database management system (dbms)€¦ · downloaded from 1 . 2 file management system (fms) : a...

45
Data : Data means collection of rawfacts and figures. Information : Data that has been processed into useful form is known as Information. Information is the processed data. Database : A database is a collection of information organized into interrelated tables of data and specifications of data objects. Attribute : a single data item related to a database object. Field a field is a single unit of data stored as part of a database record. Each record is made up of one or more fields, which correspond to the columns in a database table. collection of characters referred as "Field". Fields are often also referred to as attributes. Cell : an intersection of row and column is known as "cell". Tuple : Tuple means a collection of one or more attributes. A collection of cells vertically is known as "Tuple". Record : A collection of cells horizontally is known as "Record". A database record consists of one set of tuples for a given relational table. In a relational database, records correspond to rows in each table. A related set of data which are contained in fields. Table : A set of rows and columns. Entity : An entity is a single object about which data can be stored. Key: Key is a unique field in a record used to distinguish one record from another. A database key is an attribute used to identify data in some manner. Each table has a primary key which uniquely identifies records. Query : A statement that extracts information from the database. Queries are the primary mecha- nism for retrieving information from a database and consist of questions presented to the database in a predefined format. Schema : A database schema is a collection of metadata that describes the relations in a database. Queue : An alternate pipe form of operating system, which handles data in the form of messages rather than bytes. Stack : A memory in which the information stored last is on top and is retrieved first. Data Processing : A series of operations that convert rawfacts (data) into useful information. Data Processing System : A system that accomplishes data processing. Data Processor : A digital device that processes data. Data Transfer Rate : The speed at which data is transfered from the main memory to another medium on which data are recorded. File : A collection of related records. DATAB AB AB AB ABASE MAN ASE MAN ASE MAN ASE MAN ASE MANAGEMENT SY GEMENT SY GEMENT SY GEMENT SY GEMENT SYSTEM (DBMS) STEM (DBMS) STEM (DBMS) STEM (DBMS) STEM (DBMS)

Upload: hoangngoc

Post on 06-Apr-2018

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

Data : Data means collection of rawfacts and figures.

Information : Data that has been processed into useful form is known as Information. Information is

the processed data.

Database : A database is a collection of information organized into interrelated tables of data and

specifications of data objects.

Attribute : a single data item related to a database object.

Field a field is a single unit of data stored as part of a database record. Each record is made up of

one or more fields, which correspond to the columns in a database table. collection of characters

referred as "Field". Fields are often also referred to as attributes.

Cell : an intersection of row and column is known as "cell".

Tuple : Tuple means a collection of one or more attributes. A collection of cells vertically is known as

"Tuple".

Record : A collection of cells horizontally is known as "Record". A database record consists of one set

of tuples for a given relational table. In a relational database, records correspond to rows in each table.

A related set of data which are contained in fields.

Table : A set of rows and columns.

Entity : An entity is a single object about which data can be stored.

Key: Key is a unique field in a record used to distinguish one record from another. A database key is

an attribute used to identify data in some manner. Each table has a primary key which uniquely

identifies records.

Query : A statement that extracts information from the database. Queries are the primary mecha-

nism for retrieving information from a database and consist of questions presented to the database in

a predefined format.

Schema : A database schema is a collection of metadata that describes the relations in a database.

Queue : An alternate pipe form of operating system, which handles data in the form of messages

rather than bytes.

Stack : A memory in which the information stored last is on top and is retrieved first.

Data Processing : A series of operations that convert rawfacts (data) into useful information.

Data Processing System : A system that accomplishes data processing.

Data Processor : A digital device that processes data.

Data Transfer Rate : The speed at which data is transfered from the main memory to another

medium on which data are recorded.

File : A collection of related records.

DDDDDAAAAATTTTTABABABABABASE MANASE MANASE MANASE MANASE MANAAAAAGEMENT SYGEMENT SYGEMENT SYGEMENT SYGEMENT SYSTEM (DBMS)STEM (DBMS)STEM (DBMS)STEM (DBMS)STEM (DBMS)

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 1

Page 2: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

2

File Management System (FMS) : A software package that allows users to define data items, placethese items into specified records combine these records into designated files and then manipulateand retrieve stored data. An FMS can access records from only one file at a time.

File Organization : The technique used to represent and store the records on a file is called the FileOrganisation.

The file organization techniques are three types :

☛ Sequential File Organization : The most basic way to organize the collection of recordsthat from a file is to use sequential organization.

☛ Random File Organization : A random access file enables you to read or write information anywhere in the database.

☛ Indexed Sequential File Organization : Indexed sequential Access Method (ISAM), amethod for managing how a computer accesses records and files stored on a hard disk.While storing data sequentially, ISAM provides direct access to records through an index.This combination results in quick data access regardless of whether records are beingaccessed sequentially or randomly.

Back-up Copy : It is the reference of original file (or) duplicate version of original file.

Buffer : A storage area where data are temporarily stored.

Block : A group of records

De-Block : An individual record.

DBMS : (Database Management System) : The software used for the management, mainte-nance and retrieval of data stored in a database.

DBMS is sub-divided into three types

☛ DDL (Data Definition Language)

☛ DML (Data Manipulation Language)

☛ DCL (Data Control Language)

Types of DBMS : There are three types of DBMS.

☛ Hierarchical DBMS : A DBMS is said to be hierarchical if the relationships among data inthe database are established in such away that one data item is present as the subordinateof another one.

☛ Network DBMS : In Network DMBS, the relationships among data in the database are oftype many-to-many.

☛ Relational DBMS : The software that manages data in more than one file at a time. InRDBMS, the database relationships are treated in the form of a table. the table representsthe data with rows and columns rather than as lists of records.

