment. Hypermedia application covers more than one of the
following media such as text, audio, graphic images (still images), animation and video clips.
Hypermedia applications are well integrated in the learning environment to enhance student
autonomy and thinking (Cheung & Lim, 2000). A multimedia presentation topic will help
students to conceptualize the ideas of the real world by integrating the theories in the
practical application of real-world situations. It is to increase students' ability to use the
conceptual tools of the discipline in authentic practice. (Phillips, 2004) Multimedia able to
put the amazing array of resources on student and lecturer resources on teaching and student
1control. "Multimedia learning active learning to create a more dynamic, interactive,
collaborative, and satisfying" (Supyian, 1996)
 Constructive Tools
constructive tool is a general purpose tool that can be used to manipulate information,
construct their own knowledge or visualize students understanding. Construction tools such
as Microsoft Word or Powerpoint has a strong impact in the educational environment and is
widely used in most organizations in the form of memos, reports, letters, presentations,
record routine information, giving businesses the most (McMahon, M. 1997.) In learning a
second language , Microsoft Word manage to help students to make correct sentences and
texts as well as modern word processors include spell checking and dictionaries and grammar
checkers. Therefore, teachers can use the software to promote writing in the curriculum.
PowerPoint is a presentation graphics program packaged as part of Microsoft Office for
Windows or Macintosh. Although generally used for developing business presentations , it is
also very advantageous in the context of increase creativity among students. While word
processing program is the most common computer applications used, as a spreadsheet like
Excel is just as important in teaching and learning of English. Students will be exposed to
learning design and statistical data using the Excel program that can be automated through
the formula.
 Communicative Tools
Communicative tools are systems that allow easy communication between teachers and
students or between students outside the physical barrier classroom. (Chen, D., Hsu, JJF, and
Hung, D. 2000) It is including e-mail, electronic bulletin boards, chat, teleconference and
electronic whiteboard. Synchronous communicative tools such as chat or video conference
enable real-time communication while using the tools of communicative asynchronous (eg e-
mail and electronic whiteboard) is a system in which exchange of messages between people
are not 'live' but somehow delayed. Communicative tool most appropriate for activities
requiring more time to think before responding. Utilization of electronic mail is increasing
day by day. E-mail is the most commonly used on the Internet. It is easy to use as it is a
primarily text-based system and simple communication tool for teachers and students that
allows students to dominate class beyond physical barrier. (Chen, D., Hsu, JJF, and Hung, D.,
2000.)
 Collaborative Tools
Collaboration tools of ICT is currently the focus of much interest and emerging as
development of new tools that make online collaborative projects draw a realistic option for a
distributed group work. Internet can be used for many collaborative activities such as
meetings, discussions are taking place, working in the document, information dissemination,
and other tasks. Interactive electronic whiteboard is not just used as tools for meeting and
development, but recently became the most popular tool among teachers. whiteboard is an
electronic device that interfaces with the computer where the computer image is displayed on
the board that can be manipulated interactively (Weiser and Jay, 1996). This tool is
increasingly popular with teachers, when used in conjunction with a computer and a video
projector that produces interactive learning community. Instead of having to crowd around
one or two computers, interactive whiteboard not only display the materials, but also to
respond to human interaction with computer commands and orders on a touch screen. In
addition, these technologies provide impulsive information sharing, constructing knowledge
and stimulate personal growth. (Mona, 2004). Other collaborative tools, such as E-mail
messaging, Wireless Application Protocol (WAP) and General Packet Radio Services
(GPRS) embedded in micro-browser equipped mobile phones or GPRS enabled handheld
computers are other ICT tools that that can link students in different geographic locations
exceeding the boundaries of class. In addition, the development of mobile phone and PDA
allows learners to exchange information in a short time simultaneously and asynchronously,
and provides flexibility for one-one, one-to-many and many-to-many communication,
especially for the online discussion forum. (Lim & Lee, 2002). In conclusion, a "learning is
no longer seen as a solitary activity, but is described as taking place through social interaction
with peers, mentors and experts" (Kings, 1998).

Uses in Education
It important to analyze the facts occur within the new technology and the learning process
should be viewed in the perspective of learning English. Most of the simple basic use of ICT
devices in the educational environment that leads to the following benefits:
 Increase in pupils’ motivation, enthusiasm and confidence
 Positive association with attainment
 Learning possibilities expanded via collaboration, interaction and
communication in the target language
 Potential for differentiation according to individual pupil need
The utilization of ICT tools in education was increasingly felt in recent times and benefits the
students with the appropriate exploitation. It facilitates latest information for user by at a
click of a mouse. According to Ofsted (2002), ICT tools can perform four essential functions
as follows:
 The speed and automatic functions of ICT allow a teacher to demostrate , explore and
clarify aspects of the teaching method which enable the students learn more
effectively;
 The capacity and coverage of ICT to assist the teachers and pupils easily access to for
historical event or current formation
 The temporary nature of information stored, processed and presented using ICT
enable simpler method as documents could be change and correced by editing
software provided in the programs.
 The interactive way in which information is stored, processed and presented can
enable teachers and students to explore the model, to communicate effectively with
others and present information effectively to different audiences..
Research has shown that appropriate use of ICTs to catalyze a paradigm shift in both content
and pedagogy that is the heart of education reform in the 19th century. ICT-supported
education to enhance the success of the ongoing knowledge and skills that will give the
students continuous learning if properly designed and implimented. Leveraging ICT in an
appropriate manner enables new methods of teaching and learning, especially for students in
exploring exciting ways of problem solving in the context of education. New ways of
teaching and learning is supported by constructivist learning theory and paradgm shift from
teacher-centered pedagogy of memorization and rote-learning to focus on student centered.
 Utilization of ICT Tools Among Teachers
Technology has been supported in various ways to teach and learn, in the case of our study
we will deal specifically with the school context, Marsh and others (2002) outlines a
significant change in approach, methodology of teaching foreign languages in Europe over
the last twenty years. The authors highlight the positive impact of the implementation of ICT
in both teachers and learners on basic attitudes as a result of the changes and improvements in
teaching and learning theories. Computer-Assisted Language Learning (CALL), in particular,
and the use of web for teaching and learning (WBT ) in a second place shape the two most
recurrent and central research streamlines of present times.
A recent report by Becta (2004) is concerned with the use of ICT in teaching and learning.
This report is based on an analysis of existing research on the utilization of ICT among
primary and secondary teachers in teaching. Important findings is really affected, while the
resources available to introduce ICT to teach FL is also mentioned. Therefore, ICT can
contribute to education key skills listening, speaking, reading and writing through various
ways:
Digital sources as the Internet, CD-ROM, database vocabulary and video clips that provide
access to various kinds of information and learning opportunities.
 Students can work at their own pace as the digital resources can be slowed down and
played over and over again as the needs of individuals.
 Access to authentic materials and communication with schools abroad through video
conferences and e-mail discussion forum in the target language to facilitate cultural
awareness
 Multimedia presentation software enables a variety of English language skills into
practice and to support multiple learning styles
 Word-processing applications allow students to plan, organize and edit their work and
develop skimming and scanning techniques
 Digital video can offer feedback on pupils’ language performance for self-critique,
teacher or peer evaluation
 Personal interest in English can be encouraged by watching movies in DVD format
with subtitles and multiple audio tracks in different languages
Despite these findings , most of the existing research provides case studies and models of
teachers using ICT in their practices, and outlines the aspirational results . However, long-
term academic studies should be taken into consideration in obtain reliable and clearer picture
the benefits of ICTs ulitization in teaching and learning. Report of ICT Technologies in
Foreign Language (ICC, 2003), which looked at current developments across Europe, stated
that English is different from other subjects.
ICT can be used to support and develop all the skills in key curriculum English listening,
speaking, reading and writing, often with overlap benefit of between them (TOP, 2001).
Sources such as digital video can provide a successful way to maintain success in dominating
the language in the classroom (Tschirner, 2001). Video conferencing has shown the benefits
of listening and speaking (Harris 2002). Key skills required for teaching and learning are all
provided by software applications such as interactive multimedia, video, CD-ROM
dictionaries, digital voice recording and others, as it can be derived from Becta survey
(2004). Furthermore other research also reported positive results for ICT in
pupils'achievement. (Blow, 2001, TOP, 2001). ICT can help students become more confident
and competent in their learning (Passey et al, 2004;. TOP, 2001). ICT can be brought in
contact with native speakers and their culture, through digital means or by means of direct
communication. E-mail, which is regularly used to pursue collaborative projects with schools,
can support learning (Usher, 2001).

