Beruflich Dokumente
Kultur Dokumente
BACHELOR OF BUSINESS
ADMINISTRATION
(BBA)
Practical File
Introduction to IT Lab
(BBA 113)
NAME: HarshitMongia
ROLL NO: 417
BBA Section:1(D)
Batch 2016-2019
Index
1
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
2
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
3
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
4
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
5
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
6
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
Q1:
7 Create a Document containing text that should be
properly aligned with proper format. Use the “Replace All”
option in Find and Replace to replace each instance of some
word. Save and protect your document
FIND :- of
Then … I wore a shirt and my
Brother's trousers, cut my hair short and ignored.
My womanliness. Dress in saris, be girl
be wife, they said. Be embroiderer, be cook,
Be a quarreller with servants. Fit in. Oh,
Belong, cried the categorizers. Don't sit
on walls or peep in through our lace-draped windows.
Be Amy, or be Kamala. Or, better
still, be Madhavikutty. It is time to
choose a name, a role. Don't play pretending games.
Don't play at schizophrenia or be a
Nympho. Don't cry embarrassingly loud when
jilted in love … I met a man, loved him. Call
Him not by any name; he is every man
who wants. a woman, just as I am every
Woman who seeks love. In him . . . the hungry haste
To rivers, in me . . . the oceans' tireless
Waiting. Who are you, I ask each and everyone,
The answer is, it is I. Anywhere and,
Everywhere, I see the one who calls himself I
In this world, he is tightly packed like the
Sword in its sheath. It is I who drink lonely
Drinks at twelve, midnight, in hotels to strange towns,
It is I who laugh, it is I who make love
And then, feel shame, it is I who lie dying
With a rattle in my throat. I am sinner,
I am saint. I am the beloved and the
Betrayed. I have no joys that are not yours, no
Aches which are not yours. I too call myself
7
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
8
Replace :- to
Then … I wore a shirt and my
Brother's trousers, cut my hair short and ignored.
My womanliness. Dress in saris, be girl
be wife, they said. Be embroiderer, be cook,
Be a quarreller with servants. Fit in. Oh,
Belong, cried the categorizers. Don't sit
on walls or peep in through our lace-draped windows.
Be Amy, or be Kamala. Or, better
still, be Madhavikutty. It is time to
choose a name, a role. Don't play pretending games.
Don't play at schizophrenia or be a
Nympho. Don't cry embarrassingly loud when
jilted in love … I met a man, loved him. Call
Him not by any name; he is every man
who wants. a woman, just as I am every
Woman who seeks love. In him . . . the hungry haste
To rivers, in me . . . the oceans' tireless
Waiting. Who are you, I ask each and everyone,
The answer is, it is I. Anywhere and,
Everywhere, I see the one who calls himself I
In this world, he is tightly packed like the
Sword in its sheath. It is I who drink lonely
Drinks at twelve, midnight, in hotels to strange towns,
It is I who laugh, it is I who make love
And then, feel shame, it is I who lie dying
With a rattle in my throat. I am sinner,
I am saint. I am the beloved and the
Betrayed. I have no joys that are not yours, no
Aches which are not yours. I too call myself I.
8
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
Computers are assembled from several key components that make the computer functional, called hardware. While most
computer users are primarily familiar with the monitor, keyboard, mouse, and other peripherals, the most important physical
parts of a computer exist inside the case.
1. CPU
The central processing unit processes all of the data that is accessed by the machine. In PCs the CPU, or microprocessor, is a
small silicon chip located beneath the fan. Essentially, the purpose of a CPU is to process instructions through a four-part
sequence of fetching, decoding, and execution and write back. Since the mid-2000s, most computers are sold with multi-core
CPUs, which integrate two or more processors into one unit. In 2007, Intel built an 80-core processor that can handle a
trillion operations per second.
2. RAM
Random access memory, also known as main memory, provides a buffer between the hard drive and central processing unit.
When files are requested for processing, they get transferred from the hard drive to the memory. The CPU then processes the
file and replaces it in the memory. The RAM provides a temporary storage that gets erased when power is removed from the
machine. It is important to save modified files to the hard drive so that they get saved if power is lost.
3. HARD DRIVE
A hard drive provides permanent storage for the operating system, programs and files on a machine. When files are saved to
the hard drive, they are retained through power outages. Traditional hard drives are composed of magnetic platters that spin
when in use. Solid state drives, which contain no moving parts, are another option. Computers made after 2009 are usually
equipped with either SATA drives, which replaced the older IDE, or parallel ATA, drive technology, or solid state drives.
SATA drives use slimmer cables, smaller power connections, do not get as hot and can transfer data faster than the older
drives.
4. MOTHERBOARD
The motherboard is an underlying circuit board that holds all the computer components together. Computer components,
including the CPU, RAM, power supply and hard drive, plug into the motherboard. This allows the separate components to
9
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
interact with each other to create a fully functional machine. While each computer part has a unique function, they would be
10
useless without the unifying motherboard.
The power supply unit converts AC power from your wall outlet to DC power, usable by the computer internals, and controls
power saving. The original PSUs could only be turned on or off, but ATX-compliant ones, first developed in 1995, support
standby mode and powering peripherals while the PC is not on.
SORTED: -
10
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
STYLE 1:
11
STYLE 2:
STYLE 3:
11
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
12
STYLE 4:
STYLE 5:
12
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
13
ADVANTAGES OF A COMPUTER:
13
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
DISADVANTAGES OF COMPUTERS
1. Unhealthy
14
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
2. Less Privacy
When using the Internet on your computer, you run the risk of leaking your private
information. This is especially so if you happen to download malicious software
into your computer. Trojans and Malware can infiltrate your system and give
identity thieves access to your personal information. Of particular interest to
identity thieves are your bank and credit card details. Make sure to install reliable
antivirus software to keep malware and Trojans at bay. You should also avoid
clicking on suspicious looking links when using the Internet
3. Environment Affected
15
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
16
VIPS STUDENTS’ UNION
presents
FRESHERS’ PARTY
Date: 8th November | 3:30 p.m.
Venue: Lord of the Drinks, CP
THEME : Carnival
PROCESSING UNIT
16
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
17
STORAGE UNIT
CONTROL UNIT
SEPTEMBER 2016
Monday Tuesday Wednesday Thursday Friday Saturday Sunday
1 2 3 4 5 6
Bhai Dooj
17
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
7 8 9 10 11 12 13
18
14 15 16 17 18 19 20
Guru Nanak
21 22 23 24 25 26 27
28 29 30
NAME M1 M2 M3 M4 M5 M6
1 Jay 74 20 46 76 84 C
2 Bipin 82 35 38 86 34 E
3 Vikas 87 89 92 56 67 A
4 Vishnu 45 90 87 97 29 B
5 Bhanu 71 67 45 25 78 D
TOTAL 359 0 0 0 0
18
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
TOTAL 0 0 0 0 0
3 JAY 74 89 92 56 67 A
4 Bipin 82 90 87 97 29 B
1 Vakil\ 87 20 46 76 84 C
5 Vishnu 45 67 45 25 78 D
2 Binu 71 35 38 86 34 E
S.NO NAME M1 M2 M3 M4 M5 M6
19
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
20
Q8 Count the number of characters (with & without space),
word, pages, paragraph, and lines using word count facility of
M.S. Word.
20
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
Figure 1. The Document used in the grammar check was the document created in Question No. 1
21
VIPS/BBA/COMPUTER FUNDAMENTALS/1D
22
22