Data Automation : Making data entry and validation as automatic as possible is known as"Data Automation".

Data Recovery : A program which attempts to recover deleted or damaged data is known as"Data Recovery".

Data Compression : A program which force data into less space on the storage medium.

Data Integrity

Data Validation.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 2

Page 3: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

3

E - COMMERCE

E - Commerce (Electronic Commerce) : E-Commerce is the buying and selling of goods and ser-vices on the internet. The visitor to the site can sell or buy any product or service online. The transac-tions are enable through credit cards, Debit cards etc.

E-Business (Electronic Business) : E-Business is the administration of conducting business viathe Internet. This would include the buying and selling of goods and services, along with providingtechnical or customer support through the Internet. E-Business is used in conjunction with E-Com-merce, but includes services in addition to the sale of goods.

E-Administration : The use of ICTs (Information and Communication technologies) to modernize thestate, the creation of data repositories for MIS (Management Information Systems), computerisationof records.

E-Services : the emphasis here is to bring the state closer to the citizens. Examples include provi-sion of online services. E-Services and E-Administration together constitute what is generally termede-governance.

E-Governance : The use of IT to improve the ability of government to address the needs of society.It includes the publishing of policy and programme related information to transact with citizens. Itextends beyond provision of on-line services and use of IT for strategic planning and reaching devel-opment goals of the government.

E-Democracy : The use of IT to facilitate the ability of all sections of society to participate in thegovernance of the state. The remit is much broader here with a stated emphasis on transparency',accountability and participation. Examples are online disclosure policies, online grievance redressforums and e-referendums.

Electronic Funds Transfer (EFT) : A cashless approach used to pay for goods and services.Electronic signals between computers are used to adjust the accounts of the parties involved in atransaction. Electronic Funds transfer (EFT) is also known as "Electronic Banking (E-Banking)". E-Banking is the use of electronic means to transfer funds directly from one account to another, ratherthan by cheque or cash.

Internet Banking or Online Banking : internet Banking allows customers to conduct financial trans-actions on a secure website operated by their retail or virtual bank, credit union or building soeicty.

E-Marketing : E-Marketing is also known as Internet Marketing, Digital Marketing, Web Marketing,Online Marketing, Search Marketing, I-Marketing (Internet Marketing) is the Marketing of products orservices over the Internet.

Types of E-Marketplace:

1. Horizontal Marketing : A horizontal Market is a market which meets a given need of a widevariety of industries, ratrher than a specific one.

2. Vertical Marketing : A vertical Marketing used to define a comany's approach towards targetingthat focuses on specific industries.

E-Procurement (Supplier exchange) : E-Procurement is more than just a system for making pur-chases online. A properly implemented system can connect companies and their business processesdirectly with suppliers while managing all interactions between them. Examples are bids, manage-ment correspondence, questions and answers, previous pricing and multiple emails sent to multipleparticipants.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 3

Page 4: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

4

Types of E-Commerce :

1. Business to Customer (B2C) : The basic concept of this model is to sell the product online tothe customers. It provides direct selling through online. B2C is the indirect trade between thecompany and consumers. Directly interact with the customers is the main difference with otherbusiness model.

2. Business to Business (B2B) : It is similar to manufacturer issuing goods to the retailer or whole-saler. This model defines that Buyer and seller are two different entities. It consists of longest form ofE-Commerce. It is one of the cost effective way to sell out product through out the world.

3. Customer to Customer (C2C) : It helps the online dealing of goods or services among people.though there is no major parties needed but the parties will not fulfill the transactions without theprogram which is supplied by the online market dealer such as eBay.

4. Peer to Peer (P2P) : It is a discipline that deal itself, which assists people to instantly sharesrelated computer files and computer sources without having to interact with central webserver.

5. M-Commerce : This model deals with conducting the transactions with the help of mobile. Themobile consumers can interact each other and can lead the business. M-Commerce (Mobile Com-merce) involves the change of ownership or rights to utilize goods and related services.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 4

Page 5: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

5

DATA COMMUNICATION

Data Communication : Data Communication refers to the transmission of the digital signals over acommunication channel between the transmitter and receiver computers.

(or)

Data Communication refers to the sharing of information between two interconnected systems ina network.

The Five Elements of Data Communications :

1. Computer

2. Source (Sender)

3. destination (Receiver)

4. communication Device

5. transmission Medium

COMMUNICATION DEVICES :

1. Wire Pairs : Wire pairs are used in local telephone communication and for short distance digitaldata communication. They are usually made up of copper and the pair of wires is twisted together.

2. Coaxial Cables : Coaxial cable is groups of specially wrapped and insulted wires that are able totransfer data at higher rate. They consist of a central copper wire surrounded by an insulationover which copper mesh is placed. Coaxial cables are used for long distance telephone lines andLAN for their noise immunity and faster data transfer.

3. Microwave : Microwave system uses very high frequency radio signals to transist data throughspace. the transimitter and receiver of a microwave system should in line-or-sight because theradio signal cannot bend.

With microwave very long distance transmission is not possible to overcome this problem of lineof sight and power amplification of weak signal, repeaters are used at regular intervals betweenthe transmitting and receiving end.

4. Communication Satellite : A Communication satellite is a microwave relay station placed inouter space. In satellite communication, microwave signal is transmitted from a transmitter onearth to the satellite at space. The satellite amplifies the weak signal and transmits it back to thereceiver.

The main advantage of satellite communication is that it is a single microwave relay station visiblefrom any point of a very large area.

Data Transmission Modes : There are three ways for transmitting data from one system to anothersystem.