Barriers in Education

One of the most important trends in the present education system is the change and
restructurisation in the teaching/learning process integrating technological innovations. The
main restructurisation element of the change of the teaching practice. New teaching/learning
methods incorporate problem-solving learning, cooperative learning, orientation to real goals
and the change in the teacher roles (Masters, Yelland 2002).

It is difficult for teachers to change according to the requirements (teachers should know and
be able to use models of ICT skill acquisition, teacher should be acquainted with virtual
environments, he/she should be able to integrate ICT in the curriculum, teacher should know
main functions of operation systems etc.) of the documents which regulate ICT integration
(Strategy of Information and Communication Technology Implementation in the Lithuanian
System of Education (2000), Teacher Computer Literacy Standard (2001), Programme of
Information and Communication Technology Implementation in the Lithuanian Educational
System (2002) ) because they do not have enough ICT competency, therefore, resistance to
change conducted by ICT integration in the teaching and learning process emerges and
barriers to the integration of information and communication technologies into the
teaching/learning process appear.

Sinko (2002), discussing the barriers to successful integration of ICT into the
teaching/learning process, distinguishes the following factors:
 Lack of support for the educational personnel and learners;
 Lack of teacher competencies to use certain software;
 Insufficient financing (of teacher professional developments in ICT field, of
appropriate computer hardware and software etc.);
 Lack of cooperation among academic personnel in the same and in another schools.
Whereas Lai (2001), distinguishing barriers to the ICT integration into the teaching/learning
process, describes them in a more detailed and structured way:
 Lack of competencies;
 Limited accessibility
 Lack of support
 Lack of competencies
 Shortage of time
MS WINDOWS

Basic concept of an operating system

An operating system (OS) is the program that, after being initially loaded into the computer
by a boot program, manages all the other programs in a computer. The other programs are
called applications or application programs. The application programs make use of the
operating system by making requests for services through a defined application program
interface (API). In addition, users can interact directly with the operating system through a
user interface such as a command line or a graphical user interface (GUI).

An operating system, or "OS," is software that communicates with the hardware and allows
other programs to run. It is comprised of system software, or the fundamental files your
computer needs to boot up and function. Every desktop computer, tablet, and smartphone
includes an operating system that provides basic functionality for the device.

Functions of Operating System

An operating system performs these services for applications:

 In a multitasking operating system where multiple programs can be running at the same
time, the operating system determines which applications should run in what order and
how much time should be allowed for each application before giving another application
a turn.

 It manages the sharing of internal memory among multiple applications.

 It handles input and output to and from attached hardware devices, such as hard disks,
printers, and dial-up ports.

 It sends messages to each application or interactive user (or to a system operator) about
the status of operation and any errors that may have occurred.

 It can offload the management of what are called batch jobs (for example, printing) so
that the initiating application is freed from this work.

 On computers that can provide parallel processing, an operating system can manage how
to divide the program so that it runs on more than one processor at a time.
All major computer platforms (hardware and software) require and sometimes include an
operating system, and operating systems must be developed with different features to meet
the specific needs of various form factors.
1. Booting: Booting is a process of starting the computer operating system starts
the computer to work. It checks the computer and makes it ready to work.

2. Memory Management: It is also an important function of operating system.


The memory cannot be managed without operating system. Different
programs and data execute in memory at one time. if there is no operating
system, the programs may mix with each other. The system will not work
properly.
3. Loading and Execution: A program is loaded in the memory before it can be
executed. Operating system provides the facility to load programs in memory
easily and then execute it.
4. Data security: Data is an important part of computer system. The operating
system protects the data stored on the computer from illegal use, modification
or deletion.
5. Disk Management: Operating system manages the disk space. It manages the
stored files and folders in a proper way.
6. Process Management: CPU can perform one task at one time. if there are
many tasks, operating system decides which task should get the CPU.
7. Device Controlling: Operating system also controls all devices attached to
computer. The hardware devices are controlled with the help of small software
called device drivers.
8. Printing controlling: Operating system also controls printing function. It a
user issues two print commands at a time, it does not mix data of these files
and prints them separately.
9. Providing interface: It is used in order that user interface acts with a
computer mutually. User interface controls how you input data and instruction
and how information is displayed on screen.
Introduction of Windows
All major computer platforms (hardware and software) require and sometimes include an
operating system, and operating systems must be developed with different features to meet
the specific needs of various form factors.

Common desktop operating systems:

Windows is Microsoft’s flagship operating system, the de facto standard for home and
business computers. Introduced in 1985, the GUI-based OS has been released in many
versions since then. The user-friendly Windows 95 was largely responsible for the rapid
development of personal computing.
Windows operating systems have long dominated the market and continue to do so.
Microsoft Windows is a graphical user interface operating system. It is very easy to operate
the computer with windows operating system. In GUI based operating system, we can give
commands to the computer by clicking on icons, menus and buttons using a pointing device
like the mouse. It is not necessary to remember commands to perform any tasks in the
computer.
Basic Components of Windows
Desktop

The background area of the windows screen where icon, menu etc. appear is called desktop.
The desktop appears with different elements when we start the computer. The desktop
appears on the screen when we enter username and password in the computer.

Icon
The small picture buttons that represent commands, programs, files or folders are called
icons. My Computer, Recycle Bin, Internet Explorer etc are the desktop icons.

