basic knowledge of computer

22

Click here to load reader

Upload: monyarthy

Post on 24-Jun-2015

267 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Basic Knowledge of Computer

MSWORD

WHAT IS WORD-PROCESSING?Word Processor is a Software package that enables you to create, edit, print and save documents for future retrieval and reference. Creating a document involves typing by using a keyboard and saving it. Editing a document involves correcting the spelling mistakes, if any, deleting or moving words sentences or paragraphs.

(a) Advantages of Word ProcessingOne of the main advantages of a word processor over a conventional typewriter is that a word processor enables you to make changes to a document without retyping the entire document.

(b) Features of Word ProcessingMost Word Processor available today allows more than just creating and editing documents. They have wide range of other tools and functions, which are used in formatting the documents. The following are the main features of a Word Processor

i. Text is typing into the computer, which allows alterations to be made easily.ii. Words and sentences can be inserted, amended or deleted.

iii. Paragraphs or text can be copied /moved throughout the document.iv. Margins and page length can be adjusted as desired.v. Spelling can be checked and modified through the spell check facility.

vi. Multiple document/files can be merged.vii. Multiple copies of letters can be generated with different addresses through the mail-merge

facility.

(c) Some Common Word Processing PackagesThe followings are examples of some popular word processor available

Softword WordStar Word perfect Microsoft word

IMPORTANT FEATURES OF MS-WORDMs-Word not only supports word processing features but also DTP features. Some of the important features of Ms-Word are listed below:

i. Using word you can create the document and edit them later, as and when required, by adding more text, modifying the existing text, deleting/moving some part of it.

ii. Changing the size of the margins can reformat complete document or part of text.

iii. Font size and type of fonts can also be changed. Page numbers and Header and Footer can be included.

iv. Spelling can be checked and correction can be made automatically in the entire document. Word count and other statistics can be generated.

v. Text can be formatted in columnar style as we see in the newspaper. Text boxes can be made.

Page 1 of 17

Page 2: Basic Knowledge of Computer

vi. Tables can be made and included in the text.

vii. Word also allows the user to mix the graphical pictures with the text. Graphical pictures can either be created in word itself or can be imported from outside like from Clip Art Gallery.

viii. Word also provides the mail-merge facility.

ix. Word also has the facility of macros. Macros can be either attached to some function/special keys or to a tool bar or to a menu.

x. It also provides online help of any option.

MS EXCEL

1. Explain the following functions with syntax.

The Excel ISNUMBER function tests if an initial supplied value is a number. If so, the function returns TRUE; Otherwise it returns FALSE.

The format of the function is :

ISNUMBER( Value )

Where the Value argument can be supplied as a direct value, or can be a formula or cell reference.

Examples

The spreadsheets below show examples of the Excel Isnumber function. The spreadsheet on the left shows the format of the function and the spreadsheet on the right shows the results :

ABS( Number )

 Formulas  Results

Page 2 of 17

Page 3: Basic Knowledge of Computer

Basic Description

The Excel PMT function calculates the constant periodic payment required to pay off (or partially pay off) a loan or investment, with a constant interest rate, over a specified period.

The format of the function is :

PMT( rate, nper, pv, [fv], [type] )

Where the arguments are as follows :

rate - The interest rate, per period

nper - The number of periods over which the loan or investment is to be paid

pv - The present value of the loan / investment

[fv] - An optional argument that specifies the future value of the loan / investment, at the end of nper payments

If omitted, [fv] takes on the default value of 0

[type]

- An optional argument that defines whether the payment is made at the start or the end of the period

The type argument can have the value 0 or 1, meaning:0   -   the payment is made at the end of the period1   -   the payment is made at the beginning of the periodIf the [type] argument is omitted, it takes on the default value of 0 (denoting payments made at the end of the period).

Examples

In each of the examples below, the spreadsheet on the left shows the format of the Pmt function, and the spreadsheet on the right shows the result.

Example 1

Page 3 of 17

Page 4: Basic Knowledge of Computer

The following spreadsheet shows the Excel Pmt function used to calculate the monthly payments on a loan of $50,000 which is to be paid off in full after 5 years. Interest is charged at a rate of 5% per year and the payment to the loan is to be made at the end of each month.

 Formulas:  Results:

Note that in this example :

The payments are made monthly, so we have had to convert the annual interest rate of 5% into the monthly rate (=5%/12), and the number of years into months (=5*12).

As the forecast value is zero, and the payment is to be made at the end of the month, the [fv] and [type] arguments can be omitted from the above functions.

The returned payments are negative values, as these represent outgoing payments (for the individual taking out the loan).