1. Simplex : In simplex, the communication can take place in one direction (source to Destination)The flow of information is Uni-directional. The receiver receives the signal from the transmittingdevice. Ex: Pazer.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 5

Page 6: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

6

2. Half - Duplex : In half-duplex, communication channel is used in both directions but only in onedirection at a time. Thus, a half-duplex line can alternately send and receive data.

Ex: Walky-Talky

3. Full - Duplex : In full - duplex, the communication channel is used in both directions at the sametime.

Ex : Telephone call conversation.

Flow Control : Flow control is needed when the sender transmits faster than the receiver or interme-diate network equipment can process the transmissions.

Routing : When systems are not directly connected, intermediary systems along the route to theintended receivers need to forward messages on behalf of the sender. On the Internet, the networksare connected using routers.

Types of Data Transmission :

☛ Digital and Analog transmission : Data is transmitted from one point to another point by meansof electrical signals that may be in digital and analog form. In analog signal, the transmissionpower varies over a continuous range with respect to sound, light and radio waves. A digital signalmay assume only discrete set of values within a given range. Analog signal is measured in voltsand its frequency in Hertz (HZ).

☛ Serial and Parallel Transmission : Serial data transmission implies transfer data transferbit-by-bit on the single (serial) communication line. In serial transmission, data is sent in a serialform i.e., bit by bit on a single line. The cost of communication hardware is consider able reducedsince only a single wire or channel is require for the serial bit transmission. Serial data transmission is slow as compared to parallel transmission.

Parallel data transmission is less common but faster than serial data transmission. Most data areorganized into 8 bit bytes.In some computers, data are further organized into multiple bits calledhalf words, full words.

☛ Asynchronous and Synchronous Transmission : In asynchronous transmission data is transmitted character by character. It is cheaper to implement, as you donot have to save the databefore sending.

In synchronous mode, the saved data is transmitted block by block. Each block can contain manycharacters. Synchronous transmission is well suited for remote communication between a computer and related devices like printers and card readers.

Protocol : A set of rules and regulations for transmitting the data from one system to another systemin a network is known as "Protocol". The procedure of data transformation in the form of software is

known as "Protocol".

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 6

Page 7: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

7

Ex : of Protocols :

☛ Transmission Control Protocol (TCP)

☛ User Datagram Protocol (UDP)

☛ Internet Protocol (IP)

☛ Post Office Protocol (POP3)

☛ Hyper Text Transfer Protocol (HTTP)

☛ File Transfer Protocol (FTP)

☛ Internet Control Message Protocol (ICMP)

☛ Internet Message Access Protocol (IMAP)

Functions of Protocol : Protocol performs the following functions for the efficient and error freetransmission of data.

☛ Data Sequencing : A long message to be transmitted is broken into smaller packets of fixed sizefor error free data transmission

☛ Flow Control : All machines are not equally efficient in terms of speed. The flow control regulatesthe process of sending data between fast sender and slow receiver.

☛ Data Routing : It is the process of finding the most efficient route between source and destinationbefore sending the data.

☛ Error Control : Error detecting and recovering is the one of the main function of protocol. Itensures that data are transmitted without any error.

☛ Bandwidth : The capacity at which a given communication channel, such as ordinary coppertelephone line, can transfer information. Increasing bandwidth increases the speed at which datatransfer takes place.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 7

Page 8: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

8

NETWORKING

Network : An interconnection of computer system and/or peripherals with carriers and data commu-nications devices for the purpose of exchanging data and information. the users share hardware orsoftware over the network.

Network Types: Networks can be categorized in several different ways. Common examples of areanetwork types are :

☛ LAN : Local Area Network

☛ WLAN : Wireless Local Area Network.

☛ CAN : Campus Area Network (or) Controller Area Network (or) Cluster Area Network.

☛ PAN : Personal Area Network

☛ DAN : Desk Area Network

☛ SAN : Storage Area Network (or) System Area Network (or) Small Area Network(or) Server Area Network

☛ MAN : Metropolitan Area Network

☛ GAN : Global area Network

☛ WAN : Wide Area Network

Categories of Networks: Based on the architecture networks can be broadly classified as :

1. Peer-to-peer architecture

2. Client/server architecture

1. Peer-to-peer architecture : P2P is a type of network in which each computer has equal capabilities and responsibilities.

2. Client/Server architecture : A network architecture in which each computer on the network iseither a client or a server. Servers are powerful computers dedicated to managing disk drives,network traffic. Clients are PCs on which users run applications.

Protocol : A set of rules and regulations for transmitting the data from one system to another systemin a network.

Client : The system request for the data for further processing.

Server : A system that shares resources with one or more workstations on a network.

Client-Server Computing : A memory computing computer applications in which required functionsare grouped at service requestors and service providers. Client request services and servers providethem, this method particularly is suited for applications implemented on distributed computers.

Node : Each device connected to a network is known as "Node". An end point, of a branch in anetwork or a common junction of two or more network branches.

Network Topology : the structure of interconnecting of nodes of a computer network is known as"Network Topology". A Network topology represents its layout or structure from the point of view ofdata flow. Network topologies are categorized into the following basic types:

1. Bus Topology

2. Ring Topology

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 8

Page 9: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

9

3. Star Topology

4. Tree Topology

5. Mesh Topology

1. Bus Topology : All devices are connected to a central cable, called the bus or backbone. Allinformation transmitted a cross the bus can be received by any system in the network.

2. Ring Topology : all devices are connected to one another in the shape of a closed loop. So thatevery device has exactly two neighbors for communication purposes. All messages travel througha ring in the same direction (either "clockwise" or "Anticlockwise"). A failure in any cable or devicebreaks the loop and can take down the entire network.

3. Star Topology : All devices are connected to a central hub. Nodes communicate a cross thenetwork by passing data through the web.

