Uploaded by Mukison Izona

qdoc.tips computer-notes(1)

advertisement
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
BASIC CONCEPTS OF INFORMATION TECHNOLOGY
What is a Computer?
Comp
Comput
uter
er is an elect
electro
roni
nic
c devi
device
ce that
that takes
takes some
some Inpu
Input,
t, Proc
Proces
ess
s it and
and disp
displa
lay
y
Output.
Input:
Any Work/Command
Work/Command given to computer
computer is called input.
Processing:
Action of computer
computer on given commands
commands is called Processing.
Processing.
Output:
Result of computer according to given input is called output.
INTRODUCTION TO INFORMATION TECHNOLOGY:
What is Information
Information Technology (IT)?
IT is the
the use
use of mode
modern
rn tech
techno
nolo
logy
gy to aid
aid in Stor
Storag
age,
e, Proce
Processi
ssing
ng,, Anal
Analys
ysis
is and
and
Communication of information. Information can be of different forms.
a) Data:
Data:
Presents the information as string of characters (Letters and Numbers)
is called data. An item of data may be a Name, a Price, and a Quantity (etc).
An item of data has not much use. It makes sense when it is combined with
other information.
Examples:
Nasir, 2500, Karachi (etc).
b) Text:
Presents the information in form of Phrases and Sentences called text.
It has some meanings.
Examples:
The age of Nasir is 65.
c) Image:
Image:
Pres
Presen
ents
ts the
the info
inform
rmat
atio
ion
n in pict
pictor
oria
iall form
form.. This
This incl
includ
udes
es Char
Charts
ts,,
Graphs, Pictures and Drawings. Information in this form is more meaningful
than data.
d) Voice:
Presents the information in Spoken Phrases and Sentences is called
Voice. It is more meaningful than data.
Often we use two or more forms of information to convey a message.
COMPUTER HARDWARE AND SOFTWARE:
Computer Hardware:
All parts of a computer which we can See and Touch are called Hardware.
OR
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 1-
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
All Physical parts of a computer are called computer hardware.
Examples:
Mouse, CD, Cables, Monitor, Keyboard (etc)
Computer Software:
“Computer programs are called software”. A computer program is a set of instructions
to solve a particular problem.
Firmware is the intermediate form between hardware and software, which consists of
software embedded in electronic chips.
Examples:
Ms-Paint, Ms-Excel, Win 98, UNIX (etc)
TYPES OF SOFTWARE:
Software is of two types.
1) System Software or Operating
Operating System:
Collection of operative programs whose purpose is to make the use of
computer more effective.
 Without system software it’s impossible to operate computer.
 It deals with computer hardware.
Examples:
Win 98, Win Xp, Ms-DOS, Linux, UNIX (etc)

2) Application
Application Software or Computer
Computer Programs:
Programs:
Fulfill the needs of a user.
 Such as Typing a Letter, Playing Games, Preparing Payroll.
 Applica
Applicatio
tion
n softwa
software
re is normall
normally
y supplie
supplied
d as a packag
package,
e, consist
consisting
ing of the
the
following
Software supplied on Floppy Disk or CD
Manual,
Manual, explain
explain how to use software?
software?
Training material on CD or in a booklet.
Examples:
Ms-Paint, Ms-Excel, Internet Explorer (etc)




INPUT AND OUTPUT DEVICES:
DEVICES:
The process of getting information into and out of computers is called Input/Output or
just I/O.
Devices used for Input/Output are called I/O devices.
INPUT DEVICES:
These are used to feed information
information into computer.
computer.
Keyboard:




It is the most common input device.
It has many keys on it so that’s why it is called keyboard.
It is just like a typewriter.
A standard keyboard has following special keys.
Function Keys:
These are from F1 to F12. These have special functions in each program.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 2-
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
CTRL and ALT Keys:
CTRL (Control)
ALT (Alternate)
These are always used with other keys to issue commands.
BACKSPACE
BACKSPACE Keys:
Deletes the immediate left character of the cursor.
Four Arrow Keys:
Used for changing direction.
PageUp and PageDown Keys:
Move the cursor one page up or down.
Home Key:
Move the cursor to the left of the screen or beginning of the d ocument.
End Key:
Move the cursor to the right of the screen or end of the document.
Esc Key:
Esc (Escape)
Use to exit from your currently selected option.
Numeric Keys:
These keys are from 0 to 9.
Alphabetic Keys:
These are A to Z or a to z.
Mouse:




It is a pointing device.
By using mouse we can perform required task in a quick time.
It has a rubber ball in its base and two or three buttons on it.
It is normally used for
Picking some option
Pointing some option
Drawing



Microphone:




Microphones
Microphones are used to record speech.
speech.
It makes communication
communication (Voice chatting and Phone calls) very
easy.
Microphones are also used in speech recognition (Voice
Recognition) programs.
In speech
speech recognition
recognition programs
programs user can dictate to the computer
instead of typing.
Video Cameras:


Used to capture images of any type.
After that video camera will be attach with computer and store
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 3-
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
images in computer.
Scanners:
Also used to capture images but only from paper.
Accuracy is much better than video camera.
Scanne
ners
rs are
are widel
idely
y used
used to get
get Draw
Drawin
ings
gs,, Diag
Diagra
rams
ms and
and Phot
Photog
ogra
raph
phs
s into
into
 Scan
computer
computer systems for required
required task .


OUTPUT DEVICES:
These devices are used to return back data.
Monitor:





It is the most common output device.
Shape of monitor is just like a T.V set.
Function of monitor is to display output on its screen.
Any picture is made up of small dots called Pixels.
Two technologies used in monitor are
Cathode Ray Tube (CRT)
Liquid Crystal Display (LCD) or Flat Screens


Cathode
Cathode Ray Tube (CRT):




Most computer monitors are based on CRT.
A beam of electrons emitted by electron gun makes an image on screen.
In case of color monitor there are three electron guns one for each color
that are RED, GREEN and BLUE (RGB).
In mono
monoch
chrrome
ome mon
monitor
itors
s disp
displa
lays
ys text
text as eith
either
er green
reen on blac
black
k
back
backgr
grou
ound
nd or white
hite on blac
black
k back
backgr
grou
ound
nd.. The
The fore
foregr
grou
ound
nd and
and
background
background colors can be reversed by software.
software.
Flat Screens or Liquid Crystal Display (LCD):




Liquid
Liquid crystal
crystal displays
displays (LCD) are flat screen.
screen.
Flat screen monitors having no electron gun.
Image will made up with the help of liquid.
This technology
technology is very expensive.
PRINTERS:





Printers are used to produce hard copy of output.
Printers can print text and graphics.
Printers are available in both color and black & white.
The port of printer is called LPT1.
Main difference in printers depends on
Quality of output
Ability
Ability to print graphics
Printing speed



Character Printers:




Print one character at a time.
It has slow speed.
It can print 30 to 300 characters per second (cps).
It has low cost.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 4-
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************


It makes a lot of noise while printing.
Two types are
Dot Matrix Printer
Daisy Wheel Printer
Printer


Dot Matrix Printers:


It has normally 9 or 24 pins in the form of a matrix.
Pins hits the printer ribbon so that our required character will be print
on paper.
Daisy Wheel Printers:
Printers:




Print head of this printer is a circular wheel about 3-inches in diameter with arms.
Character shapes are made at the outer end of arms.
To print a character daisy wheel rotates so that required cha racter is positioned in
front of printer ribbon. Now arm will hot by a hammer and strikes the ribbon leaving
an impression on paper.
Print quality is better than dot matrix.
Line Printers:




Print one complete line at a time.
Speed
Speed is faster than character
character printers.
printers.
Can print 200 lines per minute (LPM).
Types are
 Chain Printers
 Drum Printers
Chain Printers:



They use a rapidly moving chain.
Characters are linked with chain.
Required characters will be placed in front of paper then strike of hammer make
impression on paper.
Drum Printers:



Characters are engraved along the drum.
Drum rotates and required characters will be print on paper by strike of hammer.
Character
Character and line printers are also called
called impact
impact printers.
printers.
Non-impact Printers:


These are high speed and expensive printers.
Types are
 Laser Printers
 Inkjet Printers
Laser Printers:




Print one page at a time.
Can print 8 pages per minute.
Print quality is good.
Laser light, Roller and Toner (ink) are responsibl
responsible
e for printing.
Inkjet Printers:

Print one page at a time.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 5-
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************

Printing is possible due to spray of ink.
PLOTTERS:


Just like printers but used to print large images such as Maps, Graphs, Charts.
Two types are
 Flatbed Plotters
 Drum Plotters
Flatbed Plotter:



Paper will fix over the flatbed table.
Pen-holding technology is used for printing.
Very slow method of printing.
Drum Plotters:


Paper will place on drum, which rotates the paperback and front.
Pen-holding technology is used for printing.
MEMORY:



It is used to store large amount of data.
Magnetic
Magnetic Tape and Magnetic
Magnetic Disk are very popular devices for storage.
storage.
Memory can be temporary or permanent.
MEMORY TERMINOLOGIES:
Memory Cell:
It is an electrical circuit used to store a single bit (0 or 1).
Memory Word:


Group of bits that represents
represents information
information or data.
Word size ranges from 4 to 64 bits.
Byte:
Combination of 8 bits is called Byte.
Memory Capacity:
Way of specifying, how many bits can be stored in memory.
Explanation:
Supp
Suppose
ose that
that we have
have memo
memory
ry size
size whic
which
h can
can store
store 4096
4096-2
-20
0 bits
bits word
words.
s. This
This
represents total capacity of 81,920 bits. This can be written as 4096x20.
Here,
4096= Number of words
20= Word Size
Units of Memory:
Unit of memory is byte. The larger units are Kilo Byte (KB), Mega Byte (MB), Giga
Byte (GB) and Tera Byte (TB).
1 Byte
1 Kilo Bytes
1 Mega Bytes
1 Giga Bytes
=
=
=
=
8 bits
1024 Bytes
1024 Kilo Bytes
1024 Mega Bytes
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 6-
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
1 Tera Bytes
=
1024 Giga Bytes
Address:



A location of words in memory is called address.
Each word has unique
unique address.
Memory addresses are specified in binary numbers.
Read Operation:
Read operation is used to fetch data from memory.
Write Operation:
Write operation is used to store data in memory.
Access Time:
It is the amount of time required to perform Read operation.
Cycle Time:
It is the amount of time required to perform Rea d or Write operation and then return
to its original state ready for next operation.
Random Access Memory (RAM):



Data will read randomly.
Access time is same for any address.
It is a temporary memory.
REVIEWED
Byuser
Azmat
By
at Afridi
1:01 13/01/2010
pm, 1/13/10
Sequential Access Memory:




Access time is not constant.
Access time is longer than random access time.
If we want to read 5 th record then we must read first 4 records.
Example is Magnetic Tape.
Read/Write Memory (RWM):
Memory that can be read from or written into.
Read-Only Memory (ROM):



It is a permanent memory.
Data can read only.
Instructions are written at the time of creation/manufacturing.
Static Memory Devices:
Stored data will remain permanent as long as power is supplied.
Dynamic Memory Devices:
Stored data will not remain permanent even with power applied.
INFORMATION SYSTEM DEVELOPMENT (ISD):
Information systems are design for those people who have very little knowledge of
information technology. The five phases of information system development are
System Analysis
System Design


Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 7-
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************



System Development
System Implementation
System Maintenance
System Analysis:
Three task of this phase are
 Defining the problem
 Analyze current system
 Selecting the best solution
System Design:
Analysis
Analysis will convert into Charts and making User Manuals.
Manuals.
System Development:


Writing computer programs.
Testing and debugging programs.
System Implementation:


Install developed system on computers.
Training of operators and users.
System Maintenance:
After implementation if any error occurs then
the n it will remove in this phase.
EXERCISE
i Microp
Microproc
rocesso
essors
rs
ii Firmw
Firmwar
are
e
iii Applic
Applicatio
ation
n
iv Optical Character
Character Reader
Reader
v Dot
Dot Matr
Matrix
ix
vi Plot
Plotter
ter
vii Memory
Memory Cell
Cell
viii Memory
Memory Address
Address
APPLICATION AND USE OF COMPUTERS
APPLICATION
APPLICATION AND USE OF COMPUTER:
COMPUTER:




Computer plays very important role in our lives.
A computer is faster and more accurate than people.
It can solve many problems of human life.
Major areas of application
applications
s are
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 8-
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Education:
 Computer is very useful tool in the field of education.
 Use of computer has become spread from primary to university level.
 A large variety of tutorial programs are available for students.
 Students can get online Certifications/Diplomas.
Word Processing:
software’s are used for preparing
preparing documents
documents and reports.
 Word processing software’s
 These packages provide facilities to user
Store
Edit
Format
Spell Check
Print (etc.)





Retail:
 Computer
Computer technology
technology has good impact on retail
retail stores.
stor es.
 Many shops have replaced cash register with computer system.
 Modern
Modern retail stores use Bar Code Reader.
Reader.
Bar Code
Code Read
Reader
er read
reads
s the
the bar
bar code
code prin
printe
ted
d on each
each prod
produc
uctt whic
which
h
 A Bar
contains price and brief description of product.
E-Commerce:
 Online Business is called E-Commerce.
 It provide facilities for sale of
Goods
Services
Services such as Banking,
Banking, Ticket Reservation
Reservation,, Stock Exchange
Exchange (etc.)


Electronic Banking:
 Electronic
Electronic banking has many benefits such as
Deposits
Withdrawals
Bank Statement
 ATMs (Automated Teller Machine) are used world wide to get cash instantly.



Computer in Medical Field:
 Computers are used in modern hospitals to perform a variety of task, such as
To keep up-to-date Records of Patients
Monitoring Instruments
Body scanners are used to diagnose patient for diseases



Weather Forecasting:
Modern weather
weather forecast is produced
produced by using computer system.
 Modern
Computer used to collect data about
Air Pressure
Pressure
Humidity
Temperature
Wind Speed





Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 9-
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************

Cloud Cover
Computer Graphics:
 Computer graphics plays very important role in
Printing products
Scientific Research
Advertisement
Entertainment (etc.)
 Powerfu
Powerfull graphi
graphics
cs packag
packages
es are availa
available
ble to draw,
draw, shade
shade and manipu
manipulat
late
e
images.




Computer Integrated Manufacturing:
Computers
ers are widely
widely used in manufa
manufactu
cturin
ring
g firms
firms to p erform
erform design
design and
 Comput
production of products.
 This technology is called CAD (Computer Aided Design).
 CAM (Computer Aided Manufacturing).
PARTS OF COMPUTER SYSTEM
Computer itself ----the hardware----has many parts, but the critical components falls
into four major categories.
1.
2.
3.
4.
Proces
Processor
sor
Memo
Me
mory
ry
Input or Output
Output Devices
Devices
Storag
Storage
e unit
unit
Processor





It works just like a human brain.
Transform raw data into useful information.
Orga
Organi
nize
zes
s and
and carr
carrie
ies
s out
out instr
instruc
ucti
tion
on that
that come
come from
from eith
either
er the
the user
user or the
the
software.
Processing speed depends upon the size of Processor.
In Perso
ersona
nall Compu
omputters,
ers, the
the Proc
Proces
esso
sorr usua
usuall
lly
y cons
consis
ists
ts of one
one or mor
more
Microprocessor (some times called “chips”).
Memory


Computer need’s a space to for launching a program or holding a data, that kind
of space is known as computer memory.
Memory can be temporary or permanent.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 10 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Two types are:
1. RAM (Rand
(Random
om Access
Access Memory
Memory))
2. ROM (Rea
(Read
d Only Memory
Memory))
RAM (Random
(Random Access
Access Memory)
Memory)









Also known as Primary memory.
Is a volatile memory.
It’s a Temporary
Temporary storage device.
Data will read randomly.
Access time is same for any address.
All the data or instructions were deleted when the power is switched off.
Hold instructions or data.
Enhance the performance of computer.
Two types are
o
Static RAM (SRAM)
(SRAM)
o
Dynamic RAM (DRAM)
Dynamic RAM (DRAM):
 Small in size.
 Less cost than SRAM.
 Constantly refreshed and recharged by CP U (Processor).
 Normally used in Personal Computers.
 Two types are
SIMM (Single Inline Memory Module)
DIMM (Double Inline Memory Module)


Static RAM (SRAM):
 Costly than DRAM.
 Faster than DRAM.
 Physically larger than DRAM.
REVIEWED
By
at Afridi
1:02 pm,
1/13/10
Byuser
Azmat
13/01/2010
ROM (Read Only Memory)








It is a permanent memory.
Data can read only.
It is a non – volatile memory.
Holds data or instruction’s permanently.
Data first-time recorded by the manufacturer.
User can’t change it directly.
All the data or instructions were not deleted when the power is switched off.
Three types are
o
PROM (Programmable Read Only Memory)
o
EPROM (Erasable Programmable Read Only Memory)
o
EEPROM (Electrical Erasable Programmable Read Only Memory)
Input / Output Devices
The input/out
input/out put devices are
INPUT Devices
Accept data / instruction from the user.
Examples:

Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 11 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Keyb
Keyboa
oard
rd,, Mous
Mouse,
e, Scan
Scanne
ner,
r, Joys
Joysti
tick
ck,, Touc
Touch
h pads
pads,, Micr
Microp
opho
hone
nes,
s,
cameras, etc.
Digi
Digita
tall
OUTPUT
OUTPUT Devices
Shows results.
Presents
Presents processed
processed data to user.
Examples:
Monitors, Printers, Speakers, Projector, etc


Storage
Saving records or information about any topic is known as data storage.
Examples:
Hard Disk, Floppy Disk, CD Rom, Magnetic Tap

Types of Input Devices
1.
2.
3.
4.
5.
6.
7.
8.
9.
Keyboard
Keyboa
rd
Mous
Mouse
e
Scan
Scanne
nerr
Joystic
Joystick
k
Ligh
Lightt Pen
Pen
Touch
Touch Screen
Screen
Optica
Opticall Inpu
Inputt
Audio
Audio Input
Input
Video
Video Input
Input
Keyboard




It is the most common input device.
It has many keys on it so that’s why it is called keyboard.
It is just like a typewriter.
A standard keyboard has following special keys.
 Alphabetic (a…..z) or (A…..Z)
 Numeric Digits (0……….….9)
 Functions Keys (F1……...F12)
 Symbols (+, - , *, @, #, $,)
 Special Keys (Enter Backspace, Spacebar, Tab, Escape, Print Screen, and
Pause/Break…..)
Mouse




Also known as pointing device
By using mouse we can perform required task in a quick time.
It has a rubber ball in its base and two or three buttons on it.
It is normally used for
o
Picking some option
o
Pointing some option
o
Drawing
Scanner



Just like a photocopier
Used to capture images but only from paper.
Accuracy is much better than video camera.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 12 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
 Scan
Scanne
ners
rs are
are widel
idely
y used
used to get
get Draw
Drawin
ings
gs,, Diag
Diagra
rams
ms and
and Phot
Photog
ogra
raph
phs
s into
into
computer
computer systems for required
required task .
Two main types are:
1- Handy Scanner
 Used in past,
 Only scan small image,
 Black & White,
 Low cost
 Result is not good.
2- Flat Bed Scanner
 Used in these days,
 Colored
 Expansive than Handy,
 Good results, Scan full page image.
Joystick



Kind of Input device
Used to play only games
Work like a mouse or keyboard.
Light Pen





Used to write notes or short messages
messa ges
Directly used on screen or on special pad.
Also used as pointing device, like a mouse
Not used to enter large amount of text.
Also use to input signature or messages on graphic images such as a fax.
Touch Screen






Device that allowing the user to place a fingertip directly on the computer screen to
make a selection
selection
Commonly used at
Fast-food restaurants
Departmental stores
Drug store
Supermarkets etc
Optical Input
Device that can read Numbers, Letters, Special Characters, and Marks
Different Types are:
(Optical mark recognition) Mark Sensing, Bank cheque,
 OMR
etc
 OCR
(Optical
(Optical character
character reader) Light Source sales tags, credit
card slips
 BCR
(Bar code reader) scanned and read, Known as Zebra
strip or UPC
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 13 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Audio Input





Microphones
Microphones are used to record speech.
speech.
It makes communication
communication (Voice chatting and Phone calls) very
easy.
Microphones are also used in speech recognition (Voice
Recognition) programs.
In speech
speech recognition
recognition programs
programs user can dictate to the computer
instead of typing.
Translating voice to text using special software
Video Input
The common video inputs are:
Video camera
 Used for videoconferencing
 Attached with PC
Digital camera
 Work much like as video camera
 Portable
 Cost depends on type
Types of Output Devices
1.
2.
3.
4.
Moni
Monito
torr
Sound
Sound Syste
System
m
PC Projec
Projector
tor (Data Show)
Show)
Prin
Printe
terr
Monitor





It is the most common output device.
Shape of monitor is just like a T.V set.
Function of monitor is to display output on its screen.
Any picture is made up of small dots called Pixels.
Two technologies used in monitor are
Cathode Ray Tube (CRT)
Liquid Crystal Display (LCD) or Flat Screens


CRT Monitor







Most computer monitors are based on CRT.
Relatively low in cost.
Uses a large vacuum tube, called CRT (cathode ray tube).
There are three electron guns one for each color that are RED, GREEN and BLUE
(RGB).
A beam of electrons emitted by electron gun makes an image on screen.
Monitor’s screen coated with phosphors chemical that glow when they are struck by
the electron beam.
Phosphors dots known as Pixels.
LCD (Liquid Crystal Display)


Also called Flat Screen monitors.
Liquid crystal displays (LCD) are flat screen.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 14 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************




Better picture quality than CRT monitor.
Flat screen monitors having no electron
electron gun.
Image will made up with the help of liquid.
This technology is very expensive.
Comparing Monitor
Size
14-inch, 15-inch, 17-inch, etc
Refresh Rate
Number of times the electron gun scan every pixel is called Refresh Rate.
Measured in cycles per seconds (cps)
Resolution
640(H) X 480(V), 600 X 800, 1024 X 768,
1152 X 864, 1280 X 1024
Dot pitch
Distance between phosphor dots is known Dot pitch.