Desktop Icons
 My Computer: It is one of the icons seen on the desktop. One can see the drive, files
and folders inside it.
 Recycle Bin: It is a special folder of windows on the hard disk. Its icon appears on the
desktop. It contains files and folders that are deleted from the hard-disk.
 Network: Network has the list of computers which are interconnected with each
other. Through this, we can utilize the shared folders and devices.
 Shortcut: This is linked file of files and folders. We create shortcut files on the
desktop to operate files, folders, and programs in a short period of time.
 Task-bar: Taskbar is a desktop toolbar that let you perform tasks such as switching
between open windows and starting new applications.
MS WORD
Word Processor
A word processor is a computer program that provides special capabilities beyond that of
a text editor such as the WordPad program that comes as part of Microsoft's Windows
operating systems. The term originated to distinguish text building programs that were "easy
to use" from conventional text editors, and to suggest that the program was more than just an
"editor." An early user of this term was Wang, which made a popular workstation system
designed especially for secretaries and anyone else who created business letters and other
documents.

In general, word processors screen the user from structural or printer-formatting markup.
Without visible markup, it's possible to describe a word processor as having
a WYSIWYG (what you see is what you get) user interface.

The most popular word processor is Microsoft Word, which is often purchased as part of
Microsoft's Office suite.

Word processing describes the process of creating or editing a document using a word
processor, such as Microsoft Word, Google Docs, or OpenOffice Writer. For example, with a
word processor, a student could create a book report and then printit, save it to a disk, display
it on the screen, or send it over e-mail. Also, a person looking for a job could create a résumé
using a word processor, then e-mail or print and mail it to job recruiters.

Basic Components of MS Word


The components of document window in MS word are:-
• Menu bar
• Standard Tool bar
• Formatting Tool bar
• Ruler
• Insertion point
• End of file maker
• Selection bar
• Split handle
• Status bar
• Task pane
• Office Assistant

Menu Bar Contains File,Edit, View, Insert, Format, Tools, Table, Window and Help
menus
Standard Contains icons for shortcuts to menu commands.
Toolbar
Formatting Contains pop-up menus for style, font, and font size; icons for boldface, italic,
Tool Bar and underline; alignment icons; number and bullet list icons; indention icons,
the border icon, highlight, and font color icons.
Ruler Ruler on which you can set tabs, paragraph alignment, and other formats.
Insertion Blinking vertical bar that indicates where text you type will be inserted. Don’t
Point confuse the insertion point with the mouse I-beam. To move the insertion
point, just click the mouse where you want the point moved.
End-of-File Non-printing symbol that marks the end of the file. You cannot insert text
Marker after this mark.
Selection Bar Invisible narrow strip along the left edge of the window. Your mouse pointer
(Gutter) changes to a right-pointing arrow when it is in this area. It is used to select a
line, a paragraph, or the entire document.
Split Handle Double-click to split the window in two (to view different portions of the
same file). Double-click to return to one window
Status Bar Displays page number, section number, and total number of pages, pointer
position on page and time of day.
Task Pane Displays and groups commonly used features for convenience.
Office An animated character that can provide help and suggestions. There are
Assistant multiple characters to choose from, and it is possible to turn the Office
Assistant off.
Operation of MS Word
Moving the text using Drag and Drop:

You can also move the text in a word document by drag and drop.

Select all the text that you wish to move to some other location. Click on the selected text and
drag the pointer on the text to the destination location.

In this way, the text will be moved to the new location.

Quick Access Toolbar: Undo and Redo

On the topmost toolbar, there are two symbols of Undo and Redo.

Undo: When you work on the word document and you perform any function/command
mistakenly.
You can undo the recent actions by using the Undo command present on Quick Access
Toolbar.

You can also perform Undo operation using Ctrl+Z. Using the same command, you can
perform multiple undo operations.

Redo: This is the opposite of Undo. It will nullify the Undo operation. You can use Ctrl+Y
combination for Redo.
Sign in Option:

On the Top Right corner, you will get an option to Sign in. Here you can sign in to your
online mail account.

This will enable you to save your documents on cloud locations. Hence, these documents can
be accessed from anywhere by logging into your account.
Share:

This option is present along with the Sign in option. Share will help you to share your files
with others. This is also done through the cloud.

If you want to share your files, save it on cloud first and then you can share
MS POWERPOINT

Introduction to Presentation Graphics

Presentation Graphics (also called: Presentation Management) programs are used


to create and edit "slides." These slides may be displayed under the control of the
computer (using a variety of hardware and display device configurations
available), printed as handouts or overhead transparencies, or processed into 35mm
slides. Most often, these electronic slides are used as a visual aid for some type of
presentation to an audience.

Slides in a presentation (aka: slide show) may contain text, graphics, sound
clips, video clips, and special effects. When a slide show is displayed under
control of the computer, the presenter can determine when each slide is displayed.
Timings may be applied to slides (all of them or just some of them) resulting in a
self-running presentation.

Presentation Graphics programs have many applications:

 Sales presentations
 Board presentations
 Advertisements
 Reports
 Lectures
 Demonstrations
 etc.

There are many Presentation Graphics programs available. The program we will be
using is PowerPoint, which is one of the four main products included in Microsoft
Office.

Presentation graphics is any graphic used during a presentation


in place of data. A good example is a graphic of a chart, rather than
the actual data it represents.

Basic Components of MS Powerpoint


User Interface
The most visible element of PowerPoint is its user interface—the screens, dialog boxes,
buttons, panes, and other parts of the application window. The biggest part of the interface is
the pane for creating and editing slides. The toolbar, called the Ribbon, is another big chunk
of the application window. Unlike versions of PowerPoint older than 2003, the Ribbon's tabs
may change depending on the command you’re running. For example, if you insert an arrow
shape on a slide, the Ribbon will display a new tab: "Drawing Tools." This tab is filled with
previously unavailable commands for formatting the arrow.

Slides
The slide is the PowerPoint element on which you insert text, graphics, audio, video, and
animations. You can create new slides by pressing “Ctrl-M” or by clicking “New Slide” on
the Home tab. Delete slides by selecting them in PowerPoint‘s left pane and then pressing the
“Delete” key. Arrange slides by dragging them in the slide thumbnail pane. Change slide
dimensions by clicking the "Page Setup” button on the Design tab.

Content
PowerPoint's content types include static text and graphics, audio, video, and animation
created inside PowerPoint itself. Most of the commands for creating content are on the Insert
tab. For example, the Media Clips group has a "Movie" option for importing videos. Use the
Animation tab for creating new animations, such as entrance and exit effects on a slide's
graphics and text.

Formatting
Formatting commands are the PowerPoint element with which you decorate the content on
your slides. The Home tab, for example, has many of the same formatting commands as
Microsoft Word, including character-level tools such as "Bold," and paragraph-level tools
that include "Align Text Left." Another tab, "Design," has a group of commands called
Themes that let you apply font and color changes to all of the slides in your presentation at
once.

Presentation Playback
The final slide presentation will be the only PowerPoint element that your audience sees, if
you’ve saved the presentation with the extension PPSX. In that case, clicking the PPSX file
brings up the presentation directly, and not the PowerPoint interface you used to create the
presentation. But if you’ve saved the presentation with the PPTX extension, the PowerPoint
interface will appear—if PowerPoint is installed on the computer. Computers without the
main PowerPoint application can still run PowerPoint presentations by using Microsoft's free
PowerPoint viewer.
Navigation Pane
Located on the left side of the PowerPoint screen, the navigation pane gives you the option to
view your presentation in outline or slides mode. The outline tab, which can expand each
slide's thumbnail to show its wording, makes text editing very easy. On the other hand, the
slides tab comes in handy for navigating through and reorganizing your presentation. You can
sort, reorder, add or delete slides by simply cutting and pasting, or dragging and dropping the
slide thumbnails.