4. Tree Topology : A hybrid topology. One "root" node connects to other nodes, which in turn connect to other nodes, forming a tree structure. Information from the root node may have to passthrough other nodes to reach the end nodes.

5. Mesh Topology : Mesh topology involve the concept of routes. Nodes are connected with manyredundant interconnections between network nodes. Messages sent on a Mesh Topology cantake any of several possible paths from source to destination.

Networking Cables : Cable is the measuring through which information usually moves from onenetwork device to another.

Some types of the network cables are :

1. Coaxial Cable

2. Fiber Optic Cable

3. Shielded Twisted Pair (STP) Cable.

4. Unshielded Twisted Pair (UTP) Cable.

1. Coaxial Cable : Coaxial lines confine the electromagnetic wave to the area inside the cable between the center conductor and the shield. The most common use for coaxial cables is for television.

2. Fiber Optic Cable : An optical Fiber cable containing one or more optical fibers. The opticalelements are typically individually coated with plastic layers and contained in a protective tubesuitable for the environment where the cable will be deployed.

3. Shielded Twisted Pair (STP) Cable : Shielded Twisted Pair cables are an attempt to preventelectromagnetic interference. Because the shielding is made of metal. This type of cabling offers thebest protection from interference from external sources, and also eliminates alien crosstalk.

4. Unshielded Twisted Pair (UTP) : Unshielded Twisted Pair Cable is the most common cableused in computer networking Unshielded Twisted Pair cable is used in data networks for short andmedium length connections because of its relatively lower costs compared to optical fiber and coaxialcable. UTP is used in video applications, security cameras.

MODEM (MODULATOR - DE MODULATOR) : Devices used to convert digital signals to its analogform (modulation) at the sending end and back to digital signals from analog form (demodulation) atthe receiving end.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 9

Page 10: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

10

Bandwidth : Bandwidth refers to the data rate supported by a network connection or interface. Band-width is the primary measure of computer network speed. Example of low bandwidth connection isdial-up connection. Example of high bandwidth connection is Broadband.

ISO/OSI (International Standard Organization for open Systems Interconnection) : ISO/OSIstandard clearly defines the functions of communication softwares in a generalized and structuredmanner which helps to carryout the network product development activities. ISO/OSI model indicatesabout how the data transmit from one system to another system in a network. ISO/OSI model con-sists of 7 layers.

Source Destination

APPLICATION APPLICATION

PRESENTATION PRESENTATION

SESSION SESSION

TRANSPORT TRANSPORT

NETWORK NETWORK

DATALINK DATALINK

PHYSICAL PHYSICAL

Physical Medium

Fig : ISO/OSI Model

1. Physical Layer : Physical layer transmits the data between the systems by 'Bit-by-Bit" level. Ituses "Category-5" wires for data transmission. It connects the two systems through physical mediumsuch as coaxial cables, Fiber optics, vaccum etc.

2. Datalink Layer : Datalink layer transmits the data between the systems by "frames (or) Seg-ment" levels. It communicates the data between adjacent nodes or systems or work stations. Thislayer uses HUB and PPP (Process to Process Protocol) for data transmission.

3. Network Layer : Network Layer transmits the data between the systems by "packet" level. Thislayer was IP (Internet Protocol), ICMP (Internet Control Message Protocol) and TCP (TransmissionControl Protocol).

4. Transport Layer : Transport Layer indicates about the type of communication. It uses TCP (Trans-mission Control Protocol) and UDP (User Datagram Protocol).

Data Transmission is divided into two types :

☛ Connection - Oriented Transmission :

◗ It is reliable transmission

◗ It gives the acknowledgements (Delivery Reports)

◗ It uses TCP for data transmission

◗ Example : Sending messages, e-mails.

☛ Connection - Less Transmission :

◗ It is non-reliable Transmission

◗ It doesn't give the acknowledgements.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 10

Page 11: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

11

◗ It uses UDP for data transmission.

◗ Example : Speech

5. Session Layer : Session Layer provides the encryption (coding) on the sender side (source) anddecrytion (decoding) on the receiver side (destination). Encryption and Decryption applied for provid-ing security to the message. Session Layer uses the RPC (Remote Procedure Call).

6. Presentation Layer : Presentation Layer indicates the syntax errors and also re-arranges themessage. Presentation Layer uses the SMTP (Simple Mail Transfer Protocol) and HTTP (HypertextTransfer Protocol).

7. Application Layer : Application Layer is also known as "User Application Layer (or) User FriendlyLayer" It uses FTP (File transfer Protocol), DNS (Domain Name System), SIME (Simple Internet MailExtension) and MIME (Multipurpose Internet Mail Extension).

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 11

Page 12: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

12

INTERNET

Internet : International Communicate Networking between number of systems is called "Internet".Internet is a network of networks. Internet is an interconnection between several computers of differ-ent types belonging to various networks all over the globe. The people all over the globe have recog-nized the Internet as their latest development tool. Internet is a world wide network of computers.Internet provides e-mail, telnet (remote login to computer), web browsing, Instant Messaging, blogs,chat rooms, social networking, VOIP, media, newsgroup, and online shopping etc.

Host : Each internet computer is called a "host". Host means a computer which handles the networktasks and holds the data.

History of Internet :

The first Internet name is "ARPANET' (Advanced Research Project Agency Network). ARPANET wasdesigned by American Department of Defense (DOD) in 1969. This ARPANET is communicatingbetween 4 systems with one computer at California and three computers at ATA.

Minimum Requirements for Internet :

☛ A Computer

☛ A modem (or) Telephone line

☛ An Account with ISP.

ISP means "Internet Service Provider". ISP is also known as "Internet Access Protocol (IAP): ISPconsists of username, password and Dial-up numbers.

INTRANET : An Intranet is a private network that is contained within an enterprise. The main purposeof an Intranet is to share company information and computing resources among employees.