PC Projector





Projects
Projects a video output onto an external
external surface.
surface.
Typically
Typically weight less than 10 pounds.
pounds.
Can display 16 millions
millions colors.
colors.
Support up to 1024 X 768 resolution.
Used to display still images, animated pictures or full video
Sound System




Speakers (common Output device)
Sound is defined as air pressure.
Magnet produces the air pressure.
Sound card translate digital sound into electric current that is sent to the speakers.
Printers





Printers are used to produce hard copy of output.
Printers can print text and graphics.
Printers are available in both color and black & white.
The port of printer is called LPT1.
Main difference in printers depends on
Quality of output
Ability
Ability to print graphics
Printing speed
Printer
Printer are classified into two groups




1. Impact
Impact Printer
Printer
2. Non-Impact
Non-Impact Printer
Printer
Impact Printer



Prints the paper with the strikes of hammer, Pins or a ribbon
Works like the typewriter
typewriter
Example are:
o
Dot Matrix Printer, Electric Typewriter, Line Printer, Band Printer
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 15 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Dot Matrix Printer
Printer






Print one character at a time.
Typical matrix is 5x7 (5 wide, 7 high)
Uses color or black magnetic ribbon to print data.
Can print 200 to more than 1000 character/minute
Less expensive
Can also print charts, pictures, or different symbols
Non-Impact Printer





Uses laser or inkjet technology.
High in speed
Best in quality
High in cost
Example are:
o
Laser Printer
o
inkjet Printer
REVIEWED
By user at 1:02 pm, 1/13/10
Inkjet Printer







Is a non-impact printer
It creates output on paper by a spray of ink
Electric field control the spraying jet
Produce one character at a time
Quality is higher than dot matrix
Can print 1 page to 8 pages per minu te
Color inkjet printers are also available
Laser Printer






Is a non-impact printer, also called page printer
LASER stands for Light Amplification by Stimulated Emission of Radiation
Can print one page at a time
Buffer holds the data and print
Can print 5 to 300 pages per minute
Very high in cost or quality
Storage Devices
Two major types are
1. Magnet
Magnetic
ic Stor
Storage
age
2. Optica
Opticall Stor
Storage
age
Magnetic Storage
Three major types of magnetic storage are
1. Disket
Diskettes
tes
2. Ha
Hard
rd disk
disk
3. Magnet
Magnetic
ic Tap
Diskettes


Magnetic disk is a thin, circular Mylar or metal plate coated with magnetic material.
The preparation of a disk for data storage is known as formatting.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 16 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************






Formatting divides the disk in to different tracks and sectors.
Operating systems label each sector of each track with an address.
All the data is stored in sectors.
Group of sectors are called cluster.
In one sector 512 bytes (0.5 KB) are stored.
Main Advantage
 Data can accessed
accessed directly or randomly
randomly
 A large amount of data can be stored
 Fastest data accessing speed.
Different Types are




inch Floppy Disk
inch Floppy Disk
ZIP Disk
Hard Disk
5.25 Floppy Disk




Also called Mini Floppy Disk
Introduce by IBM in early 1960s
Very flexible plastic jacket
Damage due to dust, hard pressing or
o r hot/cold environment
3.5 Floppy Disk









Also called micro floppy disk
Little hard plastic jacket
Uses single magnetic disk
Uses read/write window called metal shutter
Uses write protection button
Disk drive rotates disk 300 to 400 revolution per minute
Storage capacity is 1.44mb
Not reliable
Damage due to misusage
Zip Disk








Also called magnetic disk
Looks like a micro floppy, but works like a hard disk
Uses its own special drive
Very hard outer jacket
Uses a single metal disk
Can store about 100mb to 1000mb of data
Use to move
move data
data from
from one
one plac
place
e to anoth
nother
er,, norm
normal
ally
ly used
used by the
the
professional
For Example: advertisements ageneses
Hard Disk

Also called fixed disk
First hard disk had the capacity of 10mb.
Consist of more then one metal disk
All disks are fixed permanently in the drive

Data accessing speed is much faster as compare to other floppy disks



Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 17 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************


Hard drive is sealed, so less chances of disk damage occur due to dust or
mishandling.
All application or system software are stored in the hard disk
Magnetic Tap
















Magnetic is the oldest device, like a music cassettes tap.
Made of plastic (Mylar) coated with magnetic material
The amount of data is measured in cpi (character per inch) or bpi (bytes per
inch)
Tape contain tracks on which data is stored
Special unit (Tap Drive) is used to read/write on tape.
Unit manufacturer are Sony, TDK, Maxell.
Speed of some unit is up to 200 inch per second.
Usually ½ inch or ¼ inch wide tapes are available.
Data stored in the form of magnetic spots.
Reading or writing data on tap is very slow.
Data stored in the shape of records.
Blanks spaces are given after every record
Capacity of magnetic tap is depend on the length of the magnetic tap.
Different sizes are 200, 600, 1200, 2400 feet
Use to store data as backup
Data can’t be access randomly
Optical
Optical Disk












Also called Compact Disk (CD)
Uses laser technology to store data
Laser stand for Light Amplification through Stimulated Emission of Light.
Storage range is up to 700 MB.
Laser make tiny holes on the surface of disk
These holes represent
represent digital
digital or binary data
Presence of hole represent 1 and its absence represents 0
Data store on Compact Disk is save as compare to Magnetic Disk
Data does not damage due magnetic disturbance
First CD ROM Drive read data at 150kb/Sec or known as single speed drive.
Normally once writeable
Normally used to store, Application software, System software, Office files as
backup
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 18 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
COMPUTER ARCHITECTURE
BLOCK DIAGRAM OF A COMPUTER:
Computer contains five basic units
1) Memory
Memory Unit
Unit
2) Arithmetic
Arithmetic Logic
Logic Unit
Unit (ALU)
(ALU)
3) Input Unit
4) Output
Output Unit
Unit
5) Contro
Controll Unit
Unit (CU)
(CU)
CENTRAL PROCESSING UNIT (CPU):




CPU is the brain of a computer.
Transform raw data into useful information.
CPU is responsible
responsible for all Processing.
It has two parts
Arithmetic Logic Unit (ALU)
Control Unit (CU)


Arithmetic
Arithmetic Logic Unit (ALU)
( ALU)::


It is the part where actual processing takes place.
It can perform Addition, Subtraction, Multiplication, Division,
Square Roots (etc) and logic operations such as AND, OR (etc)
on binary numbers.
Control
Control Unit (CU):




It tells the computer that, “What specific sequence of operations it must perform”.
It also specifies
specifies timing of the instructions.
instructions.
Its function is to Fetch, Decode and Execute instructions that are stored in memory.
It controls
Memory Devices
Arithmetic Logic Unit
All Input/Output Devices



Main Memory:
Also called Primary memory or Internal
Internal memory.
 Memory is used to store data temporary or permanently.
 Data stored in memory can be used for required task.
 RAM and ROM are most commonly used as main memory .

RAM (Random Access Memory):







Data can Read/Write randomly.
RAM is used for storage of active programs and data.
It is a temporary memory.
It is also called Volatile memory (it will lose all stored data if power is turned off).
It increases the processing speed of a computer.
RAM is available in different sizes.
Also known as Primary
Primary memory.
memory.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 19 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
ROM (Read Only Memory):





It is a permanent memory.
Data can only Read.
It is also called Non-Volatile memory (it will not lose stored data if power is turned
off).
Instructions are stored on it during manufacturing.
Types are
PROM (Programmable Read Only Memory)
EPROM (Erasable Programmable Read Only Memory)


Input Unit:





Input unit is used to communicate with computer.
Input unit is used to feed Instructions/Commands in computer.
These devices are often called as “Peripheral
“Peripherals”,
s”, because they are
separated physically from CPU.
Input data Reads data from user, Converts it to machine code
(0 or 1) and then Store it into main memory.
Some common input devices are
Mouse
Keyboard
Joystick
Microphone
Scanner (etc).





Output Unit:



These are also peripheral devices that transfer data from main
memory to user.
Output unit receives data from main memory in binary form and
converts it into user readable form.
Some common output devices are
Monitors
Printers
Plotters
Speaker
Fax Machine (etc).





Buses:


Buses are wires, which used to carry data from one location to
other inside the processor.
Three main buses are
Data Bus
Address Bus
Control Bus



Data Bus:



It is 8-bit bus.
It is Bi-Direction
Bi-Directional
al bus.
Data sent from Processor to Memory (Write operation) or from
Memory to Processor” (Read operation).
Address Bus:
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 20 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************



It is 16-bit bus.
It is Uni-Directio
Uni-Directional
nal bus.
It carries 16-bit address code from “Processor to Memory”, which is accessing for a
Read or Write operation.
Control
Control Bus:


It is grouping of timing and control signals of processor.
Some control lines are output from Processor and some are input to the processor.
Ports:


Ports are combination
combination of wires
wires through
through which data travels.
Two types of ports are
Parallel Port
Serial Port


Parallel Port:


Connection of 8 or more wires through which data bits can flow at once.
It can handle large amount of data.
Serial Port:


Data bits can flow one at a time.
It can handle less data than Parallel port.
Registers:






High-speed memory inside the CPU.
Very small in size.
Temporary storage for memory Addresses and Instructions during the execution of
the program.
Read and execute the instructions.
Processing speed depends upon the size of register.
Some common registers are
Instruction Register (IR)
Stack Register (SR)
Memory Address Register (MAR)
Program Counter (PC)
Memory Buffer Register (MBR)





Instruction Register (IR):
Holds an instructio
instruction
n that is being executed.
executed.
Stack Register (SR):
It is a part of CPU, in which data is store and retrieved.
Memory Address Register (MAR):
Holds the address of the active memory location.
Program Counter (PC):
Holds the memory address of the instruction that is next to be executed.
Memory Buffer Register (MBR):
Holds data on its way to and from memory.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 21 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
SYSTEM SOFTWARE:
Three types of system software are
 Operating Systems
 Operating Environment
 Utilities
Operating Systems:
Main tasks of operating system are
 Disk Operations (Storing Programs and data on disk).
 Network Operations (Sharing of Hardware and Software Resources).
 Multi-tasking (Many tasks can be handle at same time).
 Multi-user (Many people can use computer at same time).
Operating Environment:
 Enable user to communicate with computer.
 Two common types are
Command-Line Interfaces
Graphical User Interfaces (GUI)


Command Line Interfaces:





Commands are used to perform a task.
Can perform only single task at a time.
C:\> (Prompt)
Every command must be written
written after Prompt.
Not
Not very
very comm
common
on used
used toda
today
y beca
becaus
use
e it is very
very diff
diffic
icul
ultt to reme
rememb
mber
er
commands.
Example:
MS-DOS
Graphical User Interface (GUI):
 Most Common used now a day.
 Apple Computers introduced first GUI in 1984.
 Advantages are
User Friendly
Multi-tasking
Easy to learn and handle
No need to Remember Commands
 A GUI have
Desktop
Icons
Taskbar and Start Button
Menus
Dialog Boxes
Program Running in Windows
Example:
MS-Windows, Linux (Red Hat)










Utilities:


Carrying out operating system tasks in a more efficient and easier way.
Examples are
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 22 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************


Windows Explorer
All Control Panel programs (Data and Time, Add/Remove
Programs, installing new Hardware, Display, Sound etc.)
EXERCISE
ix Control
Control Unit
Unit
x RAM
xi ROM
xii Periph
Periphera
erals
ls
xiii Commun
Communica
icate
te
REVIEWED
xiv Progra
Program
m Counte
Counterr
ByByuser
at Afridi
1:03 pm,
1/13/10
Azmat
13/01/2010
xv Instruct
Instruction
ion Code
Code
TOPICS:



Types of Software
RAM and ROM
Types of Network
Types of Software
There are two types of software.
1) SYSTEM SOFTWARE
SOFTWARE OR OPERATING
OPERATING SYSTEM:
Collection of operative programs whose purpose is to make the use of
computer more effective.
 Without system software it’s impossible to operate computer.
 It deals with computer hardware.
 Full fills the need of hardware.
 Enables to start computer.
 Provides CPU managements.
 Provides memory managements.
 Provides storage managements.
 Provides data, files, networking, or input / output devices management.
 Two common types are
Command-Line Interfaces (CLI)
Graphical User Interfaces (GUI)
Examples:
Win 98, Win Xp, Ms-DOS, Linux, UNIX (etc)



Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 23 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
2) APPLICATION SOFTWARE OR COMPUTER PROGRAMS:
Fulfill the needs of a user.
 This Software is specially designed according to user’s requirement.
 Such as Typing a Letter, Playing Games, Preparing Payroll.
 Applica
Applicatio
tion
n softwa
software
re is normall
normally
y supplie
supplied
d as a packag
package,
e, consist
consisting
ing of the
the
following
Software supplied on Floppy Disk or CD
Manual,
Manual, explain
explain how to use software?
software?
Training material on CD or in a booklet.
Examples:
Ms-Paint, Ms-Excel, Internet Explorer (etc)




RAM and ROM
RAM:










It stands for Random Access Memory.
Data can Read/Write randomly.
RAM is used for storage of active programs and data.
It is a temporary memory.
It is also called Volatile memory (it will lose all stored data if power is turned off).
It increases the processing speed of a computer.
Also known as Primary
Primary memory.
memory.
Hold instructions or data.
RAM is available in different sizes.
32 MB, 64 MB, 128 MB, 256 MB (etc)
Two types are
i. Stati
Static
c RAM
RAM
ii. Dynamic
Dynamic RAM
ROM:
It Stands for Read Only Memory.
Holds data or instructions permanently so it is also called permanent memory.
Data can only Read.
It is also called Non-Volatile memory (it will not lose stored data if power is turned
off).
 User can’t change it directly.
 Instructions are stored on it during manufacturing.
 Types are
PROM (Programmable Read Only Memory)
EPROM (Erasable Programmable Read Only Memory)
Examples:






BIOS (Basic Input/Output System)
Types of Network
LAN:




It stands for Local Area Network.
LAN
LAN norm
normal
ally
ly oper
operat
ates
es withi
within
n a comp
compac
actt area
area such
such as an Of
Offic
fice
e Buil
Buildi
ding
ng or a
Campus.
LAN is capable of interconnecting a large number of computers and other devices
within 1 Km.
Speed of Data Transmission is 10/100 mbps.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 24 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************


Cost is low.
Success Rate of Data Transmission is almost 100%.
Examples:
Computer
Computer Labs of Institutions
Institutions,, Computer
Computer Network in an Office, etc.
WAN:







It stands for Wide Area Network.
WAN
WAN inte
interc
rco
onnec
nnects
ts diff
differ
eren
entt Site
Sites,
s, User
ser Ter
Termina
minals
ls,, and enabl
nable
e LANs
LANs to
Communicate with each other.
Used to Communicate to Nationwide or Worldwide.
Transmission medium used are Telephone Lines, microwave and Satellite links.
Speed of Data Transmission is 1800 to 9600 bits per second.
High Cost as Compare to LANs.
Success Rate of Data Transmission is less than LAN.
Examples:
Internet, Network of all Branches of a Bank.
CLIENT/SERVER NETWORK or DEDICATED SERVER NETWORK:




Used both in LANs and WANs.
Clients
Clients (nodes)
(nodes) are attached to a Server
Server via some medium
medium (Cable,
(Cable, Telephone Lines,
Satellite Link, Microwave, etc.)
Usually Used for Database Server.
Common features are
Receiving Data
Storing Data
Sending E-mail
Printer Sharing
Security





PEER-TO-PEER NETWORK:





Usually used in LANs.
Sometimes Called a Workgroup.
No Central Computer (Server).
All Computers having equal Functionality.
A Single computer will be Server when it will serve to other computer and a Client
when it will request for some data to other computer.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 25 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
INTRODUCTION TO MICROSOFT WINDOWS 2000
Operating System:
 Collection of operative programs whose purpose is to make the use of
computer more effective.
 It controls all activities (Hardware and Software) of computer.
 Without system software it’s impossible to operate computer.
 It deals with computer hardware.
 Enables to start computer.
 Prov
Provid
ides
es CPU,
CPU, memo
memory
ry,, stor
storag
age,
e, data
data,, netw
networ
orki
king
ng,, and
and inpu
inputt / outp
output
ut
devices management.
Examples:
Window
Windows
s 98, Window
Windows
s Xp, Windows
Windows NT, UNIX,
UNIX, Windows
Windows 2000,
2000, Window
Windows
s
Vista, Linux, Servers (etc)
 Operating System or System Software has two types.
Graphical User Interface (GUI) or Windows
Command Line Interface (CLI) or DOS


Introduction to Windows 2000:
o
Windows is the product of Microsoft (Ms).
o
Windows is the interface between Hardware and Application software.
o
Windows 2000 is also called NT 5.0.
o
Microsoft officially launches it in 2000.
o
Having
Having both
both Server
Server (Windo
(Windows
ws 2000
2000 Server
Server)) and Client
Client (Windo
(Windows
ws 2000
2000
Professional) side operating systems.
o
Normally used in network environment.
o
Very powerful and popular than previous operating systems.
o
Like Windows 98 it has Internet Explorer 4.0 into the operating system.
o
Main feature are
 Impressive platform of Internet
 Data Encryption tools
 Management of Applications
 Management of Active Directory Services (ADS)
 Very powerful
powerful Security
Security can be implemented
implemented on
 Users
 Groups
 Hard Drives
 Networks
Some advanced features are
 Setup Virtual Private Networks (VPNs)
 Supports up to 2 processors (Dual Processor)

Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 26 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************


Supports NTFS (New Technology File System) partition
Windows 2000 is very useful for
 Network Server
 RIS (Remote Installation Services)
 DHCP Server(Dynamic Host Configuration Protocol)
 DNS Server (Domain Name Source)
 Proxy Server
Hardware Requirement for Windows 2000 Professional Installation:
Processor
133 MHz or Higher
RAM
64 MB Minimum-4 GB Maximum
Hard Disk
2 GB having free space of 650 MB
Desktop:
 After booting the very first screen, you will see is called desktop.
 By using desktop we can use every Program / Software installed in computer.
Icons
or
Shortcuts
Wallpaper
or
Background
Start Menu
or
Program Menu
Taskbar
Clock
Task Bar:
It is the long gray bar at the bottom of computer screen. On its left side the “ Start
Button” is used to access various programs in the computer. It also contains “Quick
Launch” and “Clock”. Currently running program’s name will display in the form of a
button in the taskbar.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 27 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Start Button:
It provides an entry point to begin using programs installed on the computer’s hard
drive.
Wallpaper:
It is a graphic file that forms the background of the desktop.
Screen Saver:
 If computer is idle for long time it may lose monitor’s resolution.
 To prevent monitors resolution we use screen saver.
Icons or Shortcuts of Desktop:
pr ogram and files.
 Icons are placed on the desktop to provide easy access to program
 Icons provide a quick way to start a program.
 Following are the default Icons of Windows 2000
o
My Computer
o
My Documents
o
Recycle Bin
o
My Network Places
My Computer:
It represents the different secondary storage devices of your computer. Like Hard
Disk Drive, Floppy Drive, CD-ROM and other I/O devices.
My Documents:
It is the default location of saved files.
Recycle Bin:
 When we will Delete Some File, it goes into Recycle Bin.
 We can Restore Files from Recycle Bin.
 After
After Deletion
Deletion of Files from Recycle Bin, we can’t restore
restore these Files.
My Network Places or Network Neighborhood:
If your computer in on network, It displays the accessible hardware and software
resources on the network.
Control Panel:
 Control Panel is the “Engine Room” of Windows 2000.
 It allo
allows
ws acce
access
ss to most
most of the
the prog
program
rams
s that
that cont
contro
roll how Wind
Window
ows
s 2000
2000
functions.
 Following are the short list of options that can change via Control Panel
 Screen Colors and Resolutions
 Screen Saver
 Network Connections
 Date and Time
 Memory allocation and System Performance
 Accessibility Options
 System Administration (Administrative Tools)
 User Accounts management
 Regional and Language options
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 28 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************

Printer, Modem, Sound, Mouse, Keyboard, Internet setting
Name of some Built-In User Accounts of Windows 2000:
 Administrators
 Backup Operators
 Guests
 Power Users
 Replicator
 Users
Folder:
 Folder is a collection of Files.
 Color of Folder’s icon is Yellow, but we can change its icon.
 Two Folders can’t contain same name at same location.
 Folder names should be meaningful.
 User can’t write in Folder.
File:





User will write some data in Files.
File is a single thing.
File’s icon is same as the program icon in which it will made.
Two Files of same program can’t contain same name at same location.
Files names should be meaningful.
File Extensions:


Extension is used after Filename to identify the file.
Some common extensions
extensions are
o
.Doc
o
.Xls
o
.Bmp
o
.Gif
o
.Ppt
.Ppt (etc)
(etc)
Dialog Box:
 It is Special types of windows use to communicate with software you are
running.
 Dialog boxes cannot be resized.
 (e.g.) Save, Open, Print, Find (etc)
Window Control Buttons:
_
Minimize and Restore Button
Restore Button
Close Button
HTML:
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 29 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************





HTML stands for “Hyper Text Markup Language”.
It is used to construct web pages.
Normally Notepad is used as HTML editor.
Each command will be written in Tags.
Extension of file is .html or just .htm.
(e.g.)
(e.g.) First.h
First.htm
tm
DHTML:



DHTML stands for “Dynamic Hyper Text Markup Language”.
It is enhanced form of HTML.
It is also used for web page development.
HOMEPAGE:
First page of a web site is called homepage.
Web HOST or Web Server:


It is the computer on Internet, which contains web site.
It fulfills the needs of clients when it request for some resources.
HTTP:


It stands for “Hyper Text Transfer Protocol”.
It is a Protocol that makes possible to view web sites.
(e.g.)
(e.g.) http://www.msn
http://www.msn.com
.com
PASSWORD:


It is a secret code used to protect system.
Password
Password can apply on
Files
Folders
Database
Computer
Web Sites (etc.)





MULTITASKING:


Working on more than one Program at a time is called multitasking.
(e.g.) working on Excel, Listening Music, Doing Chatting
Synchronous Transmission:


Data transmission is in the form of blocks between two devices.
Sender and Receiver clocks are synchronized.
Asynchronous Transmission:


Data transmission is in the form of characters between two devices.
Receiver use start and stop signal for data transmission.
ASCII:



It stands for “American Standard Code for Information Interchange”.
It is a 7-digit code in Binary form.
Used to represent Alphabets, Symbols and Numbers.
(e.g.)
(e.g.) 64 = 100000
1000000
0
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 30 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Data Protection
VIRUSES AND ANTI-VIRUS ISSUES:
Computer Virus:



Virus is a small hidden program on a floppy disk or a hard disk.
Virus can spread from computer to computer through infected floppy disk or over a
computer network.
Virus can damages
Computer Programs
Files
Hardware



How Virus Spread?
Spread?
Virus spread through different ways
 If you get E-mail with a file attached to it (.Exe or .Com) that contains a virus and you
download that file and run it, your computer will be infected.
 If you download a file that contains a virus then your computer will be infected.
 Viruses are also spread by networks and by infected floppy disks.
 If you
you boot
boot a comp
comput
uter
er with
with infe
infecte
cted
d flopp
floppy
y (boo
(boott viru
virus),
s), your
your comp
compute
uterr will
will be
infected.
How to protect your computer from virus?
Take following steps
 Never download an attached file on an E-mail from a stranger.
 Don’t set automaticall
automatically
y run attached files.
 Never run executable file before updating anti-virus program.
 If your computer is on a network, make sure you have security features.
 Make sure you have got a good anti-virus program.
 Don’t use floppy disk before checking through anti-virus programs.
 Keep your E-mail software updated.
Anti-Virus Software:


It is the software, which uses to check computer for virus.
Most common are
Mcafee
Norton Anti-virus
Dr. Solomon’s Anti-virus
Thunderbyte
Trend Micro





DATA PROTECTION AND PRIVACY ISSUES:
Data Protection Act:



It is a law
law pass
passed
ed by the
the Gove
Govern
rnme
ment
nt to prot
protec
ectt agai
agains
nstt misu
misuse
se of Pers
Person
onal
al
Information of Organizations.
Protection act passed by the British Parliament in 1984.
It has four main points.
1. Computers
Computers which process
process any personal
personal data must be registered
registered with
with the Data
Protection Registrar.
2. Personal
Personal Data must not be disclosed
disclosed to anyone
anyone outside the departme
department.
nt.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 31 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
3. Only
nly thos
those
e peopl
eople
e shou
should
ld hav
have a rig
right to view
iew data
data abou
aboutt whom
hom the
the
information is about.
4. Indi
Indivi
vidu
dual
als
s are
are give
given
n righ
rights
ts to corr
correc
ectt or eras
erase
e data
data whic
which
h has
has dama
damage
ge
through inaccuracy or loss of data.
Eight Data Protection Principles:
1.
2.
3.
4.
5.
6.
7.
8.
Obtained
Obtained fairly
fairly and
and lawfully.
lawfully.
Held only for one or more lawful
lawful purposes
purposes specified
specified in the data user’s register
register entry.
entry.
Used or disclosed
disclosed only
only due to data user’s
user’s register
register entry.
Adequate,
Adequate, relevant
relevant and
and not excessive
excessive for those purposes.
purposes.
Accurate
Accurate and where
where necessary
necessary,, up-to-date.
up-to-date.
Not kept loner
loner than necessary
necessary for the specifie
specified
d purpose.
purpose.
Made availabl
available
e to data subjects
subjects on request.
request.
Properly
Properly protected
protected against
against loss
loss or disclosed.
disclosed.
COPYRIGHT ISSUES:
What is Copyright?




It is the branch of law, which protects creative wo rks from unauthorized use by other
people.
It allows
allows creators
creators to benefit financially.
financially.
Original creator may be assigned copyright to another person.
Copyright can protect
Literacy
Dramatic
Musical
Artistic
Artistic works (etc).
Owner of copyright has the right to
Publish
Reproduce
Broadcast or
Perform in Public









What is Copyright
Copyright Infringement?
Infringement?