MAX functionThe Excel MAX function returns the largest value from a supplied set of numerical values.

The format of the function is:

MAX( Number1, [Number2], ... )

where the Number arguments are a set of one or more numeric values, or arrays of numeric values, that you want to return the largest value from - these values can be supplied directly to the function, or as one or more cells or ranges of cells containing numeric values.

Note that in Excel 2007, you can provide up to 255 Number arguments to the function, but in Excel 2003, you can only provide up to 30Number arguments.

Example

The following example shows the Max function used to retrieve the largest value from the set of values in cells A1 - A5.

The format of the function is shown in the spreadsheet on the left and the resulting value is shown in the spreadsheet on the right.

 Formula  Result

Page 4 of 17

Page 5: Basic Knowledge of Computer

Basic Description

The Excel LARGE function returns the k'th largest value from an array or a range of cells containing numerical values.

The format of the function is :

LARGE( array, k )

where the function arguments are:

array

- An array of numeric values that you want to return the k'th largest of

k - The index - i.e. the function returns the k'th largest value from the supplied array

The array argument can be supplied to the function either directly, or as a reference to a range of cells containing numeric values. If values in the supplied range of cells are text values, these values are ignored.

Basic Description

The Excel Count function returns the number of numeric values in a supplied set of cells or values. This count includes both numbers and dates.

The syntax of the function is :

COUNT( value1, [value2], ... )

Where the arguments, value1, value2, etc, can be any values or references to cell ranges.

In Excel 2007 or 2010, you can enter up to 255 value arguments to the Excel Count function, each of which may consist of any number of cells or values. However, in Excel 2003, the function can only handle up to 30 arguments.

Note that logical values and text representations of numbers are not counted as numeric values if they are present within a cell, or range of cells, that is supplied to the Excel Count functions. However, if supplied directly to the Count function these values arecounted as numeric values.

Page 5 of 17

Page 6: Basic Knowledge of Computer

Which Values are Counted as Numeric Values?

Numbers and dates are always counted as numeric values by the Count function. However, text representations and logical values are counted differently, depending on whether they are supplied as a value in a range of cells, or if they are supplied directly to the function.

The table below summarises which values are and which are not treated as numeric values by the Excel Count function:

Value Within aRange of Cells

Value SuppliedDirectly to Function

Numbers ARE counted ARE counted

Dates ARE counted ARE counted

Logical Values NOT counted ARE counted

Text Representations ofNumbers & Dates

NOT counted ARE counted

Other Text NOT counted NOT counted

Errors NOT counted NOT counted

The Excel IF function tests a user-defined condition and returns one result if the condition is true, and another result if the condition is false.

The format of the function is:

IF( logical_test, value_if_true, value_if_false )

where the arguments are as follows:

logical_test - The user-defined condition that is to be tested and evaluated as either TRUE or FALSE

value_if_true - The result that is to be returned from the function if the supplied logical_test evaluates to TRUE

value_if_false

- The result that is to be returned from the function if the supplied logical_test evaluates to FALSE

Page 6 of 17

Page 7: Basic Knowledge of Computer

If Function Example 2

The logical_test within the Excel If function can be any type of expression that returns a TRUE or FALSE result. The following example shows some more examples of the function, using different types of logical_test.

If Function Example 3

The following example shows nesting of the Excel If function. The outer function has the same logical_test as in Example 1 above. However, in the example, the value_if_true argument is a further If function. Therefore:

If the value in column B is equal to 0, a further call to 'If' is made, to test the value in column C

If the value in column B is not equal to zero, the function returns the value in column A divided by the value in column B

Question:  In Excel, use the If function to create the following logic:

if C11>=620, and C10="F"or"S", and C4<=$1,000,000, and C4<=$500,000, and C7<=85%, and C8<=90%, and C12<=50, and C14<=2, and C15="OO", and C16="N", and C19<=48, and C21="Y", then reference cell A148 on Sheet2. Otherwise, return an empty string.

Answer:  The following formula would accomplish what you are trying to do:

=IF(AND(C11>=620, OR(C10="F",C10="S"), C4<=1000000, C4<=500000, C7<=0.85, C8<=0.9, C12<=50, C14<=2, C15="OO", C16="N", C19<=48, C21="Y"), Sheet2!A148, "")

Question:  In Excel, use the If function to return 0 if cell A1 is either < 150,000 or > 250,000. Otherwise, it should return A1.

Answer:  You can use the OR function to perform an OR condition in the If function as follows:

=IF(OR(A1<150000,A1>250000),0,A1)

Page 7 of 17

Page 8: Basic Knowledge of Computer

In this example, the formula will return 0 if cell A1 was either less than 150,000 or greater than 250,000. Otherwise, it will return the value in cell A1.