When part of an intranet is made accessible to customers, partners, suppliers or others outsidethe company, that part becomes part of an "Extranet".

World Wide Web (WWW) : World Wide web offers facilities to the users to share information withothers. WWW is a global information system that is fastest growing area of the Internet. WWW is aseries of servers that are connectede through Hypertext. WWW servers can publish text and graph-ics including sound and video. "World Wide Web" was designed by "Tim Berners Lee" in 1989.

Hyper Link (or) Hypertext : Hypertext is a method of presenting information in which certain text ishighlighted that, when selected, displays more information on particular topic. These highlighted itemsare called "Hyperlinks (or) Hyper Text". Hyperlinks allow the users to navigate from one document toanother that may be located on differnt servers.

Types of Internet Connection :

1. Dial-up Internet Access : It is a form of Internet access that uses that facilities of the publicswitched Telephone Network (PSTN) to establish a dialled connection to an ISP (Internet ServiceProvider) via telephone lines. Dial-up connection is the slowest Internet Connection.

2. Integrated Services Digital Network (ISDN) : ISDN is an international communications stan-dard for sending voice, video and data over digital telephone lines.

3. Leased Line : It is a service contract between a provider and a customer, where by the provideragrees to deliver a symmetric telecommunications line connecting two or more locations in exchangefor a monthly rent.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 12

Page 13: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

13

4. Digital Subscriber Line (DSL) : DSL Provides a connection to the Internet through the tele-phone network. DSL can operate using a single phone link without preventing normal use of the tele-phone line for phone calls.

5. T-Line : Here Internet access data is carried over fiber optic lines or copper lines. They are quickbut highly regulated and generally intended for business use.

6. Broadband : It provides a high data rate access to the Internet and also provides a continuousconnection. Broadband is the fastest internet connection.

7. Wi-Fi (Wireless Fidelity) : It is the standard method to connect a high speed local area networkvia wireless transmission/receiver. Wi-Fi is convenient for mobile internet users and can bring ser-vices to areas where wiring would be costly.

Web Browser : A web browser is a software that helps the user to navigate the WWW. It is a clientsoftware that allows the user to display and interact with a hypertext document.

Examples : Mosaic, Netscape Navigator, Internet Explorer (IE), Opera, Safari, Mozilla Firefox, GoogleChrome etc.

☛ MOSAIC : Mosaic is the first web browser and was developped by the "National Center forSupercomputing Applications (NCSA)" in 1993.

☛ Netscape Navigator : Netscape Navigator was released in 1994 and is one of the fastest webbrowsers currently available in the market. It is available for UNIX, Windows and Machinatosh plat-forms and has built in e-mail and Newsgroup facilities.

☛ Microsoft Internet Explorer : IE is based on NCSA's MOSAIC and is distributed under a licens-ing agreement with spyglass Inc. This is a shareware software and it is available in various versionsfor various windows products. IE is the default webbrowser for windows operating systems.

Web Server : A web server is a computer program that accepts HTTP requests from web clients andprovides them with HTTP responses. Web server is a place where pages reside. It is also use torefers to the computer that runs the server programs.

Examples : "Internet Information Server (IIS)" from "Microsoft".

"Fast Track" from "Netscape".

"Intranetware" from "Novell".

Search Engine : Search Engines are websites that allows the users to search on keywords orcombination of keywords to provide the information to the user.

Examples : Google, yahoo, Altavista, All myfaves etc.

Cyberspace : This term is used to refer to the computer networks connected to each other and theircommunication. It is often used to refer to the Internet.

Internet chat: Internet chat is a real time synchronous conferencing that is used for group communi-cation as well as one-to-one communication over the Internet. Internet chat software is an interactivesoftware that allows the user to type comments in one window and receives replies in another win-dow.

Web Page : Web pages are created in the HTML format and provide the web users with navigationalabilities through hyperlinks to other webpages on the web. Webpages are resources of information.Webpage is also referred as "Hyper Text Document". A webpage can contain text, ,pictures, audio andvisual etc.

Home page : Home page is the default page of any website. It is the main page of a website.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 13

Page 14: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

14

Web site : A set of webpages (hypertext documents) are known as "Website".

Bookmark: Bookmarks are the links once visited can be saved in the favorites or preferences catego-ries. Bookmarks are usually integrated into browsers. Social bookmarking is a method used by Internetusers to store and manage webpages.

Cookies : Cookies are some little information that can be left on your computer by the other computerwhen we access the Internet. generally, this information is left on your computer by some advertisingagencies on the Internet. Using the information stored in the cookies, these advertising agencies cankeep track of your internet usage.

Blogs : Blogs are the expressions of the common masses about social or political issues or anything.Blogs can often be in the form of creative writeups by writers in different parts of the world.

Newsgroup : A Newsgroup is a discussion about a particular topic consisting of notes written to acentral Internet site and redistributed through usenet. "Usenet" is a worldwide network of news dis-cussion groups. Usenet uses the Network News Transfer Protocol (NNTP).

Instant Messaging (IM) : Instant Messaging (IM) is a form of real time, direct text based chattingcommunication in push mode between two or more people using personal computers or others de-vices, along with shared clients.

Netiquette : It refers to the proper behaviour on a network especially on Internet "Netiquette" term isshort for net etiquitte and refers to the principles of curtesy and consideration for the people using theInternet. It refers to certain basic principles to adhere to while using the Internet.

E-mail communication has certain implied rules of behaviour. The general ethical principles to befollowed in relation to using mailing systems of the Internet are termed as "e-mail etiquette".

CGI (Common Gateway Interface) : CGI is a simple protocol that can be use to communicatebetween webforms and your program.