Infring
Infringeme
ement
nt can happen
happen when
when origin
original
al works
works are reprod
reproduce
uced
d withou
withoutt permiss
permission
ion
form copyright owners.
Crimi
Crimina
nall acti
action
ons
s can
can be brou
brough
ghtt agai
agains
nstt peop
people
le or orga
organi
niza
zati
tion
ons
s that
that infri
infring
nge
e
copyright.
Action taken depends on the nature of infringement.
Computer
Computer Software
Software and Copyright Law:



A good software may take many years to develop and can cost millions of dollars.
This investment can only be recovered by selling the software.
Custo
Custome
mers
rs or orga
organi
niza
zatio
tions
ns are
are not
not allo
allowe
wed
d to make
make ille
illega
gall copie
copies
s of orig
origin
inal
al
software.
EXERCISE
i Comput
Computer
er Virus
Virus
ii Anti-V
Anti-Viru
irus
s
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 32 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
iii Copyrig
Copyright
ht
iv Infring
Infringeme
ement
nt
v Viru
Virus
s Hoax
Hoax
vi Hacke
Hackers
rs
WINDOWS OPERATING SYSTEM
GUI OPERATING SYSTEM :




Most Common used now a day.
Apple Computers introduced first GUI in 1984.
Windows is the most common GUI Operating System developed by Microsoft
(Ms).
Advantages are
User Friendly
Multi-Tasking
Easy to learn and handle
No need to Remember Commands
A GUI have
Desktop
Icons
REVIEWED
Taskbar and Start Button
ByBy
user
at 1:04
1/13/10
Azmat
Afridi pm,
13/01/2010
Menus
Dialog Boxes
Program Running in Windows











OPERATING SYATEM COMPONENTS:
Operating System components are
 Desktop
 Taskbar
 Windows
 My Computer
 Recycle Bin
 My Documents
 Control Panel
Desktop:



Afte
Afterr boo
booti
ting
ng the
the ver
very
y firs
firstt scre
screen
en from
from wher
where
e use
userr can
can perf
perfor
orm
m
thei
theirr
required task is called desktop.
By using desktop we can use every Program / Software installed in computer.
Desktop has
Folder Icons
Program Icons (Ms-Word, Ms-Excel, Ms-Paint)
Document Icons
Special Icons (My Computer,
Computer, Recycle Bin)




Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 33 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Taskbar:


Taskbar is a bar, which is usually placed at the bottom of the Desktop.
Taskbar has
Start Button
Quick Launch Toolbar (it has Program Icons)
Task Buttons (One button for each active program)
Tray (It contain Clock and Program Icons)




Windows:


Each program opens in its open window.
You can Maximize, Minimize, Restore or Close window.
My Computer:
It contains information about
Hard Disk
CD-ROM
Floppy Disk
I/O Devices




Recycle Bin:


When user deletes some file or data,
da ta, it will go to the Recycle Bin.
Deleted file can be restored until it remains in Recycle Bin.
My Documents:
 It contains all saved data.
 It is the Default location to save data but user can change location.
Control Panel:
 It has many Tools / Components, which are used for computer management
as per requirement.
 Some common components are
o
Display
o
Add or Remove Programs
o
Mouse
o
Keyboard
o
Sound (etc).
FILES AND FOLDERS:
FOLDERS:
What is Folder?
Folder?
 Folder is the collection of Files.
 Color of Folder’s icon is Yellow, but we can change its icon.
 Two Folders can’t contain same name at same location.
 Folder names should be meaningful.
 User can’t write in Folder.
What is File?
 User will write some data in Files.
 File is a single thing.
 File’s icon is same as the program icon in which it will made.
 Two Files of same program can’t contain same name at same location.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 34 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************

Files names should be meaningful.
File Name Conventions:
 Name can be 255 Character long.
 Name can include spaces and periods.
 Characters
Characters that can’t include are
* | < > ? / \ “ :
File Extensions:
 Extension is used after Filename to identify the file.
 Some common extensions are
o
.Doc
o
.Xls
o
.Bmp
o
.Gif
o
.Ppt (etc)
(etc)
INTERNET:
 Network of Networks is called an Internet.
 Seed of Internet were planted in 1969.
 Very huge medium for communication.
 Desi
Design
gned
ed for
for Defe
Defens
nse
e Purp
Purpos
ose
e but
but now
now a day
day it is used
used for
for Busi
Busine
ness
ss,,
Communication, Study, etc.
 Very popular
popular among all categories
categories of Users.
 100 Million Users around the world used Internet today.
 “Host” is just like network server, providing services to other computers that
connect to it.
 Due to Internet World becomes a Global Village.
Emails (Electronic Mails):
 To create, Send, and receive e-mail you need an e-mail program and Internet
connection through LAN or ISP.
 E-mail is very popular communication tool used to share information among
users on internet.
 You can also attach some file with text message.
 You must have a unique E-mail address for Send and Receive E-mail.
 User must Enter Username and Password to use E-Mail options.
 When you want to send an E-mail to someone you just write E-mail address
of that person or organization.
(i.e.) rcccbest@yahoo.com
 Popular Search Engines are
 www.Yahoo.com
 www.Hotmail.com
 www.Google.com
 www.Altavista.com (etc.)
 When we will send E-mail it will store on Mail Server until the required person
can receive it.
 Many
Many Mail
Mail Serv
Server
ers
s use
use POP
POP (Pos
(Postt Of
Offi
fice
ce Prot
Protoc
ocol
ol)) and
and are
are call
called
ed POP
POP
Servers.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 35 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************

Popular E-mail programs are
Microsoft Outlook
Outlook Express
Eudora
Yahoo
Hotmail
Hotmail (etc.)
(etc.)





CHAT:
 Popular way to communicate with other users in the immediate present.
 Peoples join channels to talk publicly or privately.
 Channels are discussion groups where chat users convene to discuss a topic.
 Before
Before chatting you should
should know E-mail address of other person.
 Chat can be
o
Voice Chat
o
Chat through typing text from keyboard
WORLD WIDE WEB:
 WWW or just Web was created in 1989.
 “HTML (Hyper Text Markup Language)” with embed “Hyperlinks” is used to
create Webpage.
 Collection of related WebPages called “Web Site”.
 Web Sites are housed / Stored on Web Servers.
 Copying a page onto a Web server is called “Posting a page or Uploading”.
 Copyi
pying a pag
page from
rom web serve
rver to client (our Com
Computer) is called
“Downloading”.
 World Wide Web includes
Web Browsers:
 Web browsers
browsers or Internet browsers
browsers are used to access Internet.
Internet.
 A browser includes E-mail features, Newsreaders and tools for Downloads
files.
 Two most popular Web Browsers are
 Internet Explorer
 Netscape Navigator.
HTML Tags:
To format a Webpage HTML Tags are used. Tags which are enclosed in
angle brackets <> tell the browser how to display elements on the page. Elements
are written between starting and closing tags.
(i.e.) <H1> First Web Page </H1>
Afte
Afterr Crea
Creati
tion
on of Web
Web Page
Page the
the file
file must
must be save
saved
d with
with the
the exte
extens
nsio
ion
n of
“HTML”.
This file will be run on Browser.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 36 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
HTTP (Hyper Text Transfer Protocol):
The internal structure of World Wide Web is built on a set of rules called
HTTP.
HTTP uses internet addresses in special format called URL.
URL (Uniform Resource Locator):
Specifies the type of server in which the file is located, address of the
server and path of the required File / Web Page.
(i.e.) http://www.pu.edu.pk /results
Home Pages:
Personalized Home Page (Which page you want to see?)
Web Site Home Page (Primary Page or First Page or Main Page of a Web Site is
called
called Web Site Home Page).
Search Engine:
These are web sites helps you to find your desired information.
(i.e.) If you want to find information about Flowers. It will provide you a list of web
sites which will all contains information about our required topic.
ONLINE SERVICES:
 Online Service is a company that offers access to
– E-mail
– Discussion Groups
– Weather Information
– Newspapers Articles
– Chat Rooms
– Online Games
– Stock Information
– Electronic Banking and Business (etc.)
 Most popular are America Online, CompuServe and Prodigy.
Connection through MODEM:
 Modem is used to access Internet.
 ISPs provide these types of services for home users and businesses.
 Telephone line will be used to connect to the internet.
 Users computer will dial into the ISPs server identify it and gain access to the
Internet.
ISPs Server
Server assigne
assigned
d an assigne
assigned
d Dynamic
Dynamic IP addres
address
s to the
the custome
customer’s
r’s
 ISPs
computer.
 Usually
Usually a Modem
Modem has speed
– 28.8 Kbps, 33.6 Kbps, or 56 Kbps
INTERNET ADDRESSES:
Six primary domains for US Internet sites are
i. COM
COM (Com
(Comme
merc
rcia
ial)
l)
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 37 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
ii.
ii.
iii.
iii.
iv.
iv.
v.
vi.
vi.
EDU
EDU (Edu
(Educa
cati
tion
on))
GOV
GO
V (Gov
(Gover
ernm
nmen
ent)
t)
MIL
MIL (Mil
(Milit
itar
ary)
y)
NET
NET (Net
(Netwo
work
rk))
ORG
ORG (Org
(Organ
aniza
izati
tion
on))
INTRODUCTION TO BROWSING:
 Web browsers
browsers or Internet browsers
browsers are used to access Internet.
Internet.
 A browser includes E-mail features, Newsreaders and tools for Downloads
files.
 Famous browsers are Netscape Communicator and Internet Explorer.
Address Bar:
You can enter the required URL into address bar of the browser or you can access a
web page by clicking on link.
Clicking Links:
 Every page on a web site has many links which are connected with specified
pages or topics.
 If you want to return previous page just click on “Back” button.
 After you have used a link, it changes color.
Home Button:
It takes you back to the very first page of site.
Back and Forward Buttons:
Buttons:
“Back”
“Back” displays
displays the last viewed
viewed page and “Forward”
“Forward” displays the next page.
Refresh Button:
“Refresh” button send a request to the ISP server for required link.
Stop Button:
“Sto
“Stop”
p” Butt
Button
on abor
aborts
ts the
the curr
curren
entt tran
transf
sfer
er of info
inform
rmat
atio
ion
n from
from the
the ISP
ISP to your
your
computer.
SEARCHING THE INTERNET:
 There are millions of sites on the web, so it’s very difficult to find your required
site.
 Search Engines are designed to help the users to find their required site or
topics.
 You just enter word related to your required stuff and click on button labeled
“Search”, “Go Get It” or “Seek”.

Popular search engines are
Alta Vista
Excite


Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 38 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************


Yahoo
Google (etc.)
DOWNLOADING:
Downloading
g is the process of saving data from internet
internet to your computer.
computer.
 Downloadin
 User can download
Software’s
Files attached with E-mails


UPLOADING:
 Copying a page onto a Web server is called “Posting a page or Uploading”.
NEWSGROUPS:
 News
Newsgr
grou
oups
ps are
are elec
electr
tron
onic
ic discu
discuss
ssio
ion
n grou
groups
ps thro
throug
ugh
h which
which peop
people
le can
can
exchange their ideas and information.
 Newsgroup articles are stored on a computer called a news server.
 To read the articles you need a program called newsreader.
 News
Newsre
read
ader
er show
shows
s you
you a list
list of curr
curren
entt arti
articl
cles
es in any
any news
newsgr
grou
oups
ps you
you
choose
choose to view.
INTERNET
INTERNET BROWSING
BROWSING AND E-MAIL
INTRODUCTION TO INTERNET:





Internet is the network of networks.
It is a very powerful communication tool.
Inte
Intern
rnet
et was
was desi
design
gned
ed for
for U.S
U.S Depa
Depart
rtme
ment
nt of Defe
Defens
nse
e to safe
safegu
guar
ard
d mili
milita
tary
ry
information in 1960s.
Now a days, internet becomes very popular among each categories of human.
Millions of users are exchanging their ideas, thoughts and other information.
INTERNET ADDRESSES:
Six primary domains for US Internet sites are
vii.
vii. COM
COM (Com
(Comme
merci
rcial
al))
viii
viii.. EDU
EDU (Educ
(Educat
ation
ion))
ix.
ix. GO
GOV
V (Gov
(Gover
ernm
nmen
ent)
t)
x. MIL
MIL (Mil
(Milit
itar
ary)
y)
xi.
xi. NET
NET (Net
(Netwo
work
rk))
xii.
xii. ORG
ORG (Org
(Organ
aniza
izati
tion
on))
REVIEWED
ByByuser
at Afridi
1:04 13/01/2010
pm, 1/13/10
Azmat
E-mail addresses versus URLs:
“Electronic Mail” and URL stands for “Uniform
“Uniform Resource Locators”.
Locators”.
 E-mail stands for “Electronic
 E-mail addresses
addresses are totally different
different form URL addresses.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 39 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************



E-mail addresses are used to identify a particular user and URL addresses are used
to identify web server.
Example of E-mail address is
rccc@yahoo.com
Example of URL address is
www.yahoo.com
INTRODUCTION TO BROWSING:



Web browsers or Internet browsers are used to access Internet.
A browser includes E-mail features, Newsreaders and tools for Downloads files.
Famous browsers are Netscape Communicator and Internet Explorer.
Getting to a web page:
You can enter the required URL into address bar of the browser or yo u can access a web
page by clicking on link.
Clicking Links:
 Every page on a web site has many links which are connected with specified pages
or topics.
 If you want to return previous page just click on “Back” button.
 After you have used a link, it changes color.
Home Button:
It takes you back to the very first page of site.
Back and Forward Buttons:
“Back” displays the last viewed page and “Forward” displays the next page.
Stop Button:
Stop Button aborts the current transfer of information from the ISP to your computer.
Print Button:
Used to print current page.
SEARCHING THE INTERNET:




There are millions of sites on the web, so it’s very difficult to find your required site.
Search Engines are designed to help the users to find their required site.
You just enter word related to your required stuff and click on button labeled
“Search”, “Go Get It” or “Seek”.
Popular search engines are
Alta Vista
Excite
Yahoo
Google (etc.)




DOWNLOADING:
 Downloading is the process of saving data from internet to your computer.
 User can download
Software’s
Files attached with E-mails


Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 40 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
NEWSGROUPS:




Newsgroups are electronic discussion groups through which people can exchange
their ideas and information.
Newsgroup articles are stored on a computer called a news server.
To read the articles you need a program called newsreader.
Newsreader shows you a list of current articles in any newsgroups you choose to
view.
E-MAIL:





E-mail stands for “Electronic
“Electronic Mail”.
E-mail is very popular communication tool used to share information among users
on internet.
User can Read, Write or Delete E-mail.
User can also attach file with E-mail.
Popular E-mail programs are
Microsoft Outlook
Outlook Express
Eudora
Yahoo
Hotmail
Google (etc.)






LANGUAGE:
 We need some language for Communication with others.
 Every language has its own Grammar, Rules and set of Words.
 Examples are
o
English
o
Arabic
o
French
o
Urdu
Urdu (etc)
(etc)
Programming:
Plan
Planni
ning
ng or sche
schedu
duliling
ng the
the perf
perfor
orma
manc
nce
e of a task
task of an even
eventt is call
called
ed
Programming.
Computer Programming:
The process of planning a sequence of steps for a computer to follow is called
Computer Programming.
PROGRAMMING LANGUAGE:
 Computer
Computer language is a way of communicatio
communication
n between
between user and computer.
set of rule
rules,
s, symbo
symbols
ls and
and speci
special
al word
words
s used
used to cons
constr
truc
uctt a compu
compute
terr
 A set
program.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 41 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************


Each language has certain rules called syntax of language.
Two main types are
o
Low level language or Machine Language
o
Assembly Language or Middle Level Language
o
High level language or User Level Language
Low Level Languages:
 Binary code (0 and 1) is used in these languages.
 Also called Machine Language.
 These languages are normally used to control hardware.
 Advantages are
• Very fast execution speed
• Direct access on hardware
 Disadvantages are
• Long program
• Wastage of time
• Machine Dependent
• Difficult to learn and understand
• Difficult to detect and remove errors
• No support for graphics
• Limited functions
Assembly Language:
 Coding in the form of Symbols
Symbols and binary code.
 Also called Middle Level Language.
 These languages are also used to control hardware.
 Assembler is used for conversion of Assembly code into machine code.
 Advantages are
o
Easier than Machine Language
o
Fast execution speed than High Level Language
o
More control on hardware than High Level Language
 Disadvantages are
o
Difficult to learn and understand than High Level Language
o
Difficult to detect and remove errors
o
No supports for graphics
graphics
o
Limited functions
High Level Languages:
 Computer programming which is very close to human languages are called
high level languages.
 Very commonly used now a day.
 Compiler or Interpreter is used as language translator.
 Used for writing application programs.
 Advantages are
o
Very powerful than Machine and Assembly Languages
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 42 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Easier to Learn and Understand
o
Easier
Easier to detect and remove
remove errors
errors
o
Shorter coding
o
Well defined syntax and standard
o
Machine Independent
o
Can perform multiple functions
o
Having support for graphics
Disadvantages are
o
Less execut
execution
ion speed
speed than
than Machine
Machine and Assembly
Assembly language
language
Some examples are
 C / C++
 Visual Basic
 Oracle
 Java (etc)
Types are
 Procedural Languages
o






Non-procedural Languages
Object Oriented Languages
Database Query Languages
Procedural Languages:
 Also called Statement Oriented
Oriented Languages.
 Program consists of sequence of statements.
 Tell the computer how to achieve a goal, by giving a sequence of instructions.
 Execution of statement is in sequence.
 Syntax of such language has the form
Statement 1;
Statement 2;
Non-procedural Languages:
 Also called Logical Based Languages.
achieve, by giving
giving a specificat
specification.
ion.
 Tell the computer what goal to achieve,
 Non-procedural Language executes by checking for the presence of a certain
conditions & when it is satisfied, they execute an appropriate action.
 Execution of these languages is similar to procedural languages except that
statements are not sequential.
 Syntax of such language has the form
Condition 1  action 1
Condition 2  action 2
Object Oriented Programming (OOP):
 Programming by using “Objects”.
 Can be procedural or non-procedural.
 The principles of object-oriented programming are

Encapsulation

Encapsulation means Information Hiding.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 43 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
What data and methods are accessible to other objects?
objects?

What data and methods are inaccessible
inaccessible from other objects?


Inheritance



Polymorphism


Deriving a new class from an existing one.
Facility of reusability of the existing software.
An object can perform multiple functions.
Abstraction

Empty classes for future use.
Database Query Languages:
 Can be procedural or non-procedural.
 These languages are used to fetch data from database.

Most
Most comm
common
on Data
Databa
base
se Quer
Query
y Langu
Languag
age
e is Stru
Struct
ctur
ure
ed Quer
Query
y Lang
Langua
uage
ge
(SQL).
Compiler:
 Translate
Translate source code into object code as whole.
whole.
 Saves Compiled file called Object file.
 Computer will run object file.
 If there is any error in the source program, compiler tells about error at time of
compilation.
 All errors must be removed for successful compilation.
 Example
C / C++ Language use Compiler.
Interpreter:
 Translate source instructions one by one and executes them immediately.
 If any error occur program tells about error and stops program execution.
execution.
 Does not make object file.
 Slow and Time Consuming method.
 Example
Visual Basic Language use Interpreter.
Assembler:
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 44 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************


Q)
Assembly language use Assembler as language translator.
Assembler converts Assembly program into computer or binary code.
Define
Define Data
Data Proce
Processi
ssing?
ng? How
How many Levels
Levels of
of Data
Data Proces
Processin
sing
g Life
Life
Cycle we have?
OR
What are the steps involved in Data Processing Cycles?
Data:
Data refers to any unorganized collection of raw facts and figures that can be
collected from different sources and from which information created. Data can be
Numerical or Non-Numerical.
Example:
Numb
Number
er of stud
studen
ents
ts in an exam
examin
inat
atio
ion,
n, Name
Name of good
goods,
s, Addr
Addres
esse
ses
s of
employees, Universities of a country (etc)
Information:
Organized and processed data is called information. Information is meaningful
and use to take intelligen
intelligentt decisions
decisions so that desired results can be generated.
generated.
Example:
Result analysis of B. COM class, Fee Record of each student (etc)
DAT A
PROCESSING
INFORM ATION
Difference between Data and Information:




DATA
It is a collection of raw facts and
figures.
Data is used rarely.
Data has large size.
Data is not available to people
for sale.




INFORMATION
Inform
Informati
ation
on is the meanin
meaningfu
gfull
form of data.
Information is used frequently.
Informati
Information
on is small in size.
Information is available to
people for sale.
Data Processing:
Data processing referred to operation carried out on data to convert it into
meaningful information.
LEVELS OF DATA PROCESSING:
We can divide data processing based on the amount of the work which is
done by the human beings with the amount of the work which are expected from the
computers.
computers. In order to get better results,
results, we can divide
divide it into three following levels.
levels.
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 45 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
1. Manual
Manual Data
Data Processing
Processing
2. Mechanical
Mechanical Data
Data Processin
Processing
g
3. Electronic
Electronic Data
Data Processin
Processing
g
Levels of Data
Processing
Manual Data
Processing
Mechanical
Data
Processing
Electronic Data
Processing
Manual Data Processing:
In manu
manual
al data
data proc
proces
essi
sing
ng human
human bein
beings
gs conv
conver
erts
ts data
data into
into info
inform
rmat
atio
ion
n
without using any machinery. This method is very time consuming and there is a lot
of chances of errors.
Example:
If you want to calculate the total result of some numerical data instead of
using calculator you will use manual calculations to perform desired operation.
Mechanical Data Processing:
In this technique human beings use and control various machines in various
combinations to complete their work and to convert their data into information. This
method produces better results in quick time than manual data processing.
Example:
We can use calculator
calculator for our desired
desired calculations
calculations instead of manual
manual work.
Electronic Data Processing (EDP):
Now a day, computer becomes need of every person. Computers are used in
this method for data processing. In order to get correct results from computers we
must provide correct input to computer. This method is very efficient and having fast
processing speed than Manual and Mechanical data processing, so mostly used in
these days. Chances of errors can also be reduced by using this technique.
Example:
We can perform our desired results very quickly with the help of computer.
But we must select right software according to our task. If we want to type an
appl
applic
icat
atio
ion
n then
then we shou
should
ld sele
select
ct Micr
Micros
osof
oftt Word
Word for
for this
this purp
purpos
ose.
e. If we use
use
Microsoft Excel for this task then our output will be affected.
DATA PROCESSING CYCLE:
In order to provide complete information to the computers and drive accurate
results from that information the following steps should be considered
i.
Coll
Collec
ecti
tion
on::
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 46 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Firs
Firstt of all
all raw
raw data
data shou
should
ld be coll
collec
ecte
ted
d prop
proper
erly
ly with
withou
outt miss
missin
ing
g
anything.
ii.
Input:
It describes the process of collecting data and getting it, into a form that
a computer can understand.
iii.
iii.
Veri
Verifi
fica
cati
tion
on::
In this
his sta
stage the col
collect
lected
ed dat
data shou
should
ld be che
checked
cked whet
hether
her it is
complete and accurate.
iv.
Coding:
This step translates the data into machine language so that computer
can process.
v.
Proce
rocess
ssin
ing:
g:
Once
Once the
the data
data is avai
availa
labl
ble,
e, user
user will
will enter
enter the
the data
data for
for proc
proces
essi
sing
ng
through keyboard or any other input device.
vi.
vi.
Clas
Cl
assi
sific
ficat
atio
ion:
n:
In this step data can be organized according to the characters that are
meaningful to the computer user.
vii.
ii.
Sorti
orting
ng::
This stage involves arrangement of data into a particular sequence to
facilitate processing.
Example:
Sorting the bank deposits to account numbers will speed up the
processing.
viii.
iii.
Calc
Ca
lcul
ulat
atin
ing:
g:
Mathematical calculation on data in needed.
Example:
Comparison of values
ix.
ix.
Summ
Summar
ariz
izin
ing:
g:
A large amount of data can be reduced to a concise and useable form.
Example:
Budget Report of a company in specific year.
x.
Stor
Storin
ing
g and
and Re
Retr
triev
ieve:
e:
Data can be retained on storage mediums and can be retrieved from
storage medium (Hard disk, Flash Drive, Floppy drive, ZIP drive)
xi.
Output:
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 47 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Once the processing is complete
complete the results are available
available for output
output that
will
will be displ
displaye
ayed
d on diff
differ
eren
entt type
types
s of medi
mediums
ums whic
which
h can
can be soft
softcop
copy
y or
hardcopy.
xii.
xii.
Feed
Feedba
back
ck::
Feedback is a process of evaluating the output and adjusting the input
or processing
processing in order to ensure that results
results in good information
information..
Q)
Define
Defi
ne Da
Data
ta Proc
Proces
essi
sing
ng?
? Why
Why data
data proc
proces
essi
sing
ng is impo
import
rtan
antt for
for
Business?
Data Processing:
Data processing referred to operation carried out on data
d ata to convert it into
useful information.
DATA PROCESSING AS A BUSINESS NEED:
Electronic data processing is growing because it is capable of handling a vast
amount of data efficiently and accurately.
Following are the demands faced by business that create this need and which
are as follow
Number of Transactions:
Big firms naturally have many transactions, so the computer with high speed
and capacity can process thousands of records of business within a minute.
Cost:
By using computers business companies can reduce their cost. If a company
hires 50 persons for any accounts job, same operation can be done by using 5 to 6
computers.
Accuracy:
The use of computers in business will not only save the time but also it will
help to produce the accurate results without errors. If there are any errors they are
automatically highlighted at initial stages and computer user can correct them.
Speed:
Every company wants that the flow of data should be very fast. The computer
technology is also increasing fastly. Pentium-IV is very Fast, Accurate and giving
more facilities to computer in comparison with 486 or P-I.
Selectivity:
The business people demand selectivity in the ways that data are reported
specially computers can reorder a collection of data into many different forms.
(e.g) Data can be arrange Ascending or Descending before processing
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 48 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
Information:
Organized and processed data is called information. Information is meaningful
and
and use
use to take
take inte
intellllig
igen
entt deci
decisio
sions
ns so that
that desi
desire
red
d resu
result
lts
s can
can be gene
generat
rated
ed..
Computer technology is very helpful to convert raw data into useful information in
business organizations.
Record Keeping:
It is very important to have a complete record of data which is going to be
proces
processed
sed by the compute
computer.
r. To achieve
achieve 100%
100% result
results
s and after
after achiev
achieving
ing those
those
results the organization will save that Information & Data for future decision making
and also will compare it with previous year results.
Service:
It is important to maintain that the computer users have to take care of those
comp
comput
uter
ers
s in order
order to gene
genera
rate
te bett
better
er resu
result
lts
s in futu
future
re also
also and
and incr
increa
ease
se thei
theirr
efficiency by giving in time maintenance.
Allocation of Job:
It has been said
“Machine should work and People should think”
Many business people believe that human resources should be applied to those
tasks for which humans are qualified for them. In other words we can say “The right
person
person for right job”.
(e.g) If a person is hired in any organization for the job of “Data Entry” but after
joining the company aspects from to manage Lab and Networking, it will be wrong
job allocation.
Internet:
Internet is also becoming the need of business environment. Especially now a
days
days,, when
when the
the busi
busine
ness
ss tran
transa
sact
ctio
ions
ns is done
done onli
online
ne,, most
most of the
the busi
busine
ness
ss
organizations have their own websites.
REVIEWED
ByByuser
at Afridi
1:04 pm,
1/13/10
Azmat
13/01/2010
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 49 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
INTRODUCTION:
Word Processing software’s are used for Typing/Composing a Document.
(e.g.) Ms-Word
INTERFACE OF WORD PROCESSING:
Interface means Layout / Shape.
Title Bar
Menu Bar
Tool Bar
Ruler
Horizontal Scroll Bar
Vertical Scroll Bar
Status Bar
Cursor








