Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ BASIC CONCEPTS OF INFORMATION TECHNOLOGY What is a Computer? Comp Comput uter er is an elect electro roni nic c devi device ce that that takes takes some some Inpu Input, t, Proc Proces ess s it and and disp displa lay y Output. Input: Any Work/Command Work/Command given to computer computer is called input. Processing: Action of computer computer on given commands commands is called Processing. Processing. Output: Result of computer according to given input is called output. INTRODUCTION TO INFORMATION TECHNOLOGY: What is Information Information Technology (IT)? IT is the the use use of mode modern rn tech techno nolo logy gy to aid aid in Stor Storag age, e, Proce Processi ssing ng,, Anal Analys ysis is and and Communication of information. Information can be of different forms. a) Data: Data: Presents the information as string of characters (Letters and Numbers) is called data. An item of data may be a Name, a Price, and a Quantity (etc). An item of data has not much use. It makes sense when it is combined with other information. Examples: Nasir, 2500, Karachi (etc). b) Text: Presents the information in form of Phrases and Sentences called text. It has some meanings. Examples: The age of Nasir is 65. c) Image: Image: Pres Presen ents ts the the info inform rmat atio ion n in pict pictor oria iall form form.. This This incl includ udes es Char Charts ts,, Graphs, Pictures and Drawings. Information in this form is more meaningful than data. d) Voice: Presents the information in Spoken Phrases and Sentences is called Voice. It is more meaningful than data. Often we use two or more forms of information to convey a message. COMPUTER HARDWARE AND SOFTWARE: Computer Hardware: All parts of a computer which we can See and Touch are called Hardware. OR Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 1- Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ All Physical parts of a computer are called computer hardware. Examples: Mouse, CD, Cables, Monitor, Keyboard (etc) Computer Software: “Computer programs are called software”. A computer program is a set of instructions to solve a particular problem. Firmware is the intermediate form between hardware and software, which consists of software embedded in electronic chips. Examples: Ms-Paint, Ms-Excel, Win 98, UNIX (etc) TYPES OF SOFTWARE: Software is of two types. 1) System Software or Operating Operating System: Collection of operative programs whose purpose is to make the use of computer more effective. Without system software it’s impossible to operate computer. It deals with computer hardware. Examples: Win 98, Win Xp, Ms-DOS, Linux, UNIX (etc) 2) Application Application Software or Computer Computer Programs: Programs: Fulfill the needs of a user. Such as Typing a Letter, Playing Games, Preparing Payroll. Applica Applicatio tion n softwa software re is normall normally y supplie supplied d as a packag package, e, consist consisting ing of the the following Software supplied on Floppy Disk or CD Manual, Manual, explain explain how to use software? software? Training material on CD or in a booklet. Examples: Ms-Paint, Ms-Excel, Internet Explorer (etc) INPUT AND OUTPUT DEVICES: DEVICES: The process of getting information into and out of computers is called Input/Output or just I/O. Devices used for Input/Output are called I/O devices. INPUT DEVICES: These are used to feed information information into computer. computer. Keyboard: It is the most common input device. It has many keys on it so that’s why it is called keyboard. It is just like a typewriter. A standard keyboard has following special keys. Function Keys: These are from F1 to F12. These have special functions in each program. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 2- Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ CTRL and ALT Keys: CTRL (Control) ALT (Alternate) These are always used with other keys to issue commands. BACKSPACE BACKSPACE Keys: Deletes the immediate left character of the cursor. Four Arrow Keys: Used for changing direction. PageUp and PageDown Keys: Move the cursor one page up or down. Home Key: Move the cursor to the left of the screen or beginning of the d ocument. End Key: Move the cursor to the right of the screen or end of the document. Esc Key: Esc (Escape) Use to exit from your currently selected option. Numeric Keys: These keys are from 0 to 9. Alphabetic Keys: These are A to Z or a to z. Mouse: It is a pointing device. By using mouse we can perform required task in a quick time. It has a rubber ball in its base and two or three buttons on it. It is normally used for Picking some option Pointing some option Drawing Microphone: Microphones Microphones are used to record speech. speech. It makes communication communication (Voice chatting and Phone calls) very easy. Microphones are also used in speech recognition (Voice Recognition) programs. In speech speech recognition recognition programs programs user can dictate to the computer instead of typing. Video Cameras: Used to capture images of any type. After that video camera will be attach with computer and store Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 3- Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ images in computer. Scanners: Also used to capture images but only from paper. Accuracy is much better than video camera. Scanne ners rs are are widel idely y used used to get get Draw Drawin ings gs,, Diag Diagra rams ms and and Phot Photog ogra raph phs s into into Scan computer computer systems for required required task . OUTPUT DEVICES: These devices are used to return back data. Monitor: It is the most common output device. Shape of monitor is just like a T.V set. Function of monitor is to display output on its screen. Any picture is made up of small dots called Pixels. Two technologies used in monitor are Cathode Ray Tube (CRT) Liquid Crystal Display (LCD) or Flat Screens Cathode Cathode Ray Tube (CRT): Most computer monitors are based on CRT. A beam of electrons emitted by electron gun makes an image on screen. In case of color monitor there are three electron guns one for each color that are RED, GREEN and BLUE (RGB). In mono monoch chrrome ome mon monitor itors s disp displa lays ys text text as eith either er green reen on blac black k back backgr grou ound nd or white hite on blac black k back backgr grou ound nd.. The The fore foregr grou ound nd and and background background colors can be reversed by software. software. Flat Screens or Liquid Crystal Display (LCD): Liquid Liquid crystal crystal displays displays (LCD) are flat screen. screen. Flat screen monitors having no electron gun. Image will made up with the help of liquid. This technology technology is very expensive. PRINTERS: Printers are used to produce hard copy of output. Printers can print text and graphics. Printers are available in both color and black & white. The port of printer is called LPT1. Main difference in printers depends on Quality of output Ability Ability to print graphics Printing speed Character Printers: Print one character at a time. It has slow speed. It can print 30 to 300 characters per second (cps). It has low cost. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 4- Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ It makes a lot of noise while printing. Two types are Dot Matrix Printer Daisy Wheel Printer Printer Dot Matrix Printers: It has normally 9 or 24 pins in the form of a matrix. Pins hits the printer ribbon so that our required character will be print on paper. Daisy Wheel Printers: Printers: Print head of this printer is a circular wheel about 3-inches in diameter with arms. Character shapes are made at the outer end of arms. To print a character daisy wheel rotates so that required cha racter is positioned in front of printer ribbon. Now arm will hot by a hammer and strikes the ribbon leaving an impression on paper. Print quality is better than dot matrix. Line Printers: Print one complete line at a time. Speed Speed is faster than character character printers. printers. Can print 200 lines per minute (LPM). Types are Chain Printers Drum Printers Chain Printers: They use a rapidly moving chain. Characters are linked with chain. Required characters will be placed in front of paper then strike of hammer make impression on paper. Drum Printers: Characters are engraved along the drum. Drum rotates and required characters will be print on paper by strike of hammer. Character Character and line printers are also called called impact impact printers. printers. Non-impact Printers: These are high speed and expensive printers. Types are Laser Printers Inkjet Printers Laser Printers: Print one page at a time. Can print 8 pages per minute. Print quality is good. Laser light, Roller and Toner (ink) are responsibl responsible e for printing. Inkjet Printers: Print one page at a time. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 5- Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Printing is possible due to spray of ink. PLOTTERS: Just like printers but used to print large images such as Maps, Graphs, Charts. Two types are Flatbed Plotters Drum Plotters Flatbed Plotter: Paper will fix over the flatbed table. Pen-holding technology is used for printing. Very slow method of printing. Drum Plotters: Paper will place on drum, which rotates the paperback and front. Pen-holding technology is used for printing. MEMORY: It is used to store large amount of data. Magnetic Magnetic Tape and Magnetic Magnetic Disk are very popular devices for storage. storage. Memory can be temporary or permanent. MEMORY TERMINOLOGIES: Memory Cell: It is an electrical circuit used to store a single bit (0 or 1). Memory Word: Group of bits that represents represents information information or data. Word size ranges from 4 to 64 bits. Byte: Combination of 8 bits is called Byte. Memory Capacity: Way of specifying, how many bits can be stored in memory. Explanation: Supp Suppose ose that that we have have memo memory ry size size whic which h can can store store 4096 4096-2 -20 0 bits bits word words. s. This This represents total capacity of 81,920 bits. This can be written as 4096x20. Here, 4096= Number of words 20= Word Size Units of Memory: Unit of memory is byte. The larger units are Kilo Byte (KB), Mega Byte (MB), Giga Byte (GB) and Tera Byte (TB). 1 Byte 1 Kilo Bytes 1 Mega Bytes 1 Giga Bytes = = = = 8 bits 1024 Bytes 1024 Kilo Bytes 1024 Mega Bytes Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 6- Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ 1 Tera Bytes = 1024 Giga Bytes Address: A location of words in memory is called address. Each word has unique unique address. Memory addresses are specified in binary numbers. Read Operation: Read operation is used to fetch data from memory. Write Operation: Write operation is used to store data in memory. Access Time: It is the amount of time required to perform Read operation. Cycle Time: It is the amount of time required to perform Rea d or Write operation and then return to its original state ready for next operation. Random Access Memory (RAM): Data will read randomly. Access time is same for any address. It is a temporary memory. REVIEWED Byuser Azmat By at Afridi 1:01 13/01/2010 pm, 1/13/10 Sequential Access Memory: Access time is not constant. Access time is longer than random access time. If we want to read 5 th record then we must read first 4 records. Example is Magnetic Tape. Read/Write Memory (RWM): Memory that can be read from or written into. Read-Only Memory (ROM): It is a permanent memory. Data can read only. Instructions are written at the time of creation/manufacturing. Static Memory Devices: Stored data will remain permanent as long as power is supplied. Dynamic Memory Devices: Stored data will not remain permanent even with power applied. INFORMATION SYSTEM DEVELOPMENT (ISD): Information systems are design for those people who have very little knowledge of information technology. The five phases of information system development are System Analysis System Design Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 7- Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ System Development System Implementation System Maintenance System Analysis: Three task of this phase are Defining the problem Analyze current system Selecting the best solution System Design: Analysis Analysis will convert into Charts and making User Manuals. Manuals. System Development: Writing computer programs. Testing and debugging programs. System Implementation: Install developed system on computers. Training of operators and users. System Maintenance: After implementation if any error occurs then the n it will remove in this phase. EXERCISE i Microp Microproc rocesso essors rs ii Firmw Firmwar are e iii Applic Applicatio ation n iv Optical Character Character Reader Reader v Dot Dot Matr Matrix ix vi Plot Plotter ter vii Memory Memory Cell Cell viii Memory Memory Address Address APPLICATION AND USE OF COMPUTERS APPLICATION APPLICATION AND USE OF COMPUTER: COMPUTER: Computer plays very important role in our lives. A computer is faster and more accurate than people. It can solve many problems of human life. Major areas of application applications s are Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 8- Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Education: Computer is very useful tool in the field of education. Use of computer has become spread from primary to university level. A large variety of tutorial programs are available for students. Students can get online Certifications/Diplomas. Word Processing: software’s are used for preparing preparing documents documents and reports. Word processing software’s These packages provide facilities to user Store Edit Format Spell Check Print (etc.) Retail: Computer Computer technology technology has good impact on retail retail stores. stor es. Many shops have replaced cash register with computer system. Modern Modern retail stores use Bar Code Reader. Reader. Bar Code Code Read Reader er read reads s the the bar bar code code prin printe ted d on each each prod produc uctt whic which h A Bar contains price and brief description of product. E-Commerce: Online Business is called E-Commerce. It provide facilities for sale of Goods Services Services such as Banking, Banking, Ticket Reservation Reservation,, Stock Exchange Exchange (etc.) Electronic Banking: Electronic Electronic banking has many benefits such as Deposits Withdrawals Bank Statement ATMs (Automated Teller Machine) are used world wide to get cash instantly. Computer in Medical Field: Computers are used in modern hospitals to perform a variety of task, such as To keep up-to-date Records of Patients Monitoring Instruments Body scanners are used to diagnose patient for diseases Weather Forecasting: Modern weather weather forecast is produced produced by using computer system. Modern Computer used to collect data about Air Pressure Pressure Humidity Temperature Wind Speed Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 9- Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Cloud Cover Computer Graphics: Computer graphics plays very important role in Printing products Scientific Research Advertisement Entertainment (etc.) Powerfu Powerfull graphi graphics cs packag packages es are availa available ble to draw, draw, shade shade and manipu manipulat late e images. Computer Integrated Manufacturing: Computers ers are widely widely used in manufa manufactu cturin ring g firms firms to p erform erform design design and Comput production of products. This technology is called CAD (Computer Aided Design). CAM (Computer Aided Manufacturing). PARTS OF COMPUTER SYSTEM Computer itself ----the hardware----has many parts, but the critical components falls into four major categories. 1. 2. 3. 4. Proces Processor sor Memo Me mory ry Input or Output Output Devices Devices Storag Storage e unit unit Processor It works just like a human brain. Transform raw data into useful information. Orga Organi nize zes s and and carr carrie ies s out out instr instruc ucti tion on that that come come from from eith either er the the user user or the the software. Processing speed depends upon the size of Processor. In Perso ersona nall Compu omputters, ers, the the Proc Proces esso sorr usua usuall lly y cons consis ists ts of one one or mor more Microprocessor (some times called “chips”). Memory Computer need’s a space to for launching a program or holding a data, that kind of space is known as computer memory. Memory can be temporary or permanent. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 10 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Two types are: 1. RAM (Rand (Random om Access Access Memory Memory)) 2. ROM (Rea (Read d Only Memory Memory)) RAM (Random (Random Access Access Memory) Memory) Also known as Primary memory. Is a volatile memory. It’s a Temporary Temporary storage device. Data will read randomly. Access time is same for any address. All the data or instructions were deleted when the power is switched off. Hold instructions or data. Enhance the performance of computer. Two types are o Static RAM (SRAM) (SRAM) o Dynamic RAM (DRAM) Dynamic RAM (DRAM): Small in size. Less cost than SRAM. Constantly refreshed and recharged by CP U (Processor). Normally used in Personal Computers. Two types are SIMM (Single Inline Memory Module) DIMM (Double Inline Memory Module) Static RAM (SRAM): Costly than DRAM. Faster than DRAM. Physically larger than DRAM. REVIEWED By at Afridi 1:02 pm, 1/13/10 Byuser Azmat 13/01/2010 ROM (Read Only Memory) It is a permanent memory. Data can read only. It is a non – volatile memory. Holds data or instruction’s permanently. Data first-time recorded by the manufacturer. User can’t change it directly. All the data or instructions were not deleted when the power is switched off. Three types are o PROM (Programmable Read Only Memory) o EPROM (Erasable Programmable Read Only Memory) o EEPROM (Electrical Erasable Programmable Read Only Memory) Input / Output Devices The input/out input/out put devices are INPUT Devices Accept data / instruction from the user. Examples: Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 11 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Keyb Keyboa oard rd,, Mous Mouse, e, Scan Scanne ner, r, Joys Joysti tick ck,, Touc Touch h pads pads,, Micr Microp opho hone nes, s, cameras, etc. Digi Digita tall OUTPUT OUTPUT Devices Shows results. Presents Presents processed processed data to user. Examples: Monitors, Printers, Speakers, Projector, etc Storage Saving records or information about any topic is known as data storage. Examples: Hard Disk, Floppy Disk, CD Rom, Magnetic Tap Types of Input Devices 1. 2. 3. 4. 5. 6. 7. 8. 9. Keyboard Keyboa rd Mous Mouse e Scan Scanne nerr Joystic Joystick k Ligh Lightt Pen Pen Touch Touch Screen Screen Optica Opticall Inpu Inputt Audio Audio Input Input Video Video Input Input Keyboard It is the most common input device. It has many keys on it so that’s why it is called keyboard. It is just like a typewriter. A standard keyboard has following special keys. Alphabetic (a…..z) or (A…..Z) Numeric Digits (0……….….9) Functions Keys (F1……...F12) Symbols (+, - , *, @, #, $,) Special Keys (Enter Backspace, Spacebar, Tab, Escape, Print Screen, and Pause/Break…..) Mouse Also known as pointing device By using mouse we can perform required task in a quick time. It has a rubber ball in its base and two or three buttons on it. It is normally used for o Picking some option o Pointing some option o Drawing Scanner Just like a photocopier Used to capture images but only from paper. Accuracy is much better than video camera. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 12 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Scan Scanne ners rs are are widel idely y used used to get get Draw Drawin ings gs,, Diag Diagra rams ms and and Phot Photog ogra raph phs s into into computer computer systems for required required task . Two main types are: 1- Handy Scanner Used in past, Only scan small image, Black & White, Low cost Result is not good. 2- Flat Bed Scanner Used in these days, Colored Expansive than Handy, Good results, Scan full page image. Joystick Kind of Input device Used to play only games Work like a mouse or keyboard. Light Pen Used to write notes or short messages messa ges Directly used on screen or on special pad. Also used as pointing device, like a mouse Not used to enter large amount of text. Also use to input signature or messages on graphic images such as a fax. Touch Screen Device that allowing the user to place a fingertip directly on the computer screen to make a selection selection Commonly used at Fast-food restaurants Departmental stores Drug store Supermarkets etc Optical Input Device that can read Numbers, Letters, Special Characters, and Marks Different Types are: (Optical mark recognition) Mark Sensing, Bank cheque, OMR etc OCR (Optical (Optical character character reader) Light Source sales tags, credit card slips BCR (Bar code reader) scanned and read, Known as Zebra strip or UPC Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 13 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Audio Input Microphones Microphones are used to record speech. speech. It makes communication communication (Voice chatting and Phone calls) very easy. Microphones are also used in speech recognition (Voice Recognition) programs. In speech speech recognition recognition programs programs user can dictate to the computer instead of typing. Translating voice to text using special software Video Input The common video inputs are: Video camera Used for videoconferencing Attached with PC Digital camera Work much like as video camera Portable Cost depends on type Types of Output Devices 1. 2. 3. 4. Moni Monito torr Sound Sound Syste System m PC Projec Projector tor (Data Show) Show) Prin Printe terr Monitor It is the most common output device. Shape of monitor is just like a T.V set. Function of monitor is to display output on its screen. Any picture is made up of small dots called Pixels. Two technologies used in monitor are Cathode Ray Tube (CRT) Liquid Crystal Display (LCD) or Flat Screens CRT Monitor Most computer monitors are based on CRT. Relatively low in cost. Uses a large vacuum tube, called CRT (cathode ray tube). There are three electron guns one for each color that are RED, GREEN and BLUE (RGB). A beam of electrons emitted by electron gun makes an image on screen. Monitor’s screen coated with phosphors chemical that glow when they are struck by the electron beam. Phosphors dots known as Pixels. LCD (Liquid Crystal Display) Also called Flat Screen monitors. Liquid crystal displays (LCD) are flat screen. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 14 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Better picture quality than CRT monitor. Flat screen monitors having no electron electron gun. Image will made up with the help of liquid. This technology is very expensive. Comparing Monitor Size 14-inch, 15-inch, 17-inch, etc Refresh Rate Number of times the electron gun scan every pixel is called Refresh Rate. Measured in cycles per seconds (cps) Resolution 640(H) X 480(V), 600 X 800, 1024 X 768, 1152 X 864, 1280 X 1024 Dot pitch Distance between phosphor dots is known Dot pitch. PC Projector Projects Projects a video output onto an external external surface. surface. Typically Typically weight less than 10 pounds. pounds. Can display 16 millions millions colors. colors. Support up to 1024 X 768 resolution. Used to display still images, animated pictures or full video Sound System Speakers (common Output device) Sound is defined as air pressure. Magnet produces the air pressure. Sound card translate digital sound into electric current that is sent to the speakers. Printers Printers are used to produce hard copy of output. Printers can print text and graphics. Printers are available in both color and black & white. The port of printer is called LPT1. Main difference in printers depends on Quality of output Ability Ability to print graphics Printing speed Printer Printer are classified into two groups 1. Impact Impact Printer Printer 2. Non-Impact Non-Impact Printer Printer Impact Printer Prints the paper with the strikes of hammer, Pins or a ribbon Works like the typewriter typewriter Example are: o Dot Matrix Printer, Electric Typewriter, Line Printer, Band Printer Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 15 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Dot Matrix Printer Printer Print one character at a time. Typical matrix is 5x7 (5 wide, 7 high) Uses color or black magnetic ribbon to print data. Can print 200 to more than 1000 character/minute Less expensive Can also print charts, pictures, or different symbols Non-Impact Printer Uses laser or inkjet technology. High in speed Best in quality High in cost Example are: o Laser Printer o inkjet Printer REVIEWED By user at 1:02 pm, 1/13/10 Inkjet Printer Is a non-impact printer It creates output on paper by a spray of ink Electric field control the spraying jet Produce one character at a time Quality is higher than dot matrix Can print 1 page to 8 pages per minu te Color inkjet printers are also available Laser Printer Is a non-impact printer, also called page printer LASER stands for Light Amplification by Stimulated Emission of Radiation Can print one page at a time Buffer holds the data and print Can print 5 to 300 pages per minute Very high in cost or quality Storage Devices Two major types are 1. Magnet Magnetic ic Stor Storage age 2. Optica Opticall Stor Storage age Magnetic Storage Three major types of magnetic storage are 1. Disket Diskettes tes 2. Ha Hard rd disk disk 3. Magnet Magnetic ic Tap Diskettes Magnetic disk is a thin, circular Mylar or metal plate coated with magnetic material. The preparation of a disk for data storage is known as formatting. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 16 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Formatting divides the disk in to different tracks and sectors. Operating systems label each sector of each track with an address. All the data is stored in sectors. Group of sectors are called cluster. In one sector 512 bytes (0.5 KB) are stored. Main Advantage Data can accessed accessed directly or randomly randomly A large amount of data can be stored Fastest data accessing speed. Different Types are inch Floppy Disk inch Floppy Disk ZIP Disk Hard Disk 5.25 Floppy Disk Also called Mini Floppy Disk Introduce by IBM in early 1960s Very flexible plastic jacket Damage due to dust, hard pressing or o r hot/cold environment 3.5 Floppy Disk Also called micro floppy disk Little hard plastic jacket Uses single magnetic disk Uses read/write window called metal shutter Uses write protection button Disk drive rotates disk 300 to 400 revolution per minute Storage capacity is 1.44mb Not reliable Damage due to misusage Zip Disk Also called magnetic disk Looks like a micro floppy, but works like a hard disk Uses its own special drive Very hard outer jacket Uses a single metal disk Can store about 100mb to 1000mb of data Use to move move data data from from one one plac place e to anoth nother er,, norm normal ally ly used used by the the professional For Example: advertisements ageneses Hard Disk Also called fixed disk First hard disk had the capacity of 10mb. Consist of more then one metal disk All disks are fixed permanently in the drive Data accessing speed is much faster as compare to other floppy disks Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 17 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Hard drive is sealed, so less chances of disk damage occur due to dust or mishandling. All application or system software are stored in the hard disk Magnetic Tap Magnetic is the oldest device, like a music cassettes tap. Made of plastic (Mylar) coated with magnetic material The amount of data is measured in cpi (character per inch) or bpi (bytes per inch) Tape contain tracks on which data is stored Special unit (Tap Drive) is used to read/write on tape. Unit manufacturer are Sony, TDK, Maxell. Speed of some unit is up to 200 inch per second. Usually ½ inch or ¼ inch wide tapes are available. Data stored in the form of magnetic spots. Reading or writing data on tap is very slow. Data stored in the shape of records. Blanks spaces are given after every record Capacity of magnetic tap is depend on the length of the magnetic tap. Different sizes are 200, 600, 1200, 2400 feet Use to store data as backup Data can’t be access randomly Optical Optical Disk Also called Compact Disk (CD) Uses laser technology to store data Laser stand for Light Amplification through Stimulated Emission of Light. Storage range is up to 700 MB. Laser make tiny holes on the surface of disk These holes represent represent digital digital or binary data Presence of hole represent 1 and its absence represents 0 Data store on Compact Disk is save as compare to Magnetic Disk Data does not damage due magnetic disturbance First CD ROM Drive read data at 150kb/Sec or known as single speed drive. Normally once writeable Normally used to store, Application software, System software, Office files as backup Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 18 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ COMPUTER ARCHITECTURE BLOCK DIAGRAM OF A COMPUTER: Computer contains five basic units 1) Memory Memory Unit Unit 2) Arithmetic Arithmetic Logic Logic Unit Unit (ALU) (ALU) 3) Input Unit 4) Output Output Unit Unit 5) Contro Controll Unit Unit (CU) (CU) CENTRAL PROCESSING UNIT (CPU): CPU is the brain of a computer. Transform raw data into useful information. CPU is responsible responsible for all Processing. It has two parts Arithmetic Logic Unit (ALU) Control Unit (CU) Arithmetic Arithmetic Logic Unit (ALU) ( ALU):: It is the part where actual processing takes place. It can perform Addition, Subtraction, Multiplication, Division, Square Roots (etc) and logic operations such as AND, OR (etc) on binary numbers. Control Control Unit (CU): It tells the computer that, “What specific sequence of operations it must perform”. It also specifies specifies timing of the instructions. instructions. Its function is to Fetch, Decode and Execute instructions that are stored in memory. It controls Memory Devices Arithmetic Logic Unit All Input/Output Devices Main Memory: Also called Primary memory or Internal Internal memory. Memory is used to store data temporary or permanently. Data stored in memory can be used for required task. RAM and ROM are most commonly used as main memory . RAM (Random Access Memory): Data can Read/Write randomly. RAM is used for storage of active programs and data. It is a temporary memory. It is also called Volatile memory (it will lose all stored data if power is turned off). It increases the processing speed of a computer. RAM is available in different sizes. Also known as Primary Primary memory. memory. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 19 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ ROM (Read Only Memory): It is a permanent memory. Data can only Read. It is also called Non-Volatile memory (it will not lose stored data if power is turned off). Instructions are stored on it during manufacturing. Types are PROM (Programmable Read Only Memory) EPROM (Erasable Programmable Read Only Memory) Input Unit: Input unit is used to communicate with computer. Input unit is used to feed Instructions/Commands in computer. These devices are often called as “Peripheral “Peripherals”, s”, because they are separated physically from CPU. Input data Reads data from user, Converts it to machine code (0 or 1) and then Store it into main memory. Some common input devices are Mouse Keyboard Joystick Microphone Scanner (etc). Output Unit: These are also peripheral devices that transfer data from main memory to user. Output unit receives data from main memory in binary form and converts it into user readable form. Some common output devices are Monitors Printers Plotters Speaker Fax Machine (etc). Buses: Buses are wires, which used to carry data from one location to other inside the processor. Three main buses are Data Bus Address Bus Control Bus Data Bus: It is 8-bit bus. It is Bi-Direction Bi-Directional al bus. Data sent from Processor to Memory (Write operation) or from Memory to Processor” (Read operation). Address Bus: Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 20 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ It is 16-bit bus. It is Uni-Directio Uni-Directional nal bus. It carries 16-bit address code from “Processor to Memory”, which is accessing for a Read or Write operation. Control Control Bus: It is grouping of timing and control signals of processor. Some control lines are output from Processor and some are input to the processor. Ports: Ports are combination combination of wires wires through through which data travels. Two types of ports are Parallel Port Serial Port Parallel Port: Connection of 8 or more wires through which data bits can flow at once. It can handle large amount of data. Serial Port: Data bits can flow one at a time. It can handle less data than Parallel port. Registers: High-speed memory inside the CPU. Very small in size. Temporary storage for memory Addresses and Instructions during the execution of the program. Read and execute the instructions. Processing speed depends upon the size of register. Some common registers are Instruction Register (IR) Stack Register (SR) Memory Address Register (MAR) Program Counter (PC) Memory Buffer Register (MBR) Instruction Register (IR): Holds an instructio instruction n that is being executed. executed. Stack Register (SR): It is a part of CPU, in which data is store and retrieved. Memory Address Register (MAR): Holds the address of the active memory location. Program Counter (PC): Holds the memory address of the instruction that is next to be executed. Memory Buffer Register (MBR): Holds data on its way to and from memory. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 21 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ SYSTEM SOFTWARE: Three types of system software are Operating Systems Operating Environment Utilities Operating Systems: Main tasks of operating system are Disk Operations (Storing Programs and data on disk). Network Operations (Sharing of Hardware and Software Resources). Multi-tasking (Many tasks can be handle at same time). Multi-user (Many people can use computer at same time). Operating Environment: Enable user to communicate with computer. Two common types are Command-Line Interfaces Graphical User Interfaces (GUI) Command Line Interfaces: Commands are used to perform a task. Can perform only single task at a time. C:\> (Prompt) Every command must be written written after Prompt. Not Not very very comm common on used used toda today y beca becaus use e it is very very diff diffic icul ultt to reme rememb mber er commands. Example: MS-DOS Graphical User Interface (GUI): Most Common used now a day. Apple Computers introduced first GUI in 1984. Advantages are User Friendly Multi-tasking Easy to learn and handle No need to Remember Commands A GUI have Desktop Icons Taskbar and Start Button Menus Dialog Boxes Program Running in Windows Example: MS-Windows, Linux (Red Hat) Utilities: Carrying out operating system tasks in a more efficient and easier way. Examples are Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 22 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Windows Explorer All Control Panel programs (Data and Time, Add/Remove Programs, installing new Hardware, Display, Sound etc.) EXERCISE ix Control Control Unit Unit x RAM xi ROM xii Periph Periphera erals ls xiii Commun Communica icate te REVIEWED xiv Progra Program m Counte Counterr ByByuser at Afridi 1:03 pm, 1/13/10 Azmat 13/01/2010 xv Instruct Instruction ion Code Code TOPICS: Types of Software RAM and ROM Types of Network Types of Software There are two types of software. 1) SYSTEM SOFTWARE SOFTWARE OR OPERATING OPERATING SYSTEM: Collection of operative programs whose purpose is to make the use of computer more effective. Without system software it’s impossible to operate computer. It deals with computer hardware. Full fills the need of hardware. Enables to start computer. Provides CPU managements. Provides memory managements. Provides storage managements. Provides data, files, networking, or input / output devices management. Two common types are Command-Line Interfaces (CLI) Graphical User Interfaces (GUI) Examples: Win 98, Win Xp, Ms-DOS, Linux, UNIX (etc) Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 23 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ 2) APPLICATION SOFTWARE OR COMPUTER PROGRAMS: Fulfill the needs of a user. This Software is specially designed according to user’s requirement. Such as Typing a Letter, Playing Games, Preparing Payroll. Applica Applicatio tion n softwa software re is normall normally y supplie supplied d as a packag package, e, consist consisting ing of the the following Software supplied on Floppy Disk or CD Manual, Manual, explain explain how to use software? software? Training material on CD or in a booklet. Examples: Ms-Paint, Ms-Excel, Internet Explorer (etc) RAM and ROM RAM: It stands for Random Access Memory. Data can Read/Write randomly. RAM is used for storage of active programs and data. It is a temporary memory. It is also called Volatile memory (it will lose all stored data if power is turned off). It increases the processing speed of a computer. Also known as Primary Primary memory. memory. Hold instructions or data. RAM is available in different sizes. 32 MB, 64 MB, 128 MB, 256 MB (etc) Two types are i. Stati Static c RAM RAM ii. Dynamic Dynamic RAM ROM: It Stands for Read Only Memory. Holds data or instructions permanently so it is also called permanent memory. Data can only Read. It is also called Non-Volatile memory (it will not lose stored data if power is turned off). User can’t change it directly. Instructions are stored on it during manufacturing. Types are PROM (Programmable Read Only Memory) EPROM (Erasable Programmable Read Only Memory) Examples: BIOS (Basic Input/Output System) Types of Network LAN: It stands for Local Area Network. LAN LAN norm normal ally ly oper operat ates es withi within n a comp compac actt area area such such as an Of Offic fice e Buil Buildi ding ng or a Campus. LAN is capable of interconnecting a large number of computers and other devices within 1 Km. Speed of Data Transmission is 10/100 mbps. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 24 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Cost is low. Success Rate of Data Transmission is almost 100%. Examples: Computer Computer Labs of Institutions Institutions,, Computer Computer Network in an Office, etc. WAN: It stands for Wide Area Network. WAN WAN inte interc rco onnec nnects ts diff differ eren entt Site Sites, s, User ser Ter Termina minals ls,, and enabl nable e LANs LANs to Communicate with each other. Used to Communicate to Nationwide or Worldwide. Transmission medium used are Telephone Lines, microwave and Satellite links. Speed of Data Transmission is 1800 to 9600 bits per second. High Cost as Compare to LANs. Success Rate of Data Transmission is less than LAN. Examples: Internet, Network of all Branches of a Bank. CLIENT/SERVER NETWORK or DEDICATED SERVER NETWORK: Used both in LANs and WANs. Clients Clients (nodes) (nodes) are attached to a Server Server via some medium medium (Cable, (Cable, Telephone Lines, Satellite Link, Microwave, etc.) Usually Used for Database Server. Common features are Receiving Data Storing Data Sending E-mail Printer Sharing Security PEER-TO-PEER NETWORK: Usually used in LANs. Sometimes Called a Workgroup. No Central Computer (Server). All Computers having equal Functionality. A Single computer will be Server when it will serve to other computer and a Client when it will request for some data to other computer. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 25 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ INTRODUCTION TO MICROSOFT WINDOWS 2000 Operating System: Collection of operative programs whose purpose is to make the use of computer more effective. It controls all activities (Hardware and Software) of computer. Without system software it’s impossible to operate computer. It deals with computer hardware. Enables to start computer. Prov Provid ides es CPU, CPU, memo memory ry,, stor storag age, e, data data,, netw networ orki king ng,, and and inpu inputt / outp output ut devices management. Examples: Window Windows s 98, Window Windows s Xp, Windows Windows NT, UNIX, UNIX, Windows Windows 2000, 2000, Window Windows s Vista, Linux, Servers (etc) Operating System or System Software has two types. Graphical User Interface (GUI) or Windows Command Line Interface (CLI) or DOS Introduction to Windows 2000: o Windows is the product of Microsoft (Ms). o Windows is the interface between Hardware and Application software. o Windows 2000 is also called NT 5.0. o Microsoft officially launches it in 2000. o Having Having both both Server Server (Windo (Windows ws 2000 2000 Server Server)) and Client Client (Windo (Windows ws 2000 2000 Professional) side operating systems. o Normally used in network environment. o Very powerful and popular than previous operating systems. o Like Windows 98 it has Internet Explorer 4.0 into the operating system. o Main feature are Impressive platform of Internet Data Encryption tools Management of Applications Management of Active Directory Services (ADS) Very powerful powerful Security Security can be implemented implemented on Users Groups Hard Drives Networks Some advanced features are Setup Virtual Private Networks (VPNs) Supports up to 2 processors (Dual Processor) Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 26 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Supports NTFS (New Technology File System) partition Windows 2000 is very useful for Network Server RIS (Remote Installation Services) DHCP Server(Dynamic Host Configuration Protocol) DNS Server (Domain Name Source) Proxy Server Hardware Requirement for Windows 2000 Professional Installation: Processor 133 MHz or Higher RAM 64 MB Minimum-4 GB Maximum Hard Disk 2 GB having free space of 650 MB Desktop: After booting the very first screen, you will see is called desktop. By using desktop we can use every Program / Software installed in computer. Icons or Shortcuts Wallpaper or Background Start Menu or Program Menu Taskbar Clock Task Bar: It is the long gray bar at the bottom of computer screen. On its left side the “ Start Button” is used to access various programs in the computer. It also contains “Quick Launch” and “Clock”. Currently running program’s name will display in the form of a button in the taskbar. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 27 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Start Button: It provides an entry point to begin using programs installed on the computer’s hard drive. Wallpaper: It is a graphic file that forms the background of the desktop. Screen Saver: If computer is idle for long time it may lose monitor’s resolution. To prevent monitors resolution we use screen saver. Icons or Shortcuts of Desktop: pr ogram and files. Icons are placed on the desktop to provide easy access to program Icons provide a quick way to start a program. Following are the default Icons of Windows 2000 o My Computer o My Documents o Recycle Bin o My Network Places My Computer: It represents the different secondary storage devices of your computer. Like Hard Disk Drive, Floppy Drive, CD-ROM and other I/O devices. My Documents: It is the default location of saved files. Recycle Bin: When we will Delete Some File, it goes into Recycle Bin. We can Restore Files from Recycle Bin. After After Deletion Deletion of Files from Recycle Bin, we can’t restore restore these Files. My Network Places or Network Neighborhood: If your computer in on network, It displays the accessible hardware and software resources on the network. Control Panel: Control Panel is the “Engine Room” of Windows 2000. It allo allows ws acce access ss to most most of the the prog program rams s that that cont contro roll how Wind Window ows s 2000 2000 functions. Following are the short list of options that can change via Control Panel Screen Colors and Resolutions Screen Saver Network Connections Date and Time Memory allocation and System Performance Accessibility Options System Administration (Administrative Tools) User Accounts management Regional and Language options Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 28 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Printer, Modem, Sound, Mouse, Keyboard, Internet setting Name of some Built-In User Accounts of Windows 2000: Administrators Backup Operators Guests Power Users Replicator Users Folder: Folder is a collection of Files. Color of Folder’s icon is Yellow, but we can change its icon. Two Folders can’t contain same name at same location. Folder names should be meaningful. User can’t write in Folder. File: User will write some data in Files. File is a single thing. File’s icon is same as the program icon in which it will made. Two Files of same program can’t contain same name at same location. Files names should be meaningful. File Extensions: Extension is used after Filename to identify the file. Some common extensions extensions are o .Doc o .Xls o .Bmp o .Gif o .Ppt .Ppt (etc) (etc) Dialog Box: It is Special types of windows use to communicate with software you are running. Dialog boxes cannot be resized. (e.g.) Save, Open, Print, Find (etc) Window Control Buttons: _ Minimize and Restore Button Restore Button Close Button HTML: Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 29 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ HTML stands for “Hyper Text Markup Language”. It is used to construct web pages. Normally Notepad is used as HTML editor. Each command will be written in Tags. Extension of file is .html or just .htm. (e.g.) (e.g.) First.h First.htm tm DHTML: DHTML stands for “Dynamic Hyper Text Markup Language”. It is enhanced form of HTML. It is also used for web page development. HOMEPAGE: First page of a web site is called homepage. Web HOST or Web Server: It is the computer on Internet, which contains web site. It fulfills the needs of clients when it request for some resources. HTTP: It stands for “Hyper Text Transfer Protocol”. It is a Protocol that makes possible to view web sites. (e.g.) (e.g.) http://www.msn http://www.msn.com .com PASSWORD: It is a secret code used to protect system. Password Password can apply on Files Folders Database Computer Web Sites (etc.) MULTITASKING: Working on more than one Program at a time is called multitasking. (e.g.) working on Excel, Listening Music, Doing Chatting Synchronous Transmission: Data transmission is in the form of blocks between two devices. Sender and Receiver clocks are synchronized. Asynchronous Transmission: Data transmission is in the form of characters between two devices. Receiver use start and stop signal for data transmission. ASCII: It stands for “American Standard Code for Information Interchange”. It is a 7-digit code in Binary form. Used to represent Alphabets, Symbols and Numbers. (e.g.) (e.g.) 64 = 100000 1000000 0 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 30 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Data Protection VIRUSES AND ANTI-VIRUS ISSUES: Computer Virus: Virus is a small hidden program on a floppy disk or a hard disk. Virus can spread from computer to computer through infected floppy disk or over a computer network. Virus can damages Computer Programs Files Hardware How Virus Spread? Spread? Virus spread through different ways If you get E-mail with a file attached to it (.Exe or .Com) that contains a virus and you download that file and run it, your computer will be infected. If you download a file that contains a virus then your computer will be infected. Viruses are also spread by networks and by infected floppy disks. If you you boot boot a comp comput uter er with with infe infecte cted d flopp floppy y (boo (boott viru virus), s), your your comp compute uterr will will be infected. How to protect your computer from virus? Take following steps Never download an attached file on an E-mail from a stranger. Don’t set automaticall automatically y run attached files. Never run executable file before updating anti-virus program. If your computer is on a network, make sure you have security features. Make sure you have got a good anti-virus program. Don’t use floppy disk before checking through anti-virus programs. Keep your E-mail software updated. Anti-Virus Software: It is the software, which uses to check computer for virus. Most common are Mcafee Norton Anti-virus Dr. Solomon’s Anti-virus Thunderbyte Trend Micro DATA PROTECTION AND PRIVACY ISSUES: Data Protection Act: It is a law law pass passed ed by the the Gove Govern rnme ment nt to prot protec ectt agai agains nstt misu misuse se of Pers Person onal al Information of Organizations. Protection act passed by the British Parliament in 1984. It has four main points. 1. Computers Computers which process process any personal personal data must be registered registered with with the Data Protection Registrar. 2. Personal Personal Data must not be disclosed disclosed to anyone anyone outside the departme department. nt. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 31 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ 3. Only nly thos those e peopl eople e shou should ld hav have a rig right to view iew data data abou aboutt whom hom the the information is about. 4. Indi Indivi vidu dual als s are are give given n righ rights ts to corr correc ectt or eras erase e data data whic which h has has dama damage ge through inaccuracy or loss of data. Eight Data Protection Principles: 1. 2. 3. 4. 5. 6. 7. 