Slide Pane

The slide pane is the most prominent section of the PowerPoint screen, located center right.
This pane displays your slides one at a time. In the pane, you can create and modify content,
add media, set transitions, apply animations and design each of your slides individually.

Notes Pane
Directly beneath the slide pane is the notes pane, again in the center-right portion of the
screen. As its name suggests, this is where you can jot down notes to elaborate on or
substantiate the content of each slide. You could also key in a script, talking points or
reminders to guide presenters in the actual presentation.

Bottom Bar
In versions 2003 and earlier, the PowerPoint screen's bottom bar offers three small buttons to
the left that allow you to switch from normal to slide sorter to presentation view. The bar also
indicates the slide number of the slide you are currently viewing and which presentation
template you are using. In versions 2007 and later, PowerPoint's bottom bar provides the
same information, but scoots the small view buttons to the right, next to a new zoom control
slider.
Operation of MS Powerpoint

Choose a theme

When you open PowerPoint, you’ll see some built-in themes and templates. A theme is a
slide design that contains matching colors, fonts, and special effects like shadows, reflections,
and more.

1. On the File tab of the Ribbon, select New, and then choose a theme.

PowerPoint shows you a preview of the theme, with four color variations to choose from on
the right side.

2. Click Create, or pick a color variation and then click Create.

Read more: Use or create themes in PowerPoint

Insert a new slide

 On the Home tab, click the bottom half of New Slide, and pick a slide layout.

Read more: Add, rearrange, and delete slides.


Save your presentation

1. On the File tab, choose Save.


2. Pick or browse to a folder.
3. In the File name box, type a name for your presentation, and then choose Save.

Note: If you frequently save files to a certain folder, you can ‘pin’ the path so that it is always
available (as shown below).

Tip: Save your work as you go. Press Ctrl+S often.

Add text

Select a text placeholder, and begin typing.

Format your text

1. Select the text.


2. Under Drawing Tools, choose Format.
3. Do one of the following:
o To change the color of your text, choose Text Fill, and then choose a color.
o To change the outline color of your text, choose Text Outline, and then choose a color.
o To apply a shadow, reflection, glow, bevel, 3-D rotation, a transform, choose Text Effects,
and then choose the effect you want.

Add pictures

On the Insert tab, do one of the following:

 To insert a picture that is saved on your local drive or an internal server, choose Pictures,
browse for the picture, and then choose Insert.
 To insert a picture from the web, choose Online Pictures, and use the search box to find a
picture.

Choose a picture, and then click Insert.

Add speaker notes

Slides are best when you don’t cram in too much information. You can put helpful facts and
notes in the speaker notes, and refer to them as you present.

1. To open the notes pane, at the bottom of the window, click Notes .
2. Click inside the Notes pane below the slide, and begin typing your notes.

Give your presentation

On the Slide Show tab, do one of the following:

 To start the presentation at the first slide, in the Start Slide Show group, click From
Beginning.

 If you’re not at the first slide and want to start from where you are, click From Current
Slide.
 If you need to present to people who are not where you are, click Present Online to set up a
presentation on the web, and then choose one of the following options:
 Get out of Slide Show view

To get out of Slide Show view at any time, on the keyboard, press Esc.

Tips for creating an effective presentation

Consider the following tips to keep your audience interested.

 Minimize the number of slides

To maintain a clear message and to keep your audience attentive and interested, keep
the number of slides in your presentation to a minimum.

 Choose an audience-friendly font size

The audience must be able to read your slides from a distance. Generally speaking, a
font size smaller than 30 might be too difficult for the audience to see.

 Keep your slide text simple

You want your audience to listen to you present your information, instead of reading
the screen. Use bullets or short sentences, and try to keep each item to one line.

Some projectors crop slides at the edges, so that long sentences might be cropped.

 Use visuals to help express your message

Pictures, charts, graphs, and SmartArt graphics provide visual cues for your audience
to remember. Add meaningful art to complement the text and messaging on your
slides.

As with text, however, avoid including too many visual aids on your slide.

 Make labels for charts and graphs understandable

Use only enough text to make label elements in a chart or graph comprehensible.
 Apply subtle, consistent slide backgrounds

Choose an appealing, consistent template or theme that is not too eye-catching. You
don't want the background or design to detract from your message.

However, you also want to provide a contrast between the background color and text
color. The built-in themes in PowerPoint 2010 set the contrast between a light
background with dark colored text or dark background with light colored text.

Basics of a presentation
Beginning a New Presentation
You’ve got two basic choices when it comes to creating a new presentation:
 You can start from scratch, using a blank canvas. If you’re familiar with earlier
incarnations of the PowerPoint program, or if you’re interested in learning the ins and
outs of PowerPoint quickly, then you’ll probably want to choose this option. (As
daunting as “from scratch” sounds, you don’t have to do all the work
yourself; Section 1.2 shows you how to apply a canned look and feel—or theme—to
your new presentation.)
 You can create a new presentation based on an existing template, theme, or
presentation. A template is a generic presentation file designed for you to reuse.
Complete with themes (see the box), background images, and even generic content
(such as page numbers and placeholder text), templates let you jump-start your
presentation by giving you everything you need except your specific content. If you’re
creating a presentation for your local school board, for example, then you’ll need to
add the content that describes your findings, conclusions, and suggestions.
Templates are the better option when you need to crank out a presentation in a jiffy.
PowerPoint comes with a handful of professionally designed templates and themes, but you
can also create presentations based on a template, theme, or presentation that you’ve
previously created, or one that you’ve found online and downloaded onto your computer.
PowerPoint divides these two basic choices into six specific options that are based on
whether you want to piggyback your new presentation on an existing template, theme, or
presentation. When you fire up PowerPoint and select Office button → New, you see the
following six choices for creating a presentation, each of which is described in detail in the
following sections:
 Blank and recent. Lets you create either a blank presentation or a presentation based
on one of the themes or templates you recently applied to a PowerPoint presentation.
 Installed Templates. Lets you create a presentation based on one of the handful of
generic templates that comes with PowerPoint, such as Classic Photo Album or
Corporate Presentation.
 Installed Themes. Lets you create a presentation based on one of the canned look and
feel options that comes with PowerPoint, such as Apex, Metro, or Opulent.
 My templates. Lets you create a presentation based on a template that you created, or
that you downloaded from the Web.
 New from existing. Lets you load an old presentation into PowerPoint 2007, make
changes, and save the newly changed presentation using a new filename.
 Microsoft Office Online. Lets you hunt for professionally designed templates and
themes on Microsoft’s Web site.
MS Excel
Introduction to spreadsheets
A spreadsheet is a large sheet having data and information arranged in rows and
columns. As you know, Excel is one of the most widely used spreadsheet
applications. It is a part of Microsoft Office suite. Spreadsheet is quite useful in
entering, editing, analysing and storing data. Arithmetic operations with numerical
data such as addition, subtraction, multiplication and division can be done using
Excel. You can sort numbers/ characters according to some given criteria (like
ascending, descending etc.) and use simple financial, mathematical and statistical
formulas.
There are a number of features that are available in Excel to make your task easier.
Some of the main features are:
1. AutoSum - helps you to add the contents of a cluster of adjacent cells.
2. List AutoFill - automatically extends cell formatting when a new item is added to
the end of a list.
3. AutoFill - allows you to quickly fill cells with repetitive or sequential data such as
chronological dates or numbers, and repeated text. AutoFill can also be used to copy
functions. You can also alter text and numbers with this feature.
4. AutoShapes toolbar will allow you to draw a number of geometrical shapes,
arrows, flowchart elements, stars and more. With these shapes you can draw your own
graphs.
5. Wizard - guides you to work effectively while you work by displaying various
helpful tips and techniques based on what you are doing.
6. Drag and Drop - it will help you to reposition the data and text by simply dragging
the data with the help of mouse.
7. Charts - it will help you in presenting a graphical representation of your data in the
form of Pie, Bar, Line charts and more.
8. PivotTable - it flips and sums data in seconds and allows you to perform data
analysis and generating reports like periodic financial statements, statistical reports,
etc. You can also analyse complex data relationships graphically.
9. Shortcut Menus - the commands that are appropriate to the task that you are doing
will appear by clicking the right mouse button.
Worksheets
Excel allows you to create worksheets much like paper ledgers that can perform
automatic calculations. Each Excel file is a workbook that can hold many worksheets.
The worksheet is a grid of columns (designated by letters) and rows (designated by
numbers). The letters and numbers of the columns and rows (called labels) are
displayed in gray buttons across the top and left side of the worksheet. The
intersection of a column and a row is called a cell. Each cell on the spreadsheet has a
cell address that is the column letter and the row number. Cells can contain text,
numbers, or mathematical formulas.
The worksheets in a workbook are accessible by clicking the worksheet tabs just
above the status bar. By default, three worksheets are included in each workbook. One
can add more worksheet in a workbook also. To do that Insert a new worksheet To
quickly insert a new worksheet at the end of existing worksheets Click the Insert
Worksheet tab