FEATURES OF WORD PROCESSING:
Main features are
Deleting and Inserting Characters
Moving Text
Undo and Redo
Page Setting and Printing a Document
Searching and Replace Characters
Aligning Text
Page Numbers
Headers and Footers
Footnotes
Columns
Spell and Grammar Checking
Thesaurus
Text Styles
Formatting
Adding Graphics
Formulas
Charts and Graphs
Tables


















INTRODUCTION:


Word Processing software’s
software’s are used for Typing / Composing
Composing a Document.
Document.
Main Features are
o
Preparation of Applications, Letters
o
Documentation
o
Tables
o
Changing
Changing Writing Styles,
Styles, Size, Color (etc)
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 50 -
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
************************************************************
(e.g.)
(e.g.) Ms-Word
Ms-Word
INTERFACE OF WORD PROCESSING:
Interface means Layout / Shape.
Title Bar
Menu Bar
Tool Bar
Ruler








Horizontal Scroll Bar
Vertical
Vertical Scroll Bar
Status Bar
Cursor
Title Bar
Menu Bar
Vertical Scroll
Bar
Ruler
Tool Bar
Page
Cursor
Horizontal
Scroll Bar
Status Bar
FEATURES OF WORD PROCESSING:
Main features of word processor are
Save and Save As
Page Setup
Print Preview
Print
Undo and Redo
Cut, Copy and Paste
Searching and Replace
Characters
Headers and Footers
Zoom
Aligning Text
Page Numbers
Date and Time
Auto Text and Auto Correct
Footnotes
Columns
Symbol
Clip Art and WordArt
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-50-2380181
- 51 -
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
************************************************************
Book Mark
Hyper Link
Bullets and Numbering
Border and Shading
Drop Cap
Change Case
Spell and Grammar Checking
Thesaurus
Track Changes
Font
Paragraph
Macro
Adding Graphics
Formulas
Charts and Graphs
Tables
Merge Cells and Split Cells
Heading Rows Repeat
REVIEWED
By
at Afridi
1:04 13/01/2010
pm, 1/13/10
Byuser
Azmat
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107 Mobile U.A.E+971-502380181
52
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
COMMANDS OF MS-WORD WITH THEIR FUNCTIONALITY:
FILE MENU:
New (Create a New File)
Open (Open a Saved File)
Close (Close Current File)
Save (Save a File)
Save As (Save File With New Name or into other location)
Versions (It will Save the Current Status of File)
Page Setup (We can Change margins of page)
Print Preview (This command shows that who page looks like Before
Printing)
Print (Print a File)
Send To (Send File to Another Location)
Properties (It Contain information about File)
Exit (Close the Program)
EDIT MENU:
Undo (Remove
(Remove the last work)
Redo (Redo last work)
Cut (Remove Selected text form its location into Clipboard)
Copy (Copy selected text into Clipboard, but text will not remove from
its location).
Paste (After Copy or Cut ,Paste Command is use to insert text from
clipboard)
Paste Special (Text can be insert in different Format)
Clear ( Remove Selected Text)
Select All (You can Select All Text)
Find (We can Find Required Word, Letter or Sentence)
Replace (Replace undesired word with new word )
Go To (Cursor
(Cursor will move on Required Place in current
current document)
document)
VIEW MENU:
Normal (Normal
(Normal View of Page)
Web Layout (Web View of Page)
Print Layout (Print View of Page)
Outline (Outline View of Page)
Toolbars ( Toolbars can be Added and Removed due to
Requirements)
Ruler (Ruler is used for measurement of page)
Document Map (All Heading of Document will be shown in Left side of
the page)
Header
Hea
der and Footer
Footer (Head
(Header
er Text
Text will
will be displ
display
ayed
ed on top
top of Each
Each
Page and Footer Text will be displayed on Bottom of Each Page)
Footnotes (Meanings of difficult words)
Comments (Explanation about something)
Full Screen (Text will be Shown on Full Screen)
Zoom (Large Size of Text Due to Requirement)
INSERT MENU:
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
53
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Break (We can Insert Page break, Column break, Text wrapping break
and section breaks)
Page Numbers (Can Apply numbering on Pages)
Date and Time (Date and Time can be Inserted)
Auto Text (Text can be inserted automatically)
Symbol (Insert a Symbol)
Cross-Reference (It is the Reference Text to other location)
Caption (It is just like Heading of Selected Text)
Picture (We can insert Picture, Stylish Text, Draw Chart and Required
Shapes)
Text Box (Just like a box in which we can write something)
File (Add already saved file in current file)
Object (By using Object you can open and create docum ent of some
other application)
Book Mark (It’s a shortcut to access your required place)
Hyper Link (It is the reference text to access other location)
FORMAT MENU:
Font (Can Change Text style, size, Effects and Character
Character Spacing)
Paragraph (Formatting of Paragraph)
Bullets and Numbering (Outlines can be applied to text)
Border and Shading (we can apply border and shading to text, page
and paragraph)
Columns (Text can be written in multiple columns)
Tabs (Set Blank Spaces)
Drop Case (First letter of paragraph will display in large size)
Text Direction (Direction
(Direction of text can be changed)
Change Case (Text can be changed in Capital, Small, Sentence style,
Toggle)
Background (It will change Background color of page)
Theme ( Background style )
Frame ( Used for Web Pages)
AutoFormat (Automatically Formatting of text)
Style (Different styles of text can also be applied)
TOOLS MENU:
Spelling and Grammar (It will check Spelling and Grammar mistakes)
Language ( Language and words can be changed )
Word Count (It will show the summary of Current Document)
AutoSummarize (This command will generate Summary of document
automatically)
Auto Correct (Wrong Word will correct automatically)
Track Changes (Highlights the Track Changes in File)
Envelopes and Labels (Prepare a letter cover)
Letter Wizard (Write Letter in different
different styles)
Macro (Text can be recorded for future use)
Customize (Toolb
(Toolbars
ars can be added
added and differ
different
ent setting
setting of Toolba
Toolbarr
can be possible)
TABLE MENU:
Draw Table (It will draw Table due to requirement)
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
54
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Insert (It will insert Table, Columns, Rows, Cells)
Delete (Remove Table, Columns, Rows, Cells)
Select (This command will Select Table, Columns, Rows, Cells)
Merge Cells (Thi
(This
s comm
comman
and
d will
will merg
merge
e sele
selecte
cted
d cell
cells
s and
and make
make a
single cell)
Split Cells (A Cell can be divided in to multiple Columns and Rows)
Split Table (A Single Table can be divided into Multiple Tables)
Table AutoForm
AutoFormat
at (Dif
(Diffe
fere
rent
nt Text
Text / Font
Font colo
colors
rs and
and size
size can
can be
applied)
AutoFit (Text will Fit according to column and row height )
Heads Row Repeat (Heading of table will show on first row of every
page)
Convert (Text can be changed into Table and Table can be changed
into Text)
Sort (Tex
(Textt of Tabl
Table
e can
can be Arra
Arrang
nge
e into
into Asce
Ascend
ndin
ing
g or Desc
Descen
endi
ding
ng
order)
Formula ( Different Functions can be Applied to Table Entries)
Gridlines (Gridlines are the grey lines which we can see on computer
screen but can’t see in printout)
Table Properties (All Possible Function of table can be edited)
WINDOW MENU:
New Windo
New
Window
w (Thi
(This
s Comm
Comman
and
d will
ill made
made simi
simila
larr copy
copy to Curr
Curren
entt
Document)
Arrange All (All Files will be Shown on monitor’s screen)
Split (We can View Complete / Full Page)
HELP MENU:
Microsoft word Help (Help about any topic)
Show
Show the Office
Office Assistan
ssistantt (Assist
(Assistant
ant means
means Helper
Helper which
which provid
provide
e
ms-word’s help)
What’s This? (Give Information about Required Thing)
Detect and Repair (Find Error and Repair from CD)
About Microsoft Word (Information about word)
INTRODUCTION:

Spreadsheet is a grid of rows and columns which is used to enter
numbers
numbers and text.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
55
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107


Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
It is very powerful tool normally used for calculation.
(e.g.)
(e.g.) Ms-Excel
Ms-Excel
INTERFACE OF SPREADSHEET:
Interface means Layout / Shape.
Title Bar
Tool Bar
Menu Bar
Formula Bar
Horizontal Scroll Bar
Vertical Scroll Bar
Columns
Rows
Sheet Tabs
Cell
Status Bar











FEATURES OF SPREADSHEET:
Main features are
Formulas and Functions
Charts
Print Area
Formatting
Validation
Subtotals
Filter
Goal Seek











Excel is very important
important tool of Microsoft office.
Excel is used to Create Huge tables.
Key Features of Excel are
o
Presents the data into tabular form
o
Can apply Formula and Functions
o
Can Insert Charts and Graphs according to our requirement
(e.g)
(e.g) Ms-Exc
Ms-Excel
el
INTERFACE OF MICROSOFT EXCEL:
Interface means Layout / Shape. How Program Looks Like?
Title Bar
Columns
Tool Bar
Rows
Menu Bar
Worksheets
Formula Bar
Cell
Horizontal Scroll Bar
Status Bar
Vertical Scroll Bar











Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
56
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Title Bar
Menu Bar
Formula
Vertical Scroll Bar
Tool Bar
Columns
Cell
Worksheet
Rows
Sheet Tabs
Status Bar
Horizontal Scroll Bar
Book, Worksheet, Cells:
Cells:
 Book is a collection of worksheets.
 A Book can have many worksheets.
 Worksheet consists of Columns and Rows.
 Cell is a unit area of Column or Row.
 Columns are 256.
65536.
 Rows are 65536.
FEATURES OF MICROSOFT EXCEL:
Main features of Microsoft excel are
Print Area
Paste Special
Fill
Move or Copy Sheet
Page Break Preview
Formulas and Functions
Custom Views
Name
Charts
Conditional Formatting
Protection
Goal Seek
Sort
Filter
Subtotals
Validations
Group and Outline
Import External Data
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
57
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
58
CHOICES AND DECISIONS
CHOICES AND DECISION STATEMENTS:
 Selection Structures allow a choice among various alternatives.
 C has following decision statements

IF-Statement

IF-ELSE Statement

ELSE-IF Statement

SWITCH Statement

CONDITIONAL
CONDITIONAL Operator
IF Statement:
 It will check a given condition, if condition is true then statements will
be executed.
 If condition is false then statements will not executed.
 Syntax of IF statement is
if (conditi
(condition)
on)
{
statement 1;
statement 2;
…………..
}
Example:
#include
#include <stdio.h>
#include
#include <conio.h>
Void main ( )
{
int a=10;
int b=15;
if (a<=b)
{
printf (“A is less than B”);
printf (“C Language”);
}
getche( );
}
IF-ELSE Statement:
 In this statement, one condition and two blocks of statements are given.
 Either one of the two blocks of statements is executed after checking the
condition.
 If condition is True, First block will be executed and if condition is
False, the Second block will be executed.
 Syntax is
if (Condition)
{
Statement (s);
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
59
}
else
{
Statement (s);
}
Example:
REVIEWED
By
at Afridi
1:05 pm,
1/13/10
#include
#include <stdio.h>
Byuser
Azmat
13/01/2010
#include
#include <conio.h>
Void main ( )
{
int a=15;
int b=10;
if (a<=b)
{
printf (“A is less than B”);
}
else
{
printf (“ A is greater than B”);
}
getche( );
}
ELSE-IF Statement:
 Syntax of ELSE-IF Statement is
if (Condition1)
(Condition1)
{
Statement (s);
}
else if (Condition2)
{
Statement (s);
}
else if (Condition3)
{
Statement (s);
}
else
{
Statement (s);
}
Example:
#include
#include <stdio.h>
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
60
#include
#include <conio.h>
Void main ( )
{
int a=10;
int b=15;
if (a>b)
{
printf (“A is greater than B”);
}
else if (a= =b)
{
printf (“A is equal to B”);
}
else
{
printf (“B is greater than A”);
}
getche( );
}
SWITCH Statement:
 Works similar like “ELSE-IF” Statements.
 Multiple choices are given and one choice is to be selected.
 Break statement is used at the end of statements in each CASE .
 It exits the control from the body of switch structure.
 Syntax of SWITCH Statement is
Switch (expression)
{
case const1:
statement;
break;
case const2:
statement;
break;
case constn:
statement;
break;
default:
statement;
}
Example:
#include
#include <stdio.h>
#include
#include <conio.h>
Void main( )
{
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
61
int n;
scanf (“%d”,&n);
switch (n)
{
case 1:
printf(“One”);
break;
case 2:
printf(“Two”);
break;
case 3:
printf(“Three”);
break;
default:
printf(“Invalid
printf(“Invalid Value”);
}
getche( );
}
CONDITIONAL Operator:
 It is the alternate to a simple if- else statement.
 It consists of “?” (question-mark) and a “:” (colon).
 Its syntax is
{condition} ? {exp1} : {exp2}
Example:
#include
#include <stdio.h>
#include
#include <conio.h>
Void main ( )
{
int a=10, b=84, c;
c=(b>a) ? a : b;
printf (“%d”, c );
getche( );
}
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
62
DATABASE
Data:



Facts in raw form are called data.
Data have no meaning.
meaning.
(i.e.) 65, Farooq , age
Information:


Meaningful / Organized form of data is called information.
(i.e.) The age of Nasir is 65.
DRAWBACKS OF FILE SYSTEM / MANUAL SYSTEM:
Drawbacks of File System are
Data Redundancy (Same data was duplicated in many different
files)
Data Inconsistency (When same data are held in different files,
the data has to be updated in all files. If any file may fail to update
it will produce wrong output)
Program
Program-da
-data
ta Depende
Dependence
nce (If
(If we want
ant to cha
change
nge/mod
modify
ify
structure of file, that means every program which uses that file
has to be changed)
Lack of Flexibility (When non-routine information is needed, it
takes many week to collect data from different files and write new
programs to produce required result)
Data
ata was
was not
not Shar
Sharea
eabl
ble
e (Dat
(Data
a of one depa
depart
rtme
men
nt can’
can’tt
shareable by other departments )





DATABASE:



A coll
colle
ectio
ction
n of info
inform
rma
atio
tion orga
organ
nized
ized in such
such a way
way that
hat a
computer program can quickly select required data.
OR
A Database is a collection of related data.
Database
Database is just like an Electronic
Electronic Filing
Filing System.
System.
(e.g.)
Computerized Library Systems
Automated Teller Machines (ATM)
Flight Reservation Systems (etc)



Advantages of Database System:
Following are the main advantages of Database System
 More information from same data
 Shared data
 Balancing conflicts among users
 Controlled Redundancy
 Consistency
 Security
 Increased productivity
 Data independence
Fields,
Fields, Records,
Records, Files and Database:
Database:
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107




Mobile U.A.E+971-50-2380181
63
Fields (Columns are called Fields)
Records (Rows are called Records)
Files (A file is a collection of records)
Database (A Database may have many files)
DATABASE MANAGEMENT SYSTEM (DBMS):


It is a collection of programs that enables users to Store, Modify,
and Retrieve information from a database.
It provides the interface between the user and the database.
Primary Key:



The field which has Primary Key can’t be null and duplicate .
If primary key is made of only one field, it is called “Simple key”.
If primary key is made of a group of two or more fields, it is called
“Composite key”.
Data Type:
Type:







Text (Used to store alphabets, digits and special characters. It
can store up to 255 characters).
Memo (Used to store a large amount of text data).
Number (Used to store numeric data).
Date/Time (Used to store Date and Time).
Currency (Used to store Currency amounts).
AutoNumber (Used to generate
generate a serial number).
number).
Yes/No (This field contain either Yes or No).
ENTITY-RELATIONSHIP MODEL:



Also called E-R Model.
It is the graphical representation of the database.
In E-R Model Entities and their relationship described.
Entity:



An entity is a person, place, event or a concept in the real world.
Each entity has a set of attributes or properties.
For example, in a school, each student is an entity. This entity
has the attributes of Name, Roll No, Class, Date of Birth, Phone
No etc.
Relationship:



Linking of records of one table with the records of another tables
is called “Relationship”.
The field(s) in both tables usually have the same name, data type
and size
Three types of relationships are
1. One-to-One
One-to-One Relati
Relationship
onship
2. One-to-Many
One-to-Many Relati
Relationship
onship
3. Many-to-Ma
Many-to-Many
ny Relationshi
Relationship
p
One-to-One Relationship:
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107


Mobile U.A.E+971-50-2380181
64
Relationship between two sets of entities A and B is one-to-one
when
o
For each entity in A, there is only one related entity in B,
and
o
For each entity in B, there is only one related entity in A.
For example, countries and their capitals.
One-to-Many Relationship:
 Relationship between two sets of entities A and B is one-to-many
when
o
For each entity in A, there can be one or more than one
related entities in B, and
o
For each entity in B, there is only one related ent ity in A.
 For example, a student can have more than one phone numbers
but phone number could be assigned to only one student.
Many-to-Many Relationship:
 Relationship between two sets of entities A and B is many-tomany when
o
For each entity in A, there can be many related entities in
the B, and
o
For each entity in B, there can be many related entities in
A.
 For example,
example, many students
students can read many subjects
TABLES:





A table consists of rows and columns.
Within a table, data is stored as records.
A database may contain one or more tables.
Each row in a table represents one record.
Column
Column is called “Field”
“Field” and row is called
called “Record”
“Record” in database.
database.
QURIES:




Query is the request to extract
extract data from database.
database.
It consists of a command that is given to display data.
The results of a query are in the form of a table.
Main Advantages of using queries are
o
Extract
Extract particular
particular records
records from one or more tables
tables without
without
modification of the actual data.
o
Sort records in a particular data
o
Display the selected records on the screen; print them on
the printer, etc.
FORMS:


Form is a wind
window
ow that
hat coll
collec
ects
ts dat
data from
rom a dat
databas
abase
e and
organizes it on the computer screen.
It is used to
o
Retrieve data from the database and display it.
o
Enter data into the database.
o
Edit data in the database.
database.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107

Mobile U.A.E+971-50-2380181
65
Forms are designed to make data entry and retrieval easier.
Advantages:
 Forms provide a user friendly interface. So non-technical user
can work easily.
easily.
 A form usually displays only one record at a time so it is easier
to edit and enter data by using form.
 A form can collect and display data from more than one table.
REPORTS:
Pres
Presen
enta
tati
tion
on of selec
selecte
ted
d data
data retri
retriev
eved
ed from
from a data
databa
base
se in a
predefined manner is called a Report.
or
Presentation of data in formatted form.
or
Presentation of processed data obtained from a database is
called Report.



Report can be displayed on the screen, printed on the paper or
stored on the disk.
It can retrieve data from one or more tables of a database.
DIFFERENCE BETWEEN FORMS & REPORTS:
No
1.
2.
3.
4.
Forms
Reports
Usually used to view data on the
computer screen
Data cannot be format
matted
Data in the
the tables
tables can be modifi
modified
ed
New data can be entered
Usually used to print data on the
paper
Data can be for
formatted
Data cannot
cannot be modified
modified
New data cannot be entered
FILE MANAGEMENT
DATA FILES AND THEIR IMPORTANCE:
 Sometime computer program need large amount of input data. So it is
very difficult to enter all data at run time.
 Input data is stored in a file on the disk. Computer program reads the
data from the data disk.
 Simil
Similarly
arly,, progra
programs
ms are also
also often
often produ
produce
ce large
large outpu
outputt which
which is not
not
possible to view the entire data on screen at run time.
 The output from a program is written into a data file and is stored on the
disk.
ACCESS METHOD OF FILES:
Sequential Access
Access Files (Data read and write in a sequence. If we want
 Sequential
to read 5th record then the first four records have to be read. Text Data
Files are Sequential Access Files in C Language).
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
66
 Random Access Files (Read and write data directly. If we want to read
5th record then we can read required record directly. Binary Data Files
are Random or Direct Access Files in C Language).
File Access Modes:
Mode
Description
r
Reading Mode.
w
Writing Mode.
a
Appen
Append
d Mod
Mode.
e. Data
Data can
can be added
added at the
the end
end of file.
file.
r+
Reading / Writing Mode.
w+
Writing / Reading Mode.
a+
Reading / Append Mode.
Opening Files:
 “fopen” function is used to open a file.
 Before opening a file, a file pointer is associated with it.
 Example
FILE *fp;
fp=fopen(“abc.txt”,”w”);
Closing Files:
 When we opened a file we must close such file, otherwise data will
damage.
 “fclose” function is used to close a file.
 Example
fclose(fp);
FUNCTIONS
IMPORTANCE
IMPORTANCE OF FUNCTIONS:
FUNCTIONS:
 A function is a piece of code written to perform a specific task.
 Importance and Advantages are
1. A larg
largee prog
program
ram can
can be divi
divide
ded
d into
into smal
smalll unit
unitss or modu
module
les.
s.
These are written as Functions.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
67
2. Each
Each functi
function
on is writt
written
en to perfor
perform
m speci
specific
fic task. This makes
writing and testing of program easier.
3. Many
Many prog
progra
ramm
mmer
erss can
can work
work on one
one prog
progra
ram
m at a time
time.. So
program develop quickly.
4. A function
function can
can be use
use in other
other program.
program.
5. Use of functions
functions also reduces overall
overall length of the
the program.
TYPES OF FUNCTIONS:
FUNCTIONS:
Built-In
In Functi
Functions
ons (The
 Built(These
se func
functi
tion
onss are
are defi
define
ned
d alre
alread
ady
y in the
the
langu
language
age.. We can’t
can’t use these
these functi
function
onss in any other
other progr
program.
am. Also
Also
called Library Functions. (i.e.) printf ( ), sqrt ( ) etc.).
User-Defined
d Functions
Functions (User
(User create
createss these
these functi
function
ons.
s. Also
Also called
 User-Define
Prog
Progra
ramm
mmerer-De
Defi
fine
ned
d func
functi
tion
ons.
s. Thes
Thesee func
functi
tion
onss are
are writ
writte
ten
n for
for a
specific use).
TYPES OF VARIABLES:
VARIABLES:
Local Variables:
 Variables that are declared inside the main function or inside any userdefined function are called Local variables or automatic variables.
 The keyword “auto” (optional) can be used to declare these variables.
 Example
auto int a, b, c;
or
int a, b, c;
Life-Time
Life-Time of Local Variables:
 Life time is the time period between the creation and destruction of the
variable.
 When control goes to that function in which variable is declared, then
variable will created and occupy memory space and when control goes
back to calling function then variable will be destroyed.
 A variable declared inside the function can not used in other function.
Global Variables:
 Variable that is declared outside the main function or any other function
are called Global variables or External variables.
 These variables can use any where in the program.
Life-Time
Life-Time of Global Variables:
 These variables exist in the memory throughout the program execution.
 When a program starts its execution these are created.
 When program ends then these variables destroyed from memory.
Static Variables:
 These
These variab
variables
les are declar
declared
ed insid
insidee a functi
function
on by using
using the keywor
keyword
d
“Static”.
 These can be used only in that function in which they are declared.
 Life time is throughout the program.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
68
 Since static variables is initialized only once and is not destroyed, the
function having static variables runs faster.
 (e.g.) static int i=10;
PASSING
PASSING ARGUMENTS TO FUNCTIONS:
FUNCTIONS:
 Two ways of passing arguments are
Argumen
entt Passed
Passed by Valu
Valuee (In
(In this
this metho
ethod,
d, valu
valuee of the
the
– Argum
variable is passed to the function).
– Argument Passed by Reference (It is also called “passing by
address”. In this method, the memory address or reference of the
vari
variab
able
le is pass
passed
ed to the
the func
functi
tion
on.. & sign
sign is used
used with
with actu
actual
al
parameter).
INTRODUCTION TO C LANGUAGE
LANGUAGE:
 Language is used for communication.
 For communication with computer we need some languages are called
Computer languages or Programming languages.
COMPUTER PROGRAM:
Set of inst
instru
ruct
ctio
ions
ns give
given
n to comp
comput
uter
er to perf
perfor
orm
m a task
task is call
called
ed
 Set
computer program.
 Instr
Instruc
uctio
tions
ns are writte
written
n accor
accordin
ding
g to some
some rules
rules are called
called comput
computer
er
language or Programming Languages.
TYPES OF PROGRAMMING
PROGRAMMING LANGUAGES:
Three main types are
 Machine Language
 Assembly Language
 High Level Language
Machine Language:
 All coding will be in form of 0s and 1s are called Binary Code.
 Difficult to learn and understand.
Assembly Language:
 Symbols are used instead of binary code.
 Easier than Machine Language but hard to learn.
High Level Language (HLLs):
 Instr
Instruc
uctio
tions
ns are writte
written
n in these
these langua
languages
ges are very
very Close
Close to Human
Human
Language.
 Very powerful than Machine and Assembly Languages.
 Easier to Learn and Understand.
 Used for writing application programs.
 Examples are
BASIC, C, C++, COBOL (etc)
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
69
Characteristics (Features) of High Level Langauage:
 Machine Independent (Program written in high level language can be
run on any computer system).
 Well defined Syntax and Standard (Syntax are rules to write a source
code).
 Easy to Learn and Understand (Easy to learn as compare to machine
languages).
Shorterr Programs
Programs (Pro
(Progr
gram
amss are
are shor
shorte
terr than
than prog
progra
rams
ms writ
writte
ten
n in
 Shorte
machine language).
Source
ce is unde
underst
rstand
andab
able
le by othe
otherr progra
programme
mmers
rs (Instruc
 Sour
(Instructio
tions
ns are
writt
written
en in Engl
English
ish words
words so any progr
programme
ammerr can under
understa
stand
nd sourc
sourcee
code).
Source Code:
 A Computer Program written in a High Level Language is called Source
Code.
 Computer can’t run this Program.
Object Code:
 Compu
Computer
ter Progra
Program
m in the
the form
form of machi
machine
ne langu
language
age (0, 1) is called
called
object code.
 Computer can run this code directly.
TRANSLATORS
TRANSLATORS OR LANGUAGE PROCESSORS:
PROCESSORS:
Common translators are
 Compiler
 Interpreter
 Assembler
Compiler:
 Translate source code into object code as whole.
 Saves Compiled file called Object file.
 Computer will run object file.
 If there is any error in the source program, compiler tells about error at
time of compilation.
 All errors must be removed for successful compilation.
Interpreter:
 Trans
anslat
late source
rce inst
instru
ruct
ctiions one by one
one and
and exe
execut
cutes them
hem
immediately.
any erro
errorr occu
occurr prog
progra
ram
m tell
tellss abou
aboutt erro
errorr and
and stop
stopss prog
progra
ram
m
 If any
execution.
 Does not make object file.
 Slow and Time Consuming method.
HISTORY OF C LANGUAGE:
 C language combines some features of Assembly language and some
features of High Level Language.
 C language was developed in early 1970s by Dennis Ritchie at Bell
Laboratories.
 Designed for UNIX Operating Systems but very widely use now a day.
 In 1980s American National Standards Institute (ANSI) introduced the
standard version of “C” called ANSI C.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
70
 Use to write all type of programs such as