8. Obtained Obtained fairly fairly and and lawfully. lawfully. Held only for one or more lawful lawful purposes purposes specified specified in the data user’s register register entry. entry. Used or disclosed disclosed only only due to data user’s user’s register register entry. Adequate, Adequate, relevant relevant and and not excessive excessive for those purposes. purposes. Accurate Accurate and where where necessary necessary,, up-to-date. up-to-date. Not kept loner loner than necessary necessary for the specifie specified d purpose. purpose. Made availabl available e to data subjects subjects on request. request. Properly Properly protected protected against against loss loss or disclosed. disclosed. COPYRIGHT ISSUES: What is Copyright? It is the branch of law, which protects creative wo rks from unauthorized use by other people. It allows allows creators creators to benefit financially. financially. Original creator may be assigned copyright to another person. Copyright can protect Literacy Dramatic Musical Artistic Artistic works (etc). Owner of copyright has the right to Publish Reproduce Broadcast or Perform in Public What is Copyright Copyright Infringement? Infringement? Infring Infringeme ement nt can happen happen when when origin original al works works are reprod reproduce uced d withou withoutt permiss permission ion form copyright owners. Crimi Crimina nall acti action ons s can can be brou brough ghtt agai agains nstt peop people le or orga organi niza zati tion ons s that that infri infring nge e copyright. Action taken depends on the nature of infringement. Computer Computer Software Software and Copyright Law: A good software may take many years to develop and can cost millions of dollars. This investment can only be recovered by selling the software. Custo Custome mers rs or orga organi niza zatio tions ns are are not not allo allowe wed d to make make ille illega gall copie copies s of orig origin inal al software. EXERCISE i Comput Computer er Virus Virus ii Anti-V Anti-Viru irus s Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 32 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ iii Copyrig Copyright ht iv Infring Infringeme ement nt v Viru Virus s Hoax Hoax vi Hacke Hackers rs WINDOWS OPERATING SYSTEM GUI OPERATING SYSTEM : Most Common used now a day. Apple Computers introduced first GUI in 1984. Windows is the most common GUI Operating System developed by Microsoft (Ms). Advantages are User Friendly Multi-Tasking Easy to learn and handle No need to Remember Commands A GUI have Desktop Icons REVIEWED Taskbar and Start Button ByBy user at 1:04 1/13/10 Azmat Afridi pm, 13/01/2010 Menus Dialog Boxes Program Running in Windows OPERATING SYATEM COMPONENTS: Operating System components are Desktop Taskbar Windows My Computer Recycle Bin My Documents Control Panel Desktop: Afte Afterr boo booti ting ng the the ver very y firs firstt scre screen en from from wher where e use userr can can perf perfor orm m thei theirr required task is called desktop. By using desktop we can use every Program / Software installed in computer. Desktop has Folder Icons Program Icons (Ms-Word, Ms-Excel, Ms-Paint) Document Icons Special Icons (My Computer, Computer, Recycle Bin) Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 33 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Taskbar: Taskbar is a bar, which is usually placed at the bottom of the Desktop. Taskbar has Start Button Quick Launch Toolbar (it has Program Icons) Task Buttons (One button for each active program) Tray (It contain Clock and Program Icons) Windows: Each program opens in its open window. You can Maximize, Minimize, Restore or Close window. My Computer: It contains information about Hard Disk CD-ROM Floppy Disk I/O Devices Recycle Bin: When user deletes some file or data, da ta, it will go to the Recycle Bin. Deleted file can be restored until it remains in Recycle Bin. My Documents: It contains all saved data. It is the Default location to save data but user can change location. Control Panel: It has many Tools / Components, which are used for computer management as per requirement. Some common components are o Display o Add or Remove Programs o Mouse o Keyboard o Sound (etc). FILES AND FOLDERS: FOLDERS: What is Folder? Folder? Folder is the collection of Files. Color of Folder’s icon is Yellow, but we can change its icon. Two Folders can’t contain same name at same location. Folder names should be meaningful. User can’t write in Folder. What is File? User will write some data in Files. File is a single thing. File’s icon is same as the program icon in which it will made. Two Files of same program can’t contain same name at same location. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 34 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Files names should be meaningful. File Name Conventions: Name can be 255 Character long. Name can include spaces and periods. Characters Characters that can’t include are * | < > ? / \ “ : File Extensions: Extension is used after Filename to identify the file. Some common extensions are o .Doc o .Xls o .Bmp o .Gif o .Ppt (etc) (etc) INTERNET: Network of Networks is called an Internet. Seed of Internet were planted in 1969. Very huge medium for communication. Desi Design gned ed for for Defe Defens nse e Purp Purpos ose e but but now now a day day it is used used for for Busi Busine ness ss,, Communication, Study, etc. Very popular popular among all categories categories of Users. 100 Million Users around the world used Internet today. “Host” is just like network server, providing services to other computers that connect to it. Due to Internet World becomes a Global Village. Emails (Electronic Mails): To create, Send, and receive e-mail you need an e-mail program and Internet connection through LAN or ISP. E-mail is very popular communication tool used to share information among users on internet. You can also attach some file with text message. You must have a unique E-mail address for Send and Receive E-mail. User must Enter Username and Password to use E-Mail options. When you want to send an E-mail to someone you just write E-mail address of that person or organization. (i.e.) rcccbest@yahoo.com Popular Search Engines are www.Yahoo.com www.Hotmail.com www.Google.com www.Altavista.com (etc.) When we will send E-mail it will store on Mail Server until the required person can receive it. Many Many Mail Mail Serv Server ers s use use POP POP (Pos (Postt Of Offi fice ce Prot Protoc ocol ol)) and and are are call called ed POP POP Servers. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 35 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Popular E-mail programs are Microsoft Outlook Outlook Express Eudora Yahoo Hotmail Hotmail (etc.) (etc.) CHAT: Popular way to communicate with other users in the immediate present. Peoples join channels to talk publicly or privately. Channels are discussion groups where chat users convene to discuss a topic. Before Before chatting you should should know E-mail address of other person. Chat can be o Voice Chat o Chat through typing text from keyboard WORLD WIDE WEB: WWW or just Web was created in 1989. “HTML (Hyper Text Markup Language)” with embed “Hyperlinks” is used to create Webpage. Collection of related WebPages called “Web Site”. Web Sites are housed / Stored on Web Servers. Copying a page onto a Web server is called “Posting a page or Uploading”. Copyi pying a pag page from rom web serve rver to client (our Com Computer) is called “Downloading”. World Wide Web includes Web Browsers: Web browsers browsers or Internet browsers browsers are used to access Internet. Internet. A browser includes E-mail features, Newsreaders and tools for Downloads files. Two most popular Web Browsers are Internet Explorer Netscape Navigator. HTML Tags: To format a Webpage HTML Tags are used. Tags which are enclosed in angle brackets <> tell the browser how to display elements on the page. Elements are written between starting and closing tags. (i.e.) <H1> First Web Page </H1> Afte Afterr Crea Creati tion on of Web Web Page Page the the file file must must be save saved d with with the the exte extens nsio ion n of “HTML”. This file will be run on Browser. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 36 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ HTTP (Hyper Text Transfer Protocol): The internal structure of World Wide Web is built on a set of rules called HTTP. HTTP uses internet addresses in special format called URL. URL (Uniform Resource Locator): Specifies the type of server in which the file is located, address of the server and path of the required File / Web Page. (i.e.) http://www.pu.edu.pk /results Home Pages: Personalized Home Page (Which page you want to see?) Web Site Home Page (Primary Page or First Page or Main Page of a Web Site is called called Web Site Home Page). Search Engine: These are web sites helps you to find your desired information. (i.e.) If you want to find information about Flowers. It will provide you a list of web sites which will all contains information about our required topic. ONLINE SERVICES: Online Service is a company that offers access to – E-mail – Discussion Groups – Weather Information – Newspapers Articles – Chat Rooms – Online Games – Stock Information – Electronic Banking and Business (etc.) Most popular are America Online, CompuServe and Prodigy. Connection through MODEM: Modem is used to access Internet. ISPs provide these types of services for home users and businesses. Telephone line will be used to connect to the internet. Users computer will dial into the ISPs server identify it and gain access to the Internet. ISPs Server Server assigne assigned d an assigne assigned d Dynamic Dynamic IP addres address s to the the custome customer’s r’s ISPs computer. Usually Usually a Modem Modem has speed – 28.8 Kbps, 33.6 Kbps, or 56 Kbps INTERNET ADDRESSES: Six primary domains for US Internet sites are i. COM COM (Com (Comme merc rcia ial) l) Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 37 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ ii. ii. iii. iii. iv. iv. v. vi. vi. EDU EDU (Edu (Educa cati tion on)) GOV GO V (Gov (Gover ernm nmen ent) t) MIL MIL (Mil (Milit itar ary) y) NET NET (Net (Netwo work rk)) ORG ORG (Org (Organ aniza izati tion on)) INTRODUCTION TO BROWSING: Web browsers browsers or Internet browsers browsers are used to access Internet. Internet. A browser includes E-mail features, Newsreaders and tools for Downloads files. Famous browsers are Netscape Communicator and Internet Explorer. Address Bar: You can enter the required URL into address bar of the browser or you can access a web page by clicking on link. Clicking Links: Every page on a web site has many links which are connected with specified pages or topics. If you want to return previous page just click on “Back” button. After you have used a link, it changes color. Home Button: It takes you back to the very first page of site. Back and Forward Buttons: Buttons: “Back” “Back” displays displays the last viewed viewed page and “Forward” “Forward” displays the next page. Refresh Button: “Refresh” button send a request to the ISP server for required link. Stop Button: “Sto “Stop” p” Butt Button on abor aborts ts the the curr curren entt tran transf sfer er of info inform rmat atio ion n from from the the ISP ISP to your your computer. SEARCHING THE INTERNET: There are millions of sites on the web, so it’s very difficult to find your required site. Search Engines are designed to help the users to find their required site or topics. You just enter word related to your required stuff and click on button labeled “Search”, “Go Get It” or “Seek”. Popular search engines are Alta Vista Excite Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 38 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Yahoo Google (etc.) DOWNLOADING: Downloading g is the process of saving data from internet internet to your computer. computer. Downloadin User can download Software’s Files attached with E-mails UPLOADING: Copying a page onto a Web server is called “Posting a page or Uploading”. NEWSGROUPS: News Newsgr grou oups ps are are elec electr tron onic ic discu discuss ssio ion n grou groups ps thro throug ugh h which which peop people le can can exchange their ideas and information. Newsgroup articles are stored on a computer called a news server. To read the articles you need a program called newsreader. News Newsre read ader er show shows s you you a list list of curr curren entt arti articl cles es in any any news newsgr grou oups ps you you choose choose to view. INTERNET INTERNET BROWSING BROWSING AND E-MAIL INTRODUCTION TO INTERNET: Internet is the network of networks. It is a very powerful communication tool. Inte Intern rnet et was was desi design gned ed for for U.S U.S Depa Depart rtme ment nt of Defe Defens nse e to safe safegu guar ard d mili milita tary ry information in 1960s. Now a days, internet becomes very popular among each categories of human. Millions of users are exchanging their ideas, thoughts and other information. INTERNET ADDRESSES: Six primary domains for US Internet sites are vii. vii. COM COM (Com (Comme merci rcial al)) viii viii.. EDU EDU (Educ (Educat ation ion)) ix. ix. GO GOV V (Gov (Gover ernm nmen ent) t) x. MIL MIL (Mil (Milit itar ary) y) xi. xi. NET NET (Net (Netwo work rk)) xii. xii. ORG ORG (Org (Organ aniza izati tion on)) REVIEWED ByByuser at Afridi 1:04 13/01/2010 pm, 1/13/10 Azmat E-mail addresses versus URLs: “Electronic Mail” and URL stands for “Uniform “Uniform Resource Locators”. Locators”. E-mail stands for “Electronic E-mail addresses addresses are totally different different form URL addresses. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 39 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ E-mail addresses are used to identify a particular user and URL addresses are used to identify web server. Example of E-mail address is rccc@yahoo.com Example of URL address is www.yahoo.com INTRODUCTION TO BROWSING: Web browsers or Internet browsers are used to access Internet. A browser includes E-mail features, Newsreaders and tools for Downloads files. Famous browsers are Netscape Communicator and Internet Explorer. Getting to a web page: You can enter the required URL into address bar of the browser or yo u can access a web page by clicking on link. Clicking Links: Every page on a web site has many links which are connected with specified pages or topics. If you want to return previous page just click on “Back” button. After you have used a link, it changes color. Home Button: It takes you back to the very first page of site. Back and Forward Buttons: “Back” displays the last viewed page and “Forward” displays the next page. Stop Button: Stop Button aborts the current transfer of information from the ISP to your computer. Print Button: Used to print current page. SEARCHING THE INTERNET: There are millions of sites on the web, so it’s very difficult to find your required site. Search Engines are designed to help the users to find their required site. You just enter word related to your required stuff and click on button labeled “Search”, “Go Get It” or “Seek”. Popular search engines are Alta Vista Excite Yahoo Google (etc.) DOWNLOADING: Downloading is the process of saving data from internet to your computer. User can download Software’s Files attached with E-mails Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 40 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ NEWSGROUPS: Newsgroups are electronic discussion groups through which people can exchange their ideas and information. Newsgroup articles are stored on a computer called a news server. To read the articles you need a program called newsreader. Newsreader shows you a list of current articles in any newsgroups you choose to view. E-MAIL: E-mail stands for “Electronic “Electronic Mail”. E-mail is very popular communication tool used to share information among users on internet. User can Read, Write or Delete E-mail. User can also attach file with E-mail. Popular E-mail programs are Microsoft Outlook Outlook Express Eudora Yahoo Hotmail Google (etc.) LANGUAGE: We need some language for Communication with others. Every language has its own Grammar, Rules and set of Words. Examples are o English o Arabic o French o Urdu Urdu (etc) (etc) Programming: Plan Planni ning ng or sche schedu duliling ng the the perf perfor orma manc nce e of a task task of an even eventt is call called ed Programming. Computer Programming: The process of planning a sequence of steps for a computer to follow is called Computer Programming. PROGRAMMING LANGUAGE: Computer Computer language is a way of communicatio communication n between between user and computer. set of rule rules, s, symbo symbols ls and and speci special al word words s used used to cons constr truc uctt a compu compute terr A set program. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 41 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Each language has certain rules called syntax of language. Two main types are o Low level language or Machine Language o Assembly Language or Middle Level Language o High level language or User Level Language Low Level Languages: Binary code (0 and 1) is used in these languages. Also called Machine Language. These languages are normally used to control hardware. Advantages are • Very fast execution speed • Direct access on hardware Disadvantages are • Long program • Wastage of time • Machine Dependent • Difficult to learn and understand • Difficult to detect and remove errors • No support for graphics • Limited functions Assembly Language: Coding in the form of Symbols Symbols and binary code. Also called Middle Level Language. These languages are also used to control hardware. Assembler is used for conversion of Assembly code into machine code. Advantages are o Easier than Machine Language o Fast execution speed than High Level Language o More control on hardware than High Level Language Disadvantages are o Difficult to learn and understand than High Level Language o Difficult to detect and remove errors o No supports for graphics graphics o Limited functions High Level Languages: Computer programming which is very close to human languages are called high level languages. Very commonly used now a day. Compiler or Interpreter is used as language translator. Used for writing application programs. Advantages are o Very powerful than Machine and Assembly Languages Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 42 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Easier to Learn and Understand o Easier Easier to detect and remove remove errors errors o Shorter coding o Well defined syntax and standard o Machine Independent o Can perform multiple functions o Having support for graphics Disadvantages are o Less execut execution ion speed speed than than Machine Machine and Assembly Assembly language language Some examples are C / C++ Visual Basic Oracle Java (etc) Types are Procedural Languages o Non-procedural Languages Object Oriented Languages Database Query Languages Procedural Languages: Also called Statement Oriented Oriented Languages. Program consists of sequence of statements. Tell the computer how to achieve a goal, by giving a sequence of instructions. Execution of statement is in sequence. Syntax of such language has the form Statement 1; Statement 2; Non-procedural Languages: Also called Logical Based Languages. achieve, by giving giving a specificat specification. ion. Tell the computer what goal to achieve, Non-procedural Language executes by checking for the presence of a certain conditions & when it is satisfied, they execute an appropriate action. Execution of these languages is similar to procedural languages except that statements are not sequential. Syntax of such language has the form Condition 1 action 1 Condition 2 action 2 Object Oriented Programming (OOP): Programming by using “Objects”. Can be procedural or non-procedural. The principles of object-oriented programming are Encapsulation Encapsulation means Information Hiding. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 43 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ What data and methods are accessible to other objects? objects? What data and methods are inaccessible inaccessible from other objects? Inheritance Polymorphism Deriving a new class from an existing one. Facility of reusability of the existing software. An object can perform multiple functions. Abstraction Empty classes for future use. Database Query Languages: Can be procedural or non-procedural. These languages are used to fetch data from database. Most Most comm common on Data Databa base se Quer Query y Langu Languag age e is Stru Struct ctur ure ed Quer Query y Lang Langua uage ge (SQL). Compiler: Translate Translate source code into object code as whole. whole. Saves Compiled file called Object file. Computer will run object file. If there is any error in the source program, compiler tells about error at time of compilation. All errors must be removed for successful compilation. Example C / C++ Language use Compiler. Interpreter: Translate source instructions one by one and executes them immediately. If any error occur program tells about error and stops program execution. execution. Does not make object file. Slow and Time Consuming method. Example Visual Basic Language use Interpreter. Assembler: Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 44 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Q) Assembly language use Assembler as language translator. Assembler converts Assembly program into computer or binary code. Define Define Data Data Proce Processi ssing? ng? How How many Levels Levels of of Data Data Proces Processin sing g Life Life Cycle we have? OR What are the steps involved in Data Processing Cycles? Data: Data refers to any unorganized collection of raw facts and figures that can be collected from different sources and from which information created. Data can be Numerical or Non-Numerical. Example: Numb Number er of stud studen ents ts in an exam examin inat atio ion, n, Name Name of good goods, s, Addr Addres esse ses s of employees, Universities of a country (etc) Information: Organized and processed data is called information. Information is meaningful and use to take intelligen intelligentt decisions decisions so that desired results can be generated. generated. Example: Result analysis of B. COM class, Fee Record of each student (etc) DAT A PROCESSING INFORM ATION Difference between Data and Information: DATA It is a collection of raw facts and figures. Data is used rarely. Data has large size. Data is not available to people for sale. INFORMATION Inform Informati ation on is the meanin meaningfu gfull form of data. Information is used frequently. Informati Information on is small in size. Information is available to people for sale. Data Processing: Data processing referred to operation carried out on data to convert it into meaningful information. LEVELS OF DATA PROCESSING: We can divide data processing based on the amount of the work which is done by the human beings with the amount of the work which are expected from the computers. computers. In order to get better results, results, we can divide divide it into three following levels. levels. Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 45 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ 1. Manual Manual Data Data Processing Processing 2. Mechanical Mechanical Data Data Processin Processing g 3. Electronic Electronic Data Data Processin Processing g Levels of Data Processing Manual Data Processing Mechanical Data Processing Electronic Data Processing Manual Data Processing: In manu manual al data data proc proces essi sing ng human human bein beings gs conv conver erts ts data data into into info inform rmat atio ion n without using any machinery. This method is very time consuming and there is a lot of chances of errors. Example: If you want to calculate the total result of some numerical data instead of using calculator you will use manual calculations to perform desired operation. Mechanical Data Processing: In this technique human beings use and control various machines in various combinations to complete their work and to convert their data into information. This method produces better results in quick time than manual data processing. Example: We can use calculator calculator for our desired desired calculations calculations instead of manual manual work. Electronic Data Processing (EDP): Now a day, computer becomes need of every person. Computers are used in this method for data processing. In order to get correct results from computers we must provide correct input to computer. This method is very efficient and having fast processing speed than Manual and Mechanical data processing, so mostly used in these days. Chances of errors can also be reduced by using this technique. Example: We can perform our desired results very quickly with the help of computer. But we must select right software according to our task. If we want to type an appl applic icat atio ion n then then we shou should ld sele select ct Micr Micros osof oftt Word Word for for this this purp purpos ose. e. If we use use Microsoft Excel for this task then our output will be affected. DATA PROCESSING CYCLE: In order to provide complete information to the computers and drive accurate results from that information the following steps should be considered i. Coll Collec ecti tion on:: Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 46 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Firs Firstt of all all raw raw data data shou should ld be coll collec ecte ted d prop proper erly ly with withou outt miss missin ing g anything. ii. Input: It describes the process of collecting data and getting it, into a form that a computer can understand. iii. iii. Veri Verifi fica cati tion on:: In this his sta stage the col collect lected ed dat data shou should ld be che checked cked whet hether her it is complete and accurate. iv. Coding: This step translates the data into machine language so that computer can process. v. Proce rocess ssin ing: g: Once Once the the data data is avai availa labl ble, e, user user will will enter enter the the data data for for proc proces essi sing ng through keyboard or any other input device. vi. vi. Clas Cl assi sific ficat atio ion: n: In this step data can be organized according to the characters that are meaningful to the computer user. vii. ii. Sorti orting ng:: This stage involves arrangement of data into a particular sequence to facilitate processing. Example: Sorting the bank deposits to account numbers will speed up the processing. viii. iii. Calc Ca lcul ulat atin ing: g: Mathematical calculation on data in needed. Example: Comparison of values ix. ix. Summ Summar ariz izin ing: g: A large amount of data can be reduced to a concise and useable form. Example: Budget Report of a company in specific year. x. Stor Storin ing g and and Re Retr triev ieve: e: Data can be retained on storage mediums and can be retrieved from storage medium (Hard disk, Flash Drive, Floppy drive, ZIP drive) xi. Output: Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 47 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Once the processing is complete complete the results are available available for output output that will will be displ displaye ayed d on diff differ eren entt type types s of medi mediums ums whic which h can can be soft softcop copy y or hardcopy. xii. xii. Feed Feedba back ck:: Feedback is a process of evaluating the output and adjusting the input or processing processing in order to ensure that results results in good information information.. Q) Define Defi ne Da Data ta Proc Proces essi sing ng? ? Why Why data data proc proces essi sing ng is impo import rtan antt for for Business? Data Processing: Data processing referred to operation carried out on data d ata to convert it into useful information. DATA PROCESSING AS A BUSINESS NEED: Electronic data processing is growing because it is capable of handling a vast amount of data efficiently and accurately. Following are the demands faced by business that create this need and which are as follow Number of Transactions: Big firms naturally have many transactions, so the computer with high speed and capacity can process thousands of records of business within a minute. Cost: By using computers business companies can reduce their cost. If a company hires 50 persons for any accounts job, same operation can be done by using 5 to 6 computers. Accuracy: The use of computers in business will not only save the time but also it will help to produce the accurate results without errors. If there are any errors they are automatically highlighted at initial stages and computer user can correct them. Speed: Every company wants that the flow of data should be very fast. The computer technology is also increasing fastly. Pentium-IV is very Fast, Accurate and giving more facilities to computer in comparison with 486 or P-I. Selectivity: The business people demand selectivity in the ways that data are reported specially computers can reorder a collection of data into many different forms. (e.g) Data can be arrange Ascending or Descending before processing Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 48 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ Information: Organized and processed data is called information. Information is meaningful and and use use to take take inte intellllig igen entt deci decisio sions ns so that that desi desire red d resu result lts s can can be gene generat rated ed.. Computer technology is very helpful to convert raw data into useful information in business organizations. Record Keeping: It is very important to have a complete record of data which is going to be proces processed sed by the compute computer. r. To achieve achieve 100% 100% result results s and after after achiev achieving ing those those results the organization will save that Information & Data for future decision making and also will compare it with previous year results. Service: It is important to maintain that the computer users have to take care of those comp comput uter ers s in order order to gene genera rate te bett better er resu result lts s in futu future re also also and and incr increa ease se thei theirr efficiency by giving in time maintenance. Allocation of Job: It has been said “Machine should work and People should think” Many business people believe that human resources should be applied to those tasks for which humans are qualified for them. In other words we can say “The right person person for right job”. (e.g) If a person is hired in any organization for the job of “Data Entry” but after joining the company aspects from to manage Lab and Networking, it will be wrong job allocation. Internet: Internet is also becoming the need of business environment. Especially now a days days,, when when the the busi busine ness ss tran transa sact ctio ions ns is done done onli online ne,, most most of the the busi busine ness ss organizations have their own websites. REVIEWED ByByuser at Afridi 1:04 pm, 1/13/10 Azmat 13/01/2010 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 49 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ INTRODUCTION: Word Processing software’s are used for Typing/Composing a Document. (e.g.) Ms-Word INTERFACE OF WORD PROCESSING: Interface means Layout / Shape. Title Bar Menu Bar Tool Bar Ruler Horizontal Scroll Bar Vertical Scroll Bar Status Bar Cursor FEATURES OF WORD PROCESSING: Main features are Deleting and Inserting Characters Moving Text Undo and Redo Page Setting and Printing a Document Searching and Replace Characters Aligning Text Page Numbers Headers and Footers Footnotes Columns Spell and Grammar Checking Thesaurus Text Styles Formatting Adding Graphics Formulas Charts and Graphs Tables INTRODUCTION: Word Processing software’s software’s are used for Typing / Composing Composing a Document. Document. Main Features are o Preparation of Applications, Letters o Documentation o Tables o Changing Changing Writing Styles, Styles, Size, Color (etc) Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 50 - Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 ************************************************************ (e.g.) (e.g.) Ms-Word Ms-Word INTERFACE OF WORD PROCESSING: Interface means Layout / Shape. Title Bar Menu Bar Tool Bar Ruler Horizontal Scroll Bar Vertical Vertical Scroll Bar Status Bar Cursor Title Bar Menu Bar Vertical Scroll Bar Ruler Tool Bar Page Cursor Horizontal Scroll Bar Status Bar FEATURES OF WORD PROCESSING: Main features of word processor are Save and Save As Page Setup Print Preview Print Undo and Redo Cut, Copy and Paste Searching and Replace Characters Headers and Footers Zoom Aligning Text Page Numbers Date and Time Auto Text and Auto Correct Footnotes Columns Symbol Clip Art and WordArt Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 - 51 - Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 ************************************************************ Book Mark Hyper Link Bullets and Numbering Border and Shading Drop Cap Change Case Spell and Grammar Checking Thesaurus Track Changes Font Paragraph Macro Adding Graphics Formulas Charts and Graphs Tables Merge Cells and Split Cells Heading Rows Repeat REVIEWED By at Afridi 1:04 13/01/2010 pm, 1/13/10 Byuser Azmat Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-502380181 52 Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 COMMANDS OF MS-WORD WITH THEIR FUNCTIONALITY: FILE MENU: New (Create a New File) Open (Open a Saved File) Close (Close Current File) Save (Save a File) Save As (Save File With New Name or into other location) Versions (It will Save the Current Status of File) Page Setup (We can Change margins of page) Print Preview (This command shows that who page looks like Before Printing) Print (Print a File) Send To (Send File to Another Location) Properties (It Contain information about File) Exit (Close the Program) EDIT MENU: Undo (Remove (Remove the last work) Redo (Redo last work) Cut (Remove Selected text form its location into Clipboard) Copy (Copy selected text into Clipboard, but text will not remove from its location). Paste (After Copy or Cut ,Paste Command is use to insert text from clipboard) Paste Special (Text can be insert in different Format) Clear ( Remove Selected Text) Select All (You can Select All Text) Find (We can Find Required Word, Letter or Sentence) Replace (Replace undesired word with new word ) Go To (Cursor (Cursor will move on Required Place in current current document) document) VIEW MENU: Normal (Normal (Normal View of Page) Web Layout (Web View of Page) Print Layout (Print View of Page) Outline (Outline View of Page) Toolbars ( Toolbars can be Added and Removed due to Requirements) Ruler (Ruler is used for measurement of page) Document Map (All Heading of Document will be shown in Left side of the page) Header Hea der and Footer Footer (Head (Header er Text Text will will be displ display ayed ed on top top of Each Each Page and Footer Text will be displayed on Bottom of Each Page) Footnotes (Meanings of difficult words) Comments (Explanation about something) Full Screen (Text will be Shown on Full Screen) Zoom (Large Size of Text Due to Requirement) INSERT MENU: Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 53 Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Break (We can Insert Page break, Column break, Text wrapping break and section breaks) Page Numbers (Can Apply numbering on Pages) Date and Time (Date and Time can be Inserted) Auto Text (Text can be inserted automatically) Symbol (Insert a Symbol) Cross-Reference (It is the Reference Text to other location) Caption (It is just like Heading of Selected Text) Picture (We can insert Picture, Stylish Text, Draw Chart and Required Shapes) Text Box (Just like a box in which we can write something) File (Add already saved file in current file) Object (By using Object you can open and create docum ent of some other application) Book Mark (It’s a shortcut to access your required place) Hyper Link (It is the reference text to access other location) FORMAT MENU: Font (Can Change Text style, size, Effects and Character Character Spacing) Paragraph (Formatting of Paragraph) Bullets and Numbering (Outlines can be applied to text) Border and Shading (we can apply border and shading to text, page and paragraph) Columns (Text can be written in multiple columns) Tabs (Set Blank Spaces) Drop Case (First letter of paragraph will display in large size) Text Direction (Direction (Direction of text can be changed) Change Case (Text can be changed in Capital, Small, Sentence style, Toggle) Background (It will change Background color of page) Theme ( Background style ) Frame ( Used for Web Pages) AutoFormat (Automatically Formatting of text) Style (Different styles of text can also be applied) TOOLS MENU: Spelling and Grammar (It will check Spelling and Grammar mistakes) Language ( Language and words can be changed ) Word Count (It will show the summary of Current Document) AutoSummarize (This command will generate Summary of document automatically) Auto Correct (Wrong Word will correct automatically) Track Changes (Highlights the Track Changes in File) Envelopes and Labels (Prepare a letter cover) Letter Wizard (Write Letter in different different styles) Macro (Text can be recorded for future use) Customize (Toolb (Toolbars ars can be added added and differ different ent setting setting of Toolba Toolbarr can be possible) TABLE MENU: Draw Table (It will draw Table due to requirement) Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 54 Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Insert (It will insert Table, Columns, Rows, Cells) Delete (Remove Table, Columns, Rows, Cells) Select (This command will Select Table, Columns, Rows, Cells) Merge Cells (Thi (This s comm comman and d will will merg merge e sele selecte cted d cell cells s and and make make a single cell) Split Cells (A Cell can be divided in to multiple Columns and Rows) Split Table (A Single Table can be divided into Multiple Tables) Table AutoForm AutoFormat at (Dif (Diffe fere rent nt Text Text / Font Font colo colors rs and and size size can can be applied) AutoFit (Text will Fit according to column and row height ) Heads Row Repeat (Heading of table will show on first row of every page) Convert (Text can be changed into Table and Table can be changed into Text) Sort (Tex (Textt of Tabl Table e can can be Arra Arrang nge e into into Asce Ascend ndin ing g or Desc Descen endi ding ng order) Formula ( Different Functions can be Applied to Table Entries) Gridlines (Gridlines are the grey lines which we can see on computer screen but can’t see in printout) Table Properties (All Possible Function of table can be edited) WINDOW MENU: New Windo New Window w (Thi (This s Comm Comman and d will ill made made simi simila larr copy copy to Curr Curren entt Document) Arrange All (All Files will be Shown on monitor’s screen) Split (We can View Complete / Full Page) HELP MENU: Microsoft word Help (Help about any topic) Show Show the Office Office Assistan ssistantt (Assist (Assistant ant means means Helper Helper which which provid provide e ms-word’s help) What’s This? (Give Information about Required Thing) Detect and Repair (Find Error and Repair from CD) About Microsoft Word (Information about word) INTRODUCTION: Spreadsheet is a grid of rows and columns which is used to enter numbers numbers and text. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 55 Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 It is very powerful tool normally used for calculation. (e.g.) (e.g.) Ms-Excel Ms-Excel INTERFACE OF SPREADSHEET: Interface means Layout / Shape. Title Bar Tool Bar Menu Bar Formula Bar Horizontal Scroll Bar Vertical Scroll Bar Columns Rows Sheet Tabs Cell Status Bar FEATURES OF SPREADSHEET: Main features are Formulas and Functions Charts Print Area Formatting Validation Subtotals Filter Goal Seek Excel is very important important tool of Microsoft office. Excel is used to Create Huge tables. Key Features of Excel are o Presents the data into tabular form o Can apply Formula and Functions o Can Insert Charts and Graphs according to our requirement (e.g) (e.g) Ms-Exc Ms-Excel el INTERFACE OF MICROSOFT EXCEL: Interface means Layout / Shape. How Program Looks Like? Title Bar Columns Tool Bar Rows Menu Bar Worksheets Formula Bar Cell Horizontal Scroll Bar Status Bar Vertical Scroll Bar Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 56 Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Title Bar Menu Bar Formula Vertical Scroll Bar Tool Bar Columns Cell Worksheet Rows Sheet Tabs Status Bar Horizontal Scroll Bar Book, Worksheet, Cells: Cells: Book is a collection of worksheets. A Book can have many worksheets. Worksheet consists of Columns and Rows. Cell is a unit area of Column or Row. Columns are 256. 65536. Rows are 65536. FEATURES OF MICROSOFT EXCEL: Main features of Microsoft excel are Print Area Paste Special Fill Move or Copy Sheet Page Break Preview Formulas and Functions Custom Views Name Charts Conditional Formatting Protection Goal Seek Sort Filter Subtotals Validations Group and Outline Import External Data Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 57 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 58 CHOICES AND DECISIONS CHOICES AND DECISION STATEMENTS: Selection Structures allow a choice among various alternatives. C has following decision statements IF-Statement IF-ELSE Statement ELSE-IF Statement SWITCH Statement CONDITIONAL CONDITIONAL Operator IF Statement: It will check a given condition, if condition is true then statements will be executed. If condition is false then statements will not executed. Syntax of IF statement is if (conditi (condition) on) { statement 1; statement 2; ………….. } Example: #include #include <stdio.h> #include #include <conio.h> Void main ( ) { int a=10; int b=15; if (a<=b) { printf (“A is less than B”); printf (“C Language”); } getche( ); } IF-ELSE Statement: In this statement, one condition and two blocks of statements are given. Either one of the two blocks of statements is executed after checking the condition. If condition is True, First block will be executed and if condition is False, the Second block will be executed. Syntax is if (Condition) { Statement (s); Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 59 } else { Statement (s); } Example: REVIEWED By at Afridi 1:05 pm, 1/13/10 #include #include <stdio.h> Byuser Azmat 13/01/2010 #include #include <conio.h> Void main ( ) { int a=15; int b=10; if (a<=b) { printf (“A is less than B”); } else { printf (“ A is greater than B”); } getche( ); } ELSE-IF Statement: Syntax of ELSE-IF Statement is if (Condition1) (Condition1) { Statement (s); } else if (Condition2) { Statement (s); } else if (Condition3) { Statement (s); } else { Statement (s); } Example: #include #include <stdio.h> Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 60 #include #include <conio.h> Void main ( ) { int a=10; int b=15; if (a>b) { printf (“A is greater than B”); } else if (a= =b) { printf (“A is equal to B”); } else { printf (“B is greater than A”); } getche( ); } SWITCH Statement: Works similar like “ELSE-IF” Statements. Multiple choices are given and one choice is to be selected. Break statement is used at the end of statements in each CASE . It exits the control from the body of switch structure. Syntax of SWITCH Statement is Switch (expression) { case const1: statement; break; case const2: statement; break; case constn: statement; break; default: statement; } Example: #include #include <stdio.h> #include #include <conio.h> Void main( ) { Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 61 int n; scanf (“%d”,&n); switch (n) { case 1: printf(“One”); break; case 2: printf(“Two”); break; case 3: printf(“Three”); break; default: printf(“Invalid printf(“Invalid Value”); } getche( ); } CONDITIONAL Operator: It is the alternate to a simple if- else statement. It consists of “?” (question-mark) and a “:” (colon). Its syntax is {condition} ? {exp1} : {exp2} Example: #include #include <stdio.h> #include #include <conio.h> Void main ( ) { int a=10, b=84, c; c=(b>a) ? a : b; printf (“%d”, c ); getche( ); } Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 62 DATABASE Data: Facts in raw form are called data. Data have no meaning. meaning. (i.e.) 65, Farooq , age Information: Meaningful / Organized form of data is called information. (i.e.) The age of Nasir is 65. DRAWBACKS OF FILE SYSTEM / MANUAL SYSTEM: Drawbacks of File System are Data Redundancy (Same data was duplicated in many different files) Data Inconsistency (When same data are held in different files, the data has to be updated in all files. If any file may fail to update it will produce wrong output) Program Program-da -data ta Depende Dependence nce (If (If we want ant to cha change nge/mod modify ify structure of file, that means every program which uses that file has to be changed) Lack of Flexibility (When non-routine information is needed, it takes many week to collect data from different files and write new programs to produce required result) Data ata was was not not Shar Sharea eabl ble e (Dat (Data a of one depa depart rtme men nt can’ can’tt shareable by other departments ) DATABASE: A coll colle ectio ction n of info inform rma atio tion orga organ nized ized in such such a way way that hat a computer program can quickly select required data. OR A Database is a collection of related data. Database Database is just like an Electronic Electronic Filing Filing System. System. (e.g.) Computerized Library Systems Automated Teller Machines (ATM) Flight Reservation Systems (etc) Advantages of Database System: Following are the main advantages of Database System More information from same data Shared data Balancing conflicts among users Controlled Redundancy Consistency Security Increased productivity Data independence Fields, Fields, Records, Records, Files and Database: Database: Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 63 Fields (Columns are called Fields) Records (Rows are called Records) Files (A file is a collection of records) Database (A Database may have many files) DATABASE MANAGEMENT SYSTEM (DBMS): It is a collection of programs that enables users to Store, Modify, and Retrieve information from a database. It provides the interface between the user and the database. Primary Key: The field which has Primary Key can’t be null and duplicate . If primary key is made of only one field, it is called “Simple key”. If primary key is made of a group of two or more fields, it is called “Composite key”. Data Type: Type: Text (Used to store alphabets, digits and special characters. It can store up to 255 characters). Memo (Used to store a large amount of text data). Number (Used to store numeric data). Date/Time (Used to store Date and Time). Currency (Used to store Currency amounts). AutoNumber (Used to generate generate a serial number). number). Yes/No (This field contain either Yes or No). ENTITY-RELATIONSHIP MODEL: Also called E-R Model. It is the graphical representation of the database. In E-R Model Entities and their relationship described. Entity: An entity is a person, place, event or a concept in the real world. Each entity has a set of attributes or properties. For example, in a school, each student is an entity. This entity has the attributes of Name, Roll No, Class, Date of Birth, Phone No etc. Relationship: Linking of records of one table with the records of another tables is called “Relationship”. The field(s) in both tables usually have the same name, data type and size Three types of relationships are 1. One-to-One One-to-One Relati Relationship onship 2. One-to-Many One-to-Many Relati Relationship onship 3. Many-to-Ma Many-to-Many ny Relationshi Relationship p One-to-One Relationship: Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 64 Relationship between two sets of entities A and B is one-to-one when o For each entity in A, there is only one related entity in B, and o For each entity in B, there is only one related entity in A. For example, countries and their capitals. One-to-Many Relationship: Relationship between two sets of entities A and B is one-to-many when o For each entity in A, there can be one or more than one related entities in B, and o For each entity in B, there is only one related ent ity in A. For example, a student can have more than one phone numbers but phone number could be assigned to only one student. Many-to-Many Relationship: Relationship between two sets of entities A and B is many-tomany when o For each entity in A, there can be many related entities in the B, and o For each entity in B, there can be many related entities in A. For example, example, many students students can read many subjects TABLES: A table consists of rows and columns. Within a table, data is stored as records. A database may contain one or more tables. Each row in a table represents one record. Column Column is called “Field” “Field” and row is called called “Record” “Record” in database. database. QURIES: Query is the request to extract extract data from database. database. It consists of a command that is given to display data. The results of a query are in the form of a table. Main Advantages of using queries are o Extract Extract particular particular records records from one or more tables tables without without modification of the actual data. o Sort records in a particular data o Display the selected records on the screen; print them on the printer, etc. FORMS: Form is a wind window ow that hat coll collec ects ts dat data from rom a dat databas abase e and organizes it on the computer screen. It is used to o Retrieve data from the database and display it. o Enter data into the database. o Edit data in the database. database. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 65 Forms are designed to make data entry and retrieval easier. Advantages: Forms provide a user friendly interface. So non-technical user can work easily. easily. A form usually displays only one record at a time so it is easier to edit and enter data by using form. A form can collect and display data from more than one table. REPORTS: Pres Presen enta tati tion on of selec selecte ted d data data retri retriev eved ed from from a data databa base se in a predefined manner is called a Report. or Presentation of data in formatted form. or Presentation of processed data obtained from a database is called Report. Report can be displayed on the screen, printed on the paper or stored on the disk. It can retrieve data from one or more tables of a database. DIFFERENCE BETWEEN FORMS & REPORTS: No 1. 2. 3. 