TELNET : TELNET is use to communicate with other system Logon by the user, in one place toanother place.

Sign-up : Sign-up means creates a new personal Account on the Internet.

Sign-In: Sign-In is a term use to enter into the personal Account.

Sign-Out: Sign-out is a term used to exit from the personal Account.

Logn-In : Log in is a term refers to enter into the website.

Log-Out : Logout is a term refers to exit from the website.

URL (Uniform Resource Locator) : URL specifies the location of a resource on the Internet. URL isunique address for the file that has to be accessed over the Internet.

Protocal Identifier and resource name are seperated by a colon and two forward slashes.

Any link from one document to another document is always implemented by using a URL. A URLcontains information about the location of the document. A URL may point to another HTML documentor an image.

URL is a web addressing scheme that spellsout the exact location of an Internet resources. When the

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 14

Page 15: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

15

user clicks on a link, the browser reads the link to the document. The information about the link isprovided to the browser by URL.

Components of URL :

☛ FTP : To get or send a file to another system on the Internet.

☛ TELNET : To view files in a directory in a system on another network.

☛ HTTP : To get or send information to another system on the Internet.

☛ e-mail : To communicate with a particular person on the Internet.

☛ Newsgroup : To communicate with a group of people in a similar topic.

☛ WWW : To read multimedia documents on the Internet.

☛ Gopher : Search for everything about a specific topic on the Internet.

Internet Protocols : A set of rules and conventions that specify how devices on network exchangeinformation.

Some of the protocols are:

1. Internet protocol (IP)

2. Transmission Control Protocol (TCP)

3. User Datagram Protocol (UDP)

4. Address Resolution Protocol (ARP)

5. Internet Control Message Protocol (ICMP)

6. File Transfer Protocol (FTP)

7. Hyper text Transfer Protocol (HTTP)

8. Simple Network Management Protocol (SNMP)

9. Network File System (NFS)

10. external Data Representation (XDR)

11. Remote procedure Call (RPC)

12. Domain name System (DNS)

13. Simple Mail Transfer Protocol (SMTP)

14. Point-to-point-protocol (PPP)

15. Internetwork Packet Exchange (IPX)

16. sequenced Packet Exchange (SPX)

Hypertext Tranfer Protocol (HTTP) : HTTP is a protocol used on the web to transfer hypertextdocuments (web pages). HTTP is a protocol which helps web client to establish communication withthe webserver. HTTP sends the data in the form of "message". HTTP is a request and responseprotocol between client and server. HTTP is useful for transfering the data in any format such as text,graphgics, images etc.

File Transfer Protocol (FTP) : File Transfer Protocol (FTP) translates the individual files from onesystem to another system on the Internet. FTP sends the data in the form of "packets".

Standard Generalized Markup Language : SGML is a language for defining the markup languages.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 15

Page 16: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

16

SGML defines a document structure using a special grammer called "Document type Definition (DTD).

Hyper Text Markup Language (HTML) : HTML is a scripting language.

HTML is use to create the hypertext documents (web pages).

HTML is the encoding scheme use to create hypertext document.

HTML language is use for describing the text based information on the webpage.

Hyper Text : A piece of text that works as a link.

Markup Language : A language of writing layout information with in documents.

HTML extension is ".html" or ".htm".

HTML is divided into two types.

1. SHTML (Static Hyper Text Markup Language)

2. DHTML (Dynamic Hyper Text Markup Language)

Hypertext Preprocessor (PHP) : Hypertext Preprocessor (PHP), the coding language to createinteractive webpages and so forth.

CSS (Cascading Style Sheets) : While HTML dictates the content of page, CSS regulates the for-mat, including headers, footers, navigation bars etc. While all of these elements can be created inHTML, such a method would have to be repeated on every webpage. CSS on the other hand, isapplied to all pages of a websites.

Download : To transfer information from host computer to a personal computer often through mo-dem.

Upload : To transfer information from personal computer to host computer often through modem.

Upgrade : It refers to the replacement of a new product with the same product.

Companies and Their Founders :

Microsoft Bill gates

Google Sergey Brain and Larrypase (1997)

Yahoo Journeying and David(1994)

Facebook Mark Jukerberg

Apple Steeve Jobbs

Oracle Tim Nerveski

Wikipedia Jimmy Wales

Twitter Bizz Stone

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 16

Page 17: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

17

ELECTRONIC MAIL (e-mail):

Electronic Mail (e-mail) was invented by "John Von Neumann". Electronic Mail transfers the datafrom one system to another system in the form of messages (test), pictures (images), Multi Mediamessages.

An e-mail address normally consistsof four parts.

1. Name of the User

2. "@" Sign

3. 3rd part comes after @ sign and it is the nameof the Service Provider.

4. Domain Name(.com, .net, .in, .org) etc.,)

Example : google @ gmail .com

User Name Domain Name System (DNS)

"@" sign Service Provider

To view an e-mail, you have to use e-mail software is "Outlook Express".

In the e-mail window, you can find "folder Pane" at the left side of the window. It has set of foldersnamed as Composed mail, Inbox, Out Box, Sent Items, Drafts, Trash, Spam etc.,

* Inbox is used to store incoming mail.

* Outbox is use to store outgoing mail before it is sent.

* Sent Items is use to store mail that has already been sent.

* Deleted Items (Trash) is use to store deleted mail upto 30 days.

*. Draft folder is use to store mail that is not yet complete.

* Spam is use to store the unsolicited bulk e-mail upto 30 days.

* Compose Mail is use to create a new mail.

� To : To type the e-mail address of the person to whom you want to send a mail in this box.

� Subject : To type a few words about the subject of the letter you want to write.