Control Hardware Processes
Word-processing
Word-processing Programs
Spreadsheet Programs
Educational
Educational Programs
Games
BASIC STRUCTURE OF C PROGRAM:
 Writing style of a program is called Structure of program.
 C Program has 3 main parts
1. Preproces
Preprocessor
sor Directiv
Directives
es
2. The Main(
Main( ) Function
Function
3. C Statem
Statement
entss
Example:
# include <stdio.h>
main( )
{
printf (“First Program”);
Preprocessor
Directive
Header
File
Main Function
C Statement
getche( );
}
Preprocessors Directives:
Directi ves:
 Inst
Instru
ruct
ctio
ions
ns give
given
n to Comp
Compil
iler
er befo
before
re actu
actual
al prog
progra
ram
m are
are call
called
ed
Preprocessor
Preprocessor Directives.
 It does some processing before the Compilation process starts.
 Preprocessor Directives are used to include Header files in the program.
(e.g.)
#inc
#inclu
lude
de <S
<Std
tdio
io.h
.h>
> or
#inc
#inclu
lude
de “Std
“Stdio
io.h
.h””
or #de
#defi
fine
ne <S
<Std
tdio
io.h
.h>
> or
#def
#defin
inee “Std
“Stdio
io.h
.h””
Header Files:
 Contain Definitions of standard library function.
 C has many header files.
 Each header file contains definitions of one type of functions only.
 (e.g.) math.h (Has Mathematical Function only)
 Header File has an extension .h
 The name of header file is written in angle brackets < > or double quotes
“ ”after #include
#include or #Define
#Define directive.
directive.
Main Function:
 C Program begins with “main( )” function.
 “main( )” must be included in every C Program.
 Execution will Starts through “main( )” Function.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
71
 If there in no “main ( )” Function, Compiler generated an error.
(e.g.)
main
main(( )
{
Program Statements…
}
C Statements:
 Statements are written between Curly braces { } of main function.
 Each statement of C ends with Semicolon ( ; ).
 Mostly written in lowercase, but in some cases, can also be written in
uppercase.
CREATING, EDITING AND SAVING A PROGRAM:
 Creating is the process of writing program into C compile r editor.
 Editing is the process of make changes into written program (Del and
Backspace key is used to delete characters).
 After creation of program save it as filename.c.
COMPILING, LINKING AND EXECUTING A PROGRAM:
Compiling:
 Conversion of Source code into object code is called Compiling.
 Compiler is used for conversion.
 Compiler saves object code in a file with extension .obj.
e.g.) Filename.obj
 If there are errors in source code compiler tells about error, when
these errors will rem
remove then program will comp
ompiled
successfully.
Linking:
 Nece
Necess
ssary
ary libr
librar
arie
iess are link
linked
ed to the
the obje
object
ct code
code and
and make
make
executable file.
 Linker can also detect errors.
 If Source code uses a library function that does not exist, linker
generates an error.
 Object file is converted into Executable file with extension .Exe.
Executing:
 Executable file will run on the computer system.
 Exec
Execut
utab
able
le file
file may
may also
also cont
contai
ain
n erro
errors
rs.. Thes
Thesee can
can prod
produc
ucee
wrong output or they can halt the system.
(e.g.)
(e.g.) a = 20 / 6;
FUNDAMENTALS OF C LANGUAGE
CHAPTER # 2
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
72
KEYWORDS OR RESERVED WORDS:
 Words that are used for Special purpose by the language.
 These are always written in lowercase.
 These have predefined uses and can’t be used for any other purpose in C
Language.
 C has 32 Keywords.
 (e.g.) Main (Indicate Main( ) function, we can’t use main for any other
purpose).
CONSTANTS:
Constan
Constants
ts are quantities
quantities whose
whose values
values do not change during
during program
program
execution.
Types of Constants:
Two types of constant are
1. Numeric
Numeric Constant
Constant
a. Integer
Integer Constan
Constantt (0, 245, -4759,
-4759, +4595)
+4595)
b. Floating-point
Floating-point Constant
Constant (25.5,
(25.5, 0.49, 245.
245. 463)
2. Characte
Characterr Constant
Constant (M,
(M, s, 5, +, - , * )
VARIABLES:
 Value of Variable may change during program execution.
 Variable represents memory location.
 Data stored into the memory location.
 May be Numeric or a non-numeric value.
Rules for Writing Variable Names:
 Must be starting with Alphabetic Character or an underscore ( _ ).
 First character cannot be a digit.
 Spaces are not allowed in variable name.
 Special character are not allowed (#,^,&,* , %, }, etc)
 Reserved words cannot be used.
 Maximum length is up to 31 characters.
 Two variables can not contain same name.
Types of Variables:
C has three types of variables
1. Integer
Integer Variables
Variables
2. Floatin
Floating-po
g-point
int Variab
Variables
les
3. Characte
Characterr Variab
Variables
les
Integer Variables:
 Integer is a whole number.
 It may have a positive or negative value.
 (e.g.) 25, 785, -78, 342
 Four types of integer are
i. Int (Takes 2 bytes in memory)
ii.
ii. Short
Short Int
Int (Takes 2 bytes in memory)
iii.
iii. Long
Long Int
Int (Takes 4 bytes in memory)
iv.
iv. Unsi
Unsign
gned
ed Int
Int (Takes 2 bytes in memory, Can Store only positive
values)
Floating-point Variables:
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
73
 These consist of whole numbers with fraction or decimal point.
 These are also called floating point numbers.
 (e.g.) 27.47, 0.14, -2.15
 Three types are
i.
Float
 It takes 4 bytes in memory.
 Represented in decimal or exponential form.
 May be signed or unsigned.
ii.
iii.
iii.
Double
 It takes 8 bytes in memory.
 Used to store large floating values.
Lon
Long Dou
Double
ble
 It takes 10 bytes in memory.
 Used to store very large floating values.
Character Variables:
 Character data type consists of alphabetic characters, numeric digits and
special characters
 It takes 1 byte in memory.
Declaration of Variables:
Variablee Type it can
variab
able
le and
and the
the Variabl
can hold
hold is call
called
ed
 Name of a vari
declaration of the variable.
 When a variable is declared, it occupies some memory space according
to its data type.
 Value of variable is stored in this memory.
(e.g)
 Int marks;
Data Type
Variable Name
REVIEWED
ByByuser
at Afridi
1:05 13/01/2010
pm, 1/13/10
Azmat
Examples:
 Short int Marks;
 Long int Length;
 Float Height;
 Double Distance;
 Char Single;
 Int Marks, Rollno, Age;
Initialization of Variables:
 Assigning a value to variable at declaration time is called initialization
of the variable.
 (e.g)
Int a=110, b=60, c;
Float num=6.78f;
Char sin=‘M’;
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
74
COMMENTS:
 Compiler can’t read these statements.
 Used to add remarks or comments in a program.
 Usually given to explain logic of program.
 For Single line comments
// comments
 For multi line comments
/* comments
comments */
 (e.g.)
c=aa +b;
c=
+b;
// Addi
Additi
tion
on of two
two numb
number
erss
INPUT AND OUTPUT STATEMENTS:
 Stat
Statem
emen
ents
ts that
that are
are used
used to prov
provid
idee data
data to the
the prog
progra
ram
m duri
during
ng its
its
execution are called input statements.
 Function used for input are
– scanf Function
– gets Function
– getch Function
– getche Function
 Statements that are used to show data to an output device are called
output statements.
 Function used for output are
– printf Function
– puts Function
 scanf and printf are most common used functions.
 These functions are defined in the “Stdio.h” header file.
#include <stdio.h>
Example:
#include
#include <stdio.h>
#include
#include <conio.h>
main ( )
{
int a=15;
int b;
scanf(“%d”,&b);
printf (“This is C Language”);
printf (“%d”,a);
print(“%d”,b);
getche( );
}
FORMAT SPECIFIER:
Format Specifier should be same to the type of variable for printing.
%c
Sin
Single Charac
aractter
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
%s
%d
%f
%e
%g
%u
Mobile U.A.E+971-50-2380181
75
String
Sing
Singed
ed Deci
Decim
mal Inte
Intege
gerr
Floating Point
Floati
Floating
ng Point
Point (Expo
(Exponen
nenti
tial
al Notat
Notation
ion))
Floa
Floati
ting
ng Poin
Pointt (%f
(%f or %e)
%e)
Unsi
Unsign
gned
ed Deci
Decima
mall Inte
Intege
gerr
FIELD WIDTH SPECIFIRER or ESCAPE SEQUENCES:
 Special characters are used to control printing on the output device are
called Escape Sequence.
 Escape Sequence is a combination of a Backslash ‘\’ and a code character.
\n
\t
\b
\a
\r
\r
\’
\’
\”
\”
\\
For New Line
For Tab
For Backspace
For Alarm (Beep)
Curs
Cursor
or will
will move
move to the
the begi
beginn
nnin
ing
g of line
line
To Prin
rint Sin
Single Quo
Quote
To Prin
rint Dou
Double Quo
Quote
To Print Bac
Backslash
OPERATORS:
Expression:
 Expression is used for calculating the value of a formula.
 It has different Operands and Operators.
 Its evaluation gives a single value.
(e.g.)
A×B×C
– Where
here A, B, C are
are vari
ariabl
able name
namess and
and are
are calle
alled
d
operands.
– Multipl
Multiplicati
ication
on sign
sign ‘×’
‘×’ is called
called operat
operator.
or.
Arithmetic Operators:
 Arit
Arithm
hmet
etic
ic Oper
Operat
ator
orss are
are the
the symb
symbol
olss that
that are
are used
used for
for Arit
Arithm
hmet
etic
ic
operations.
 Arithmetic Operators are
Symbol
+
*
%
Operation
Addition
Subtraction
Multiplication
/
Division
Modulus (Rem
(Remaainder)
Assignment Operator:
The Oper
Operat
ator
or that
that is used
used to assi
assign
gn valu
valuee to a vari
variab
able
le is call
called
ed an
 The
Assignment
Assignment Operator.
 Assignment Operator ‘=‘ is used to assign value to variable.
 Example
int age ;
age = 50;
or
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
76
int age = 50;
 Assi
Assignm
gnment
ent Operator
Operator can also be used
used to assign
assign one value
value to many
many
variables called Compound Assignment Operator.
 Example
int x, y, z;
x = y = z = 10;
Increment and Decrement Operators:



Increment Operator
+ + is used as Increment Operator.
It is used to add 1 to the value of a
variable.
(e.g.)
int x = 87;
x + +;



Decrement Operator
- - is used as Decrement Operator.
It is used to Subtract 1 to the value
of a variable.
(e.g.)
int x = 87;
x - -;
Prefix and Postfix Operators:
Prefix Operator
 It adds 1 to the value of the
vari
variab
able
le befo
before
re the
the valu
valuee of the
the
variable is used in the expression.
 (e.g.)
int a = 50, b;
b = + +a;
Postfix Operator
 It adds 1 to the value of the
vari
ariabl
able afte
afterr the
the valu
alue of the
the
variable is used in the expression.
 (e.g.)
int a = 50, b;
b = a+ +;
Relational Operators:
 Rela
Relati
tion
onal
al oper
operat
ator
or is a symb
symbol
ol that
that is used
used to find
find a rela
relati
tion
onsh
ship
ip
between two expressions.
 Relational operator are
Symbol
==
!=
<
>
<=
>=
Definition
Equal To
Not Equal To
Less Than
Greater Than
Less Than or Equal To
Greater Than or Equal To
Logical Operators:
 Used to compare two or more conditions.
 The output of logical expression is True or False.
 Logical operators are
Symbol
&&
||
!
Definition
AND Operator
OR Operator
NOT Operator
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
77
Truth Table for &&, || and ! Operator
a
True
True
False
False
b
True
False
True
False
a && b
True
False
False
False
a || b
True
True
True
False
!a
False
False
True
True
!b
False
True
False
True
Order of Precedence of Operators:
 All Multiplication and Division are performed first.
 All Addition and Subtraction are then performed.
 If parentheses are used in an expression, then expression in parenthesis
are performed first.
 If pare
parent
nthe
hese
sess are
are used
used with
within
in pare
parent
nthe
hese
ses,
s, the
the expr
expres
essi
sion
on,, with
within
in
innermost parentheses will performed first.
 (e.g.)
(4 - (3*5))+2
LOOPS
LOOP:
 A statement or a set of statements that is executed repeatedly is called a
loop.
 Loop is executed until the given condition remains true.
 Three loops in C are

While Loop

Do-While Loop

For Loop
While Loop:
 Used to execute a statement or set of statements as long as the given
condition remains true.
 Syntax of the “While” loop is
while (condition)
(condition)
{
statement (s);
}
Example:
#include
#include <stdio.h>
#include
#include <conio.h>
main ( )
{
int c=1;
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
78
while (c<6)
{
printf (“I Love Pakistan\n”);
c=c+1;
}
getche( );
}
Do-While Loop:
 Used to execute a statement or set of statements.
 Just
Just like
like whil
whilee loop
loop but
but in this
this loop
loop the
the cond
condit
itio
ion
n is test
tested
ed after
after
executing the statements of the loop.
 Syntax of the “While” loop is
do
{
statement (s);
}
while (condition);
(condition);
Example:
#include
#include <stdio.h>
#include
#include <conio.h>
main ( )
{
int c=1;
do
{
printf (“I Love Pakistan\n”);
c=c+1;
}
while (c<6);
getche( );
}
For Loop:
 Used to execute a statement or set of statements as long as the given
condition remains true.
 Also called Counter loop.
 It has following parts
1. Initiali
Initializati
zation
on
2. Condit
Conditio
ion
n
3. Incremen
Incrementt or
or Decreme
Decrement
nt
4. Body
Body of
of the
the Loop
Loop
 General syntax of For Loop is
for (initialization; condition; increment / decrement)
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
79
{
Statements;
}
REVIEWED
ByBy
user
at 1:05
1/13/10
Azmat
Afridi pm,
13/01/2010
Example:
#include
#include <stdio.h>
#include
#include <conio.h>
main ( )
{
int a;
for (a=5; a<15; a++)
{
printf (“I Love Pakistan\n”);
Pakista n\n”);
}
getche( );
}
NESTED LOOPS:
 A loop can be declared inside another loop called nested loop.
 Loops can be nested For-Loop, While Loop, Do-While Loop or mixture
of these.
Example:
#include
#include <stdio.h>
#include
#include <conio.h>
main ( )
{
int a, b;
for (a=1; a<5; a++)
for (b=1; b<3; b++)
{
printf (“I Love Pakistan\n”);
}
getche( );
}
INFORMATION SYSTEM DEVELOPMENT (ISD)
An Information System Collects, Maintains, and Provides information to
people
people.. Today,
Today, many
many inform
informati
ation
on systems
systems are computer
computerize
ized.
d. Inform
Informati
ation
on
syste
systems
ms are
are desig
design
n for
for thos
those
e peop
people
le who
who have
have very
very littl
little
e know
knowle
ledg
dge
e of
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
80
information technology. The five phases of information system development
are
System Analysis
System Design

System Development


System Implementation
System Maintenance


System Analysis:
o
o
o
The person who does analysis is called an Analyst.
This phase focuses on “what”.
“what”.
Three task of this phase are
Defining the problem
Analyze current system
Selecting the best solution



System Design:


This phase focuses on “how”.
“how”.
Main tasks in this phase are
Making Flow Charts and Data Flow Diagrams (DFD’s)
Making User Manuals
Selecting the best computer language for development



System Development:



The person who does development is called a Programmer
Writing computer programs by using some computer language
Testing and debugging programs
System Implementation:



Install developed system on computers
Update or upgrade systems hardware if needed
Training of operators and users
System Maintenance:
o
o
Afte
Afterr impl
implem
emen
enta
tati
tion
on if any
any erro
errorr occur
occurs
s then
then it will
will remo
remove
ve in this
this
phase
Monitor system performance
DATA COMMUNICATION
DATA COMMUNICATION:
“Transferring of data fro
from one point to other is called data
communication”.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
81
BASIC ELEMENTS OF DATA COMMUNICATION:
COMMUNICATION:
Three basic elements are
1) Transmitter
Transmitter or Sender:
Sender:
Who sends data called a Sender.
2) Medium
Medium::
Which carries information called a Medium. Such as
cables, air (etc)
3) Receiver:
Receiver:
Which receives the information, called a Receiver.
Sender
Medium
Receiver
DATA COMMUNICATION MODES:
There are three modes of data communication
1) Simplex
Simplex Mode:
Mode:
Data can send only in one direction/side (from sender to
receiver).
Examples:
Radio, Television (etc)
Sender
Medium
Receiver
2) Half-Duplex
Half-Duplex Mode:
Data
Data can
can send
send both
both dire
direct
ctio
ions
ns/s
/sid
ides
es but
but only
only in one
one
direction/side at a time (from sender to receiver or from receiver
to sender).
Examples:
Wireless set, Computers in a Network (etc)
OR
Sender
Medium
Receiver
3) Full-Duplex
Full-Duplex Mode:
Data
Data can
can send
send both
both dire
direct
ctio
ions
ns/s
/sid
ides
es at a time
time (fro
(from
m
sender to receiver and from receiver to sender).
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
82
Examples:
Telephone Lines (etc)
AND
Sender
Medium
Receiver
TYPES OF DATA:
There are two types of data are
1) Digital
Digital Signals:
Signals:
Computer use digital signals.
Data in the form of “0” and “1”.
Discrete data.
Examples:
Data stored in memory (etc)



2) Analog Signals:
Signals:
Telephone lines use digital
d igital signals.
Data in the form waves.
Continue data.
Examples:
Human Voice (etc)



MODEM:
Modem is used to access Internet.
Wor
Word Mode
Modem
m com
comes from
from MOdula
dulati
tion
on (Dig
(Digit
ital
al to Anal
Analog
og)) and
and
DEModulation (Analog to Digital).
 Computer use digital signals, while telephone lines use analog signals.
 Modem is the medium between telephone lines and computer, which
perform Modulation and Demodulation.
 Computer “A” wants to send a file to computer “B”, both should have
modem and a protocol FTP (File Transfer Protocol).


TRANSMISSION MEDIAS:


Data travel from one computer to other through some media called
transmission media or communication channels or communication
media.
Communication media includes
Standard Telephone Lines
Coaxial Cables
Microwave Transmission
Satellite Communication
Fiber Optics





Telephone Lines:


Telephone lines are widely used as communication lines.
Data travel over these lines in the form of Analog signals.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
83
Coaxial Cables:




These are made up of copper.
Transmission rate is 10 Mega bits per second (Mbps).
Mostly used for long distance transmission.
transmission.
Prov
Provid
ide
e high
high qual
quality
ity data
data trans
transmi
missi
ssion
on witho
without
ut dist
distor
ortio
tion
n or loss
loss of
signal.
Microwave Transmission:





These use air for data transmission.
Data transmit in the form of waves.
Transmission speed is faster than Telephone lines and Coaxial cables.
Transmitters are installed on high buildings.
Two stations must be within sight of one another.
Satellite Communication:





Ideal for long distance communication.
Very fast transmission
transmission speed.
Satellites are placed about 22,000 miles above the earth.
There
There are many
many earth
earth station
stations
s with
with antenn
antennas
as which
which receive
receives/se
s/sends
nds
signals from satellite.
Satellites are launched either by rockets or by space shuttles.
Fiber Optics:






Thin glass or plastic tubes are used for data transmission.
Data transmit through the speed of light.
Transmission rate is more than a Billion bits per second (Bbps).
Very costly
Special devices are used to cut and install the cable.
Conv
Conver
erter
ters
s are
are used
used at the
the both
both ends
ends of the
the cabl
cable,
e, whic
which
h conve
convert
rt
electrical
electrical signals into light and vice versa.
ENCODING
ENCODING DIFFERENT TYPES OF DATA:

Two types of a data are
Analog Signals
Digital Signals
Computer use digital signals, while telephone lines use analog signals.
Analog signals should be change into digital signals for transmit over
teleph
telephone
one lines and
and then
then change
change back to digita
digitall data
data for proces
processin
sing
g
inside the computer.
Modem is used for changing data from Digital to Analog and Analog to
Digital.