Workbboks
A workbook is another word for your Excel file. When you start Excel, click Blank workbook
to create an Excel workbook from scratch.

 Open an Existing Workbook


To open a workbook you've created in the past, execute the following steps.

1. On the File tab, click Open.

2. Recent shows you a list of your recently used workbooks. You can quickly open a workbook
from here.

 Create a New Workbook

Sometimes you want to start all over again. To create a new workbook, execute the following
steps.

1. On the File tab, click New.

2. Click Blank workbook.


 Turn off the Start screen
When you start Excel, it shows a start screen that lists recently used Excel files and templates.
To skip the start screen and always start with a blank workbook, execute the following steps.

1. On the File tab, click Options.

2. Uncheck 'Show the Start screen when this application starts'.


INTERNET

It is a worldwide/global system of interconnected computer networks. It uses the standard


Internet Protocol (TCP/IP). Every computer in Internet is identified by a unique IP address.
IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer’s
location.

A special computer DNS (Domain Name Server) is used to provide a name to the IP Address
so that the user can locate a computer by a name. For example, a DNS server will resolve a
name https://www.tutorialspoint.comto a particular IP address to uniquely identify the
computer on which this website is hosted.

Internet is accessible to every user all over the world.

Intranet
Intranet is the system in which multiple PCs are connected to each other. PCs in intranet are
not available to the world outside the intranet. Usually each organization has its own Intranet
network and members/employees of that organization can access the computers in their
intranet.

Each computer in Intranet is also identified by an IP Address which is unique among the
computers in that Intranet.

 Similarities between Internet and Intranet


 Intranet uses the internet protocols such as TCP/IP and FTP.

 Intranet sites are accessible via the web browser in a similar way as websites in the
internet. However, only members of Intranet network can access intranet hosted sites.

 In Intranet, own instant messengers can be used as similar to yahoo messenger/gtalk


over the internet.

 Differences between Internet and Intranet


 Internet is general to PCs all over the world whereas Intranet is specific to few PCs.

 Internet provides a wider and better access to websites to a large population, whereas
Intranet is restricted.

 Internet is not as safe as Intranet. Intranet can be safely privatized as per the need.
World Wide Web (WWW)

The WWW is a collection of Internet sites that can be accessed by using a hypertext
interface. Hypertext documents on the web contain links to other documents located
anywhere on the web. By clicking on a link, you are immediately taken to another file or site
to access relevant materials. The interesting thing about Hypertext links is that the links
might take you to related material on another computer located anywhere in the world, rather
than just to a file on your local hard drive.

Basic WWW Concepts

1. BROWSER -- A WWW browser is software on your computer that allows you to


access the World Wide Web. Examples include Netscape Navigator and Microsoft
Internet Explorer. Please know that a browser can’t work its magic unless you are
somehow connected to the Internet. At home, that is normally accomplished by using
a modem that is attached to your computer and your phone line and allows you to
connect to, or dial-up, an Internet Service Provider (ISP). At work, it may be
accomplished by connecting your workplace’s local area network to the Internet by
using a router and a high speed data line.
2. HYPERTEXT AND HYPERMEDIA -- Hypertext is text that contains electronic
links to other text. In other words, if you click on hypertext it will take you to other
related material. In addition, most WWW documents contain more than just text.
They may include pictures, sounds, animations, and movies. Documents with links
that contain more than just text are called hypermedia.
3. HTML (HYPERTEXT MARKUP LANGUAGE) -- HTML is a set of commands
used to create world wide web documents. The commands allow the document creator
to define the parts of the document. For example, you may have text marked as
headings, paragraphs, bulleted text, footers, etc. There are also commands that let you
import images, sounds, animations, and movies as well as commands that let you
specify links to other documents. If you wanted to create your own web page, you
would need to know HTML or be able to use a tool that can generate HTML such as
Claris HomePage or Adobe PageMill.
4. URL (UNIFORM RESOURCE LOCATOR) -- Links between documents are
achieved by using an addressing scheme. That is, in order to link to another document
or item (sound, picture, movie), it must have an address. That address is called its
URL. The URL identifies the host computer name, directory path, and file name of
the item. It also identifies the protocol used to locate the item such as hypertext,
gopher, ftp, telnet or news. For example, the URL for the main page of the OPEN
(Oregon Public Education Network) website is http://www.open.k12.or.us
5. HTTP (HYPERTEXT TRANPORT PROTOCOL) -- HTTP is the protocol used to
transfer hypertext or hypermedia documents.
6. HOME PAGE -- A home page is usually the starting point for locating information at
a WWW site. Currently, the home page for Roseburg High School’s web site is
located at http://schools.rosenet.net/roseburg/rhs/
7. CLIENTS AND SERVERS -- If a computer has a web browser installed, it is known
as a client. A host computer that is capable of providing information to others is called
a server. A server requires special software in order to provide web documents to
others.

Working of Internet

The Internet has one very simple job: to move computerized information (known as data)
from one place to another. That's it! The machines that make up the Internet treat all the
information they handle in exactly the same way. In this respect, the Internet works a bit like
the postal service. Letters are simply passed from one place to another, no matter who they
are from or what messages they contain. The job of the mail service is to move letters from
place to place, not to worry about why people are writing letters in the first place; the same
applies to the Internet.