Question:  In Excel, use the If function to return 25 if cell A1 > 100 and cell B1 < 200. Otherwise, it should return 0.Answer:  You can use the AND function to perform an AND condition in the If function as follows:

=IF(AND(A1>100,B1<200),25,0)

In this example, the formula will return 25 if cell A1 is greater than 100 and cell B1 is less than 200. Otherwise, it will return 0.

Question:  In Excel, write a formula that works this way:

If (cell A1) is less than 20, then times it by 1,If it is greater than or equal to 20 but less than 50, then times it by 2If its is greater than or equal to 50 and less than 100, then times it by 3And if it is great or equal to than 100, then times it by 4

Answer:  You can write a nested IF statement to handle this. For example:

=IF(A1<20, A1*1, IF(A1<50, A1*2, IF(A1<100, A1*3, A1*4)))

Question:  In Excel, formula in cell C5 that does the following:

IF A1+B1 <= 4, return $20IF A1+B1 > 4 but <= 9, return $35IF A1+B1 > 9 but <= 14, return $50IF A1+B1 > 15, return $75

Answer:  In cell C5, you can write a nested IF statement that uses the AND function as follows:

=IF((A1+B1)<=4,20,IF(AND((A1+B1)>4,(A1+B1)<=9),35,IF(AND((A1+B1)>9,(A1+B1)<=14),50,75)))

Basic Networking Questions and Answers:

1 What is difference between baseband and broadband transmission?

In a baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.

Page 8 of 17

Page 9: Basic Knowledge of Computer

2 What is Bandwidth?

Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.

3: What is the range of IP addresses in the classes of internet addresses?

range of IP addresses in the classes of internet addresses are as under...

Class A 0.0.0.0 - 127.255.255.255Class B 128.0.0.0 - 191.255.255.255Class C 192.0.0.0 - 223.255.255.255Class D 224.0.0.0 - 239.255.255.255Class E 240.0.0.0 - 247.255.255.255

5 :: Difference between bit rate and baud rate?

Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.baud rate = bit rate / Nwhere N is no-of-bits represented by each signal shift.

The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

The 7 OSI Layers 

The OSI Model consists of the following seven layers:

1. Application

Application Layer: Provides network services to user applications. It is responsible for exchanging information between programs running on the machine, such as an e-mail program, and other services running on a network, such as a print server or another computers' application.

Page 9 of 17

Page 10: Basic Knowledge of Computer

2. Presentation

Presentation Layer: Concerned with how data is converted and formatted for data transfer. Examples of format conversions include ASCII text for documents and .gif and JPG for images. This layer performs code conversion, data translation, compression and encryption.

3. Session

Session Layer: Determines how two devices establish, maintain and manage a connection - how they talk to each other. These connections are called sessions.

4. Transport

Transport Layer: Responsible for breaking the data into segments, establishing an end-to-end logical connection between machines, and providing for error handling.

5. Network

Network Layer:  Responsible for determining addressing on the network, determining the routes that information will take on its journey, and managing network traffic congestion. Data at this level is packaged into packets.

6. Data Link

Data Link Layer: Provides the link for how data, packaged into frames is communicated through hardware to be transported across a medium. It communicates with network cards, manages physical layer communications between connecting systems and handles error notification.

7. PhysicalData Link Layer: Provides the link for how data, packaged into frames is communicated through hardware to be transported across a medium. It communicates with network cards, manages physical layer communications between connecting systems and handles error notification.

1. What is a topology?

A topology refers to the manner in which the cable is run to individual workstations on the network. The dictionary defines topology as: the configurations formed by the connections between devices on a local area network (LAN) or between two or more LANs

There are three basic network topologies (not counting variations thereon): the bus, the star, and the ring.

It is important to make a distinction between a topology and an architecture. A topology is concerned with the physical arrangement of the network components. In contrast, an architecture addresses the components themselves and how a system is structured (cable access methods, lower level protocols, topology, etc.). An example of an architecture is 10baseT Ethernet which typically uses the start topology.

Page 10 of 17

Page 11: Basic Knowledge of Computer

2. What is a bus topology?

A bus topology connects each computer (node) to a single segment trunk. A ‘trunk’ is a communication line, typically coax cable, which is referred to as the ‘bus.’  The signal travels from one end of the bus to the other. A terminator is required at each end to absorb the signal so it does not reflect back across the bus.