EXERCISE
vii Data Communicat
Communication
ion
viii Half
Half Duplex
Duplex
ix Asynch
Asynchron
ronous
ous
x Synchro
Synchronou
nous
s
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
84
xi Relay
Relay Station
Station
xii Modula
Modulatio
tion
n
xiii
xiii Mode
Modem
m
xiv
xiv Baud
Baud
COMPUTER NETWORKS
COMPUTER NETWORKS:
Connection between two or more Computers, so that they can communicate with
each other.
Types of a network:
Types of network are the following.
 LAN (Local Area Network)
 WAN (Wide Area Network)
 MAN (Metropolitan Area Network)
Local Area Network (LAN):
 LAN is a network that spans limited physical area.
 LANs
LANs are
are usua
usualllly
y used
used for
for shar
sharin
ing
g prin
printe
ters
rs,, hard
hard disk
disk,, hard
hardwa
ware
re
devices, and software applications (etc.).
 LAN is a high-speed connection.
 Used in small office, computers Labs.
Wide Area Network (WAN):
 WAN is a Network that spans a large number of areas.
 It may operate nationwide or worldwide.
NETWORKING CONCEPTS:
Server:
 If a computer shares resources for other to use then it is called a
server.
 Server are often more powerful, more faster, more memory and
more disk space than client.
Client:
 When the computer access the resources form other, then we
can say that is a client.
 Clients are usually less powerful, less memory, less speed and
less disk space than server.
LAN Card or NIC Card (Network
(Network Interface Card):
 NIC card or LAN cards are used for data communication.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107

Mobile U.A.E+971-50-2380181
85
LAN cards are used in Local Area Network.
Modem:
Modem is used to access internet and data communication in WAN.
Types of a network:
There are two types of network.
1. Dedicated
Dedicated server network or client server network.
2. Peer-to-Peer network.
Dedicated server network:
 Normally used in both in LAN and WAN.
 There is a server with many clients.
 Server can provide
o
File sharing
o
Printer sharing
o
Application sharing
o
Access to the internet and
o
Security.
Peer-to-Peer network:
 Normally used in LAN.
 Also called workgroup.
 No central computer (Server).
(Server).
 All computers are having equal functionality.
 A single computer will be server when it will serve to other
Computers, and become a client when request for resources to
Other.
Networking Software:
 Software, which provide feature for communication.
 These
These softw
softwar
are’
e’s
s are
are also
also call
called
ed netw
networ
orkin
king
g oper
operat
atin
ing
g syste
system
m
(NOS).
 Examples are
WIN XP, WIN 2000, LINUX, and UNIX etc.
Workgroup Computing and Groupware:
 A workgroup is a collection of individuals working in a task.
 They can send e-mail to each other's, shared data and schedule
meetings.
 Groupware is software that supports workgroup computing.
NETWORK TOPOLOGIES:


Cabling layout of a network is called topology.
Network topologies are following.
o
Bus
o
Ring
o
Star
Bus Topology:
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107






Mobile U.A.E+971-50-2380181
86
All computers are connected with a single cable called a bus.
At the end of bus, terminator is installed that absorbs the
singles.
Data
Data trav
travel
els
s alon
along
g the
the cabl
cable
e until
until it reac
reache
hes
s to the
the requ
require
ired
d
computer.
Suitable for small networks.
If any computer goes down all network will goes down.
It uses Carrier Sense Multiple Access (CSMA) technology.
Ring Topology:
 Its shape is just like a ring.
 Each computer is connected
connected with its to adjacent computers.
computers.
 Data will travel in one direction around the ring.
 If any computer goes down then all network will goe s down.
Star Topology:
 All computers are connected with a central device called hub.
 Very popular for small networks.
networks.
 More expensive than bus topology.
 Data
Data will
will send
send to hub
hub than
than hub
hub will
will send
send it to the
the requ
requir
ired
ed
computer.
 If any computer goes down there is no effect on network.
ISO and OSI Model:
 ISO Developed a standard for data communication called Open
System Interconnection.
 OSI has seven layers.
o
Physical Layer
o
Data Link Layer
o
Network Layer
o
Transport Layer
o
Session Layer
o
Presentation Layer
o
Application Layer
Physical Layer:
 This layer deals with system of bits.
 Collect data from upper layer and send it to required computer in
the form of bits.
 RS-232 connector is used for data transmission.
Data Link Layer:
 Responsible for node-to-node delivery of message.
 Control the rate of flow of data.
Network Layer:
 It deci
decide
des
s whic
which
h path
path of data
data shou
should
ld send
send from
from one
one node
node to
other.
 Swit
Switche
ches,
s, Rout
Router
ers
s and
and NIC
NIC Card
Cards
s (Netw
(Networ
ork
k inte
interfa
rface
ce card
card))
decid
decides
es the
the rout
routin
ing
g base
based
d on netw
networ
ork
k condi
conditio
tions
ns,, prio
priori
rity
ty of
service and other factors.
factors.
 TCP/IP is very important protocol of this layer.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
87
Transport Layer:
 Responsible for end-to-end delivery of entire message.
 If the link goes down then this layer send data into other link
(Path).
 Arrangement of data in its order.
 Remove errors.
 Control rate of flow of data.
Session Layer:
 Establish a connection between two-application across network.
f unction
n is performing
performing
 Its functio
o
Security
o
Logging
o
Administration
Presentation Layer:
 This layer represents
represents data in user understan
understan dable form.
 Techniques used are
o
Translation
o
Encryption
REVIEWED
o
Compression
ByByuser
at Afridi
1:05 pm,
1/13/10
Azmat
13/01/2010
Application Layer:
 This layer serves the user.
 User can control it directly.
 It includes services such as
o
E-mail
o
File sharing
o
File printing and other software
PROTOCOLS:


Protocols are set of rules that transfer data from one location to
another.
Network has many protocols.
o
TCP/IP
o
IEEE 802.X Standard
o
IEEE 802.3 and 802.5 Standard
o
IEEE 802.6 Standard.
TCP/IP:





TCP/
TCP/IP
IP stan
stands
ds for
for tran
transm
smis
issi
sion
on cont
contro
roll prot
protoc
ocol
ol/I
/Int
nter
erne
nett
protocols.
TCP/IP protocol communicates between two similar or
dis-similar computer systems.
Very popular protocol in large networks.
It is used in Network layer and transport layer.
Example are
192.168.0.10
10.0.0.15


IEEE 802.X Standard:
 IEEE stands for Institute
Institute of Electrical
Electrical & Electronics
Electronics Engineers
Engineers
(IEEE).
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107



Mobile U.A.E+971-50-2380181
88
IEEE has developed a set of standard about cabling, Topology
and Access time of network products.
The general committee working
working on these standard is called
called 802.
This standard is used in lower two layers (Physical & Data Link
Layer).
IEEE 802.3 and 802.5 Standard:
 IEEE 802.3 uses carrier sense Multiple Access (CSMA) on bus
topology.
 IEEE 802.6 standard used in Token Ring Topology.
IEEE 802.6 Standard:
IEEE 802.6 use in Metropolitan Area Network (MAN).
EXERCISE
xv Netw
Networ
ork
k
xvi Dedicat
Dedicated
ed Server
Server
xvii
xvii Peer-t
Peer-to-P
o-Peer
eer
xvii
xviiii WAN
WAN
xix Groupw
Groupware
are
xx Topo
Topolo
logy
gy
xxi Protoco
Protocols
ls
xxii
xxii Netwo
Network
rk
NETWORK:
Conn
onnect
ection
ion of more
more than
han one
one Comp
Compu
uters
ters so that
hat they
hey can
can
Communicate, Exchange Information, and Share Resources.
Uses of Networking:
 Sharing Hardware Resources (Printer, Scanner, CD-ROM etc.)
 Sharing Software Resources (Programs and Data)
 Easy Backup
 Communication and Messaging
Hardware Requirement for a Computer Network:
 Computers
 NIC Card or LAN Cards or Ethernet Card
 Wires (UTP Cat5)
 RJ-45 Connectors
 HUB / Switch
TYPES OF NETWORK:
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
89
Following are the types of network
 Local Area Networks (LAN)
 Wide Area Networks (WAN)
 Metropolitan Area Network (MAN)
Local Area Network (LAN):
 LAN normally operates within a compact area such as an Office
Building or a Campus.
 LAN is capable of interconnecting a large number of computers
and other devices within 1 Km.
 A LAN tends to use only one type of transmission medium.
 LANs are usually used for sharing printers, hard disk, hardware
devices, and software applications (etc.).
 Physical medium is used for data transmission.
 Transmission medium used are UTP (Un-Shielded Twisted Pair)
Cable, STP (Shielded Twisted Pair) Cable or Fiber Optic Cable.
 Data transmission Speed is high.
(i.e.) 10/100 mbps
 Installation cost is low.
 Normally owned by a single organization.
Success Rate of Data Transmission
Transmission is almost 100%.
 Success
 (e.g.)
(e.g.) Computer
Computer Labs of Instituti
Institutions,
ons, Computer
Computer Network
Network in an
Office, etc.
Wide Area Network (WAN):
 WAN interc
interconn
onnect
ects
s differ
different
ent Sites,
Sites, User
User Termin
Terminals
als,, and enable
enable
LANs to Communicate with each other.
 They exist in an unlimited geographical
geographical area.
 Used to Communicate to Nationwide or Worldwide.
 Transmission medium used are Telephone Lines, microwave and
Satellite links.
 Devices used are HUB, Switches, Routers (etc.)
 Speed of Data Transmission is 1800 to 9600 bits per second.
 Very High Installation cost as Compare to LANs.
 Not owned by a single organizatio
organization.
n.
 Complex structure than LAN.
 There is more chance of errors due to the distance data travels.
 Success Rate of Data Transmission is less than LAN.
 (e.g.)
(e.g.) Internet,
Internet, Network
Network of all Branches
Branches of a Bank.
METROPOLITAN AREA NETWORK (MAN):
 A MAN interconnects different Sites, User Terminals, and enables
LANs to Communicate with each other but within a city.
 It covers region larger than LAN but smaller than WAN.
 MANs normally covers an area of between 5 to 50 Km.
 Like WAN it is not owned by a single organization.
 Installation cost is high than LAN but less than WAN.
 Data transmission speed is high than WAN but less than LAN.
(e.g.) Network of different
different branches
branches of a company
company within
within city
 (e.g.)
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
90
NETWORKING CONCEPTS:
Server:
 If a computer shares resources for other to use then it is
called
called a server.
server.
 Server are often more powerful, faster, more memory and
more disk space than client.
Client:
 When the computer access the resources form other, then
we can say that is a client.
memory, less speed
 Clients are usually less powerful, less memory,
and less disk space than server.
LAN Card or NIC Card (Network Interface Card):
 NIC card or LAN cards are used for data communication.
 LAN cards are used in Local Area Network.
WAN Card or MoDem:
 Modem is used to access Internet.
 Word Modem comes from MOdulation (Digital to Analog)
and DEModulation (Analog to Digital).
 Comp
Comput
uter
er use
use digi
digita
tall sign
signal
als,
s, whil
while
e tele
teleph
phon
one
e line
lines
s use
use
analog signals.
 Mod
Modem is the
the medi
mediu
um betw
betwee
een
n tele
telep
phone
hone lines
ines and
computer, which perform Modulation and Demodulation.
Networking Software:
 Software, which provide feature for communication.
 These software’s are also called network operating system
(NOS).
 Examples are
WIN XP, WIN 2000, LINUX, and UNIX etc.
NETWORK TOPOLOGIES:
 The term topology refers to the way a network is laid out.
OR
 Cabling
Cabling layout
layout of a Network
Network is called Network Topology.
Topology.
OR
 Physical
Physical layout of a network
network is called
called Network
Network Topology.
Topology.

Network topologies are
o
Bus Topology or Linear Topology
o
Star Topology
o
Ring or Token Topology
o
Mesh Topology
o
Tree Topology
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
91
Bus Topology:
 All Computers will be attached with a long cable called a Bus or
Trunk or Back bone cable.
 Multi-Point Communication.
 No security of data.
data.
 Not recommended for large or sensitive networks.
 T-Connectors and Terminators are used.
 It uses
uses Carr
Carrie
ierr Sense
Sense Mult
Multip
iple
le Acce
Access
ss (CSM
(CSMA)
A) tech
techno
nolog
logy
y for
for
data transmission.
 Advantages are
o
Least amount of Cabling of any topology.
o
Suitable for small networks
o
Adding additional nodes is easy
 Disadvantages are
o
If main Cable breaks, then whole Network will goes down.
o
If any link goes down, then network will goes down.
o
Only one medium for Data Transmission so Transmission
Speed is very slow.
o
Terminators are requires at the both ends.
Star Topology:
 Most common use now a day.
 Point-to-Point or Uni-cost Communication.
 Security of data.
 All Computers will be connected to a Central controller, usually
called a HUB or Switch.
 Central device (Switch or HUB) has addresses of all computers
connected to it.
 If one device wants to send the data to another, it sends the data
to the controller, which then relays the data to other connected
devices.
 Advantages are
o
Fast Communication Speed as compared to Bus Topology.
o
Easy to install and wire.
o
If one computer fails, no effect on network.
o
Easy to detect and remove faults.
 Disadvantages are
o
High installation cost as compared to Bus Topology.
o
If central device fails then entire network
network will goes down.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
92
Ring Topology:
 Its shape is just like a ring.
 Also called Token Ring Topology.
 Connects the nodes (computers) in a circular Chain.
 Point-to-point Communication only with two devices on either side
of it.
 A signal or Token is passed along the ring in the direction (Anti
Clock Wise), from device to device, until it reaches its required
destination.
 Better
Better Perfor
Performan
mance
ce than
than Bus Topolo
Topology
gy but less
less effect
effective
ive than
than
Star Topology.
 Not very common used for large networks.
 Advantages are
Adding additional nodes is easy.
All computers
computers have equal access on network.
network.
 Disadvantages are
Difficult to configure
If Cable breaks, then whole Network will goes down.
If any link goes down, then network will also goes down.
Only one medium for Data Transmission so Transmission
Speed is very slow.






DATA COMMUNICATION:
“Trans
“Transfer
ferrin
ring
g or Exchang
Exchange
e of inform
informati
ation
on or messag
messages
es from
from one
point to other is called data communication”.
BASIC ELEMENTS OF DATA COMMUNICATION:
COMMUNICATION:
Three basic elements are
4) Transmitter
Transmitter or Sender:
Sender:
Who sends data called a Sender.
OR
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
93
Transmitting device is called sender.
5) Medium
Medium::
Which carries informatio
information
n called a Medium.
Medium. Such as
cables, air (etc)
6) Receiver:
Receiver:
Which receives the information, called a Receiver.
Sender
Medium
Receiver
DATA COMMUNICATION MODES:
There are three modes of data communication
4) Simplex
Simplex Mode:
Mode:
Data can send only in one
one direc
directi
tion/
on/si
side
de (from
(from
sender to receiver).
Examples:
Radio, Television (etc)
Sender
Medium
Receiver
5) Half-Duplex
Half-Duplex Mode:
Data can send both directions/sides but only in one
dire
direct
ctio
ion/
n/si
side
de at a time
time (fro
(from
m send
sender
er to rece
receiv
iver
er or from
from
receiver to sender).
Examples:
Wireless set, Computers in a Network (etc)
OR
Sender
Medium
Receiver
6) Full-Duplex
Full-Duplex Mode:
Data can send both directions/sides at a time (from
sender
sender to receiver and from receiver
receiver to sender).
Examples:
Telephone Lines (etc)
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
94
AND
Sender
Medium
Receiver
TYPES OF DATA:
Two types of data
3) Digital
Digital Signals:
Signals:
 Computer use digital signals.
 Data in the form of “0” and “1”.
 Refers to something that is discrete.
di screte.
 A set of specific points of data with no other points in
between.
example of digi
igital data is data sto
stored in the
 An exa
memory of a computer in the form of 0s and 1s it is
usually converted to digital signal when needed to be
transmitted.
4) Analog Signals:
Signals:
 Telephone lines use Analog signals.
 Analog refers to something that is continuous.
 A set of specific points of data and all possible points
in between.
 Data in the form of waves.
exampl
mple of anal
analo
og data
ata is huma
human
n voice
oice when
hen
 An exa
somebody speaks a continuous wave is created in the
air.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
95
NETWORK OR TRANSMISSION MEDIAS:
 Data travel from one computer to other through some medium
call
called
ed trans
ransmi
miss
ssio
ion
n med
media or comm
commun
uniicat
cation
ion cha
channel
nnels
s or
communication media.
Medias is classified
classified into two types
 Medias
Boun
Bounde
ded
d or Guid
Guided
ed (In
(In Boun
Bounde
ded
d or Guid
Guided
ed phys
physic
ical
al
media is used. Such as cable system)
Unbounded or Unguided (Unbounded
(Unbounded or Unguided
Unguided media
is wireless. Signal is usually transmitted through air)
 Communication media includes
Standard Telephone Lines
Coaxial Cables
Microwave Transmission
Satellite Communication
Fiber Optics







Telephone Lines:
 Telephone cable is used to access internet.
 Normally used in WAN and MAN for data transmission.
 It has low cost as compare to other transmission Medias.
 Telephone lines are widely used as communication lines.
 Data travel over these lines in the form of Analog signals.
Coaxial Cables:
 These are made up of copper. A plastic layer provides insulation
between the copper wire and metal shield. Metal shield helps to
block any outside interference.
 Transmission rate is 10 Mega bits per second (Mbps).
 It is less expensive than Fiber Optic.
 Mostly used for long distance transmission.
 Provide high quality data transmission without distortion or loss of
signal.
 It can be classified in two categories
o
UTP (Unshielded Twisted Pair Cable)



o
It has maximum range of 100 meters (328 feet).
It consists of 2 or 4 twisted wire pairs.
Widely used in LANs.
STP (Shielded Twisted Pair Cable)




Same as UTP but it is covered with a shield for
resistance.
It is more reliable and faster than UTP.
It covers long distance.
Normally used as a back bone cable.
Microwave Transmission:
transmission.
n.
 These use air for data transmissio
 Data transmit in the form of waves.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107








Mobile U.A.E+971-50-2380181
96
Very useful for lone distance communication.
It has high cost.
It is very difficult
difficult to install.
install.
Data
Data tran
transm
smiss
issio
ion
n spee
speed
d is slow
slow as compa
compare
red
d to phys
physica
icall or
guided Medias.
Transmitters are installed on high buildings.
Two stations must be within sight of one another.
Difficult to detect and remove errors.
Normally
Normally telecommuni
telecommunicatio
cation
n companies
companies use microwave
microwave signals
signals
for data transmission.
Satellite Communication:
 Ideal for long distance communication.
Coa xial and Fiber
 Transmission speed is slow as compared to Coaxial
optic cables.
 Satellites are placed about 22,000 miles above the earth.
 This technique has very huge cost.
 Difficult to install.
 Data transmission in the form of waves.
 It covers very large area of the earth.
 There
are many earth stations with antennas which
receives/sends signals from satellite.
 Satellit
Satellites
es are launched either by rockets
rockets or by space shuttles.
shuttles.
 Difficult to detect and remove errors.
Fiber Optics:
 Thin glass or plastic tubes are used for data transmission.
 Data transmit through the speed of light so that’s why it provides
very high data transmission speed.
 Transmission rate is more than a Billion bits per second (Bbps).
 It has very high cost.
 Special devices are used to cut and install the cable.
 Very difficult to install.
 Converters are used at the both ends of the cable, which convert
electrical signals into light and vice versa.
 Normally used for long distance communication.
 Very secure and reliable data transmission.
OSI LAYERS
ISO AND OSI MODEL:
 ISO Developed a standard for data communication called Open
System Interconnection (OSI).


It’s a model that allows two different systems to
communicate with each other.
It is not a protocol, it’s a standard.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107


Mobile U.A.E+971-50-2380181
97
Used for understanding and designing network
architecture.
OSI Model has seven separated
separated but related layers.
o
o
o
o
o
o
o
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
( Please Do Not Trust Sales Person Advice )
( All People Seem To Need Data Processing )
Physical Layer:
 This layer deals with stream of bits.
 Collect data from upper layer and send it to required computer in
the form of bits.
 RS-232 connector is used for data transmission.



Control Data Flow rate.
Define Physical Medium.
Define
Define Transm
Transmiss
ission
ion mode
mode (Simpl
(Simplex,
ex, Half-D
Half-Dupl
uplex
ex or FullFullDuplex).
Data Link Layer:
 Responsible for node-to-node delivery of message.
 Control the rate of flow of data.
 Make Data error free.
 Making Access to the link for data transmission.
Network Layer:
 It deci
decide
des
s whic
which
h path
path of data
data shou
should
ld send
send from
from one
one node
node to
other.
 Swit
Switche
ches,
s, Rout
Router
ers
s and
and NIC
NIC Card
Cards
s (Netw
(Networ
ork
k inte
interfa
rface
ce card
card))
decid
decides
es the
the rout
routin
ing
g base
based
d on netw
networ
ork
k condi
conditio
tions
ns,, prio
priori
rity
ty of
service and other factors.
factors.
 TCP/IP is very important protocol of this layer.
Transport Layer:
 Responsible for end-to-end delivery of entire message.
 If the link goes down then this layer send data into other link
(Path).
 Segmentation and Reassembly of data
 Remove errors.
 Control rate of flow of data.
Session Layer:
 Establish, Maintain and Synchronize a connection between two
Communication Systems across the network.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107

Mobile U.A.E+971-50-2380181
98
Its functio
f unction
n is performing
performing
o
Security
o
Logging
o
Administration
Presentation Layer:
 This layer represents data in user understandable form.
 Techniques used are
o
Translation
o
Encryption
o
Compression
Application Layer:
 This layer serves the user.
 User can control it directly.
 It includes services such as
o
E-mail
o
File sharing
o
File printing and other software
Hardware Equipment
Equipment for
LAN

Computers

NIC or LAN Cards

UTP Cat 5 Cable

RJ-45 Connectors

Switch / Hub
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
99
REVIEWED
By
atAfridi
1:0513/01/2010
pm, 1/13/10
Byuser
Azmat
STRAIGHT CABLE
CABLE
SIDE A
SIDE B
Cable #
Colour
Cable #
Colour
1
White-Orange
1
White-Orange
2
Orange
2
Orange
3
White-Green
3
White-Green
4
Blue
4
Blue
5
White-Blue
5
White-Blue
6
Green
6
Green
7
White-Brown
7
White-Brown
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
8
Brown
Computer to Switch / Hub
8
=
Mobile U.A.E+971-50-2380181
100
Brown
Straight Cable
MCSE (Microsoft Certified System Engineer)
Version:
MCSE 2003
Papers:
1) Windows
Windows Xp
Xp Professional
2) Windows
Windows 2003
2003 Server
Server Enterprise
Enterprise
3) Active Directory Services (ADS)
Core
4) Planning Network Infrastructure
Infrastructure
5) Implementation
Implementation Network Infrastructure
Infrastructure
6) Designing
Designing Active Directory
Directory Services
Services + Infrastructure
Infrastructure
Or
Network Design
Designing Security using Windows 2003
7) SQL Server
Server or ISA Server
Server or Exchange
Exchange 2003 or SMS
Fee per Paper 50 Dollar = Rs. 3,000/-
Recommended Books:
 Sybex Press
 Microsoft Press
Course Duration:
3 Months
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
101
LECTURE 1
Hardware Requirement for a Computer Network:
 Computers
 NIC Card or LAN Cards or Ethernet Card
 Wires (UTP Cat5)
 RJ-45 Connectors
 HUB / Switch
NIC CARD:










NIC Card having RJ-45 Port.
Slot is called PCI.
NIC Card having a chip called NPU (Network Processing Unit).
NPU is responsible for Sending / Receiving data.
NPU has further two chips inside.
RX (Receive data from wires)

TX (Transmit data to motherboard)

RJ-45 having 8 pins.
1, 2 wires for Transmit
3, 6 wires for Receive
Remaining 4 wires are for future use.
1 Gbps or 10 Gbps use all 8 wires for communication.
TYPES OF NIC CARD:
 Ethernet
 Token Ring
 FDDI
 ATM
 Wireless
(Common used)
(Old Technology)
Technology)
(Costly)
(Very Costly)
(Less Speed, No Security)
Ethernet:




Ethernet Card (100 Mbps)
Used Ethernet Card having Cost (Rs. 50)
Switch Speed is 100 Mbps
1 Gbps Ethernet Card (Rs. 1200)
 100 Mbps Switch (Rs. 1200-1400)
 Normally used in Computer Labs.
REVIEWED
ByByuser
at Afridi
1:06 13/01/2010
pm, 1/13/10
Azmat
Fiber Optic:
 Fiber Card
 Fiber Cable (Rs. 3000-4000)
 Very Costly Network
 Very Fast Communication
 Processing Speed is very fast
 Media converters are used between Fiber network and other network.
 Normally used in Server Rooms.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
102
ATM (Asynchronous Transmission Mode):
 Basically designed for Audio and Video Conferencing.
 Very Expensive Technology.
Technology.
 ATM Cards and ATM Switches are used.
 Normally used as ISP back bone, Manager Rooms (etc)
NETWORK OF TWO COMPUTERS:
Method 1 (COM Port to COM Port):
COM Port is also called Serial Port or 9 Pin Male Port
 Null Modem Cable (Cost is Rs. 200)
 Data Transmission Speed is 1 Mbps
 Transmission range is 10-12 feet
 Lap link software can be used for configuration
 We should configure one computer as a Host and other as a Guest
 Data will transmit through one wire out of 9
Method 2 (Parallel Port to Parallel Port):
Parallel Port is also called LPT or Female Port
 Null Modem Parallel Cable
 Data Transmission Speed is 8 Mbps
 Transmission range is 10-12 feet
 Data will transmit through 8 wires at a time
Method 3 (USB Port to USB Port):
 USB to USB Cable
 Data Transmission Speed is 30 MBps
 Software is available on Internet
 Two types of USB Port are

USB Port 1 = Less Speed
USB Port 2 = Fast Speed (New P-IV have this Port)