Just like the mail service, the Internet's simplicity means it can handle many different kinds
of information helping people to do many different jobs. It's not specialized to handle emails,
Web pages, chat messages, or anything else: all information is handled equally and passed on
in exactly the same way. Because the Internet is so simply designed, people can easily use it
to run new "applications"—new things that run on top of the basic computer network. That's
why, when two European inventors developed Skype, a way of making telephone calls over
the Net, they just had to write a program that could turn speech into Internet data and back
again. No-one had to rebuild the entire Internet to make Skype possible.

Services of Internet

Internet service providers (ISP - Internet Service Provider) companies or institutions (such as
T-Com, Iskon or CARNet in Croatia, AT&T in US and MTNL in India), which satellite or
optical connections with several major Internet node abroad (mainly in the direction of America
and Europe) and the thus ensuring high capacity connection to the rest of the Internet world.
However, practice has shown that it can barely follow the needs of the growing number of
members of Internet communities. When selecting an ISP of significance is the number of
services that it provides to its customers. All services provided by e-mail, but do not provide
any service to FTP, newsgroups, renting space on the disc, certain program support and etc.
CARNet allows for almost all university departments.

User from their computers at work or at home by joining the Internet can:

 Exchange electronic mail (e-mail) to any Internet user in any location on the planet.
 Participate in off-line (indirectly, not in real time) discussions via e-mail with people
with similar interests through 'mailing lists' and 'News Groups'.
 Participate live (in real time) in a conversation with another person via the 'Internet
video phone' (like Skype), or audio-video conferencing between multiple people using
a specially designed computer programs and equipment.
 Participate in on-line (directly, in real time) written discussion with a larger group of
people who use the 'Internet Relay Chat' (IRC) service - chat rooms.
 To work on a remote computer using the 'Telnet' service or some per function quite
the same.
 Take files of any type (download) from remote computers and deliver files (upload)
them with an FTP (File Transfer Protocol) service.
 Reading complex documents using 'hypertext'. Clicking on a keyword or image on the
screen the user is automatically goes to other facilities within the same or other
domains.
 Read multimedia documents found on WWW (World Wide Web) that contain text,
graphics, sound, and video using intelligent browser web presentation, as 'Google
Chrome', 'Firefox' or 'Internet Explorer' program support.
 Learning and practicing for the exam and achieve appropriate certification.
 Search the Web, documents, various WWW sites or via dedicated international
service, as 'Google' and 'Yahoo!', over subscribed keywords to find the desired
documents.
 Publicly disclose their images or pictures of his grandchildren, and who wants to can
publish a picture of mother in law.
 Advertise your business in a variety of ways, from setting up video clips to the
creation of their own website.
 Paying bills through the 'Internet Banking'.
 Buy and spend money :-), advertise and offer for sale.
 Read web editions of newspapers or say 'IT Alphabet'.
 Play simple games and ..... who knows what else.

Electronic Mail (E-mail)


 Service which is much earlier than the World Wide Web and has won hearts of the
users. The idea that in a few minutes you can deliver, text, image, audio or video
recording of any person on the planet was unfeasible until recently, but now, thanks
largely to the rapid expansion of the number of Internet users and the increasing speed
of communication, was to become reality of business and social communication.
Mainly used for the contents of up to 500 kB. Otherwise need to use the FTP service.
 It is customary that the electronic address contains two parts separated by ' @ '
(<ALT> + <64>). The first part is usually the user selected a name, but it could be
anything else, any term. The second part is the name of a specific electronic ISP or a
local name from the list of network nodes that belong to its domain (DNS) server. For
example, for CARNet applies:
 'name@domain.hr'
 It is an abbreviated form for which the server CARNet 'name' is the code of the person,
or the name of the application server - USER_NAME or USE_ID, behind which lies in
content table with registered users in the system supporting server, real name and
surname of the ID belongs. The actual e-mail address along with the user information
and the name and location of the computer is:
 'Name.Surname@domain.hr' or
 'Name.Surname@computer.domain.hr'
 T-Com Provider (ISP) for the city of Split in Croatia applies:
 'Name.Surname@st.t-com.hr'
 So something extended address, where is 'T-Com' core domain and 'st' sub-domain,
which indicates to the user is from the city of 'Split'. How are server systems are mainly
based on a Unix-like operating systems, and almost all the members of the wide world
of computer networks, the use of local graphemes in computer name and domain name
is not recommended. Indeed, local graphemes are not recommended even when
defining user_name, name and surname, nor in the messages to be sent as well as to
and content of the message, because it is doubtful that some 'handle' interpret a server
in America or Africa. So instead ČŽŠ.. should be used CZS.., basic ASCII characters.
Local directories can contain local institution graphemes in the names because they
have international significance, but not advisable.
 The cost of sending electronic letters to any multimedia attachment to any Internet user,
regardless of the distance is less secure than sending greetings for the New Year
traditional postal services, particularly if it is sent through the mailing-list. Difficulties
may arise if only the system administrator on the receiving side of the transmit or
introduce restrictive measures in respect of defense against unwanted attachment types
in an electronic letter for security needs.
 In the business world, this type of communication is more prevalent. No more waiting
on the phone or fax machine to free selection signal or a sign of nervousness on the
calendar. This is irritating especially if the destination is no one to receive the message.
Such a user sends a message to his partner, an electronic mailbox that this will sooner
or later read and return the response.
FTP (File Transfer Protocol)
 Before the World Wide Web and FTP was the only way to transfer large files between
computers of Internet users. Allows access to a computer on the Internet (if it's public
or available to the password), preview content on its hard disk, finding the necessary
files and copy on its own disk. This Internet service is not as simple as the World
Wide Web, but it is very useful.
 Using program support for FTP will set about establishing communication address is
similar as in the previous examples:
 'ftp://ftp.domain.hr' or
 'ftp://computer.domain.hr' or
 'ftp://×××.×××.×××.×××'
 File transfer function is increasingly taking the WWW, so that with a confirmation copy
selected files as needed and the auxiliary program with WWW browser (GetRight or
similar) which will take over the task of FTP transmission and after stop using the
browser.
IRC (Internet Relay Chat)
 This service allows the Internet to one or more of Internet users who are hooked to the
same channel at the same time see the text that you type on your computer, and the
texts of other active users typing on his computer. Channels to 'talk' to exist for almost
all areas of interest. This system is much faster than e-mail because it is conducted
almost simultaneously send and read messages, but it is much more expensive than e-
mail, because it requires a long term connection with the Internet, but only for those
who pay for this service out of his own pocket.