In a bus topology, signals are broadcast to all stations. Each computer checks the address on the signal (data frame) as it passes along the bus. If the signal’s address matches that of the computer, the computer processes the signal. If the address doesn’t match, the computer takes no action and the signal travels on down the bus.

Only one computer can ‘talk’ on a network at a time. A media access method called CSMA/CD is used to handle the collisions that occur when two signals are placed on the wire at the same time.

The bus topology is passive. In other words, the computers on the bus simply ‘listen’ for a signal; they are not responsible for moving the signal along.

A bus topology is normally implemented with coaxial cable.

3. What is the difference between a regular bus and a local bus?

In a regular bus, each computer is attached to the cable segment (called a backbone) by means of a drop cable (a shorter cable connecting the computer to the backbone)

In a local bus, each computer is attached directly to the backbone in a daisy-chain configuration by means of a "T" connector.  Peer-to-peer networks are often configured as a local bus.

4. What are the advantages and disadvantages of the bus topology?

Advantages of bus topology:

Easy to implement and extend Well suited for temporary networks that must be set up in a hurry Typically the least cheapest topology to implement Failure of one station does not affect others

Disadvantages of bus topology:

Page 11 of 17

Page 12: Basic Knowledge of Computer

Difficult to administer/troubleshoot Limited cable length and number of stations A cable break can disable the entire network; no redundancy Maintenance costs may be higher in the long run Performance degrades as additional computers are added

5. What are the key features of a star topology?

All of the stations in a star topology are connected to a central unit called a hub.

The hub offers a common connection for all stations on the network. Each station has its own direct cable connection to the hub. In most cases, this means more cable is required than for a bus topology. However, this makes adding or moving computers a relatively easy task; simply plug them into a cable outlet on the wall.

 If a cable is cut, it only affects the computer that was attached to it. This eliminates the single point of failure problem associated with the bus topology. (Unless, of course, the hub itself goes down.)

Star topologies are normally implemented using twisted pair cable, specifically unshielded twisted pair (UTP). The star topology is probably the most common form of network topology currently in use.

6. What are the advantages and disadvantages of a star topology?

Advantages of star topology:

Easy to add new stations Easy to monitor and troubleshoot Can accommodate different wiring

Disadvantages of ring topology:

Failure of hub cripples attached stations More cable required

7. What are the key features of a ring topology?

A ring topology consists of a set of stations connected serially by cable. In other words, it’s a circle or ring of computers. There are no terminated ends to the cable; the signal travels around the circle in a clockwise direction.

Note that while this topology functions logically as ring, it is physically wired as a star. The central connector is not called a hub but a Multistation Access Unit or MAU. (Don’t confuse a Token Ring MAU with a ‘Media Adapter Unit’ which is actually a transceiver.)

Page 12 of 17

Page 13: Basic Knowledge of Computer

Under the ring concept, a signal is transferred sequentially via a "token" from one station to the next. When a station wants to transmit, it "grabs" the token, attaches data and an address to it, and then sends it around the ring. The token travels along the ring until it reaches the destination address. The receiving computer acknowledges receipt with a return message to the sender. The sender then releases the token for use by another computer.

Each station on the ring has equal access but only one station can talk at a time.

In contrast to the ‘passive’ topology of the bus, the ring employs an ‘active’ topology. Each station repeats or ’boosts’ the signal before passing it on to the next station.

Rings are normally implemented using twisted pair or fiber-optic cable.

8. What are the advantages and disadvantages of a ring topology?

Advantages of ring topology:

Growth of system has minimal impact on performance All stations have equal access

Disadvantages of ring topology:

Most expensive topology Failure of one computer may impact others Complex

9. What are the costs considerations for choosing a topology?

The following factors should be considered when choosing a topology:

Installation Maintenance and troubleshooting Expected growth Distances Infrastructure

Existing network

As a general rule, a bus topology is the cheapest to install, but may be more expensive to maintain because it does not provide for redundancy.

Bluetoothis a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994,[1] it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization.

Page 13 of 17

Page 14: Basic Knowledge of Computer

Wi-Fi is a trademark of the Wi-Fi Alliance. A Wi-Fi enabled device such as a personal computer, video game console, smart phone, and digital audio player can connect to the Internet when within range of a wireless network connected to the Internet. The coverage of one or more (interconnected)access points — called hotspots when offering public access — generally comprises an area the size of a few rooms but may be expanded to cover many square miles, depending on the number of access points with overlapping coverage.

WiMAX is an IP based, wireless broadband access technology that provides performance similar to 802.11/Wi-Fi networks with the coverage and QOS (quality of service) of cellular networks. WiMAX is also an acronym meaning "Worldwide Interoperability for Microwave Access (WiMAX).