� CC (Carbon Copy) : To type the e-mail address of the other receipients in this box, eachaddress is seperated by a comma (,). When you complete the mail and click the "Send" button, thenthe mail will automatically be sent to all the receipients. Here, all the receipients will know who theother receipients are.

� BCC ( Band Carbon Copy) or (Blind Curtesy Copy) : If you don't want them to know who elsehave received copies, you can type the addresses in the BCC text box. In this case, only you (thesender) will know the identity of all the receipients of mail.

� Reply : You can send your reply using the same window. The subject box will have the samesubject, but with the words "Re:" before it.

� Forward : You can send the forward message using the same window. The subject box willhave the same subject, but with the words "Fwd:" before it.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 17

Page 18: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

18

COMPUTER SECURITY

Security : Security controls access to data in files and permits only authorized use of terminalsand other equipments. Control is usually through various levels of passwords assigned on thebasis of need to know.

Typical approaches to improving Computer security can include the following :

☛ Physically limit access to computers to only those who will not compromise security.

☛ Hardware Mechanisms that impose rules on computer programs, thus avoiding depending oncomputer programs for computer security.

☛ Operating system Mechanisms that impose rules on programs to avoid trusting Computer Pro-grams.

☛ Programming strategies to make computer programs dependable and resist subversion.

Security Tools :

Firewall : A firewall is a set of related programs, located at a network gateway server, that protects theresources of a private network from users of other networks. Firewall can either be hardware devicesor software programs. They provide protection from Online intrusions. A firewall is designed to pre-vent unauthorized Internet users from accessing your computer. All messages entering your Com-puter from the Internet pass through the firewall which examines each message. The firewall blocksany messge that was not specifically requested by your system.

Encryption : It can be used to protect the message from unauthorized users. It can be done inseveral ways by switching the characters around, replacing characters with others, and even remov-ing characters from the message.

Cryptographic Techniques : It can be used to defend data in transit between systems reducing theprobability that data exchanged between systems can be intercepted or modified. Securecryptoprocessors can be used to leverage physical security techniques into detecting the security ofthe system. Strong authentication techniques can be used to ensure that communication end-pointsare who they say they are.

Intrution - Detection - System : It can be scan a network for people that are on the network but whoshould not be there oraredoing things that they shouldnotbedoing. For example trying a lot of pass-words to gain access to the network.

Pinging : The Ping application can beusedby potential crackers to find if an IP address is reachable.If a cracker finds a computer they can try a port scan to detect and attack services on that computer.

Anti-Virus Software : Anti-virus software consists of computer programs that attempt to identify,thwart and eliminate computer viruses and other malicious software (Malware). The term "Antivirus"isused because it is designed exclusively to combat computer viruses.

Antivirus software typically usestwo different approaches to accomplish this:

☛ Examining (Scanning) files to look for known viruses matching definitious in a virus dictionary.

☛ Identifying suspecious behaviour from any computer program which might indicateinfection : S

VIRUS (Vital Information Resource Under Siege) : VIRUS full form is "Vital Information ResourceUnder Siege". A computer virus is a computer program that spreads by inserting copies of itself intoother executablecode or documents. Virus program that runs on your computer without your knowl-edge and can cause damage to your files. A common way to receive a virus is through an attachmentvia e-mail.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 18

Page 19: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

19

Worm : Worm is a self-replicating program. It replicates itself to new computers using the flaws andthen begins scanning and replicating again. The difference between a virus and worm is that a wormdoes not create copies of itself on one system. It propagates through computer networks.

Trojan Horse : It is a program in which malicious or harmful code is contained inside apparentlyharmless programming or data in such a way that it can get control and do its chosen form of dam-age. Trojan Horses cannot replicate automatically. A Trojan horse can be used to setup a back door ina computer system so that the intruder can return later and gain access.

Malware (Malicious Software) : It is a software designed specifically to damage or disrupt a systemsuch as a virus or Trojan horse.

Spyware : Spyware is a software that performs actions such as advertising, collecting personal data,orchanging the configuration of your computer, usually without obtaining your consent. Spyware thatdisplays advertisements and tracks your personal information is known as "Adware".

Spam : E-mail spam also known as "Junk e-mail" or "Unsolicited Bulk e-mail (UBE), is a subset ofspam that involves nearly identical messages sent to numerous receipients by e-mail.

Phishing : Phishing is a fraudulent activity of acquiring the sensitive information by the use of a fakeidentity during electronic communication.

Spoofing : It occurs when the sender of an e-mail message pretends to be someone else, theyfalsely manipulate the "From" field in an e-mail. This is usually done to make you release sensitiveinformation.

Key loggers : Key logger is a software program designed to record (log) everykeystroke on themachine on which it runs. Key logger is also known as "Key Stroke logger" or "System Monitor".

Packet Sniffer : A packet sniffer is an application that captures TCP/IP data packets, which canmaliciously be used to capture passwords and other data while it is in transit either within the com-puter or over the network.

Root Kit : A root kit is a computer program that enable administrator - level access to a computer orcomputer network. A cracker installs a root kit on a computer after first obtaining user-level access,either by exploiting a known vulnerability or cracking a password. Once the root kit is installed, it allowsthe hacker to mask intrusion and gain root or privileged access to the computer.

Cyber crime: It contains all criminal offences which are committed with the aid of communicationdevices in a network. Example are :

☛ Unauthorized access, malicious code, and denial-of-service attacks.

☛ Theft of service and certain financial frauds.

☛ Spamming and copyright crimes, particularly those facilitated through peer-to-peer networks.

☛ Hacking, phishing, identify theft, child pronography, online gambling securities fraud.

Hacking : Hacking is the activity of programmatically gaining access to a computer application that isotherwise in accessible. The act of gaining an unauthorised access to a computer is known as "Hack-ing".