4. Forms Reports Usually used to view data on the computer screen Data cannot be format matted Data in the the tables tables can be modifi modified ed New data can be entered Usually used to print data on the paper Data can be for formatted Data cannot cannot be modified modified New data cannot be entered FILE MANAGEMENT DATA FILES AND THEIR IMPORTANCE: Sometime computer program need large amount of input data. So it is very difficult to enter all data at run time. Input data is stored in a file on the disk. Computer program reads the data from the data disk. Simil Similarly arly,, progra programs ms are also also often often produ produce ce large large outpu outputt which which is not not possible to view the entire data on screen at run time. The output from a program is written into a data file and is stored on the disk. ACCESS METHOD OF FILES: Sequential Access Access Files (Data read and write in a sequence. If we want Sequential to read 5th record then the first four records have to be read. Text Data Files are Sequential Access Files in C Language). Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 66 Random Access Files (Read and write data directly. If we want to read 5th record then we can read required record directly. Binary Data Files are Random or Direct Access Files in C Language). File Access Modes: Mode Description r Reading Mode. w Writing Mode. a Appen Append d Mod Mode. e. Data Data can can be added added at the the end end of file. file. r+ Reading / Writing Mode. w+ Writing / Reading Mode. a+ Reading / Append Mode. Opening Files: “fopen” function is used to open a file. Before opening a file, a file pointer is associated with it. Example FILE *fp; fp=fopen(“abc.txt”,”w”); Closing Files: When we opened a file we must close such file, otherwise data will damage. “fclose” function is used to close a file. Example fclose(fp); FUNCTIONS IMPORTANCE IMPORTANCE OF FUNCTIONS: FUNCTIONS: A function is a piece of code written to perform a specific task. Importance and Advantages are 1. A larg largee prog program ram can can be divi divide ded d into into smal smalll unit unitss or modu module les. s. These are written as Functions. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 67 2. Each Each functi function on is writt written en to perfor perform m speci specific fic task. This makes writing and testing of program easier. 3. Many Many prog progra ramm mmer erss can can work work on one one prog progra ram m at a time time.. So program develop quickly. 4. A function function can can be use use in other other program. program. 5. Use of functions functions also reduces overall overall length of the the program. TYPES OF FUNCTIONS: FUNCTIONS: Built-In In Functi Functions ons (The Built(These se func functi tion onss are are defi define ned d alre alread ady y in the the langu language age.. We can’t can’t use these these functi function onss in any other other progr program. am. Also Also called Library Functions. (i.e.) printf ( ), sqrt ( ) etc.). User-Defined d Functions Functions (User (User create createss these these functi function ons. s. Also Also called User-Define Prog Progra ramm mmerer-De Defi fine ned d func functi tion ons. s. Thes Thesee func functi tion onss are are writ writte ten n for for a specific use). TYPES OF VARIABLES: VARIABLES: Local Variables: Variables that are declared inside the main function or inside any userdefined function are called Local variables or automatic variables. The keyword “auto” (optional) can be used to declare these variables. Example auto int a, b, c; or int a, b, c; Life-Time Life-Time of Local Variables: Life time is the time period between the creation and destruction of the variable. When control goes to that function in which variable is declared, then variable will created and occupy memory space and when control goes back to calling function then variable will be destroyed. A variable declared inside the function can not used in other function. Global Variables: Variable that is declared outside the main function or any other function are called Global variables or External variables. These variables can use any where in the program. Life-Time Life-Time of Global Variables: These variables exist in the memory throughout the program execution. When a program starts its execution these are created. When program ends then these variables destroyed from memory. Static Variables: These These variab variables les are declar declared ed insid insidee a functi function on by using using the keywor keyword d “Static”. These can be used only in that function in which they are declared. Life time is throughout the program. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 68 Since static variables is initialized only once and is not destroyed, the function having static variables runs faster. (e.g.) static int i=10; PASSING PASSING ARGUMENTS TO FUNCTIONS: FUNCTIONS: Two ways of passing arguments are Argumen entt Passed Passed by Valu Valuee (In (In this this metho ethod, d, valu valuee of the the – Argum variable is passed to the function). – Argument Passed by Reference (It is also called “passing by address”. In this method, the memory address or reference of the vari variab able le is pass passed ed to the the func functi tion on.. & sign sign is used used with with actu actual al parameter). INTRODUCTION TO C LANGUAGE LANGUAGE: Language is used for communication. For communication with computer we need some languages are called Computer languages or Programming languages. COMPUTER PROGRAM: Set of inst instru ruct ctio ions ns give given n to comp comput uter er to perf perfor orm m a task task is call called ed Set computer program. Instr Instruc uctio tions ns are writte written n accor accordin ding g to some some rules rules are called called comput computer er language or Programming Languages. TYPES OF PROGRAMMING PROGRAMMING LANGUAGES: Three main types are Machine Language Assembly Language High Level Language Machine Language: All coding will be in form of 0s and 1s are called Binary Code. Difficult to learn and understand. Assembly Language: Symbols are used instead of binary code. Easier than Machine Language but hard to learn. High Level Language (HLLs): Instr Instruc uctio tions ns are writte written n in these these langua languages ges are very very Close Close to Human Human Language. Very powerful than Machine and Assembly Languages. Easier to Learn and Understand. Used for writing application programs. Examples are BASIC, C, C++, COBOL (etc) Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 69 Characteristics (Features) of High Level Langauage: Machine Independent (Program written in high level language can be run on any computer system). Well defined Syntax and Standard (Syntax are rules to write a source code). Easy to Learn and Understand (Easy to learn as compare to machine languages). Shorterr Programs Programs (Pro (Progr gram amss are are shor shorte terr than than prog progra rams ms writ writte ten n in Shorte machine language). Source ce is unde underst rstand andab able le by othe otherr progra programme mmers rs (Instruc Sour (Instructio tions ns are writt written en in Engl English ish words words so any progr programme ammerr can under understa stand nd sourc sourcee code). Source Code: A Computer Program written in a High Level Language is called Source Code. Computer can’t run this Program. Object Code: Compu Computer ter Progra Program m in the the form form of machi machine ne langu language age (0, 1) is called called object code. Computer can run this code directly. TRANSLATORS TRANSLATORS OR LANGUAGE PROCESSORS: PROCESSORS: Common translators are Compiler Interpreter Assembler Compiler: Translate source code into object code as whole. Saves Compiled file called Object file. Computer will run object file. If there is any error in the source program, compiler tells about error at time of compilation. All errors must be removed for successful compilation. Interpreter: Trans anslat late source rce inst instru ruct ctiions one by one one and and exe execut cutes them hem immediately. any erro errorr occu occurr prog progra ram m tell tellss abou aboutt erro errorr and and stop stopss prog progra ram m If any execution. Does not make object file. Slow and Time Consuming method. HISTORY OF C LANGUAGE: C language combines some features of Assembly language and some features of High Level Language. C language was developed in early 1970s by Dennis Ritchie at Bell Laboratories. Designed for UNIX Operating Systems but very widely use now a day. In 1980s American National Standards Institute (ANSI) introduced the standard version of “C” called ANSI C. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 70 Use to write all type of programs such as Control Hardware Processes Word-processing Word-processing Programs Spreadsheet Programs Educational Educational Programs Games BASIC STRUCTURE OF C PROGRAM: Writing style of a program is called Structure of program. C Program has 3 main parts 1. Preproces Preprocessor sor Directiv Directives es 2. The Main( Main( ) Function Function 3. C Statem Statement entss Example: # include <stdio.h> main( ) { printf (“First Program”); Preprocessor Directive Header File Main Function C Statement getche( ); } Preprocessors Directives: Directi ves: Inst Instru ruct ctio ions ns give given n to Comp Compil iler er befo before re actu actual al prog progra ram m are are call called ed Preprocessor Preprocessor Directives. It does some processing before the Compilation process starts. Preprocessor Directives are used to include Header files in the program. (e.g.) #inc #inclu lude de <S <Std tdio io.h .h> > or #inc #inclu lude de “Std “Stdio io.h .h”” or #de #defi fine ne <S <Std tdio io.h .h> > or #def #defin inee “Std “Stdio io.h .h”” Header Files: Contain Definitions of standard library function. C has many header files. Each header file contains definitions of one type of functions only. (e.g.) math.h (Has Mathematical Function only) Header File has an extension .h The name of header file is written in angle brackets < > or double quotes “ ”after #include #include or #Define #Define directive. directive. Main Function: C Program begins with “main( )” function. “main( )” must be included in every C Program. Execution will Starts through “main( )” Function. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 71 If there in no “main ( )” Function, Compiler generated an error. (e.g.) main main(( ) { Program Statements… } C Statements: Statements are written between Curly braces { } of main function. Each statement of C ends with Semicolon ( ; ). Mostly written in lowercase, but in some cases, can also be written in uppercase. CREATING, EDITING AND SAVING A PROGRAM: Creating is the process of writing program into C compile r editor. Editing is the process of make changes into written program (Del and Backspace key is used to delete characters). After creation of program save it as filename.c. COMPILING, LINKING AND EXECUTING A PROGRAM: Compiling: Conversion of Source code into object code is called Compiling. Compiler is used for conversion. Compiler saves object code in a file with extension .obj. e.g.) Filename.obj If there are errors in source code compiler tells about error, when these errors will rem remove then program will comp ompiled successfully. Linking: Nece Necess ssary ary libr librar arie iess are link linked ed to the the obje object ct code code and and make make executable file. Linker can also detect errors. If Source code uses a library function that does not exist, linker generates an error. Object file is converted into Executable file with extension .Exe. Executing: Executable file will run on the computer system. Exec Execut utab able le file file may may also also cont contai ain n erro errors rs.. Thes Thesee can can prod produc ucee wrong output or they can halt the system. (e.g.) (e.g.) a = 20 / 6; FUNDAMENTALS OF C LANGUAGE CHAPTER # 2 Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 72 KEYWORDS OR RESERVED WORDS: Words that are used for Special purpose by the language. These are always written in lowercase. These have predefined uses and can’t be used for any other purpose in C Language. C has 32 Keywords. (e.g.) Main (Indicate Main( ) function, we can’t use main for any other purpose). CONSTANTS: Constan Constants ts are quantities quantities whose whose values values do not change during during program program execution. Types of Constants: Two types of constant are 1. Numeric Numeric Constant Constant a. Integer Integer Constan Constantt (0, 245, -4759, -4759, +4595) +4595) b. Floating-point Floating-point Constant Constant (25.5, (25.5, 0.49, 245. 245. 463) 2. Characte Characterr Constant Constant (M, (M, s, 5, +, - , * ) VARIABLES: Value of Variable may change during program execution. Variable represents memory location. Data stored into the memory location. May be Numeric or a non-numeric value. Rules for Writing Variable Names: Must be starting with Alphabetic Character or an underscore ( _ ). First character cannot be a digit. Spaces are not allowed in variable name. Special character are not allowed (#,^,&,* , %, }, etc) Reserved words cannot be used. Maximum length is up to 31 characters. Two variables can not contain same name. Types of Variables: C has three types of variables 1. Integer Integer Variables Variables 2. Floatin Floating-po g-point int Variab Variables les 3. Characte Characterr Variab Variables les Integer Variables: Integer is a whole number. It may have a positive or negative value. (e.g.) 25, 785, -78, 342 Four types of integer are i. Int (Takes 2 bytes in memory) ii. ii. Short Short Int Int (Takes 2 bytes in memory) iii. iii. Long Long Int Int (Takes 4 bytes in memory) iv. iv. Unsi Unsign gned ed Int Int (Takes 2 bytes in memory, Can Store only positive values) Floating-point Variables: Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 73 These consist of whole numbers with fraction or decimal point. These are also called floating point numbers. (e.g.) 27.47, 0.14, -2.15 Three types are i. Float It takes 4 bytes in memory. Represented in decimal or exponential form. May be signed or unsigned. ii. iii. iii. Double It takes 8 bytes in memory. Used to store large floating values. Lon Long Dou Double ble It takes 10 bytes in memory. Used to store very large floating values. Character Variables: Character data type consists of alphabetic characters, numeric digits and special characters It takes 1 byte in memory. Declaration of Variables: Variablee Type it can variab able le and and the the Variabl can hold hold is call called ed Name of a vari declaration of the variable. When a variable is declared, it occupies some memory space according to its data type. Value of variable is stored in this memory. (e.g) Int marks; Data Type Variable Name REVIEWED ByByuser at Afridi 1:05 13/01/2010 pm, 1/13/10 Azmat Examples: Short int Marks; Long int Length; Float Height; Double Distance; Char Single; Int Marks, Rollno, Age; Initialization of Variables: Assigning a value to variable at declaration time is called initialization of the variable. (e.g) Int a=110, b=60, c; Float num=6.78f; Char sin=‘M’; Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 74 COMMENTS: Compiler can’t read these statements. Used to add remarks or comments in a program. Usually given to explain logic of program. For Single line comments // comments For multi line comments /* comments comments */ (e.g.) c=aa +b; c= +b; // Addi Additi tion on of two two numb number erss INPUT AND OUTPUT STATEMENTS: Stat Statem emen ents ts that that are are used used to prov provid idee data data to the the prog progra ram m duri during ng its its execution are called input statements. Function used for input are – scanf Function – gets Function – getch Function – getche Function Statements that are used to show data to an output device are called output statements. Function used for output are – printf Function – puts Function scanf and printf are most common used functions. These functions are defined in the “Stdio.h” header file. #include <stdio.h> Example: #include #include <stdio.h> #include #include <conio.h> main ( ) { int a=15; int b; scanf(“%d”,&b); printf (“This is C Language”); printf (“%d”,a); print(“%d”,b); getche( ); } FORMAT SPECIFIER: Format Specifier should be same to the type of variable for printing. %c Sin Single Charac aractter Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 %s %d %f %e %g %u Mobile U.A.E+971-50-2380181 75 String Sing Singed ed Deci Decim mal Inte Intege gerr Floating Point Floati Floating ng Point Point (Expo (Exponen nenti tial al Notat Notation ion)) Floa Floati ting ng Poin Pointt (%f (%f or %e) %e) Unsi Unsign gned ed Deci Decima mall Inte Intege gerr FIELD WIDTH SPECIFIRER or ESCAPE SEQUENCES: Special characters are used to control printing on the output device are called Escape Sequence. Escape Sequence is a combination of a Backslash ‘\’ and a code character. \n \t \b \a \r \r \’ \’ \” \” \\ For New Line For Tab For Backspace For Alarm (Beep) Curs Cursor or will will move move to the the begi beginn nnin ing g of line line To Prin rint Sin Single Quo Quote To Prin rint Dou Double Quo Quote To Print Bac Backslash OPERATORS: Expression: Expression is used for calculating the value of a formula. It has different Operands and Operators. Its evaluation gives a single value. (e.g.) A×B×C – Where here A, B, C are are vari ariabl able name namess and and are are calle alled d operands. – Multipl Multiplicati ication on sign sign ‘×’ ‘×’ is called called operat operator. or. Arithmetic Operators: Arit Arithm hmet etic ic Oper Operat ator orss are are the the symb symbol olss that that are are used used for for Arit Arithm hmet etic ic operations. Arithmetic Operators are Symbol + * % Operation Addition Subtraction Multiplication / Division Modulus (Rem (Remaainder) Assignment Operator: The Oper Operat ator or that that is used used to assi assign gn valu valuee to a vari variab able le is call called ed an The Assignment Assignment Operator. Assignment Operator ‘=‘ is used to assign value to variable. Example int age ; age = 50; or Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 76 int age = 50; Assi Assignm gnment ent Operator Operator can also be used used to assign assign one value value to many many variables called Compound Assignment Operator. Example int x, y, z; x = y = z = 10; Increment and Decrement Operators: Increment Operator + + is used as Increment Operator. It is used to add 1 to the value of a variable. (e.g.) int x = 87; x + +; Decrement Operator - - is used as Decrement Operator. It is used to Subtract 1 to the value of a variable. (e.g.) int x = 87; x - -; Prefix and Postfix Operators: Prefix Operator It adds 1 to the value of the vari variab able le befo before re the the valu valuee of the the variable is used in the expression. (e.g.) int a = 50, b; b = + +a; Postfix Operator It adds 1 to the value of the vari ariabl able afte afterr the the valu alue of the the variable is used in the expression. (e.g.) int a = 50, b; b = a+ +; Relational Operators: Rela Relati tion onal al oper operat ator or is a symb symbol ol that that is used used to find find a rela relati tion onsh ship ip between two expressions. Relational operator are Symbol == != < > <= >= Definition Equal To Not Equal To Less Than Greater Than Less Than or Equal To Greater Than or Equal To Logical Operators: Used to compare two or more conditions. The output of logical expression is True or False. Logical operators are Symbol && || ! Definition AND Operator OR Operator NOT Operator Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 77 Truth Table for &&, || and ! Operator a True True False False b True False True False a && b True False False False a || b True True True False !a False False True True !b False True False True Order of Precedence of Operators: All Multiplication and Division are performed first. All Addition and Subtraction are then performed. If parentheses are used in an expression, then expression in parenthesis are performed first. If pare parent nthe hese sess are are used used with within in pare parent nthe hese ses, s, the the expr expres essi sion on,, with within in innermost parentheses will performed first. (e.g.) (4 - (3*5))+2 LOOPS LOOP: A statement or a set of statements that is executed repeatedly is called a loop. Loop is executed until the given condition remains true. Three loops in C are While Loop Do-While Loop For Loop While Loop: Used to execute a statement or set of statements as long as the given condition remains true. Syntax of the “While” loop is while (condition) (condition) { statement (s); } Example: #include #include <stdio.h> #include #include <conio.h> main ( ) { int c=1; Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 78 while (c<6) { printf (“I Love Pakistan\n”); c=c+1; } getche( ); } Do-While Loop: Used to execute a statement or set of statements. Just Just like like whil whilee loop loop but but in this this loop loop the the cond condit itio ion n is test tested ed after after executing the statements of the loop. Syntax of the “While” loop is do { statement (s); } while (condition); (condition); Example: #include #include <stdio.h> #include #include <conio.h> main ( ) { int c=1; do { printf (“I Love Pakistan\n”); c=c+1; } while (c<6); getche( ); } For Loop: Used to execute a statement or set of statements as long as the given condition remains true. Also called Counter loop. It has following parts 1. Initiali Initializati zation on 2. Condit Conditio ion n 3. Incremen Incrementt or or Decreme Decrement nt 4. Body Body of of the the Loop Loop General syntax of For Loop is for (initialization; condition; increment / decrement) Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 79 { Statements; } REVIEWED ByBy user at 1:05 1/13/10 Azmat Afridi pm, 13/01/2010 Example: #include #include <stdio.h> #include #include <conio.h> main ( ) { int a; for (a=5; a<15; a++) { printf (“I Love Pakistan\n”); Pakista n\n”); } getche( ); } NESTED LOOPS: A loop can be declared inside another loop called nested loop. Loops can be nested For-Loop, While Loop, Do-While Loop or mixture of these. Example: #include #include <stdio.h> #include #include <conio.h> main ( ) { int a, b; for (a=1; a<5; a++) for (b=1; b<3; b++) { printf (“I Love Pakistan\n”); } getche( ); } INFORMATION SYSTEM DEVELOPMENT (ISD) An Information System Collects, Maintains, and Provides information to people people.. Today, Today, many many inform informati ation on systems systems are computer computerize ized. d. Inform Informati ation on syste systems ms are are desig design n for for thos those e peop people le who who have have very very littl little e know knowle ledg dge e of Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 80 information technology. The five phases of information system development are System Analysis System Design System Development System Implementation System Maintenance System Analysis: o o o The person who does analysis is called an Analyst. This phase focuses on “what”. “what”. Three task of this phase are Defining the problem Analyze current system Selecting the best solution System Design: This phase focuses on “how”. “how”. Main tasks in this phase are Making Flow Charts and Data Flow Diagrams (DFD’s) Making User Manuals Selecting the best computer language for development System Development: The person who does development is called a Programmer Writing computer programs by using some computer language Testing and debugging programs System Implementation: Install developed system on computers Update or upgrade systems hardware if needed Training of operators and users System Maintenance: o o Afte Afterr impl implem emen enta tati tion on if any any erro errorr occur occurs s then then it will will remo remove ve in this this phase Monitor system performance DATA COMMUNICATION DATA COMMUNICATION: “Transferring of data fro from one point to other is called data communication”. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 81 BASIC ELEMENTS OF DATA COMMUNICATION: COMMUNICATION: Three basic elements are 1) Transmitter Transmitter or Sender: Sender: Who sends data called a Sender. 2) Medium Medium:: Which carries information called a Medium. Such as cables, air (etc) 3) Receiver: Receiver: Which receives the information, called a Receiver. Sender Medium Receiver DATA COMMUNICATION MODES: There are three modes of data communication 1) Simplex Simplex Mode: Mode: Data can send only in one direction/side (from sender to receiver). Examples: Radio, Television (etc) Sender Medium Receiver 2) Half-Duplex Half-Duplex Mode: Data Data can can send send both both dire direct ctio ions ns/s /sid ides es but but only only in one one direction/side at a time (from sender to receiver or from receiver to sender). Examples: Wireless set, Computers in a Network (etc) OR Sender Medium Receiver 3) Full-Duplex Full-Duplex Mode: Data Data can can send send both both dire direct ctio ions ns/s /sid ides es at a time time (fro (from m sender to receiver and from receiver to sender). Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 82 Examples: Telephone Lines (etc) AND Sender Medium Receiver TYPES OF DATA: There are two types of data are 1) Digital Digital Signals: Signals: Computer use digital signals. Data in the form of “0” and “1”. Discrete data. Examples: Data stored in memory (etc) 2) Analog Signals: Signals: Telephone lines use digital d igital signals. Data in the form waves. Continue data. Examples: Human Voice (etc) MODEM: Modem is used to access Internet. Wor Word Mode Modem m com comes from from MOdula dulati tion on (Dig (Digit ital al to Anal Analog og)) and and DEModulation (Analog to Digital). Computer use digital signals, while telephone lines use analog signals. Modem is the medium between telephone lines and computer, which perform Modulation and Demodulation. Computer “A” wants to send a file to computer “B”, both should have modem and a protocol FTP (File Transfer Protocol). TRANSMISSION MEDIAS: Data travel from one computer to other through some media called transmission media or communication channels or communication media. Communication media includes Standard Telephone Lines Coaxial Cables Microwave Transmission Satellite Communication Fiber Optics Telephone Lines: Telephone lines are widely used as communication lines. Data travel over these lines in the form of Analog signals. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 83 Coaxial Cables: These are made up of copper. Transmission rate is 10 Mega bits per second (Mbps). Mostly used for long distance transmission. transmission. Prov Provid ide e high high qual quality ity data data trans transmi missi ssion on witho without ut dist distor ortio tion n or loss loss of signal. Microwave Transmission: These use air for data transmission. Data transmit in the form of waves. Transmission speed is faster than Telephone lines and Coaxial cables. Transmitters are installed on high buildings. Two stations must be within sight of one another. Satellite Communication: Ideal for long distance communication. Very fast transmission transmission speed. Satellites are placed about 22,000 miles above the earth. There There are many many earth earth station stations s with with antenn antennas as which which receive receives/se s/sends nds signals from satellite. Satellites are launched either by rockets or by space shuttles. Fiber Optics: Thin glass or plastic tubes are used for data transmission. Data transmit through the speed of light. Transmission rate is more than a Billion bits per second (Bbps). Very costly Special devices are used to cut and install the cable. Conv Conver erter ters s are are used used at the the both both ends ends of the the cabl cable, e, whic which h conve convert rt electrical electrical signals into light and vice versa. ENCODING ENCODING DIFFERENT TYPES OF DATA: Two types of a data are Analog Signals Digital Signals Computer use digital signals, while telephone lines use analog signals. Analog signals should be change into digital signals for transmit over teleph telephone one lines and and then then change change back to digita digitall data data for proces processin sing g inside the computer. Modem is used for changing data from Digital to Analog and Analog to Digital. EXERCISE vii Data Communicat Communication ion viii Half Half Duplex Duplex ix Asynch Asynchron ronous ous x Synchro Synchronou nous s Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 84 xi Relay Relay Station Station xii Modula Modulatio tion n xiii xiii Mode Modem m xiv xiv Baud Baud COMPUTER NETWORKS COMPUTER NETWORKS: Connection between two or more Computers, so that they can communicate with each other. Types of a network: Types of network are the following. LAN (Local Area Network) WAN (Wide Area Network) MAN (Metropolitan Area Network) Local Area Network (LAN): LAN is a network that spans limited physical area. LANs LANs are are usua usualllly y used used for for shar sharin ing g prin printe ters rs,, hard hard disk disk,, hard hardwa ware re devices, and software applications (etc.). LAN is a high-speed connection. Used in small office, computers Labs. Wide Area Network (WAN): WAN is a Network that spans a large number of areas. It may operate nationwide or worldwide. NETWORKING CONCEPTS: Server: If a computer shares resources for other to use then it is called a server. Server are often more powerful, more faster, more memory and more disk space than client. Client: When the computer access the resources form other, then we can say that is a client. Clients are usually less powerful, less memory, less speed and less disk space than server. LAN Card or NIC Card (Network (Network Interface Card): NIC card or LAN cards are used for data communication. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 85 LAN cards are used in Local Area Network. Modem: Modem is used to access internet and data communication in WAN. Types of a network: There are two types of network. 1. Dedicated Dedicated server network or client server network. 2. Peer-to-Peer network. Dedicated server network: Normally used in both in LAN and WAN. There is a server with many clients. Server can provide o File sharing o Printer sharing o Application sharing o Access to the internet and o Security. Peer-to-Peer network: Normally used in LAN. Also called workgroup. No central computer (Server). (Server). All computers are having equal functionality. A single computer will be server when it will serve to other Computers, and become a client when request for resources to Other. Networking Software: Software, which provide feature for communication. These These softw softwar are’ e’s s are are also also call called ed netw networ orkin king g oper operat atin ing g syste system m (NOS). Examples are WIN XP, WIN 2000, LINUX, and UNIX etc. Workgroup Computing and Groupware: A workgroup is a collection of individuals working in a task. They can send e-mail to each other's, shared data and schedule meetings. Groupware is software that supports workgroup computing. NETWORK TOPOLOGIES: Cabling layout of a network is called topology. Network topologies are following. o Bus o Ring o Star Bus Topology: Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 86 All computers are connected with a single cable called a bus. At the end of bus, terminator is installed that absorbs the singles. Data Data trav travel els s alon along g the the cabl cable e until until it reac reache hes s to the the requ require ired d computer. Suitable for small networks. If any computer goes down all network will goes down. It uses Carrier Sense Multiple Access (CSMA) technology. Ring Topology: Its shape is just like a ring. Each computer is connected connected with its to adjacent computers. computers. Data will travel in one direction around the ring. If any computer goes down then all network will goe s down. Star Topology: All computers are connected with a central device called hub. Very popular for small networks. networks. More expensive than bus topology. Data Data will will send send to hub hub than than hub hub will will send send it to the the requ requir ired ed computer. If any computer goes down there is no effect on network. ISO and OSI Model: ISO Developed a standard for data communication called Open System Interconnection. OSI has seven layers. o Physical Layer o Data Link Layer o Network Layer o Transport Layer o Session Layer o Presentation Layer o Application Layer Physical Layer: This layer deals with system of bits. Collect data from upper layer and send it to required computer in the form of bits. RS-232 connector is used for data transmission. Data Link Layer: Responsible for node-to-node delivery of message. Control the rate of flow of data. Network Layer: It deci decide des s whic which h path path of data data shou should ld send send from from one one node node to other. Swit Switche ches, s, Rout Router ers s and and NIC NIC Card Cards s (Netw (Networ ork k inte interfa rface ce card card)) decid decides es the the rout routin ing g base based d on netw networ ork k condi conditio tions ns,, prio priori rity ty of service and other factors. factors. TCP/IP is very important protocol of this layer. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 87 Transport Layer: Responsible for end-to-end delivery of entire message. If the link goes down then this layer send data into other link (Path). Arrangement of data in its order. Remove errors. Control rate of flow of data. Session Layer: Establish a connection between two-application across network. f unction n is performing performing Its functio o Security o Logging o Administration Presentation Layer: This layer represents represents data in user understan understan dable form. Techniques used are o Translation o Encryption REVIEWED o Compression ByByuser at Afridi 1:05 pm, 1/13/10 Azmat 13/01/2010 Application Layer: This layer serves the user. User can control it directly. It includes services such as o E-mail o File sharing o File printing and other software PROTOCOLS: Protocols are set of rules that transfer data from one location to another. Network has many protocols. o TCP/IP o IEEE 802.X Standard o IEEE 802.3 and 802.5 Standard o IEEE 802.6 Standard. TCP/IP: TCP/ TCP/IP IP stan stands ds for for tran transm smis issi sion on cont contro roll prot protoc ocol ol/I /Int nter erne nett protocols. TCP/IP protocol communicates between two similar or dis-similar computer systems. Very popular protocol in large networks. It is used in Network layer and transport layer. Example are 192.168.0.10 10.0.0.15 IEEE 802.X Standard: IEEE stands for Institute Institute of Electrical Electrical & Electronics Electronics Engineers Engineers (IEEE). Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 88 IEEE has developed a set of standard about cabling, Topology and Access time of network products. The general committee working working on these standard is called called 802. This standard is used in lower two layers (Physical & Data Link Layer). IEEE 802.3 and 802.5 Standard: IEEE 802.3 uses carrier sense Multiple Access (CSMA) on bus topology. IEEE 802.6 standard used in Token Ring Topology. IEEE 802.6 Standard: IEEE 802.6 use in Metropolitan Area Network (MAN). EXERCISE xv Netw Networ ork k xvi Dedicat Dedicated ed Server Server xvii xvii Peer-t Peer-to-P o-Peer eer xvii xviiii WAN WAN xix Groupw Groupware are xx Topo Topolo logy gy xxi Protoco Protocols ls xxii xxii Netwo Network rk NETWORK: Conn onnect ection ion of more more than han one one Comp Compu uters ters so that hat they hey can can Communicate, Exchange Information, and Share Resources. Uses of Networking: Sharing Hardware Resources (Printer, Scanner, CD-ROM etc.) Sharing Software Resources (Programs and Data) Easy Backup Communication and Messaging Hardware Requirement for a Computer Network: Computers NIC Card or LAN Cards or Ethernet Card Wires (UTP Cat5) RJ-45 Connectors HUB / Switch TYPES OF NETWORK: Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 89 Following are the types of network Local Area Networks (LAN) Wide Area Networks (WAN) Metropolitan Area Network (MAN) Local Area Network (LAN): LAN normally operates within a compact area such as an Office Building or a Campus. LAN is capable of interconnecting a large number of computers and other devices within 1 Km. A LAN tends to use only one type of transmission medium. LANs are usually used for sharing printers, hard disk, hardware devices, and software applications (etc.). Physical medium is used for data transmission. Transmission medium used are UTP (Un-Shielded Twisted Pair) Cable, STP (Shielded Twisted Pair) Cable or Fiber Optic Cable. Data transmission Speed is high. (i.e.) 10/100 mbps Installation cost is low. Normally owned by a single organization. Success Rate of Data Transmission Transmission is almost 100%. Success (e.g.) (e.g.) Computer Computer Labs of Instituti Institutions, ons, Computer Computer Network Network in an Office, etc. Wide Area Network (WAN): WAN interc interconn onnect ects s differ different ent Sites, Sites, User User Termin Terminals als,, and enable enable LANs to Communicate with each other. They exist in an unlimited geographical geographical area. Used to Communicate to Nationwide or Worldwide. Transmission medium used are Telephone Lines, microwave and Satellite links. Devices used are HUB, Switches, Routers (etc.) Speed of Data Transmission is 1800 to 9600 bits per second. Very High Installation cost as Compare to LANs. Not owned by a single organizatio organization. n. Complex structure than LAN. There is more chance of errors due to the distance data travels. Success Rate of Data Transmission is less than LAN. (e.g.) (e.g.) Internet, Internet, Network Network of all Branches Branches of a Bank. METROPOLITAN AREA NETWORK (MAN): A MAN interconnects different Sites, User Terminals, and enables LANs to Communicate with each other but within a city. It covers region larger than LAN but smaller than WAN. MANs normally covers an area of between 5 to 50 Km. Like WAN it is not owned by a single organization. Installation cost is high than LAN but less than WAN. Data transmission speed is high than WAN but less than LAN. (e.g.) Network of different different branches branches of a company company within within city (e.g.) Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 90 NETWORKING CONCEPTS: Server: If a computer shares resources for other to use then it is called called a server. server. Server are often more powerful, faster, more memory and more disk space than client. Client: When the computer access the resources form other, then we can say that is a client. memory, less speed Clients are usually less powerful, less memory, and less disk space than server. LAN Card or NIC Card (Network Interface Card): NIC card or LAN cards are used for data communication. LAN cards are used in Local Area Network. WAN Card or MoDem: Modem is used to access Internet. Word Modem comes from MOdulation (Digital to Analog) and DEModulation (Analog to Digital). Comp Comput uter er use use digi digita tall sign signal als, s, whil while e tele teleph phon one e line lines s use use analog signals. Mod Modem is the the medi mediu um betw betwee een n tele telep phone hone lines ines and computer, which perform Modulation and Demodulation. Networking Software: Software, which provide feature for communication. These software’s are also called network operating system (NOS). Examples are WIN XP, WIN 2000, LINUX, and UNIX etc. NETWORK TOPOLOGIES: The term topology refers to the way a network is laid out. OR Cabling Cabling layout layout of a Network Network is called Network Topology. Topology. OR Physical Physical layout of a network network is called called Network Network Topology. Topology. Network topologies are o Bus Topology or Linear Topology o Star Topology o Ring or Token Topology o Mesh Topology o Tree Topology Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 91 Bus Topology: All Computers will be attached with a long cable called a Bus or Trunk or Back bone cable. Multi-Point Communication. No security of data. data. Not recommended for large or sensitive networks. T-Connectors and Terminators are used. It uses uses Carr Carrie ierr Sense Sense Mult Multip iple le Acce Access ss (CSM (CSMA) A) tech techno nolog logy y for for data transmission. Advantages are o Least amount of Cabling of any topology. o Suitable for small networks o Adding additional nodes is easy Disadvantages are o If main Cable breaks, then whole Network will goes down. o If any link goes down, then network will goes down. o Only one medium for Data Transmission so Transmission Speed is very slow. o Terminators are requires at the both ends. Star Topology: Most common use now a day. Point-to-Point or Uni-cost Communication. Security of data. All Computers will be connected to a Central controller, usually called a HUB or Switch. Central device (Switch or HUB) has addresses of all computers connected to it. If one device wants to send the data to another, it sends the data to the controller, which then relays the data to other connected devices. Advantages are o Fast Communication Speed as compared to Bus Topology. o Easy to install and wire. o If one computer fails, no effect on network. o Easy to detect and remove faults. Disadvantages are o High installation cost as compared to Bus Topology. o If central device fails then entire network network will goes down. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 92 Ring Topology: Its shape is just like a ring. Also called Token Ring Topology. Connects the nodes (computers) in a circular Chain. Point-to-point Communication only with two devices on either side of it. A signal or Token is passed along the ring in the direction (Anti Clock Wise), from device to device, until it reaches its required destination. Better Better Perfor Performan mance ce than than Bus Topolo Topology gy but less less effect effective ive than than Star Topology. Not very common used for large networks. Advantages are Adding additional nodes is easy. All computers computers have equal access on network. network. Disadvantages are Difficult to configure If Cable breaks, then whole Network will goes down. If any link goes down, then network will also goes down. Only one medium for Data Transmission so Transmission Speed is very slow. DATA COMMUNICATION: “Trans “Transfer ferrin ring g or Exchang Exchange e of inform informati ation on or messag messages es from from one point to other is called data communication”. BASIC ELEMENTS OF DATA COMMUNICATION: COMMUNICATION: Three basic elements are 4) Transmitter Transmitter or Sender: Sender: Who sends data called a Sender. OR Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 93 Transmitting device is called sender. 5) Medium Medium:: Which carries informatio information n called a Medium. Medium. Such as cables, air (etc) 6) Receiver: Receiver: Which receives the information, called a Receiver. Sender Medium Receiver DATA COMMUNICATION MODES: There are three modes of data communication 4) Simplex Simplex Mode: Mode: Data can send only in one one direc directi tion/ on/si side de (from (from sender to receiver). Examples: Radio, Television (etc) Sender Medium Receiver 5) Half-Duplex Half-Duplex Mode: Data can send both directions/sides but only in one dire direct ctio ion/ n/si side de at a time time (fro (from m send sender er to rece receiv iver er or from from receiver to sender). Examples: Wireless set, Computers in a Network (etc) OR Sender Medium Receiver 6) Full-Duplex Full-Duplex Mode: Data can send both directions/sides at a time (from sender sender to receiver and from receiver receiver to sender). Examples: Telephone Lines (etc) Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 94 AND Sender Medium Receiver TYPES OF DATA: Two types of data 3) Digital Digital Signals: Signals: Computer use digital signals. Data in the form of “0” and “1”. Refers to something that is discrete. di screte. A set of specific points of data with no other points in between. example of digi igital data is data sto stored in the An exa memory of a computer in the form of 0s and 1s it is usually converted to digital signal when needed to be transmitted. 4) Analog Signals: Signals: Telephone lines use Analog signals. Analog refers to something that is continuous. A set of specific points of data and all possible points in between. Data in the form of waves. exampl mple of anal analo og data ata is huma human n voice oice when hen An exa somebody speaks a continuous wave is created in the air. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 95 NETWORK OR TRANSMISSION MEDIAS: Data travel from one computer to other through some medium call called ed trans ransmi miss ssio ion n med media or comm commun uniicat cation ion cha channel nnels s or communication media. Medias is classified classified into two types Medias Boun Bounde ded d or Guid Guided ed (In (In Boun Bounde ded d or Guid Guided ed phys physic ical al media is used. Such as cable system) Unbounded or Unguided (Unbounded (Unbounded or Unguided Unguided media is wireless. Signal is usually transmitted through air) Communication media includes Standard Telephone Lines Coaxial Cables Microwave Transmission Satellite Communication Fiber Optics Telephone Lines: Telephone cable is used to access internet. Normally used in WAN and MAN for data transmission. It has low cost as compare to other transmission Medias. Telephone lines are widely used as communication lines. Data travel over these lines in the form of Analog signals. Coaxial Cables: These are made up of copper. A plastic layer provides insulation between the copper wire and metal shield. Metal shield helps to block any outside interference. Transmission rate is 10 Mega bits per second (Mbps). It is less expensive than Fiber Optic. Mostly used for long distance transmission. Provide high quality data transmission without distortion or loss of signal. It can be classified in two categories o UTP (Unshielded Twisted Pair Cable) o It has maximum range of 100 meters (328 feet). It consists of 2 or 4 twisted wire pairs. Widely used in LANs. STP (Shielded Twisted Pair Cable) Same as UTP but it is covered with a shield for resistance. It is more reliable and faster than UTP. It covers long distance. Normally used as a back bone cable. Microwave Transmission: transmission. n. These use air for data transmissio Data transmit in the form of waves. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 96 Very useful for lone distance communication. It has high cost. It is very difficult difficult to install. install. Data Data tran transm smiss issio ion n spee speed d is slow slow as compa compare red d to phys physica icall or guided Medias. Transmitters are installed on high buildings. Two stations must be within sight of one another. Difficult to detect and remove errors. Normally Normally telecommuni telecommunicatio cation n companies companies use microwave microwave signals signals for data transmission. Satellite Communication: Ideal for long distance communication. Coa xial and Fiber Transmission speed is slow as compared to Coaxial optic cables. Satellites are placed about 22,000 miles above the earth. This technique has very huge cost. Difficult to install. Data transmission in the form of waves. It covers very large area of the earth. There are many earth stations with antennas which receives/sends signals from satellite. Satellit Satellites es are launched either by rockets rockets or by space shuttles. shuttles. Difficult to detect and remove errors. Fiber Optics: Thin glass or plastic tubes are used for data transmission. Data transmit through the speed of light so that’s why it provides very high data transmission speed. Transmission rate is more than a Billion bits per second (Bbps). It has very high cost. Special devices are used to cut and install the cable. Very difficult to install. Converters are used at the both ends of the cable, which convert electrical signals into light and vice versa. Normally used for long distance communication. Very secure and reliable data transmission. OSI LAYERS ISO AND OSI MODEL: ISO Developed a standard for data communication called Open System Interconnection (OSI). It’s a model that allows two different systems to communicate with each other. It is not a protocol, it’s a standard. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 97 Used for understanding and designing network architecture. OSI Model has seven separated separated but related layers. o o o o o o o Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer ( Please Do Not Trust Sales Person Advice ) ( All People Seem To Need Data Processing ) Physical Layer: This layer deals with stream of bits. Collect data from upper layer and send it to required computer in the form of bits. RS-232 connector is used for data transmission. Control Data Flow rate. Define Physical Medium. Define Define Transm Transmiss ission ion mode mode (Simpl (Simplex, ex, Half-D Half-Dupl uplex ex or FullFullDuplex). Data Link Layer: Responsible for node-to-node delivery of message. Control the rate of flow of data. Make Data error free. Making Access to the link for data transmission. Network Layer: It deci decide des s whic which h path path of data data shou should ld send send from from one one node node to other. Swit Switche ches, s, Rout Router ers s and and NIC NIC Card Cards s (Netw (Networ ork k inte interfa rface ce card card)) decid decides es the the rout routin ing g base based d on netw networ ork k condi conditio tions ns,, prio priori rity ty of service and other factors. factors. TCP/IP is very important protocol of this layer. Transport Layer: Responsible for end-to-end delivery of entire message. If the link goes down then this layer send data into other link (Path). Segmentation and Reassembly of data Remove errors. Control rate of flow of data. Session Layer: Establish, Maintain and Synchronize a connection between two Communication Systems across the network. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 98 Its functio f unction n is performing performing o Security o Logging o Administration Presentation Layer: This layer represents data in user understandable form. Techniques used are o Translation o Encryption o Compression Application Layer: This layer serves the user. User can control it directly. It includes services such as o E-mail o File sharing o File printing and other software Hardware Equipment Equipment for LAN Computers NIC or LAN Cards UTP Cat 5 Cable RJ-45 Connectors Switch / Hub Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 99 REVIEWED By atAfridi 1:0513/01/2010 pm, 1/13/10 Byuser Azmat STRAIGHT CABLE CABLE SIDE A SIDE B Cable # Colour Cable # Colour 1 White-Orange 1 White-Orange 2 Orange 2 Orange 3 White-Green 3 White-Green 4 Blue 4 Blue 5 White-Blue 5 White-Blue 6 Green 6 Green 7 White-Brown 7 White-Brown Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 8 Brown Computer to Switch / Hub 8 = Mobile U.A.E+971-50-2380181 100 Brown Straight Cable MCSE (Microsoft Certified System Engineer) Version: MCSE 2003 Papers: 1) Windows Windows Xp Xp Professional 2) Windows Windows 2003 2003 Server Server Enterprise Enterprise 3) Active Directory Services (ADS) Core 4) Planning Network Infrastructure Infrastructure 5) Implementation Implementation Network Infrastructure Infrastructure 6) Designing Designing Active Directory Directory Services Services + Infrastructure Infrastructure Or Network Design Designing Security using Windows 2003 7) SQL Server Server or ISA Server Server or Exchange Exchange 2003 or SMS Fee per Paper 50 Dollar = Rs. 3,000/- Recommended Books: Sybex Press Microsoft Press Course Duration: 3 Months Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 101 LECTURE 1 Hardware Requirement for a Computer Network: Computers NIC Card or LAN Cards or Ethernet Card Wires (UTP Cat5) RJ-45 Connectors HUB / Switch NIC CARD: NIC Card having RJ-45 Port. Slot is called PCI. NIC Card having a chip called NPU (Network Processing Unit). NPU is responsible for Sending / Receiving data. NPU has further two chips inside. RX (Receive data from wires) TX (Transmit data to motherboard) RJ-45 having 8 pins. 1, 2 wires for Transmit 3, 6 wires for Receive Remaining 4 wires are for future use. 1 Gbps or 10 Gbps use all 8 wires for communication. TYPES OF NIC CARD: Ethernet Token Ring FDDI ATM Wireless (Common used) (Old Technology) Technology) (Costly) (Very Costly) (Less Speed, No Security) Ethernet: Ethernet Card (100 Mbps) Used Ethernet Card having Cost (Rs. 50) Switch Speed is 100 Mbps 1 Gbps Ethernet Card (Rs. 1200) 100 Mbps Switch (Rs. 1200-1400) Normally used in Computer Labs. REVIEWED ByByuser at Afridi 1:06 13/01/2010 pm, 1/13/10 Azmat Fiber Optic: Fiber Card Fiber Cable (Rs. 3000-4000) Very Costly Network Very Fast Communication Processing Speed is very fast Media converters are used between Fiber network and other network. Normally used in Server Rooms. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 102 ATM (Asynchronous Transmission Mode): Basically designed for Audio and Video Conferencing. Very Expensive Technology. Technology. ATM Cards and ATM Switches are used. Normally used as ISP back bone, Manager Rooms (etc) NETWORK OF TWO COMPUTERS: Method 1 (COM Port to COM Port): COM Port is also called Serial Port or 9 Pin Male Port Null Modem Cable (Cost is Rs. 200) Data Transmission Speed is 1 Mbps Transmission range is 10-12 feet Lap link software can be used for configuration We should configure one computer as a Host and other as a Guest Data will transmit through one wire out of 9 Method 2 (Parallel Port to Parallel Port): Parallel Port is also called LPT or Female Port Null Modem Parallel Cable Data Transmission Speed is 8 Mbps Transmission range is 10-12 feet Data will transmit through 8 wires at a time Method 3 (USB Port to USB Port): USB to USB Cable Data Transmission Speed is 30 MBps Software is available on Internet Two types of USB Port are USB Port 1 = Less Speed USB Port 2 = Fast Speed (New P-IV have this Port) Method 4 (Infrared to Infrared): Used in Laptops or Mobiles Wireless Communication Communication within line of sight Transmission range is 12-15 feet Built-in Software If computer has not Infrared port then Infrared device is used for data communication Method 5 (Bluetooth to Bluetooth): Latest Technique Wireless Communication No need of line of sight Transmission range is 12-15 feet Speed is better than Infrared Method 6 (Modem to Modem): Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 103 Two Telephone lines On Sender / Server side configure Dial-up Setting On Receiver / Client side configure Dial-in Setting Method 7 (NIC Card to NIC Card): Cross Cable will use for connectivity between two NIC Cards. If computers are more than two then Switch / HUB (Hybrid Universal Bus) will used as a Central device between computers. Straight Cable is used between Switch / HUB and Computer (b/c in switch / HUB 1&2 Cable is for Receive and 3&6 Cable is for Transmit). CABLE CONFIGURATIONS: Configurat Configuration ion of a Cross Cable: SIDE A Cable # 1 2 3 4 5 6 7 8 Color SIDE B Cable # Wh White-Orange Orange White-Green Blue White-Blue Green White-Brown Brown 1 2 3 4 5 6 7 8 Color White-Green Green Wh White-Orange Blue White-Blue Orange Wh White-Brown Brown Cable between two Computers Cable between two Ports of Switch / HUB Cable between two Up-Link Ports of Switch / HUB Configuration of a Straight Cable: SIDE A Cable # 1 2 3 4 5 6 7 8 Color Wh White-Orange Orange White-Green Blue White-Blue Green White-Brown Brown SIDE B Cable # 1 2 3 4 5 6 7 8 Color White-Orange Orange Wh White-Green Blue White-Blue Green Wh White-Brown Brown Cable between Switch / HUB and Computer Cable between Up-Link to any other Port of Switch / HUB MDI (Media Dependent Interface): Uplink standard is called MDI. Uplink port and connected port are basically one port. MDI / MDI.x standard is used in modern switches. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 104 MDI MDI / MDI. MDI.x x stan standa dard rd use use to conv conver ertt cabl cablee com combina binati tion on as per per requirement. Un-Shielded Twisted Pair Cable (UTP): Common types are o CAT 5 (Width = 27 awg, Twist = 5-7 per inch) CAT 5e (Enhanced Version) o o CAT 6 (Width = 24/25 awg, Twist = 7-11 per inch) Voltages can drop due to resistance of copper wire. If number of twists is more then more security of data. Outer cable is called “ Ring Cable” and inner cable is called “ Tip Cable”. Ring cable protects the tip cable. For Tx, Rx wires will use in pair format. LECTURE 2 Versions Versions of Windows Xp: 1. Home Home Edition Edition (for home users) 2. Professio Professional nal Edition Edition (for networking environment) 3. Media Media Centre Centre Edition Edition INSTALLATION OF WINDOWS XP: Hardware Requirement (Microsoft Recommended): Processor = P-II RAM = 64 MB H.D.D = 1.5 GB Hardware Requirement (Normally Recommended): Processor = P-III (800 MHz) RAM = 256 MB = 10 GB H.D.D Installation Types: 1. CD-Based Attended Installation Installation (Normal Installation) 2. CD-Based Un-Attended Un-Attended Installation Installation (Installation through answer file) 3. SysPr SysPrep ep (System Preparation) 4. RIS (Remote Installation Services) BIOS (Basic Input / Output System): BIOS are the collection software stored in ROM will run when computer turns on. Normal sizes of BIOS are 256 KB, 512 KB, and 1 MB. BIOS having files / software Post Check all components which are attached to Main Board Boot Loader Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 105 Search Operating System from all storage medias (H.D.D, F.D.D, CDROM, USB) Copy Operating System from storage media to RAM. Setup Utility Drivers PnP (Plug and Play) Tools Installation: Boot from windows Xp Bootable CD. Create Partitions as per requirement (Partition should not exceed than 10 GB) Format the Hard Drive (Format is the method of creation sectors and tracks on Hard Disk). Quick Format (Just Check File System) Normal Format (Check all sectors and tracks of Hard Disk) Three default folders of windows Xp are Windows (having windows files) Program Files (having all third party software) Documents and Settings (having documents) Three default files will copy to hard disk are called system files NTDLR Boot.ini NTDetect.com The boot file is NTosKrnl.exe FILE SYSTEMS: File System is just like Index which contains names, location and other information related to files and folders. File systems are FAT16 (DOS) FAT32 (Windows 98 having Add, Remove features) NTFS (WinNT, 2000, Xp having Encryption Techniques ) m e st y S e li F a t a D n o ti r o P Hard Disk Master Master Boot Record (MBR): Master Boot Record or Zero Sector is not a part of C Drive. MBR having 512bytes in size. Recommendation: Hard Disk should be formatted after 3 or 4 months for better performance. CD-Based Un-Attended Installation: Answer File: SetupMgr is the software which is used to create answer files. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 106 Windows Xp CD→ CD → Support→ Tools→ Deploy.cab Extract “Deploy.cab” file you will see a file “SetupMgr.exe”. Click “Next” then click on “Create a new answer file”. Click “Un-attended Installation” then click “Windows Xp Professional”. Click “Fully Automated” then click on “Setup from CD”. Click “Accept License”. Give answers according to given questions. After creation of answer file you can save into floppy (winNT.sif) or CD (unattend.txt). Insert bootable CD and floppy (having answer file) and start installation. Service Pack: Service Packs are collection of software used to repair / remove errors / bugs from windows operating system. Three Service Packs of windows Xp are Service Pack 1 Service Pack 2 Service Pack 3 (In Progress) Pagefile.sys Pagefile.sys or Virtual Memory Memory or Swap File: When capacity of RAM will full of active programs then there is area on Hard Disk which will act as RAM (use for storage of programs). Page file contains information about RAM. Page file should not be on drive which have operating system. My Computer→ Computer→ Advanced → Settings → Advanced → Change Bootable CD: When we copied bootable CD to any location then only data portion is copied. If we want want to copy copy Data Data Port Portio ion n as well well as Boot Boot area area then then thro throug ugh h Nero Nero burning ROM we will create image on bootable CD and copy this image to other CD. Bootable CD = Boot Area + Data Portion Boot Area Data Portion Administrator: The The pers person on who who insta install llss wind window owss or any any othe otherr soft softwa ware re is call called ed “Adm “Admin inis istr trat ator or”. ”. Admi Admini nist stra rato torr can can be a “Net “Netwo work rk Admi Admini nist stra rato tor” r” or “Hardware Engineer” Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 107 LECTURE 3 DISK DUPLICATOR: DUPLICATOR: Disk Duplicator is a device used to copy data of Master drive to Slave drives. Hardware should be same for all computers. We can attach many slave drives with disk duplicator. Functions of Disk Duplicator are Create Partitions Format Drives Copy data of Master drive to Slave drives Price of Disk duplicator is almost 1 or 3/2 lac. Disk duplicator is very expensive technique so alternate solution is Norton Ghost or Win Image Norton Ghost: Norton Ghost is used to Copy data from master drive to slave drive. Main features of Norton Ghost are Disk-to-Disk Partition-to-Partition Partition-to-Image REVIEWED Partition-from-Image ByByuser at Afridi 1:06 pm, 1/13/10 Azmat 13/01/2010 Two methods of cloning / copying data are Windows Based DOS Based Windows Based: Install Norton Ghost on windows environment. Attach another Hard disk and make it slave. Norton will copy all sectors of master drive with data to slave. This method is called Cloning or Image. DOS Based: Insert Bootable CD of Norton Ghost Run Norton Ghost Copy data from master drive to slave drive SysPrep (System Preparation) Installation: By using Norton Ghost all computers will have same Name, IP address, Domain so there is a problem in networking environment. SysPrep is provided solution of above problem. “SysPrep” is available in “setupmgr.cab” file. “SysP “SysPre rep” p” will will remov removee Syst System em Name Name,, IP addr addres ess, s, CD-K CD-Key ey,, CID CID (System Identifier). “SysPrep” file will use on master system. Run “SysPrep” file and select “mini setup mode” then click on “OK” button. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 108 Window will shut down and start in mini setup mode and write answers of questions. Mini setup mode can remove through making answer file. SysPrep.inf Copy this file into C:\SysPrep USER ACCOUNTS: SAM SAM (Secu (Securi rity ty Acco Accoun untt Mana Manage ger) r) is the the data databa base se whic which h cont contai ains ns information about user accounts. Only Administrator can create user accounts. User name and Password will be checked in SAM database. Two types of profiles are Local Profile or Default Profile Roaming Profile Local Profile or Default Profile: Profile: After verification computer will load User prof ile or Local profile or Default profile (Desktop Settings, My Documents, Color Schemes) from C:\ Documents and Settings If user user prof profil ilee is not not avai availa labl blee in C:\ C:\ Docu Docume ment ntss and and Sett Settin ings gs then then default profile will load from C:\ Documents and Settings \ All User \ Default Computer → Manage→ Local User and Groups Right Click on My Computer→ or Run→ Run→ lusrmgr.msc→ Local User and Groups Check option “Password never expire”, otherwise password will expire in 42 days by default. Logoff the computer and then Login. Press “Ctrl + Alt + Del” (2 Times) at Login screen for simple login screen. Local profile technique is normally used in “Stand Alone Computers”. Roaming Profile: This technique is normally used in “Networking Environment”. All user accounts are on server. Windows will load profile other than C:\ Documents and Settings (from any other location). Example: Create a folder on D:\Profile Create a user named “Test”. Go to My Com Comput puter → Properties → Advanced → User Accounts → User Profiles Copy to Test profile to D:\Profile Check option “For everyone” Go to Local User and Groups → User 1 → Properties Profil Profilee Path Path : D: \ Profil Profilee We should change security policy Run → gpedit.msc →Administrative →Administrative Templates → System → Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 109 User User Profil Profiles es → Double Click on “Don’t Check for User Ownership….” → Enable Run → gpupdate Logoff the computer and Login as User 1. Computer will load test profile from D:\Profile for user 1. Conversion of FAT or FAT32 File System to NTFS: Run → cmd (Command Prompt) Command is as follow C:\> Conve Convert rt e: /fs:ntfs /fs:ntfs Classification of Processor according to functionality: PROCESSOR Celeron Normal Xeon (Server Based) LECTURE 4 APPLYING SECURITY ON FOLDERS: Open Folder Options. Go to View Tag and uncheck “Use Simple File sharing”. Then Go to Folder Properties → Security → Remove all Users → Click on Add → Advanced → Find Now → Add users as per requirement Apply Permissions to users as your requirement. Security window has two parts. ACL (Access Control List) Having user names ACE (Access Control Entry) Having user rights Administrator can view Secret data of any user by getting “Ownership” rights. Only Administrator has right at disk level. Sing Single le head head symb symbol ol repr repres esen ents ts “Use “User” r” and and Doub Double le head head sym symbol bol represents “Group”. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 110 DISK QUOTA: Quota is the space allocated by Administrator to users. Quota has two types 1) Default Default Quota Quota 2) User Base Quota Quota Default Quota: Equal spaced is allocated by administrator to all users. E: Drive → Properties → Quota Enable Quota Management Deny Disk Space Limit Space → 300 MB , Set Warning → 200 MB User Base Quota: Different space is allocated by administrator to all users. Drive → Properties → Quota → Quota Entries User E: Drive En tries → Go to User Properties → Limit Space → 300 MB , Set Warning → 200 MB MICROSOFT MANAGEMENT CONSOLE: It is software which makes Console (Container or Bags). It has windows management tools also called “Snap-ins”. All Snap-ins are stored in C:\Windows\System 32 Snap-ins has extension .msc. Run → MMC → File → Add / Remove Snap-ins Snap -ins → Add → Local User and Groups Save “Snap-Ins” on desktop. HARD DISK PARTITION: Logical division of Hard disk is called “Partition”. Two standards of Partition are 1. Basic Basic Disk Disk Standard Standard 2. Dynamic Dynamic Disk Standard Standard Basic Disk Standard: This This inclu includes des FDisk FDisk,, Disk Disk Manag Manager, er, Parti Partitio tion n Magic Magic,, and other other such such kind of tools. Supports all operating systems (Dos Based, Windows Based) One Disk should be “Primary”, then “Extended” and “Logical Drives” are in Extended. Maxi Maximu mum m 4 prim primary ary part partit itio ions ns can can be crea create ted d in this this stan standa dard rd but but norma normally lly we create create 1 Prima Primary ry and Remain Remainin ing g space space is alloca allocated ted for extended which is use for making Logical drives. Dynamic Disk Standard: Introduced in 1990s. Partition is Un-limited. Partition is called “Volume” in this standard. We can also create one partition of two disks. Supports Windows 2000, Xp and 2003 Server. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 111 “Disk Management” (Product of “Veritas Corporation”) tool is used for volume. Dynamic disk can’t be read in win98. Partition Magic can’t apply on Dynamic Disk. This standard is not used practically because this is software based and if operating system fails then we can’t access volumes. Types of partitions are 1. Simple Simple Volume Volume 2. Spanned Spanned Volume Volume 3. Stripe Stripe Volume Volume 4. Mirror Mirror Volume Volume 5. RAID5 RAID5 Volume Volume Simple Volume: Same as “Basic Disk Standard” but we can create volume as per requirement. Spanned Volume: We can create one volume of more than one hard disks. st nd rd Data will Read/Write through 1 drive, then 2 drive, then 3 drive and so on. Normally used in “Exchange Server”. (e.g.) (e.g.) 600 GB GB + 600 GB + 300 300 GB = 1500 1500 GB GB 1500 GB Stripe Volume: Enhanced form of “Spanned Volume”. In this method data will Read / Write simultaneously from all disks. If one drive fails then all data will be lost. Mirror Volume: If we create one volume through 100 GB + 100 GB then capacity shows 100 GB in this method instead of 200 GB. nd 2 drive will save all data of first drive automatically (Mirror copy of first drive). In this method both Hard disks should be same Company, same RPM, same Cache and same Size is recommended. Used for taking backup normally. We can use only 2 drives. If both drives fail then data can’t be recovered. RAID5 Volume: If we create one volume through 100 GB + 100 GB + 100 GB then capacity shows 200 GB instead of 300 GB. If one drive fails then data can be recovered form other drives. If two drives fail then data can’t be recovered. If data is “ABCDEF” then storage will be as A B C P Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 P E P D Mobile U.A.E+971-50-2380181 F U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Disk 1 Mobile U.A.E+971-50-2380181 Disk 2 112 Disk 3 Where “P” is the “Parity Bit”. LECTURE 5 TCP/IP (Transmission Control Protocol / Internet Protocol): IP ADDRESSING: ADDRESSING: NIC cards having unique addressing. Address is in the form of Hexa-Decimal. (e.g.) A1.B2.0 A1.B2.00.C1. 0.C1.D2.0 D2.01 1 (e.g.) Manu Manufa fact ctur urin ing g Comp Compan any y Name Name Num Number ber of NIC NIC Card Cardss desi design gned ed by com company pany IP address is in Network layer. IP address is of 32 bits. Classes of IP address: Sub-net mask specifies the direction of data (i.e.) where data is to be sent. Router sends data by checking sub-net mask. IP addresses having different classes are called IPV 4 (IP version 4). Class Name Network Bits Host Bits IP Range Sub-ne Sub-nett Mask Mask Range Range Starting IP Range Sub-ne Sub-nett Mask Mask Range Range Ending Class A 8 24 1.0.0.0 255.0.0.0 126.255.255.255 255.0.0.0 Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 Class B 16 16 128.0.0.0 255.255.0.0 191.255.255.255 255.255.0.0 Class C 24 8 192.0.0.0 255.255.255.0 223.255.255.255 255.255.255.0 Class D - - 240.0.0.0 255.255.255.255 Class E - - - - 113 127.0. 0.0. 0.0 0 To 127. 127.25 255. 5.25 255. 5.25 255 5 is used used for for devi device ce chec checki king ng called called 127. “Loopback” “Loopback” address. Class D is used for multitasking (not for normal communication). 240.0.0.0 To 255.255.255.255 are used by NASA for Research work. Private IP: Private IP can’t run on Internet because Router can’t understand private IP. Class Name IP Range Starting Class A 10.0.0.0 Class B 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255 Class C IP Range Ending 10.255.255.255 Public IP: Public IP are those who can run on Internet Services and Ports: SERVICE NAME PORT # WWW 80 DNS 53 SMTP 25 Telnet 23 POP3 110 SSL 423 Setting for Data Communication: NIC Card + Drivers Protocols (TCP/IP, IPx/SPx, Apple Talk, NetBeui) Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 114 Client Software File and Print Sharing IP Address PROTOCOLS: Protocols are set of rules that make communication possible. Some common protocols are IPx / SPx Apple Talk NetBeui TCP / IP IPx / SPx: Novell made this protocol. Not used now a day. Apple Talk: This is also not used now a day. NetBeui: In this method without IP address communic ation is possible. Not used now a day. TCP/IP: It is the default protocol of Win Xp. Very popular and common used now a day. TCP/IP is used for Internet Connectivity. Setting of NIC Card Properties: If all machines are Microsoft then check the option Microsoft Network comput uters ers having having differ different ent opera operatin ting g syste systems ms then then click click on Instal Installl If comp button and check the option Client Services for Netware For File and Printer sharing check option File & Printer Sharing Some Some Ethe Ethern rnet et Card Cardss havi having ng Spee Speed d 10 Mbps Mbps and and some some havi having ng 100 100 Mbps (Fast Ethernet Card) then Configure → Advanced → Media Type → Auto Select This will maintain Send / Receive speed of all computers. IP Assignment: IP Assignment Static or Manual Dynamic or Automatic (DHCP) DHCP (Any IP Range) APIPA (169.254.X.X) Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 115 Types of IP Addresses: Without IP address communication is not possible. Types of IP address are Manual or Static Automatic or Dynamic (DHCP, APIPA) Static or Manual IP: NIC Card → Properties → TCP/IP → Properties → Write IP Dynamic Dynamic or Automatic IP: Set option “Obtained IP Automatically”. Comp Comput uter er will will get get IP from from DHCP DHCP (Dyna (Dynami micc Host Host Conf Config igur urat atio ion n Protocol) Protocol) Server. If there is conflict of IP then a new IP will be assigned to computer by DHCP Server. APIPA: IF “Obtained IP Automatically” option is checked and DHCP server is not present then computer will assign IP itself which can be 169. 254. X. X This method in not suitable for large networks. DHCP Server: DHCP having list of IP’s. DHCP is a Server who will assign dynamically IP to computers. DHCP Server can be a Router, Computer or any other Hardware. Normally there is one DHCP server in a network. Packets: Data will transmit over network in the form of “Packets”. Maximum size of packet on Ethernet is 1500 Bytes. Maximum size is called M.T.U (Maximum Transmission Unit). Lost of Packets: Packets: If distance between computers to switch is more than 100 meter then packets will drop. Bad Cable causes lost of packets. Huge traffic over network. If cable is not properly made (Cable Pair Combination). Computer Name: Computer name can be checked through My Computer → Properties → Computer name or Run → cmd → hostname Services: It is the software which will run backhand automatically and perform some useful functions. Services can be Start and Stop according to our requirement. Control Panel → Administrative Tools → Services Sharing of Data: Right Click on folder → Sharing and Security → Sharing Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 116 Max number of user → 10 Window Xp supports maximum 10 users Accessing Share Folders: If we want to see all share folders then write command as Run → \\ 192.168.0.4 192.168.0.4 or Run → \\ Computer Name Where \\ = Network And 192.168. 192.168.0.4 0.4 = UNC (Univers (Universal al Naming Naming Conventi Convention) on) If we want to see a specific folder then writes command as Run → \\ 192.168.0.4 \ Data or Run → \\ Computer Name \ Share Folder Ping Command: Ping is software which is built-in in Windows, Linux operating System. C:\ Windows \ System32 \ Ping.exe If we remove “Ping.exe” then computer will not Ping. Ping command is used for checking connectivity on network. Run → Ping 192.168.0.4 Ping command will send 4 Packets each of 32 Bytes to target machine. If source machine get message “Replying from 192.168.0.4” then target machine is connected but if message is “Request time out” then target machine is not connected. Structure of Packet is as fallow Source Address Data Destination Address We can check own machine NIC Card as Ping 192.168.0.1 (Own IP) or Ping 127.0.0.1 (Loop back address or Local host address) or Ping Localhost or Ping Loopback We can check own machine IP as Run → cmd → IPconfig /all or NIC Card → Properties → Support If firewall in on / Activate on remote computer than remote computer will not reply through “Ping” command. our com compute puterr havi having ng IP “192 “192.1 .168 68.0 .0.1 .1:” :” and and we are are ping pingin ing g IP If our “10.0.0.1” the IP of other class then message will come “Destination Host Unreachable”. Unreachable”. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 117 Router is the machine which will connect computers having different IP addresses (IPs of different classes). Network Router Device Network Default Gateway: Normally IP (address of same class of network) of Router is used as a Default Gateway through which different networks having different IP classes communicates with each other. Pinging through Name (Name Resolver): “Name Resolver” is the software which is used to conver t computer / mach machin inee name name into into its its IP addr addres esss beca becaus usee Sour Source ce and and Dest Destin inat atio ion n addresses are in the form of IP address. If ping through name Ping PC4 Then operating system will sends “PC4 (computer name)” to “Name Resolver” which will convert “PC4” to its IP address. ICS (INTERNET CONNECTION SERVER): NIC Card → Properties → Advanced Allo llow oth other netw etwork users ers to con connect ect thro throu ugh Int Interne ernett Connection IP address of Proxy should be 192.168.0.1. Services Services of Proxy: 1. Proxy will will be “Default “Default Gateway” for for other computers computers connected connected to it. 2. Serve as a DHCP DHCP (Dynamic Host Configuration Configuration Protocol) Protocol) Server. Server. 3. Server Server as a DNS (Domain (Domain Name Name Source) Source) Server. Server. 4. NAT Services (Network Address Translation). Translation). Internet Proxy PC1 PC2 (Public IP) PC3 PC4 Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 118 (Private IP) We can can chec check k “Gat “Gatew eway ay”, ”, “DHC “DHCP” P”,, “DNS “DNS”, ”, and and “Sub “Subne nett Mask Mask”” through NIC → Properties → Support DNS is used to resolve names on Internet. “Default Gateway” & “DNS” are not required for internal Proxy Server. DSL Routers: Now a day “DSL Routers” are used as a Proxy server. Normally 4 port “DSL Router” is used as a Proxy Server. Router always checks “Destination Address or Target Address ” for data transmission. Internet DSL Router PC1 PC2 PC3 PC4 Tips: www.w www.what hatism ismyi yip.c p.com om (Shows (Shows the source source IP addres address) s) Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 119 LECTURE 6 NETWORK NAMES: Network Names Net Bios FQDN Net Bios: Used in LAN. Net Bios is of 13 Characters and Host name is of 65 Characters. Examples: PC1, PC2, Computer 100 (etc.) “Name Resolver” converts “Host name or Net Bios or Computer Name” into IP address by performing following steps. 1. Check Check Local Local name name or own name (if not found found then then next step step will be checked) 2. Chec Check k “LMH “LMHos osts ts.s .sam am”” File File (Lis (Listt of impo import rtan antt comp comput uter er names and their IP address). C:\ Windows \ System32 \ drivers \ etc \ LMHosts.sam (If not found then next step will be checked) 3. RAM RAM tabl tablee (Net (Net Bios Bios Remo Remote te Name Name Cach Cachee tabl table) e) will will be checked. We can view this table by following command Run → cmd → nbtstat –c Life time of “IP address” in cache table is 600 seconds. If we want want to make make empty empty Cache Cache table table then then follow followin ing g comman command d will be followed Run → cmd → nbtstat -r (If not found then next step will be checked) 4. Wins Wins Server Server will will be checked checked.. TCP/IP → Properties → Advanced → Wins (If not found then next step will be checked) 5. Broad cost cost on Network (192.168.0.255 (192.168.0.255 is used used for broad cost). (192.168.0.9) COMPUTER NAME (192.168.0.255) FQDN’s: FQDN stands for “Fully Qualified Domain Name” Give information about System and Network. Normally used in WAN. Examples: www.yahoo.com mail.gmail.com Where www = Computer name, yahoo.com = Network name Pc1.corvit.com Where Pc1 = Computer name or Net Bios Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 120 Corvit.com = Domain Name “Name “Name Resolv Resolver” er” conve converts rts “FQDN” “FQDN” into into IP addres addresss by perfo performi rming ng following following steps. 1. Check Check Local Local name. (if not not found found then next next step) 2. Check Check “Hosts” “Hosts” file. (if not not found then then next step) step) C:\ windows \ system32 \ drivers \ etc \ hosts 3. FQDN table table will will be checked. checked. (if not found then then next step) step) Run → cmd → ipconfig / d displaydns isplaydns (View FQDN table) Run → cmd → ipconfig / flushdns (empty FQDN table) 4. DNS will will be checked. checked. (If not found then then next step) step) TCP/IP → Properties → DNS DNS is normally ISP Server. Net Bios Vs FQDN: Net Bios FQDN LAN WAN LMHosts Hosts NbtStat –c IPConfig / Displayd aydns NbtStat –r IPConfig / Flushdns Wins DNS Symbol of Connectivity: Our Pc Network If yellow sign is appear on above symbol then NIC having IP through APIPA. Net View: “Net “Net View View”” Comm Command and is used used for for chec checki king ng,, “How “How many many syst system emss / computers are connected with network”? Run → cmd → Net View LECTURE 7 FILE SHARING AND SECURITY: How to Share a Folder: Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 121 Right click on required folder → Sharing and Security → Share this folder → Share name → ok Shared data can be accessed through UNC (Universal Naming Convention) Path Network Neighborhood Neighborhood Map Network Drive Most common way of accessing shared data is Run → \\172.16.0.100 Permission Permission / Security Security on Folder: Folder: We can assign permission to different users. Permissions can be Full Control Change Read Only Max 10 users can access shared data at a time in window s Xp. In standalone computer “NTFS” will check user permission. In Networking Environment “Network Permission” will be checked then “Local Permission” will be checked. “Network Permission” is “Read-Only” By Default. USEFUL TOOLS OF WINDOWS XP: “FASTWIZ” “FASTWIZ” Tool: This tool is used in GUI environment. Built-in tool of win Xp. This tool is used for coping Data and Configuration into USB Other Partition (D: or E :) Network Computer Normally used when format old system and install new system then first copy data from old computer then paste on new computer. System Tools → File and Setting Transfer Wizard For Win 98, Win 2000 Xp CD → Support → Tools → FASTWIZ “USMT” (User State Migration Migration Tool): Its function is same like “FASTWIZ”. DOS based program. Not used now a day. REVIEWED ByBy user at 1:06 1/13/10 Azmat Afridi pm, 13/01/2010 Firewall Firewall Tool: Service Pack 2 has three main features Windows Firewall Wireless Networking Pop-Up Blocker Internet Firewall is used to block un-wanted Incoming (Inbound) and Outgoing (Outbound) traffic of a computer. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 122 Control Panel → Firewall → General → ON → Ok Sniffers Software: It is use to view detail of Inbound and Outbound packets. Software’s are Ethereal Observers IRIS SYSTEM PROPERTIES: Advanced → Performan Performance ce → Settings Settings: Different Setting can be set according to our requirement o Let’s windows choose what’s best for my computer o Adjust for best appearance o Adjust for best performance o Custom Hardware → Device Manager: Shows the list of all hardware connected wit h computer. Hardware → Driver Signing: Microsoft checks drivers of products and grant license to driver creator companies. If some firm doesn’t take license and when we want to install driver of that firm then there is a “Driver Signing” problem. Hardware → Hardware Profiles: Basically designed for Laptop Computers. We can load Drivers or Services according to our requirement. We can view profiles when Boot / Restart computer. Automatic Updates: “Vits” service is responsible for automatic updating computer programs from Internet. This This proc proces esss slow slowss down down the the Inte Intern rnet et proc proces essi sing ng spee speed d so it is recommended that automatic updates should be tern off. Remote → Remote Assistance: Used to help other user remotely. Both computers should have windows Xp operating system. Can be used both on LAN and WAN. “Remote Assistance Invitation” must be sent for assistant. Check the option Allow Remote Assistance invitations to be sent from this computer Then click on Start Start Button Button → Help and Support → Invite a Friend → Invite Some Someon onee to Help Help You You → Advanced → Name, Expiry Time → Password → Save → Send File (E-mail (E -mail Attachment, USB, Network) Invitation will have information about IP Address Username Password Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 123 Remote → Remote Desktop: Use to connect with Remote computer’s desktop. Check option Allow users to Connect Remotely to this computer The click on Start Button → Programs → Accessories → Communications → Remote Desktop Connection → Computer → Connect Client Operating System: Client operating system is for users. Server Operating System: Server operating system provides services for Users / Clients. Windows Xp Vs Windows 2003 Server: S# 1 2 3 4 5 6 WINDOW WIN OWS S XP PROF OFES ESS SION ONA AL Clie Client nt o/s o/s (Des (Deskt ktop op Appl Applic icat atio ions ns)) Graphical VGA (2D, 3D) Audio Built-in CD Burning s/w Introduce in 2002 Not Very Stable WINDOW OWS S 2003 SER ERV VER Serv Server er o/s o/s (Bac (Backg kgro roun und d Serv Servic ices es)) Not Good Graphical (2D) Not Good for Audio No Software Introduce in 2003 Very Stable Conversion Conversion of “Windows 2003 Server” to “Windows “Windows Xp”: If we want to use “Server 2003” just like “Windows Xp” then following changes should be made in Server 2003 environment Administrative Administrative Tools → Services → Themes → Automatic → Start, then then Desk Deskto top p → Properties → Themes → Windows Xp Display → Advanced → Hardware Acceleration → Full Run → DxDiag → Display Direct Draw Acceleration → Enable Direct3D Acceleration → Enable AGP Texture Acceleration → Enable (Direct X Drivers are used for better result of drivers VGA, Sound Card) Administrator Tools → Services → Windows Audio → Enable → Administrator Automatic → Start → Ok Administrative Tools → Services → IMAPI CD Burning → Enable → Automatic → Start → Ok System Propertie Propertiess → Advanced → Performance → Settings → System Advanced → Application Programs Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 124 Information Technology: Information Technology is both Hardware and Software, and often including Networking and Telecommunications, usually in the context of a business or other enterprise. Peripheral Devices: Periph Periphera erall Devices Devices are used used as hardw hardware are compone components nts for differ different ent operations of data. o Input (Keyboard, Mouse, Scanner etc) Output (Monitors, Printers, Speakers etc) o o Storage (Disk, Tape Drive) Commonly used Operating Systems: MS-DOS MS-WINDOWS (3.1,3.11,95,97,98,Me,2000,Xp) MS-WINDOWS NT UNIX LINUX OS/2 MAC (used for Apple computers) Device Drivers: Device drivers make it possible for specific sp ecific hardware devices to function with the software on your computer system. Clock: Each CPU has its own internal clock. It gene genera rate tes s puls pulses es on a fixe fixed d rate rate to sync synchr hron oniz ize e all all comp comput uter er operations. CPU: It Stands Stands for “Central Processing Unit”. CPU is the brain of a computer. Transform raw data into useful information. CPU is responsible responsible for all Processing. It has two parts Arithmetic Logic Unit (ALU) Control Unit (CU) ALU: It stands for “Arithmetic and Logic Unit”. It is the part of Processor where actual processing takes place. It can perform perform Additi Addition, on, Subtrac Subtractio tion, n, Multip Multiplica lication tion,, Divisi Division, on, Square Square Root Roots s (etc) (etc) and and logi logic c oper operat atio ions ns such such as AND, AND, OR (etc (etc)) on bina binary ry numbers. CU: It stands for “Control Unit”. It is also an important part of Processor. It tells the computer that, “What specific sequence of operations it must perform”. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 125 It also specifies timing of the instructions. Its Its funct functio ion n is to Fetc Fetch, h, Decod Decode e and and Exec Execut ute e instr instruc ucti tion ons s that that are are stored in memory. It controls Memory Devices Arithmetic Logic Unit All Input/Output Devices Buses: Buses are wires, which used to carry data from one location to other inside the processor. Three main buses are Data Bus Address Bus Control Bus Registers: High-speed memory inside the CPU. Very small in size. Temporary storage for memory Addresses Addresse s and Instructions during the execution of the program. Read and execute the instructions. Processing Processing speed depends upon the size of register. register. Some common registers are Instruction Register (IR) Stack Register (SR) Memory Address Register (MAR) Program Counter (PC) Memory Buffer Register (MBR) Ports: Ports are combinatio combination n of wires wires through through which data travels. Two types of ports are Parallel Port Serial Port Computer Administrator: The The pers person on who who inst instal alls ls wind window ows s or any any othe otherr soft softwa ware re is call called ed “Administrator”. Administrator can be a “Network Administrator” or “Hardware Engineer” “Database” and “Database Management System”: A collection of information organized in such a way that a computer program can quickly select required data is called “Database”. DBMS is a program that enables users to Store, Modify, and Retrieve information from a database. Database Administrator: The person who will maintain database is called Database Administrator. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 126 Difference between “Data” and “Information”: Data is raw or unprocessed facts. Any form of a material is provided by a user via input devices to a computer is called data. Whe When data data is conv conver erte ted d into into mean meaniingfu ngfull for form then then it beco become mes s Information. Binary Numbers: In binary numbers we have only two digits “0” and “1”. Computer language is called machine language or binary language. Base of binary number system is 2. Bandwidth: Number of bits sent over a particular path is called Bandwidth. Packet: Chunks or Small parts of information sent over computer ne twork is called data packet. Real Time: Time critical tasks are refers as Real Time. Real time is the highest priority. Switch: Normally Normally used in LANs. It is uni-cost device. Used to receive data from computers and send it into specific computer. HUB: Functions are same like Switch but it is multi-cost device. Also used in LANs. Slow speed than Switch. Repeater: This device is used to boost up weak signals. Normally Normally used in LANs. Routers: Routers are used to specify routes to data packets. Normally Normally used in WANs. It is uni-cost device. Virtual Memory: An area of hard disk that the computer uses for RAM. Has slow speed than RAM. The created file is called Swap file and technique is called swapping. Booting: When user “Turn on” computer, it perform a series of steps then it will be ready for working this process is called “Booting”. Actu Actual ally ly duri during ng boot bootin ing g comp comput uter er will will chec check k all all I/O I/O devi device ces s and and hardware attached with computer. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 127 Boot Process is located in a chip called “BIOS( Basic Input and Output System)”. My Computer: It represents represents the different different secondary storage devices devices of your computer. computer. My Documents: It is the default location of saved files. Recycle Bin: When we will Delete Some File, it goes into Recycle Bin. We can Restore Files from Recycle Bin. After Deletion of Files from Recycle Bin, we can’t restore these th ese Files. My Network Places or Network Neighborhood: If your your comp comput uter er in on netw networ ork, k, It disp displa lays ys the acce accessi ssibl ble e hard hardwa ware re and and software resources on the network. Start Button: It provides an entry point to begin using programs installed on the computer’s hard drive. Wallpaper: It is a graphic file that forms the background of the desktop. Screen Saver: If computer is idle for long time it may lose monitor’s resolution. To prevent monitors resolution we use screen saver. Name of some Built-In User Accounts: Administrators Backup Operators Guests Power Users REVIEWED ByByuser at Afridi 1:06 13/01/2010 pm, 1/13/10 Azmat Dialog Box: It is Special types of windows use to communicate with software you are running. Dialog boxes cannot be resized. Icons or Shortcuts: Icons are placed on the desktop to provide easy access to program and files. Icons provide a quick way to start a program. Buffer: A temporary location to store information while the processor is busy. Clipboard: Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 128 Clipboard is the temporary location to store data. When we use “CUT” or “COPY” command, the selected text store on clipboard area. Internet and Intranet: Network of networks is called internet. It covers all across the world. Private internet or mini internet is called Intranet. It covers less area than Internet. IP Address: IP stands for “Internet Protocol”. Protocol”. Every computer on network has an IP address. Without IP address its impossible to communicate with other devices on network. Example 192.168.0.15 VGA Card: It stands for “Video Graphic Adaptor”. It is responsible to build image on monitor’s screen. scr een. File: User will write some data in Files. File is a single thing. File’s icon is same as the program icon in which it will made. Two Files of same program can’t contain same name at same location. Files names should be meaningful. File Extensions: Extension is used after Filename to identify the file. Some common extensions are o .Doc o .Xls o .Bmp o .Gif o .Ppt (etc) (etc) Folder: Folder is a collection of Files. Color of Folder’s icon is Yellow, but we can change its icon. Two Folders can’t contain same name at same location. Folder names should be meaningful. User can’t write in Folder. UNIX: Very powerful command line operating system. Developed in 1969 at Bell laboratories. Idea Ideall for for those those comp comput uter ers s which which stor store e infor informa mati tion on carri carried ed over over the the Internet (Network Server or Web Server). Its advanced form is Linux. Linux: It is advanced form of UNIX. It has all functions of UNIX and some own extra features. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 129 It is an open source operating system. Normally used on Network Server. Byte: Combination of 8 bits is called a Byte. Nibble: Half Byte (4 bits) is called Nibble. Bit: Each “0” or “1” in the binary system is called a bit (Binary Digit). “0” means “OFF” and “1” means “ON”. Firmware: Firmware is a combination of hardware and software. Examples are ROM, EPROM Freeware: This is copyright software given away for free fr ee by the author. Freeware are copyright software so you cannot make changes in it. Shareware: Most Shareware are delivered free of charge or having a small fee. If you want to use regular you will have to pay a small registration fee. Steps of Computer Programming: Techniques to write a program or develop a program has following steps 1. 2. 3. 4. 5. Defining Defining the Problem Problem Planning Planning the Solution Solution Coding Coding the Program Program Testing Testing the Program Program Documenta Documentation tion the Program Program 6. Upgrading the Program Protocol: Protocols are set of rules that transfer data from one location to another. Network has many protocols. o TCP/IP o IEEE 802.X Standard o HTTP o FTP o SMTP Virus: Virus is a small hidden program on a floppy disk or a hard disk. Virus can spread from computer to computer through infected floppy disk or over a computer network. Virus can damages damages Computer Programs Files Hardware Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 130 Anti-Virus Software: It is the software, which uses to check computer for virus. Most common are Mcafee Norton Anti-virus Dr. Solomon’s Anti-virus Thunderbyte Password: It is a secret code used to protect system. Password can apply on Files Folders Database Computer Web Sites (etc.) Multitasking: Working on more than one Program at a t ime is called multitasking. (e.g.) working on Excel, Listening Music, Doing Chatting Synchronous Transmission: Data transmission is in the form of blocks between two devices. Sender and Receiver clocks are synchronized. Asynchronous Transmission: Data transmission is in the form of characters between two devices. Receiver use start and stop signal for data transmission. ASCII: It stands for “American Standard Code for Information Interchange”. It is a 7-digit code in Binary form. Used to represent Alphabets, Symbols and Numbers. (e.g.) (e.g.) 64 = 100000 1000000 0 Units of Memory: Unit of memory is byte. The larger units are Kilo Byte (KB), Mega Byte (MB), Giga Byte (GB) and Tera Byte (TB). 1 Byte 1 Kilo Bytes 1 Mega Bytes 1 Giga Bytes 1 Tera Bytes = = = = = 8 bits 1024 Bytes 1024 Kilo Bytes 1024 Mega Bytes 1024 Giga Bytes Memory Address: A location of words in memory is called address. Each word has unique address. Memory addresses are specified in binary numbers. Read Operation: Read operation is used to fetch data from memory. Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 131 Write Operation: Write operation is used to store data in memory. Access Time: It is the amount of time required to perform Read operation. Cycle Time: It is the amount of time required to perform Read or Write operation and then return to its original state ready for next operation. E-Commerce: Online Business is called E-Commerce. It provide facilities for sale of Goods Services Services such as Banking, Banking, Ticket Reservation Reservation,, Stock Exchange Service Pack: Service Packs are collection of software used to repair / remove errors / bugs from from windows windows operating operating system. Firewall Tool: Firewall is used to block un-wanted Incoming (Inbound) and Outgoing (Outbound) (Outbound) traffic of a computer. computer. REVIEWED ByBy user at 1:07 1/13/10 Azmat Afridi pm, 13/01/2010 Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 132 Some useful Abbreviations Written by Azmat Afridi SAMS 07/12/2007 RAM ROM CPU OS PC NIC OCR CRT SCSI MIDI IDI AMD H.D.D F.D.D CD-R CD-ROM OM DVD-RO DVD-ROM M CD-R CD-R CD-RW W DOS NT DBMS LAN WAN MIS PDA SDLC WWW HTML U RL FTP HTTP B-2-B IT LCD IBM MS DPI MB Mb GB Random Access Memory Read Only Memory Central Processing Unit Operating System Personal Computer Network Interface Card Optical Charact acter Rec Recognition Cathode Ray Tube Small Com Computer Syste stem Interface Music usical al Inst Instru rume men nt Digi Digittal Inte nterfac rface e Advanced Micro Devices Hard Disk Drive Floppy Disk Drive Comp Compac actt DiskDisk-Re Read ad Only Only Memo Memory ry Digita Digitall Video Video Disk-R Disk-Read ead Only Only Memory Memory Compact Disk-Readable Comp Compa act Disk Disk-R -Rew ewri rita tabl ble e Disk Operating System New Technology Database Managemen ment System Local Area Network Wide Area Network Management Information System Personal Digital Assistant System Deve evelop lopment ent Life Cyc Cycle World Wide Web Hyper Text Marku rkup Language age Uniform Resource Locator File Transfer Protocol Hyper Text Transfer Protocol Business 2 Business Information Technology Liquid Crystal Display International Business Machines Microsoft Dot Per Inch Mega Bytes Mega Bits Giga Bytes Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181 Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 TB KB ISDN SDN DSL ATM TCP/ TCP/IP IP IP DNS E-mail GUI MIPS IPS EIDE EIDE SIMM DIMM SMP MMP ALU BMP CAD Coax FAT 4GL I/O ISP IRC IRQ TFT USB MAN OOP IEEE IEEE CPI OSI SQL Mobile U.A.E+971-50-2380181 133 Terra Bytes Kilo Bytes Inte ntegra grated ted Serv Serviices ces Digi Digita tall Netw Networ ork k Digital Subscriber Line Asynchronous Transfer Mode Tran Transm smis issi sion on Cont Contro roll Prot Protoco ocol/ l/In Inte tern rnet et Proto Protoco coll Internet Protocol Domain Name System Electronic Mail Graphical User Interface Millio llions ns of Inst Instru ruct ctio ions ns Per Per Seco Second nd Enhan nhance ced d Inte ntegra grated ted Driv Drive e Ele Electr ctronic onics s Single In-line Memory Module Dual In-line Memory Module Symmetric Multiprocessing Massively Multiprocessing Arithmetic Logic Unit Bitmap Computer Aided Design Coaxial Cable File Allocation Table Fourth Generation Language Input/Output Internet Service Provider Internet Relay Chat Interrupt Request Thin Film Transistor Universal Serial Bus Metropolitan Area Network Object Oriented Programming Inst Instit itut ute e of Elec Electr tric ical al and and Elec Electr tron onic ics s Engi Engine neer ers s Character Per Inch Open System Interconnection Structured Query Languages Prepared by Azmat Afridi Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile azmat443@gmail.com----Mobile Pakistan: Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181 U.A.E+971-50-2380181