WiMAX is a wireless digital communications system, also known as IEEE 802.16, that is intended for wireless "metropolitan area networks". WiMAX can provide broadband wireless access (BWA) up to 30 miles (50 km) for fixed stations, and 3 - 10 miles (5 - 15 km) for mobile stations. In contrast, the WiFi/802.11 wireless local area network standard is limited in most cases to only 100 - 300 feet (30 - 100m).

GPRS

Short for General Packet Radio Service, a standard for wireless communications which runs at speeds up to 115 kilobits per second, compared with current GSM (Global System for Mobile Communications) systems' 9.6 kilobits.GPRS, which supports a wide range of bandwidths, is an efficient use of limited bandwidth and is particularly suited for sending and receiving small bursts of data, such as e-mail and Web browsing, as well as large volumes of data.

GSMGSM (Global System for Mobile communication) is a digital mobile telephony system that is widely used in Europe and other parts of the world. GSM uses a variation of time division multiple access (TDMA) and is the most widely used of the three digital wireless telephony technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency band.

CDMACDMA (Code-Division Multiple Access) refers to any of several protocols used in so-called second-generation (2G) and third-generation (3G) wireless communications. As the term implies, CDMA is a form of multiplexing, which allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth. The technology is used in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz bands.

Optical fiber   An optical fiber is a thin, flexible, transparent fiber that acts as a waveguide, or "light pipe", to transmit light between the two ends of the fiber.Optical fiber typically consists of a transparent core surrounded by a transparent cladding material with a lower index of refraction. Light is kept in the core by total internal reflection.Principle of operation

Page 14 of 17

Page 15: Basic Knowledge of Computer

An optical fiber is a cylindrical dielectric waveguide (no conducting waveguide) that transmits light alo

ng its axis, by the process of total internal reflection. The fiber consists of a core surrounded by

a cladding layer, both of which are made of dielectric materials. To confine the optical signal in the core,

the refractive of the core must be greater than that of the cladding. The boundary between the core and

cladding may either be abrupt, in step-index fiber, or gradual, in graded-index fiber.

Advantages of Optical Fiber:

Noise immunity: RFI and EMI immune (RFI - Radio Frequency Interference, EMI -Electromagnetic Interference)

Security: cannot tap into cable.

Large Capacity due to BW (bandwidth)

No corrosion

Longer distances than copper wire

Smaller and lighter than copper wire

Faster transmission rate

Disadvantages of optical fiber:

Physical vibration will show up as signal noise! Limited physical arc of cable. Bend it too much and it will break!

Difficult to splice

Types of nodes important to networks.

Hub A device that repeats or broadcasts the network stream of information to individual nodes ( usually personal computers)

Switch A device that receives packets from its input link, and then sorts them and transmits them over the proper link that connects to the node addressed.

Bridge A link between two networks that have identical rules of communication.

Gateway A link between two different networks that have different rules of communication. Router A node that sends network packets in one of many possible directions to get them to their destination.

MODEMOutgoing: Converts binary data from computer (digital) into telephone compatible signals (analog).Incoming: Converts telephone signal (analog) into binary data for the computer (digital).

Page 15 of 17

Page 16: Basic Knowledge of Computer

Can be an external or internal device (usually a “card”).

The method used to transport the datayTwo types of data transmission, each requiring a different modem.

yAsynchronous transmission - xInformation is sent byte by byte.xCheaper and more commonly used.

ySynchronous transmission - xData is sent in large blocks rather than in small pieces.xPreceded by special information, concerning error detection and block size.xThese modems are expensive but very fast.

LAN - Local Area Network

A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.

WAN - Wide Area Network

As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.A WAN is a geographically-dispersed collection of LANs. A network device called a  routerconnects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address.A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances.

LAN, WAN and Home Networking

Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider (ISP) using a broadband modem. The ISP provides a WAN IP address to the modem, and all of the computers on the home network use LAN (so-called private) IP addresses. All computers on the home LAN can communicate directly with each other but must go through a central gateway, typically a broadband router, to reach the ISP.

Other Types of Area Networks

While LAN and WAN are by far the most popular network types mentioned, you may also commonly see references to these others:

Page 16 of 17

Page 17: Basic Knowledge of Computer

Wireless Local Area Network - a LAN based on WiFi wireless network technology Metropolitan Area Network - a network spanning a physical area larger than a LAN but

smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation.

Campus Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus.

Storage Area Network - connects servers to data storage devices through a technology like Fibre Channel.

System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network.

Page 17 of 17