 Telnet
Internet service that allows the user logs on and runs on a remote computer and use
programs installed on the remote computer. Of course, the remote computer must be
enabled in the user access rights to the computer. For security reasons this service on
many servers is not allowed. It is better to say that the Telnet 'Terminal Emulation',
software which to communicate with a computer connected via a TCP / IP stack.
Thus, the emulator work former unit called 'Terminal' (from the mainframe era). This
same role today better performed by programs that use SSH (Secure Shell)
connections over TCP / IP as the carrier of connection, but all traffic is encrypted.
Although this mechanism provides plenty of security in the work with the server,
system administrators are reluctant to make this service available to all users.
 Voice / Video Communication - Skype
Internet networking service that allows users to voice / video communication. This
implies that the devices that use this service have built-in camera and microphone.
Although this service is usually used for that purpose, in addition to communicate
written messages, internet calls, sharing information and much more. Can be used as a
common telephone communications. This service is based on the free program
support allows free calls to anyone who has installed a 'Skype' program support on his
computer, anywhere in the world. Thanks to the high speed internet communication
has increasingly better quality. Can be achieved over a fixed PTT communication
lines or cell phones or send text messages at very reasonable prices, without any
special setup or subscriptions.
 It should be emphasized that this is no communication between user devices (phones),
but between two user accounts registered on 'Skype' service which includes registration,
enter the user_name and password protected some basic personal information. The user
can later modify the information in their profiles as needed. 'Skype' has just developed
that allows retrieval of user account and select the desired action and can be installed
on a PC with Windows, Mac or Linux operating system, several kinds of mobile
phones, and what is best to communicate between multiple users in a commercial
version it's the conference using the 'Skype Manager' program support to be purchased.
Provides for the use of TV sets in communication. So, a kind of free video phone, which
offers even extra specific services. With this program support the new generation
of smartphones and tablets, using the resources of the existing SOHO infrastructure,
'calling' becomes really cheap. This service should not be confused with VoIP (Voice
over Internet Protocol) technology that allows the transmission of voice
communications over Internet networks for the purpose of protocol design, that 'Skype'
is used in the sense of some kind of Peer-to-Peer (P2P) communication.
 Something similar is service 'Viber' that allows free calls, SMS and MMS share content
with anyone, anywhere, but there is no ability to transfer video as 'Skype'. Similar to
the above mentioned is service 'WhatsApp', multiple platform mobile application to
send messages in real time.

 Social networks
Social networks are a newer phenomenon and do not belong in a separate category
because they contain almost all of the previously mentioned services, unified to work
in an easy, friendly way. Not only does it allow communication among users but also
represent a form of socializing. There are already quite developed FORUMS, bulletin
boards web version, which uses a technology exchange text via the web site, or web
sites. It is a debate on a topic initiated by a member of the forum. As a rule, seek
enrollment, mostly for free, using the application type USER_NAME / PASSWORD,
typically associated with a user's address in the e-mail regarding the identification. To
service the forum is not abused in any way and to respect the rules of acceptable
behavior take care administrators - moderators appointed by the forum owner of the
forum members themselves who usually takes this obligation voluntarily reported.
These individuals may be excluded from membership and delete and delete malicious
content, basically supervise. Depending on the number of members, topic, traffic, and
the owner of the forum depends with how the server program to use the forums.
 Purpose of writing by arbitrarily selected topics has a BLOG (contraction of the term
'web log'), a type of website that is usually maintained by an individual, is organized
much like a personal diary with respect to input regarding the content of the description
of an event or topic, with the possibility of enriching the content and graphics video.
As a kind of diary of events, entered contests are usually displayed in reverse
chronological order. Usually allows readers can add here your comments on the topic
that is currently being processed..
 One of the most popular is FACEBOOK, a social network where users can set up their
image, disclose your personal information, describe their interests, publish their written
and photographic pieces, develop some thematic discussions, etc. with the possibility
that any of the members receive in 'his 'group or a member of it off. A sort of meeting
place, so it is possible even to initiate effective political, protest, humanitarian or some
other action. Has a similar purpose, and TWITTER, social networks and mikrobloging
service, which uses instant messaging, SMS or web content. There are also 'LinkedIn',
'Myspace', 'Tumblr', 'Instagram' and the other, each with its own characteristics. What
made them especially adorned with a tremendously rapid dissemination of information,
and misinformation. Thus, the negative effects are possible.
 Very specific Internet service YOUTUBE. Used to exchange video content where
users can upload, view and evaluate video, up to 'Full HD' resolution, respecting
copyrights. It is forbidden to support pornography, violence, crime, embarrassment
and defamation, and advertising. For your own protection YouTube reserves the right
to use, modify and delete content posted. In summary, one can find all sorts of things,
from useful to useless content, but also very funny and naughty and critical to
everyday events. Whether it is a film and music videos covering YouTube to be a free
medium for promoting a filmmaker, musician or politician and there have been cases
where people have gained popularity in this way, and then accepted by traditional
media such as newspapers, radio and television.
 Essentially all of these are web applications that typically require enrollment to confirm
the response to the e-mail messages to prospective members. Registration is usually
type USER_NAME / PASSWORD or E-MAIL / PASSWORD, and the user alone
chooses who will be his personal data are visible in your profile settings. But for one
such network services server is usually insufficient. Caring for their functioning in
particular computers-servers; datacenter. The forerunner of the above was certainly
B.B.S. era of modem communications.

 Search Engines
Already these social networks to enable retrieval of content that is stored and
monitored, but a special group of interconnected computer servers in a
DATACENTER and interconnected datacenters in a unique system. The basic idea is
that all registered facilities are located on one or more servers can be found in some
sort of elaborate directory by interest groups (sports, music, movies ...). For this
purpose, the contents should be reported to the owner who approves the inclusion of
datacenter facilities and reported its index. Advanced way of this is that all of the
reported content indexes and their keywords are ranked according to their relevance.
Through a simple form to enter the desired search term on the basis of which offers all
of the titles that describe the content of the list according to the achieved ranking. So,
basically it is a huge database that is constantly updated.
 Almost every state has its own internal search engine, but the most interesting are those
international type as YAHOO!, GOOGLE and BING. Are listed in the order they
occurred, although they appear to their versions that preceded them, today its
possibilities are not even close. Course and apply them to the desired content complying
with the prescribed rules. Basically all are oriented to search HTML text or the images,
though some of their skills are recognized and other formats of documents and index
them. Currently qualified as a browser web content considered GOOGLE. In addition
to enabling the global search and local search free within declared site. Algorithm
correspondence of new titles, indexing and ranking their content daily in construction,
a mechanism for storing data and their storage is not reduced more on copying disks
themselves but to each other constantly copying content themselves datacenter which
has quite a few in the world, about forty. Seen from the perspective described something
of very great importance should be kept by them.