Method 4 (Infrared to Infrared):
 Used in Laptops or Mobiles
 Wireless Communication
 Communication within line of sight
 Transmission range is 12-15 feet
 Built-in Software
 If computer has not Infrared port then Infrared device is used for data
communication
Method 5 (Bluetooth to Bluetooth):
 Latest Technique
 Wireless Communication
 No need of line of sight
 Transmission range is 12-15 feet
 Speed is better than Infrared
Method 6 (Modem to Modem):
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
103
 Two Telephone lines
 On Sender / Server side configure Dial-up Setting
 On Receiver / Client side configure Dial-in Setting
Method 7 (NIC Card to NIC Card):
 Cross Cable will use for connectivity between two NIC Cards.
 If computers are more than two then Switch / HUB (Hybrid Universal
Bus) will used as a Central device between computers.
 Straight Cable is used between Switch / HUB and Computer (b/c in
switch / HUB 1&2 Cable is for Receive and 3&6 Cable is for Transmit).
CABLE CONFIGURATIONS:
Configurat
Configuration
ion of a Cross Cable:
SIDE A
Cable #
1
2
3
4
5
6
7
8
Color
SIDE B
Cable #
Wh
White-Orange
Orange
White-Green
Blue
White-Blue
Green
White-Brown
Brown
1
2
3
4
5
6
7
8
Color
White-Green
Green
Wh
White-Orange
Blue
White-Blue
Orange
Wh
White-Brown
Brown
Cable between two Computers
Cable between two Ports of Switch / HUB
Cable between two Up-Link Ports of Switch / HUB
Configuration of a Straight Cable:
SIDE A
Cable #
1
2
3
4
5
6
7
8
Color
Wh
White-Orange
Orange
White-Green
Blue
White-Blue
Green
White-Brown
Brown
SIDE B
Cable #
1
2
3
4
5
6
7
8
Color
White-Orange
Orange
Wh
White-Green
Blue
White-Blue
Green
Wh
White-Brown
Brown
Cable between Switch / HUB and Computer
Cable between Up-Link to any other Port of Switch / HUB
MDI (Media Dependent Interface):
 Uplink standard is called MDI.
 Uplink port and connected port are basically one port.
 MDI / MDI.x standard is used in modern switches.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
104
 MDI
MDI / MDI.
MDI.x
x stan
standa
dard
rd use
use to conv
conver
ertt cabl
cablee com
combina
binati
tion
on as per
per
requirement.
Un-Shielded Twisted Pair Cable (UTP):
 Common types are
o
CAT 5 (Width = 27 awg, Twist = 5-7 per inch)
CAT 5e (Enhanced Version)
o
o
CAT 6 (Width = 24/25 awg, Twist = 7-11 per inch)
 Voltages can drop due to resistance of copper wire.
 If number of twists is more then more security of data.
 Outer cable is called “ Ring Cable” and inner cable is called “ Tip
Cable”.
 Ring cable protects the tip cable.
 For Tx, Rx wires will use in pair format.
LECTURE 2
Versions
Versions of Windows Xp:
1. Home
Home Edition
Edition (for home users)
2. Professio
Professional
nal Edition
Edition (for networking environment)
3. Media
Media Centre
Centre Edition
Edition
INSTALLATION OF WINDOWS XP:
Hardware Requirement (Microsoft Recommended):
 Processor
=
P-II
 RAM
=
64 MB
 H.D.D
=
1.5 GB
Hardware Requirement (Normally Recommended):
 Processor
=
P-III (800 MHz)
 RAM
=
256 MB
=
10 GB
 H.D.D
Installation Types:
1. CD-Based Attended Installation
Installation (Normal Installation)
2. CD-Based Un-Attended
Un-Attended Installation
Installation (Installation through answer file)
3. SysPr
SysPrep
ep (System Preparation)
4. RIS (Remote Installation Services)
BIOS (Basic Input / Output System):
 BIOS are the collection software stored in ROM will run when computer
turns on.
 Normal sizes of BIOS are 256 KB, 512 KB, and 1 MB.
 BIOS having files / software

Post


Check all components which are attached to Main Board
Boot Loader
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107





Mobile U.A.E+971-50-2380181
105
Search Operating System from all storage medias (H.D.D, F.D.D, CDROM, USB)
Copy Operating System from storage media to RAM.
Setup Utility
Drivers
PnP (Plug and Play) Tools
Installation:
 Boot from windows Xp Bootable CD.
 Create Partitions as per requirement (Partition should not exceed than 10 GB)
 Format the Hard Drive (Format is the method of creation sectors and tracks on
Hard Disk).
Quick Format (Just Check File System)

Normal Format (Check all sectors and tracks of Hard Disk)
 Three default folders of windows Xp are

Windows (having windows files)
Program Files (having all third party software)
Documents and Settings (having documents)

 Three default files will copy to hard disk are called system files

NTDLR

Boot.ini

NTDetect.com
 The boot file is

NTosKrnl.exe


FILE SYSTEMS:
 File System is just like Index which contains names, location and other
information related to files and folders.
 File systems are
FAT16 (DOS)

FAT32 (Windows 98 having Add, Remove features)

NTFS (WinNT, 2000, Xp having Encryption Techniques )

m
e
st
y
S
e
li
F
a
t
a
D
n
o
ti
r
o
P
Hard Disk
Master
Master Boot Record (MBR):
 Master Boot Record or Zero Sector is not a part of C Drive.
 MBR having 512bytes in size.
Recommendation:
Hard Disk should be formatted after 3 or 4 months for better performance.
CD-Based Un-Attended Installation:
Answer File:
 SetupMgr is the software which is used to create answer files.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
106
Windows Xp CD→
CD → Support→ Tools→ Deploy.cab




Extract “Deploy.cab” file you will see a file “SetupMgr.exe”.
Click “Next” then click on “Create a new answer file”.
Click “Un-attended Installation” then click “Windows Xp Professional”.
Click “Fully Automated” then click on “Setup from CD”.
 Click “Accept License”.
 Give answers according to given questions.
 After creation of answer file you can save into floppy (winNT.sif) or CD
(unattend.txt).
 Insert bootable CD and floppy (having answer file) and start installation.
Service Pack:
 Service Packs are collection of software used to repair / remove errors /
bugs from windows operating system.
 Three Service Packs of windows Xp are
Service Pack 1


Service Pack 2

Service Pack 3 (In Progress)
Pagefile.sys
Pagefile.sys or Virtual Memory
Memory or Swap File:
 When capacity of RAM will full of active programs then there is area on
Hard Disk which will act as RAM (use for storage of programs).
 Page file contains information about RAM.
 Page file should not be on drive which have operating system.
My Computer→
Computer→ Advanced → Settings → Advanced → Change
Bootable CD:
When we copied bootable CD to any location then only data portion is copied.
If we want
want to copy
copy Data
Data Port
Portio
ion
n as well
well as Boot
Boot area
area then
then thro
throug
ugh
h Nero
Nero
burning ROM we will create image on bootable CD and copy this image to
other CD.
Bootable CD = Boot Area + Data Portion
Boot Area
Data
Portion
Administrator:
The
The pers
person
on who
who insta
install
llss wind
window
owss or any
any othe
otherr soft
softwa
ware
re is call
called
ed
“Adm
“Admin
inis
istr
trat
ator
or”.
”. Admi
Admini
nist
stra
rato
torr can
can be a “Net
“Netwo
work
rk Admi
Admini
nist
stra
rato
tor”
r” or
“Hardware Engineer”
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
107
LECTURE 3
DISK DUPLICATOR:
DUPLICATOR:
 Disk Duplicator is a device used to copy data of Master drive to Slave
drives.
 Hardware should be same for all computers.
 We can attach many slave drives with disk duplicator.
 Functions of Disk Duplicator are

Create Partitions

Format Drives

Copy data of Master drive to Slave drives
 Price of Disk duplicator is almost 1 or 3/2 lac.
 Disk duplicator is very expensive technique so alternate solution is
Norton Ghost or Win Image
Norton Ghost:
 Norton Ghost is used to Copy data from master drive to slave drive.
 Main features of Norton Ghost are

Disk-to-Disk

Partition-to-Partition

Partition-to-Image
REVIEWED

Partition-from-Image
ByByuser
at Afridi
1:06 pm,
1/13/10
Azmat
13/01/2010
 Two methods of cloning / copying data are

Windows Based

DOS Based
Windows Based:
 Install Norton Ghost on windows environment.
 Attach another Hard disk and make it slave.
 Norton will copy all sectors of master drive with data to slave. This
method is called Cloning or Image.
DOS Based:
 Insert Bootable CD of Norton Ghost
 Run Norton Ghost
 Copy data from master drive to slave drive
SysPrep (System Preparation) Installation:
 By using Norton Ghost all computers will have same Name, IP address,
Domain so there is a problem in networking environment.
 SysPrep is provided solution of above problem.
 “SysPrep” is available in “setupmgr.cab” file.
 “SysP
“SysPre
rep”
p” will
will remov
removee Syst
System
em Name
Name,, IP addr
addres
ess,
s, CD-K
CD-Key
ey,, CID
CID
(System Identifier).
 “SysPrep” file will use on master system.
 Run “SysPrep” file and select “mini setup mode” then click on “OK”
button.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
108
 Window will shut down and start in mini setup mode and write answers
of questions.
 Mini setup mode can remove through making answer file.
SysPrep.inf
Copy this file into C:\SysPrep
USER ACCOUNTS:
 SAM
SAM (Secu
(Securi
rity
ty Acco
Accoun
untt Mana
Manage
ger)
r) is the
the data
databa
base
se whic
which
h cont
contai
ains
ns
information about user accounts.
 Only Administrator can create user accounts.
 User name and Password will be checked in SAM database.
 Two types of profiles are

Local Profile or Default Profile

Roaming Profile
Local Profile or Default Profile:
Profile:
 After verification computer will load User prof ile or Local profile or
Default profile (Desktop Settings, My Documents, Color Schemes) from
C:\ Documents and Settings
 If user
user prof
profil
ilee is not
not avai
availa
labl
blee in C:\
C:\ Docu
Docume
ment
ntss and
and Sett
Settin
ings
gs then
then
default profile will load from
C:\ Documents and Settings \ All User \ Default
Computer → Manage→ Local User and Groups
 Right Click on My Computer→
or
Run→
Run→ lusrmgr.msc→ Local User and Groups
 Check option “Password never expire”, otherwise password will expire
in 42 days by default.
 Logoff the computer and then Login. Press “Ctrl + Alt + Del” (2 Times)
at Login screen for simple login screen.
 Local profile technique is normally used in “Stand Alone Computers”.
Roaming Profile:
 This technique is normally used in “Networking Environment”.
 All user accounts are on server.
 Windows will load profile other than C:\ Documents and Settings (from
any other location).
Example:

Create a folder on D:\Profile

Create a user named “Test”.

Go to My Com
Comput
puter → Properties → Advanced → User
Accounts → User Profiles
Copy to Test profile to D:\Profile


Check option “For everyone”
 Go to Local User and Groups → User 1 → Properties
Profil
Profilee Path
Path : D: \ Profil
Profilee
 We should change security policy
 Run → gpedit.msc →Administrative
→Administrative Templates → System →
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
109
User
User Profil
Profiles
es → Double Click on “Don’t Check for User
Ownership….” → Enable
 Run → gpupdate
 Logoff the computer and Login as User 1. Computer will load
test profile from D:\Profile for user 1.
Conversion of FAT or FAT32 File System to NTFS:
 Run → cmd (Command Prompt)
 Command is as follow
C:\> Conve
Convert
rt e: /fs:ntfs
/fs:ntfs
Classification of Processor according to functionality:
PROCESSOR
Celeron
Normal
Xeon
(Server Based)
LECTURE 4
APPLYING SECURITY ON FOLDERS:
 Open Folder Options.
 Go to View Tag and uncheck “Use Simple File sharing”. Then
 Go to Folder Properties → Security → Remove all Users → Click on





Add → Advanced → Find Now → Add users as per requirement
Apply Permissions to users as your requirement.
Security window has two parts.
ACL (Access Control List)

 Having user names
ACE (Access Control Entry)

 Having user rights
Administrator can view Secret data of any user by getting “Ownership”
rights.
Only Administrator has right at disk level.
Sing
Single
le head
head symb
symbol
ol repr
repres
esen
ents
ts “Use
“User”
r” and
and Doub
Double
le head
head sym
symbol
bol
represents “Group”.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
110
DISK QUOTA:
 Quota is the space allocated by Administrator to users.
 Quota has two types
1) Default
Default Quota
Quota
2) User Base Quota
Quota
Default Quota:
 Equal spaced is allocated by administrator to all users.
 E: Drive → Properties → Quota
 Enable Quota Management
 Deny Disk Space
 Limit Space → 300 MB , Set Warning → 200 MB
User Base Quota:
 Different space is allocated by administrator to all users.
Drive → Properties → Quota → Quota Entries
User
 E: Drive
En tries → Go to User
Properties → Limit Space → 300 MB , Set Warning → 200 MB
MICROSOFT MANAGEMENT CONSOLE:




It is software which makes Console (Container or Bags).
It has windows management tools also called “Snap-ins”.
All Snap-ins are stored in C:\Windows\System 32
Snap-ins has extension .msc.
 Run → MMC → File → Add / Remove Snap-ins
Snap -ins → Add → Local User
and Groups
 Save “Snap-Ins” on desktop.
HARD DISK PARTITION:
 Logical division of Hard disk is called “Partition”.
 Two standards of Partition are
1. Basic
Basic Disk
Disk Standard
Standard
2. Dynamic
Dynamic Disk Standard
Standard
Basic Disk Standard:
 This
This inclu
includes
des FDisk
FDisk,, Disk
Disk Manag
Manager,
er, Parti
Partitio
tion
n Magic
Magic,, and other
other such
such
kind of tools.
 Supports all operating systems (Dos Based, Windows Based)
 One Disk should be “Primary”, then “Extended” and “Logical Drives”
are in Extended.
 Maxi
Maximu
mum
m 4 prim
primary
ary part
partit
itio
ions
ns can
can be crea
create
ted
d in this
this stan
standa
dard
rd but
but
norma
normally
lly we create
create 1 Prima
Primary
ry and Remain
Remainin
ing
g space
space is alloca
allocated
ted for
extended which is use for making Logical drives.
Dynamic Disk Standard:
 Introduced in 1990s.
 Partition is Un-limited.
 Partition is called “Volume” in this standard.
 We can also create one partition of two disks.
 Supports Windows 2000, Xp and 2003 Server.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
111
 “Disk Management” (Product of “Veritas Corporation”) tool is used for




volume.
Dynamic disk can’t be read in win98.
Partition Magic can’t apply on Dynamic Disk.
This standard is not used practically because this is software based and
if operating system fails then we can’t access volumes.
Types of partitions are
1. Simple
Simple Volume
Volume
2. Spanned
Spanned Volume
Volume
3. Stripe
Stripe Volume
Volume
4. Mirror
Mirror Volume
Volume
5. RAID5
RAID5 Volume
Volume
Simple Volume:
Same as “Basic Disk Standard” but we can create volume as per requirement.
Spanned Volume:
 We can create one volume of more than one hard disks.
st
nd
rd
 Data will Read/Write through 1 drive, then 2 drive, then 3 drive and
so on.
 Normally used in “Exchange Server”.
 (e.g.)
(e.g.) 600 GB
GB + 600 GB + 300
300 GB = 1500
1500 GB
GB
1500
GB
Stripe Volume:
 Enhanced form of “Spanned Volume”.
 In this method data will Read / Write simultaneously from all disks.
 If one drive fails then all data will be lost.
Mirror Volume:
 If we create one volume through 100 GB + 100 GB then capacity shows
100 GB in this method instead of 200 GB.
nd
 2 drive will save all data of first drive automatically (Mirror copy of
first drive).
 In this method both Hard disks should be same Company, same RPM,
same Cache and same Size is recommended.
 Used for taking backup normally.
 We can use only 2 drives.
 If both drives fail then data can’t be recovered.
RAID5 Volume:
 If we create one volume through 100 GB + 100 GB + 100 GB then
capacity shows 200 GB instead of 300 GB.
 If one drive fails then data can be recovered form other drives.
 If two drives fail then data can’t be recovered.
 If data is “ABCDEF” then storage will be as
A
B
C
P
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
P
E
P
D
Mobile U.A.E+971-50-2380181
F U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Disk 1
Mobile U.A.E+971-50-2380181
Disk 2
112
Disk 3
Where “P” is the “Parity Bit”.
LECTURE 5
TCP/IP (Transmission Control Protocol / Internet Protocol):
IP ADDRESSING:
ADDRESSING:
 NIC cards having unique addressing.
 Address is in the form of Hexa-Decimal.
(e.g.) A1.B2.0
A1.B2.00.C1.
0.C1.D2.0
D2.01
1
 (e.g.)
Manu
Manufa
fact
ctur
urin
ing
g
Comp
Compan
any
y Name
Name
Num
Number
ber of NIC
NIC Card
Cardss
desi
design
gned
ed by com
company
pany
 IP address is in Network layer.
 IP address is of 32 bits.
Classes of IP address:
 Sub-net mask specifies the direction of data (i.e.) where data is to be
sent.
 Router sends data by checking sub-net mask.
 IP addresses having different classes are called IPV 4 (IP version 4).
Class
Name
Network
Bits
Host
Bits
IP Range
Sub-ne
Sub-nett Mask
Mask Range
Range
Starting
IP Range
Sub-ne
Sub-nett Mask
Mask Range
Range
Ending
Class A
8
24
1.0.0.0
255.0.0.0
126.255.255.255
255.0.0.0
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
Class B
16
16
128.0.0.0
255.255.0.0
191.255.255.255
255.255.0.0
Class C
24
8
192.0.0.0
255.255.255.0
223.255.255.255
255.255.255.0
Class D
-
-
240.0.0.0
255.255.255.255
Class E
-
-
-
-
113
127.0.
0.0.
0.0
0 To 127.
127.25
255.
5.25
255.
5.25
255
5 is used
used for
for devi
device
ce chec
checki
king
ng called
called
 127.
“Loopback”
“Loopback” address.
 Class D is used for multitasking (not for normal communication).
 240.0.0.0 To 255.255.255.255 are used by NASA for Research work.
Private IP:
Private IP can’t run on Internet because Router can’t understand private IP.
Class Name
IP Range
Starting
Class A
10.0.0.0
Class B
172.16.0.0
172.31.255.255
192.168.0.0
192.168.255.255
Class C
IP Range
Ending
10.255.255.255
Public IP:
Public IP are those who can run on Internet
Services and Ports:
SERVICE NAME
PORT #
WWW
80
DNS
53
SMTP
25
Telnet
23
POP3
110
SSL
423
Setting for Data Communication:
 NIC Card + Drivers
 Protocols (TCP/IP, IPx/SPx, Apple Talk, NetBeui)
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
114
 Client Software
 File and Print Sharing
 IP Address
PROTOCOLS:
 Protocols are set of rules that make communication possible.
 Some common protocols are




IPx / SPx
Apple Talk
NetBeui
TCP / IP
IPx / SPx:
 Novell made this protocol.
 Not used now a day.
Apple Talk:
This is also not used now a day.
NetBeui:
 In this method without IP address communic ation is possible.
 Not used now a day.
TCP/IP:
 It is the default protocol of Win Xp.
 Very popular and common used now a day.
 TCP/IP is used for Internet Connectivity.
Setting of NIC Card Properties:
 If all machines are Microsoft then check the option
 Microsoft Network
comput
uters
ers having
having differ
different
ent opera
operatin
ting
g syste
systems
ms then
then click
click on Instal
Installl
 If comp
button and check the option
 Client Services for Netware
 For File and Printer sharing check option
 File & Printer Sharing
 Some
Some Ethe
Ethern
rnet
et Card
Cardss havi
having
ng Spee
Speed
d 10 Mbps
Mbps and
and some
some havi
having
ng 100
100
Mbps (Fast Ethernet Card) then
Configure → Advanced → Media Type → Auto Select
This will maintain Send / Receive speed of all computers.
IP Assignment:
IP Assignment
Static
or
Manual
Dynamic
or
Automatic (DHCP)
DHCP
(Any IP Range)
APIPA
(169.254.X.X)
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
115
Types of IP Addresses:
 Without IP address communication is not possible.
 Types of IP address are

Manual or Static

Automatic or Dynamic (DHCP, APIPA)
Static or Manual IP:
NIC Card → Properties → TCP/IP → Properties → Write IP
Dynamic
Dynamic or Automatic IP:
 Set option “Obtained IP Automatically”.
 Comp
Comput
uter
er will
will get
get IP from
from DHCP
DHCP (Dyna
(Dynami
micc Host
Host Conf
Config
igur
urat
atio
ion
n
Protocol)
Protocol) Server.
 If there is conflict of IP then a new IP will be assigned to computer by
DHCP Server.
APIPA:
 IF “Obtained IP Automatically” option is checked and DHCP server is
not present then computer will assign IP itself which can be
169. 254. X. X
 This method in not suitable for large networks.
DHCP Server:
 DHCP having list of IP’s.
 DHCP is a Server who will assign dynamically IP to computers.
 DHCP Server can be a Router, Computer or any other Hardware.
 Normally there is one DHCP server in a network.
Packets:
 Data will transmit over network in the form of “Packets”.
 Maximum size of packet on Ethernet is 1500 Bytes.
 Maximum size is called M.T.U (Maximum Transmission Unit).
Lost of Packets:
Packets:

If distance between computers to switch is more than 100 meter
then packets will drop.

Bad Cable causes lost of packets.

Huge traffic over network.