Searching information on the Internet


Most information is found on the Internet by utilizing search engines. A search engine is a
web service that uses web robots to query millions of pages on the Internet and creates
an index of those web pages. Internet users can then use these services to find information on
the Internet. When searching for information on the Internet, keep the below things in mind.
Surround searches in quotes

If you are searching for multiple common words, such as computer and help, it is a good
idea to place quotes around the full search to get better results. For example, type "computer
help" as your search criteria. This trick can also be used in parts of your search query. For
example, Microsoft "computer help" would search for anything containing 'Microsoft' and
that also has "computer help" together. Finally, you can also do multiple words surrounded in
quotes. For example, "Microsoft Windows" and "computer help" would refine your results
even more.
Exchanging Information on Internet
Information exchange or information sharing are informal terms that can either refer to
bidirectional information transfer in telecommunications and computer
science or communication seen from a system-theoretic or information-theoretic point of
view. As "information" in this context invariably refers to (electronic) data that encodes and
represents[1]the information at hand, a broader treatment can be found under data exchange.
The term information sharing has a long history in information technology. Traditional
information sharing referred to one-to-one exchanges of data between a sender and receiver.
These information exchanges are implemented via dozens of open and
proprietary protocols, message and file formats. Electronic data interchange (EDI) is a
successful implementation of commercial data exchanges that began in the late 1970s and
remains in use today.
Initiatives to standardize information sharing protocols include extensible markup language
(XML), simple object access protocol (SOAP), and web services description language
(WSDL).
SMART CLASSROOM
A smart learning environment not only enables learners to access digital resources and
interact with learning systems in any place and at any time, but also actively provides the
necessary learning guidance, hints, supportive tools learning suggestions to them in the right
place, at the right time and in the right form. A smart learning environment not only enables
learners to access digital resources and interact with learning systems in any place and
at any time, but also actively provides the necessary learning guidance, hints, supportive tools
learning suggestions to them in the right place, at the right time and in the right form.

Smart Classrooms are technology enhanced classrooms that foster opportunities for teaching
and learning by integrating learning technology, such as computers, specialized software,
audience response technology, assistive listening devices, networking, and audio/visual
capabilities. Classroom Services leads the support, design, and planning for campus learning
spaces.

Concept

 It is a comprehensive strategy for digital education.

 Electronically enhanced lecture classrooms

 it is student-centric

 also called digital or new media classrooms

 uses interactive teaching and learning

 Different types of visual equipment.

Operation

 Install educational equipment (e-Podium, projector .....)


 Learning Space Design & furniture
 Classroom Media Types
 Renovations
 Classroom Software
 Classroom Software Training
 Technical support & maintenance 24/7

Once the projector is operating and the desired source is powered on (PC, VCR/DVD, Doc
Cam), press and release the desired input button; the switch will occur within a few seconds.
If projector does not respond, wait 5 seconds and reselect input.

Organization

 Classroom should be sharp and well maintained

 must reflect your high standards.

 must reflect your vision of a well behaved of hardworking classroom.

 use your materials, supplies, and guides to support your teaching.


Importance in Teaching
 Access to online resources
 Digital medium of notes
 Advantageous for absentees
 Makes learning easy and enjoyable
 Improves the academic performance
 Communication
 Health friendly
Computer virus
A Computer Virus is a malicious software program “Malware” that can infect a computer by
modifying or deleting data files, boot sector of a hard disk drive or causes a software program
to work in an unexpected manner”.
A computer virus resides on a host computer and can replicate itself when executed. Virus can
steal user data, delete or modify files & documents, records keystrokes & web sessions of a
user. It can also steal or damage hard disk space, it can slowdown CPU processing.
Definition of Computer Virus
“A computer virus is a program that may disturb the normal working of a computer
system”. Virus attaches itself to files stored on floppy disks, USBs, email attachments and hard
disks. A file containing a virus is called infected file. If this file is copied to a computer, virus
is also copied to the computer.
Activation of Virus
When the computer virus starts working, it is called the activation of virus. A virus normally
runs all the time in the computer. Different viruses are activated in different ways. Many viruses
are activated on a certain data. For example, a popular virus“Friday, the 13th” is activated only
if the date is 13 and the day is Friday.
According to Wikipedia “Computer viruses cause billions of dollars’ worth of economic
damage each year, due to causing systems failure, wasting computer resources, corrupting
data, increasing maintenance costs, etc”.
Damages caused by virus
Computer virus cannot damage computer hardware. IT may cause many damages to a computer
system. A virus can:
1. A computer virus can damage data or software on the computer.
2. It can delete some or all files on the computer system.
3. It can destroy all the data by formatting hard drive.
4. It may display a political or false message very few times.
Causes of Computer Virus
The following are the main causes of a Computer Virus.
Infected Flash Drives or Disks
Flash drives and disks are the main cause of spreading viruses. Flash drives and disks are used
to transfer data from one computer to other. A virus can also be copied from one computer to
other when the user copies infected files using flash drives and disks.
Email Attachments
Most of the viruses spread through emails. Email attachment is a file that is sent along with an
email. An email may contain an infected file attachment. Virus can spread if the users opens
and downloads an email attachment. It may harm the computer when it is activated. It may
destroy files on the hard disk or may send the virus automatically to all email addresses saved
in the address book.
 Infected / Pornography websites
Thousands of insecure websites can infect computer with viruses. Most of the websites with
pornographic materials are infected, so by visiting these websites the user’s computer also gets
infected by virus. These websites are developed to spread viruses or other unethical material.
The virus is transferred to the user’s computer when this material is downloaded. These
websites may access the computer automatically when the users visit them.
 Networks
Virus can spread if an infected computer is connected to a network. The internet is an example
of such network. When a user downloads a file infected with virus from the internet, the virus
is copied to the computer. It may infect the files stored on the computer.
 Pirated Software
An illegal copy of software is called pirated software. Virus can spread if user installs pirated
software that contains a virus. A variety of pirated software is available in CDs and from the
internet. Some companies intentionally add virus in the software. The virus is automatically
activated if the user uses the software without purchasing license.

Types of Computer Virus


The following are some well-known viruses:
 CodeRed
It is a worm that infects a computer running Microsoft IIS server. This virus launched DOS
attack on White House’s website. It allows the hacker to access the infected computer remotely.
 Nimba
It is a worm that spreads itself using different methods. IT damages computer in different ways.
It modified files, alters security settings and degrades performance.
 SirCam
It is distributed as an email attachment. It may delete files, degrade performance and send the
files to anyone.
 Melisa
It is a virus that is distributed as an email attachment. IT disables different safeguards in MS
Word. It sends itself to 50 people if Microsoft Outlook is installed..
 Ripper
It corrupts data from the hard disk.
 MDMA
It is transferred from one MS Word file to other if both files are in memory.
 Concept
It is also transferred as an email attachment. It saves the file in template directory instead of its
original location.
 One_Half
It encrypts hard disk so only the virus may read the data. It displays One_Half on the screen
when the encryption is half completed.

Protection from Computer Virus


Virus infects computer system if latest and updated version of an Antivirus program is not
installed. Latest Antivirus software should be installed on Computer to protect it from viruses.
A computer system can be protected from virus by following these precautions.
 The latest and updated version of Anti-Virus and firewall should be installed on the
computer.
 The Anti-Virus software must be upgraded regularly.
 USB drives should be scanned for viruses, and should not be used on infected
computers.
 Junk or unknown emails should not be opened and must be deleted straightaway.
 Unauthorized or pirated software should not be installed on the computer.
 An important way of protection against virus is the use of back up of data. The backup
is used if the virus deletes data or modifies it. So back-up your data on regular basis.
There are some great softwares that can back up your data automatically.
 Freeware and shareware software from the internet normally contain viruses. It is
important to check the software before using them.
 Your best protection is your common sense. Never click on suspicious links, never
download songs, videos or files from suspicious websites. Never share your personal
data with people you don’t know over the internet.

Das könnte Ihnen auch gefallen