If cable is not properly made (Cable Pair Combination).
Computer Name:
Computer name can be checked through
My Computer → Properties → Computer name
or
Run → cmd → hostname
Services:
 It is the software which will run backhand automatically and perform
some useful functions.
 Services can be Start and Stop according to our requirement.
Control Panel → Administrative Tools → Services
Sharing of Data:
 Right Click on folder → Sharing and Security → Sharing
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
116
 Max number of user → 10
 Window Xp supports maximum 10 users
Accessing Share Folders:
 If we want to see all share folders then write command as
Run → \\ 192.168.0.4
192.168.0.4
or
Run → \\ Computer Name
Where \\ = Network
And 192.168.
192.168.0.4
0.4 = UNC (Univers
(Universal
al Naming
Naming Conventi
Convention)
on)
 If we want to see a specific folder then writes command as
Run → \\ 192.168.0.4 \ Data
or
Run → \\ Computer Name \ Share Folder
Ping Command:
 Ping is software which is built-in in Windows, Linux operating System.
C:\ Windows \ System32 \ Ping.exe
 If we remove “Ping.exe” then computer will not Ping.
 Ping command is used for checking connectivity on network.
Run → Ping 192.168.0.4
 Ping command will send 4 Packets each of 32 Bytes to target machine.
 If source machine get message “Replying from 192.168.0.4” then target
machine is connected but if message is “Request time out” then target
machine is not connected.
 Structure of Packet is as fallow
Source
Address
Data
Destination
Address
 We can check own machine NIC Card as
Ping 192.168.0.1 (Own IP)
or
Ping 127.0.0.1 (Loop back address or Local host address)
or
Ping Localhost
or
Ping Loopback
 We can check own machine IP as
Run → cmd → IPconfig /all
or
NIC Card → Properties → Support
 If firewall in on / Activate on remote computer than remote computer
will not reply through “Ping” command.
our com
compute
puterr havi
having
ng IP “192
“192.1
.168
68.0
.0.1
.1:”
:” and
and we are
are ping
pingin
ing
g IP
 If our
“10.0.0.1” the IP of other class then message will come “Destination
Host Unreachable”.
Unreachable”.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
117
 Router is the machine which will connect computers having different IP
addresses (IPs of different classes).
Network
Router
Device
Network
Default Gateway:
Normally IP (address of same class of network) of Router is used as a
Default Gateway through which different networks having different IP classes
communicates with each other.
Pinging through Name (Name Resolver):
 “Name Resolver” is the software which is used to conver t computer /
mach
machin
inee name
name into
into its
its IP addr
addres
esss beca
becaus
usee Sour
Source
ce and
and Dest
Destin
inat
atio
ion
n
addresses are in the form of IP address.
 If ping through name
Ping PC4
Then operating system will sends “PC4 (computer name)” to “Name
Resolver” which will convert “PC4” to its IP address.
ICS (INTERNET CONNECTION SERVER):
 NIC Card → Properties → Advanced
 Allo
llow oth
other netw
etwork users
ers
to con
connect
ect thro
throu
ugh Int
Interne
ernett
Connection
 IP address of Proxy should be 192.168.0.1.
Services
Services of Proxy:
1. Proxy will
will be “Default
“Default Gateway” for
for other computers
computers connected
connected to it.
2. Serve as a DHCP
DHCP (Dynamic Host Configuration
Configuration Protocol)
Protocol) Server.
Server.
3. Server
Server as a DNS (Domain
(Domain Name
Name Source)
Source) Server.
Server.
4. NAT Services (Network Address Translation).
Translation).
Internet
Proxy
PC1
PC2
(Public IP)
PC3
PC4
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
118
(Private IP)
 We can
can chec
check
k “Gat
“Gatew
eway
ay”,
”, “DHC
“DHCP”
P”,, “DNS
“DNS”,
”, and
and “Sub
“Subne
nett Mask
Mask””
through
NIC → Properties → Support
 DNS is used to resolve names on Internet.
 “Default Gateway” & “DNS” are not required for internal Proxy Server.
DSL Routers:
 Now a day “DSL Routers” are used as a Proxy server.
 Normally 4 port “DSL Router” is used as a Proxy Server.
 Router always checks “Destination Address or Target Address ” for data
transmission.
Internet
DSL Router
PC1
PC2
PC3
PC4
Tips:
www.w
www.what
hatism
ismyi
yip.c
p.com
om
(Shows
(Shows the source
source IP addres
address)
s)
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
119
LECTURE 6
NETWORK NAMES:
Network Names
Net Bios
FQDN
Net Bios:
 Used in LAN.
 Net Bios is of 13 Characters and Host name is of 65 Characters.
Examples:
PC1, PC2, Computer 100 (etc.)
 “Name Resolver” converts “Host name or Net Bios or Computer Name”
into IP address by performing following steps.
1. Check
Check Local
Local name
name or own name (if not found
found then
then next step
step
will be checked)
2. Chec
Check
k “LMH
“LMHos
osts
ts.s
.sam
am”” File
File (Lis
(Listt of impo
import
rtan
antt comp
comput
uter
er
names and their IP address).
C:\ Windows \ System32 \ drivers \ etc \ LMHosts.sam
(If not found then next step will be checked)
3. RAM
RAM tabl
tablee (Net
(Net Bios
Bios Remo
Remote
te Name
Name Cach
Cachee tabl
table)
e) will
will be
checked. We can view this table by following command
Run → cmd → nbtstat –c
Life time of “IP address” in cache table is 600 seconds. If we
want
want to make
make empty
empty Cache
Cache table
table then
then follow
followin
ing
g comman
command
d
will be followed
Run → cmd → nbtstat -r
(If not found then next step will be checked)
4. Wins
Wins Server
Server will
will be checked
checked..
TCP/IP → Properties → Advanced → Wins
(If not found then next step will be checked)
5. Broad cost
cost on Network (192.168.0.255
(192.168.0.255 is used
used for broad cost).
(192.168.0.9)
COMPUTER NAME
(192.168.0.255)
FQDN’s:
 FQDN stands for “Fully Qualified Domain Name”
 Give information about System and Network.
 Normally used in WAN.
Examples:
www.yahoo.com
mail.gmail.com
Where www = Computer name, yahoo.com = Network name
Pc1.corvit.com
Where Pc1 = Computer name or Net Bios
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
120
Corvit.com = Domain Name
 “Name
“Name Resolv
Resolver”
er” conve
converts
rts “FQDN”
“FQDN” into
into IP addres
addresss by perfo
performi
rming
ng
following
following steps.
1. Check
Check Local
Local name. (if not
not found
found then next
next step)
2. Check
Check “Hosts”
“Hosts” file. (if not
not found then
then next step)
step)
C:\ windows \ system32 \ drivers \ etc \ hosts
3. FQDN table
table will
will be checked.
checked. (if not found then
then next step)
step)
Run → cmd → ipconfig / d
displaydns
isplaydns (View FQDN table)
Run → cmd → ipconfig / flushdns (empty FQDN table)
4. DNS will
will be checked.
checked. (If not found then
then next step)
step)
TCP/IP → Properties → DNS
DNS is normally ISP Server.
Net Bios Vs FQDN:
Net Bios
FQDN
LAN
WAN
LMHosts
Hosts
NbtStat –c
IPConfig / Displayd
aydns
NbtStat –r
IPConfig / Flushdns
Wins
DNS
Symbol of Connectivity:
Our Pc
Network
If yellow sign is appear on above symbol then NIC having IP through APIPA.
Net View:
“Net
“Net View
View”” Comm
Command
and is used
used for
for chec
checki
king
ng,, “How
“How many
many syst
system
emss /
computers are connected with network”?
Run → cmd → Net View
LECTURE 7
FILE SHARING AND SECURITY:
How to Share a Folder:
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
121
 Right click on required folder → Sharing and Security → Share this
folder → Share name → ok
 Shared data can be accessed through
 UNC (Universal Naming Convention) Path
 Network Neighborhood
Neighborhood
 Map Network Drive
 Most common way of accessing shared data is
Run → \\172.16.0.100
Permission
Permission / Security
Security on Folder:
Folder:
 We can assign permission to different users.
 Permissions can be

Full Control
Change

Read Only

 Max 10 users can access shared data at a time in window s Xp.
 In standalone computer “NTFS” will check user permission.
 In Networking Environment “Network Permission” will be checked then
“Local Permission” will be checked.
 “Network Permission” is “Read-Only” By Default.
USEFUL TOOLS OF WINDOWS XP:
“FASTWIZ”
“FASTWIZ” Tool:
 This tool is used in GUI environment.
 Built-in tool of win Xp.
 This tool is used for coping Data and Configuration into
USB

Other Partition (D: or E :)


Network Computer
 Normally used when format old system and install new system then first
copy data from old computer then paste on new computer.
 System Tools → File and Setting Transfer Wizard
 For Win 98, Win 2000
Xp CD → Support → Tools → FASTWIZ
“USMT” (User State Migration
Migration Tool):
 Its function is same like “FASTWIZ”.
 DOS based program.
 Not used now a day.
REVIEWED
ByBy
user
at 1:06
1/13/10
Azmat
Afridi pm,
13/01/2010
Firewall
Firewall Tool:
 Service Pack 2 has three main features

Windows Firewall

Wireless Networking

Pop-Up Blocker Internet
 Firewall is used to block un-wanted Incoming (Inbound) and Outgoing
(Outbound) traffic of a computer.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
122
 Control Panel → Firewall → General → ON → Ok
Sniffers Software:
 It is use to view detail of Inbound and Outbound packets.
 Software’s are

Ethereal

Observers

IRIS
SYSTEM PROPERTIES:
Advanced → Performan
Performance
ce → Settings
Settings:
 Different Setting can be set according to our requirement
o
Let’s windows choose what’s best for my computer
o
Adjust for best appearance
o
Adjust for best performance
o
Custom
Hardware → Device Manager:
Shows the list of all hardware connected wit h computer.
Hardware → Driver Signing:
 Microsoft checks drivers of products and grant license to driver creator
companies.
 If some firm doesn’t take license and when we want to install driver of
that firm then there is a “Driver Signing” problem.
Hardware → Hardware Profiles:
 Basically designed for Laptop Computers.
 We can load Drivers or Services according to our requirement.
 We can view profiles when Boot / Restart computer.
Automatic Updates:
 “Vits” service is responsible for automatic updating computer programs
from Internet.
 This
This proc
proces
esss slow
slowss down
down the
the Inte
Intern
rnet
et proc
proces
essi
sing
ng spee
speed
d so it is
recommended that automatic updates should be tern off.
Remote → Remote Assistance:
 Used to help other user remotely.
 Both computers should have windows Xp operating system.
 Can be used both on LAN and WAN.
 “Remote Assistance Invitation” must be sent for assistant.
 Check the option
 Allow Remote Assistance invitations to be sent from this computer
 Then click on
Start
Start Button
Button → Help and Support → Invite a Friend → Invite
Some
Someon
onee to Help
Help You
You → Advanced → Name, Expiry Time →
Password → Save → Send File (E-mail
(E -mail Attachment, USB, Network)
 Invitation will have information about

IP Address

Username

Password
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
123
Remote → Remote Desktop:
 Use to connect with Remote computer’s desktop.
 Check option
 Allow users to Connect Remotely to this computer
 The click on
Start Button → Programs → Accessories → Communications →
Remote Desktop Connection → Computer → Connect
Client Operating System:
Client operating system is for users.
Server Operating System:
Server operating system provides services for Users / Clients.
Windows Xp Vs Windows 2003 Server:
S#
1
2
3
4
5
6
WINDOW
WIN
OWS
S XP PROF
OFES
ESS
SION
ONA
AL
Clie
Client
nt o/s
o/s (Des
(Deskt
ktop
op Appl
Applic
icat
atio
ions
ns))
Graphical VGA (2D, 3D)
Audio
Built-in CD Burning s/w
Introduce in 2002
Not Very Stable
WINDOW
OWS
S 2003 SER
ERV
VER
Serv
Server
er o/s
o/s (Bac
(Backg
kgro
roun
und
d Serv
Servic
ices
es))
Not Good Graphical (2D)
Not Good for Audio
No Software
Introduce in 2003
Very Stable
Conversion
Conversion of “Windows 2003 Server” to “Windows
“Windows Xp”:
If we want to use “Server 2003” just like “Windows Xp” then following
changes should be made in Server 2003 environment
 Administrative
Administrative Tools → Services → Themes → Automatic → Start,
then
then Desk
Deskto
top
p → Properties → Themes → Windows Xp
 Display → Advanced → Hardware Acceleration → Full
 Run → DxDiag → Display

Direct Draw Acceleration → Enable

Direct3D Acceleration → Enable

AGP Texture Acceleration → Enable
(Direct X Drivers are used for better result of drivers VGA, Sound Card)
Administrator Tools → Services → Windows Audio → Enable →
 Administrator
Automatic → Start → Ok
 Administrative Tools → Services → IMAPI CD Burning → Enable →
Automatic → Start → Ok
System Propertie
Propertiess → Advanced → Performance → Settings →
 System
Advanced → Application Programs
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
124
Information Technology:
Information Technology is both Hardware and Software, and often including
Networking and Telecommunications, usually in the context of a business or
other enterprise.
Peripheral Devices:

Periph
Periphera
erall Devices
Devices are used
used as hardw
hardware
are compone
components
nts for differ
different
ent
operations of data.
o
Input (Keyboard, Mouse, Scanner etc)
Output (Monitors, Printers, Speakers etc)
o
o
Storage (Disk, Tape Drive)
Commonly used Operating Systems:







MS-DOS
MS-WINDOWS (3.1,3.11,95,97,98,Me,2000,Xp)
MS-WINDOWS NT
UNIX
LINUX
OS/2
MAC (used for Apple computers)
Device Drivers:
Device drivers make it possible for specific
sp ecific hardware devices to function with
the software on your computer system.
Clock:


Each CPU has its own internal clock.
It gene
genera
rate
tes
s puls
pulses
es on a fixe
fixed
d rate
rate to sync
synchr
hron
oniz
ize
e all
all comp
comput
uter
er
operations.
CPU:





It Stands
Stands for “Central Processing Unit”.
CPU is the brain of a computer.
Transform raw data into useful information.
CPU is responsible
responsible for all Processing.
It has two parts
Arithmetic Logic Unit (ALU)
Control Unit (CU)


ALU:



It stands for “Arithmetic and Logic Unit”.
It is the part of Processor where actual processing takes place.
It can perform
perform Additi
Addition,
on, Subtrac
Subtractio
tion,
n, Multip
Multiplica
lication
tion,, Divisi
Division,
on, Square
Square
Root
Roots
s (etc)
(etc) and
and logi
logic
c oper
operat
atio
ions
ns such
such as AND,
AND, OR (etc
(etc)) on bina
binary
ry
numbers.
CU:



It stands for “Control Unit”.
It is also an important part of Processor.
It tells the computer that, “What specific sequence of operations it must
perform”.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107



Mobile U.A.E+971-50-2380181
125
It also specifies timing of the instructions.
Its
Its funct
functio
ion
n is to Fetc
Fetch,
h, Decod
Decode
e and
and Exec
Execut
ute
e instr
instruc
ucti
tion
ons
s that
that are
are
stored in memory.
It controls
Memory Devices
Arithmetic Logic Unit
All Input/Output Devices



Buses:


Buses are wires, which used to carry data from one location to other
inside the processor.
Three main buses are
Data Bus
Address Bus
Control Bus



Registers:






High-speed memory inside the CPU.
Very small in size.
Temporary storage for memory Addresses
Addresse s and Instructions during the
execution of the program.
Read and execute the instructions.
Processing
Processing speed depends upon the size of register.
register.
Some common registers are
Instruction Register (IR)
Stack Register (SR)
Memory Address Register (MAR)
Program Counter (PC)
Memory Buffer Register (MBR)





Ports:


Ports are combinatio
combination
n of wires
wires through
through which data travels.
Two types of ports are
Parallel Port
Serial Port


Computer Administrator:
The
The pers
person
on who
who inst
instal
alls
ls wind
window
ows
s or any
any othe
otherr soft
softwa
ware
re is call
called
ed
“Administrator”. Administrator can be a “Network Administrator” or “Hardware
Engineer”
“Database” and “Database Management System”:
 A collection of information organized in such a way that a computer

program can quickly select required data is called “Database”.
DBMS is a program that enables users to Store, Modify, and Retrieve
information from a database.
Database Administrator:
The person who will maintain database is called Database Administrator.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
126
Difference between “Data” and “Information”:


Data is raw or unprocessed facts. Any form of a material is provided by
a user via input devices to a computer is called data.
Whe
When data
data is conv
conver
erte
ted
d into
into mean
meaniingfu
ngfull for
form then
then it beco
become
mes
s
Information.
Binary Numbers:



In binary numbers we have only two digits “0” and “1”.
Computer language is called machine language or binary language.
Base of binary number system is 2.
Bandwidth:
Number of bits sent over a particular path is called Bandwidth.
Packet:
Chunks or Small parts of information sent over computer ne twork is called
data packet.
Real Time:


Time critical tasks are refers as Real Time.
Real time is the highest priority.
Switch:



Normally
Normally used in LANs.
It is uni-cost device.
Used to receive data from computers and send it into specific
computer.
HUB:



Functions are same like Switch but it is multi-cost device.
Also used in LANs.
Slow speed than Switch.
Repeater:


This device is used to boost up weak signals.
Normally
Normally used in LANs.
Routers:



Routers are used to specify routes to data packets.
Normally
Normally used in WANs.
It is uni-cost device.
Virtual Memory:



An area of hard disk that the computer uses for RAM.
Has slow speed than RAM.
The created file is called Swap file and technique is called swapping.
Booting:


When user “Turn on” computer, it perform a series of steps then it will
be ready for working this process is called “Booting”.
Actu
Actual
ally
ly duri
during
ng boot
bootin
ing
g comp
comput
uter
er will
will chec
check
k all
all I/O
I/O devi
device
ces
s and
and
hardware attached with computer.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107

Mobile U.A.E+971-50-2380181
127
Boot Process is located in a chip called “BIOS( Basic Input and Output
System)”.
My Computer:
It represents
represents the different
different secondary storage devices
devices of your computer.
computer.
My Documents:
It is the default location of saved files.
Recycle Bin:



When we will Delete Some File, it goes into Recycle Bin.
We can Restore Files from Recycle Bin.
After Deletion of Files from Recycle Bin, we can’t restore these
th ese Files.
My Network Places or Network Neighborhood:
If your
your comp
comput
uter
er in on netw
networ
ork,
k, It disp
displa
lays
ys the acce
accessi
ssibl
ble
e hard
hardwa
ware
re and
and
software resources on the network.
Start Button:
It provides an entry point to begin using programs installed on the computer’s
hard drive.
Wallpaper:
It is a graphic file that forms the background of the desktop.
Screen Saver:


If computer is idle for long time it may lose monitor’s resolution.
To prevent monitors resolution we use screen saver.
Name of some Built-In User Accounts:




Administrators
Backup Operators
Guests
Power Users
REVIEWED
ByByuser
at Afridi
1:06 13/01/2010
pm, 1/13/10
Azmat
Dialog Box:


It is Special types of windows use to communicate with software you
are running.
Dialog boxes cannot be resized.
Icons or Shortcuts:


Icons are placed on the desktop to provide easy access to program
and files.
Icons provide a quick way to start a program.
Buffer:
A temporary location to store information while the processor is busy.
Clipboard:
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
128
Clipboard is the temporary location to store data. When we use “CUT” or
“COPY” command, the selected text store on clipboard area.
Internet and Intranet:


Network of networks is called internet. It covers all across the world.
Private internet or mini internet is called Intranet. It covers less area
than Internet.
IP Address:




IP stands for “Internet Protocol”.
Protocol”.
Every computer on network has an IP address.
Without IP address its impossible to communicate with other devices
on network.
Example
192.168.0.15
VGA Card:


It stands for “Video Graphic Adaptor”.
It is responsible to build image on monitor’s screen.
scr een.
File:





User will write some data in Files.
File is a single thing.
File’s icon is same as the program icon in which it will made.
Two Files of same program can’t contain same name at same location.
Files names should be meaningful.
File Extensions:
 Extension is used after Filename to identify the file.
 Some common extensions are
o
.Doc
o
.Xls
o
.Bmp
o
.Gif
o
.Ppt (etc)
(etc)
Folder:





Folder is a collection of Files.
Color of Folder’s icon is Yellow, but we can change its icon.
Two Folders can’t contain same name at same location.
Folder names should be meaningful.
User can’t write in Folder.
UNIX:




Very powerful command line operating system.
Developed in 1969 at Bell laboratories.
Idea
Ideall for
for those
those comp
comput
uter
ers
s which
which stor
store
e infor
informa
mati
tion
on carri
carried
ed over
over the
the
Internet (Network Server or Web Server).
Its advanced form is Linux.
Linux:


It is advanced form of UNIX.
It has all functions of UNIX and some own extra features.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107


Mobile U.A.E+971-50-2380181
129
It is an open source operating system.
Normally used on Network Server.
Byte:
Combination of 8 bits is called a Byte.
Nibble:
Half Byte (4 bits) is called Nibble.
Bit:


Each “0” or “1” in the binary system is called a bit (Binary Digit).
“0” means “OFF” and “1” means “ON”.
Firmware:


Firmware is a combination of hardware and software.
Examples are ROM, EPROM
Freeware:


This is copyright software given away for free
fr ee by the author.
Freeware are copyright software so you cannot make changes in it.
Shareware:


Most Shareware are delivered free of charge or having a small fee.
If you want to use regular you will have to pay a small registration fee.
Steps of Computer Programming:
Techniques to write a program or develop a program has following steps
1.
2.
3.
4.
5.
Defining
Defining the Problem
Problem
Planning
Planning the Solution
Solution
Coding
Coding the Program
Program
Testing
Testing the Program
Program
Documenta
Documentation
tion the Program
Program
6. Upgrading the Program
Protocol:


Protocols are set of rules that transfer data from one location to another.
Network has many protocols.
o
TCP/IP
o
IEEE 802.X Standard
o
HTTP
o
FTP
o
SMTP
Virus:



Virus is a small hidden program on a floppy disk or a hard disk.
Virus can spread from computer to computer through infected floppy
disk or over a computer network.
Virus can damages
damages
Computer Programs
Files
Hardware



Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
130
Anti-Virus Software:


It is the software, which uses to check computer for virus.
Most common are
Mcafee
Norton Anti-virus
Dr. Solomon’s Anti-virus
Thunderbyte




Password:


It is a secret code used to protect system.
Password can apply on
Files
Folders
Database
Computer
Web Sites (etc.)





Multitasking:


Working on more than one Program at a t ime is called multitasking.
(e.g.) working on Excel, Listening Music, Doing Chatting
Synchronous Transmission:


Data transmission is in the form of blocks between two devices.
Sender and Receiver clocks are synchronized.
Asynchronous Transmission:


Data transmission is in the form of characters between two devices.
Receiver use start and stop signal for data transmission.
ASCII:



It stands for “American Standard Code for Information Interchange”.
It is a 7-digit code in Binary form.
Used to represent Alphabets, Symbols and Numbers.
(e.g.)
(e.g.) 64 = 100000
1000000
0
Units of Memory:
Unit of memory is byte. The larger units are Kilo Byte (KB), Mega Byte
(MB), Giga Byte (GB) and Tera Byte (TB).
1 Byte
1 Kilo Bytes
1 Mega Bytes
1 Giga Bytes
1 Tera Bytes
=
=
=
=
=
8 bits
1024 Bytes
1024 Kilo Bytes
1024 Mega Bytes
1024 Giga Bytes
Memory Address:



A location of words in memory is called address.
Each word has unique address.
Memory addresses are specified in binary numbers.
Read Operation:
Read operation is used to fetch data from memory.
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
131
Write Operation:
Write operation is used to store data in memory.
Access Time:
It is the amount of time required to perform Read operation.
Cycle Time:
It is the amount of time required to perform Read or Write operation
and then return to its original state ready for next operation.
E-Commerce:
 Online Business is called E-Commerce.
 It provide facilities for sale of
Goods
Services
Services such as Banking,
Banking, Ticket Reservation
Reservation,, Stock Exchange


Service Pack:
 Service Packs are collection of software used to repair / remove errors
/ bugs from
from windows
windows operating
operating system.
Firewall Tool:
 Firewall is used to block un-wanted Incoming (Inbound) and Outgoing
(Outbound)
(Outbound) traffic of a computer.
computer.
REVIEWED
ByBy
user
at 1:07
1/13/10
Azmat
Afridi pm,
13/01/2010
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
132
Some useful Abbreviations
Written by Azmat Afridi SAMS
07/12/2007
RAM
ROM
CPU
OS
PC
NIC
OCR
CRT
SCSI
MIDI
IDI
AMD
H.D.D
F.D.D
CD-R
CD-ROM
OM
DVD-RO
DVD-ROM
M
CD-R
CD-R
CD-RW
W
DOS
NT
DBMS
LAN
WAN
MIS
PDA
SDLC
WWW
HTML
U RL
FTP
HTTP
B-2-B
IT
LCD
IBM
MS
DPI
MB
Mb
GB
Random Access Memory
Read Only Memory
Central Processing Unit
Operating System
Personal Computer
Network Interface Card
Optical Charact
acter Rec
Recognition
Cathode Ray Tube
Small Com
Computer Syste
stem Interface
Music
usical
al Inst
Instru
rume
men
nt Digi
Digittal Inte
nterfac
rface
e
Advanced Micro Devices
Hard Disk Drive
Floppy Disk Drive
Comp
Compac
actt DiskDisk-Re
Read
ad Only
Only Memo
Memory
ry
Digita
Digitall Video
Video Disk-R
Disk-Read
ead Only
Only Memory
Memory
Compact Disk-Readable
Comp
Compa
act Disk
Disk-R
-Rew
ewri
rita
tabl
ble
e
Disk Operating System
New Technology
Database Managemen
ment System
Local Area Network
Wide Area Network
Management Information System
Personal Digital Assistant
System Deve
evelop
lopment
ent Life Cyc
Cycle
World Wide Web
Hyper Text Marku
rkup Language
age
Uniform Resource Locator
File Transfer Protocol
Hyper Text Transfer Protocol
Business 2 Business
Information Technology
Liquid Crystal Display
International Business Machines
Microsoft
Dot Per Inch
Mega Bytes
Mega Bits
Giga Bytes
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Prepared by Azmat Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan: +92-333-9382107
TB
KB
ISDN
SDN
DSL
ATM
TCP/
TCP/IP
IP
IP
DNS
E-mail
GUI
MIPS
IPS
EIDE
EIDE
SIMM
DIMM
SMP
MMP
ALU
BMP
CAD
Coax
FAT
4GL
I/O
ISP
IRC
IRQ
TFT
USB
MAN
OOP
IEEE
IEEE
CPI
OSI
SQL
Mobile U.A.E+971-50-2380181
133
Terra Bytes
Kilo Bytes
Inte
ntegra
grated
ted Serv
Serviices
ces Digi
Digita
tall Netw
Networ
ork
k
Digital Subscriber Line
Asynchronous Transfer Mode
Tran
Transm
smis
issi
sion
on Cont
Contro
roll Prot
Protoco
ocol/
l/In
Inte
tern
rnet
et Proto
Protoco
coll
Internet Protocol
Domain Name System
Electronic Mail
Graphical User Interface
Millio
llions
ns of Inst
Instru
ruct
ctio
ions
ns Per
Per Seco
Second
nd
Enhan
nhance
ced
d Inte
ntegra
grated
ted Driv
Drive
e Ele
Electr
ctronic
onics
s
Single In-line Memory Module
Dual In-line Memory Module
Symmetric Multiprocessing
Massively Multiprocessing
Arithmetic Logic Unit
Bitmap
Computer Aided Design
Coaxial Cable
File Allocation Table
Fourth Generation Language
Input/Output
Internet Service Provider
Internet Relay Chat
Interrupt Request
Thin Film Transistor
Universal Serial Bus
Metropolitan Area Network
Object Oriented Programming
Inst
Instit
itut
ute
e of Elec
Electr
tric
ical
al and
and Elec
Electr
tron
onic
ics
s Engi
Engine
neer
ers
s
Character Per Inch
Open System Interconnection
Structured Query Languages
Prepared by Azmat Afridi
Afridi SAMS 07/12/2007---E-mail: azmat443@gmail.com----Mobile
azmat443@gmail.com----Mobile Pakistan:
Pakistan: +92-333-9382107
Mobile U.A.E+971-50-2380181
U.A.E+971-50-2380181
Download