Hacker : A Hacker is someone involved in computer security specializing in the discovery of exploitsin systems orin obtaining or preventing unauthorized access to systms through skills, tactics anddetailed knowledge.

Polymorphic Virus : A polymorphic virus modifies its program code each time it attaches itself toanother program or file.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 19

Page 20: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

20

SHORT CUT KEYS

Ctrl + A = Select All

Ctrl+B = Bold

Ctrl+C = Copy

Ctrl+D = Font (MS-Word) (or) Down (Ms-Excel) (or) DuplicateSlide (PPT)

Ctrl+E = Center Allignment

Ctrl+F = Find(search)

Ctrl+G = Goto

Ctrl+H = Replace (Find and Replace)

Ctrl+I = Italic

Ctrl+J = Justify

Ctrl+K = Hyperlink

Ctrl+L = Left Alignment

Ctrl+M = Tab (Left Indent)

Ctrl+N = New

Ctrl+O = Open

Ctrl+P = Print

Ctrl+Q = Remove formating Programme (or) Exit

Ctrl+R = Right Alignment

Ctrl+S = Save

Ctrl+T = Tab(Left Indent)

Ctrl+U = Underline

Ctrl+V = Paste

Ctrl+W = Close Window

Ctrl+X = Cut

Ctrl+Y = Redo (Repeat typing)

Ctrl+Z = Undo

Ctrl+Right Arrow = Move the insertion point to the beginning of the next word

Ctrl+Left Arrow = Move the insertion point to the beginning of the previousword.

Ctrl+Down arrow = Move the insertion point to the beginning of the nextparagraph.

Ctrl+Up arrow = Move the insertion point to the beginning of the previousparagraph.

Ctrl+Esc = Display the start menu

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 20

Page 21: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

21

Ctrl+Tab = Move forward through the tabs.

Ctrl+Shift+Tab = Move backward through the tabs

Ctrl+Shift+Esc = Open Task Manager

Ctrl+F5 = Restore the active console window

Ctrl+F10 = Maximize the active console window.

Ctrl + F2 (or) Ctrl+Alt+I = Print Preview

Ctrl+Alt+N = Normal View

Ctrl+Alt+O = Outline view

Ctrl+Alt+P = Page Layout View

Ctrl+Home = Move to thefirstcharacter

Ctrl+End = Move to thelast character

Ctrl+} (or) Ctrl+Shift+> (or) Ctrl ++ = Increase the font size

Ctrl+{ (or) Ctrl+Shift+< (or) Ctrl +- = Decrease the font size

Ctrl +F9 = Minimize the active console window.

Ctrl+Enter = Page break.

Shift+Delete = Delete the selected item permanently without placing theitem in the Recycle bin.

Shift + F10 = Display the shortcutmenu for the selected item.

Shift+Tab = Movebackward through the options.

Tab = Move forward through the options

Enter = Linebreak (or) perform thecommand for the activeoption

End = Move to the end of the line.

Home = Move to the beginning oftheline.

Windows Logo = Display or hide start menu.

Windows Logo + Break = Display the system properties dialog box.

Windows Logo + D = Display the Desktop.

Windows Logo + M = Minimize all of the Windows.

Windows Logo + E = Open My Computer

Windows Logo + F = Search for a file or a folder

Windows Logo + L = Lock the Key Board

Windows Logo + R = Open the Run dialog Box.

Windows Logo + U = Open Utility Manager.

Windows Logo + F1 = Display Windows Help.

Windows Logo + Shift + M = Restore the minimized windows.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 21

Page 22: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

22

Windows Logo + Ctrl + F = Search for computers

Alt + F = Fle Menu

Alt + E = Edit Menu

Alt + V = View Menu

Alt + I = Insert Menu

Alt + O = Format Menu

Alt + T = Tools Menu

Alt + Space + X = Maximize

Alt + Space + N = Minimize

Alt + F4 = To close the correct working application

or

To shutdown the system.

Alt + F8 = Macros

Alt + I + R = To insert Row

Alt + I + C = To Insert Column

Alt + Space + R = Restore

Alt + Space = Open the shortcut menu for the active window.

Alt + Enter = Display the properties of the selected object.

Alt + Home = Display the Start Menu.

Alt + Delete = Display the Windows menu

Alt + Tab = Switch from one open program to another on yourtaskbar.

Alt + Down Arrow = Will open a drop down list box.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 22

Page 23: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

23

ABBREVIATIONS

AC = Accumulator (or) Alternating Current

ACK = Acknowledge Character

A/D = Analog to Digital

ADO = Active X Data Objects.

ADCCP = Advanced Data Communication Control Procedure

ADP = Automatic Data Processing.

ADSL = Asymmetric Digital Subscriber Line.

ADT = Abstract Data type

AGP = Accelerated Graphic Port.

AI = Artificial Intelligence

AJAX = Asynchronous Java Script and XML

ALGOL = Algorithmic Language

ALU = Arithmetic and Logical Unit

AM = Amplitude Modulation (or) Accounting Machine (or)

Access Mechanism.

AMD = Advanced Micro Devices.

ANSI = American National Standards Institute.

AP = Attached Processor

APDOS = Apple Disc Operating System

API = Application Programming Interface.

APL = A programming Language

ARM = Advanced RiSC Machines.

ARPANET = Advanced Research Projects Agency Network.

ASCII = American Standard code for Information Interchange

ASK = Amplitude Shift keying.

ASP = Application Service Provider

ASR = Automatic Send and Receive.

AT = Access Time

ATDM = Asynchronous Time Division Multiplexing.

ATM = Automated Teller Machine (or) Asynchronous TransferMode

AU = Arthmetic Unit

AVI = Audio Video Inter leaved.

B2B = Business - to - Business

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 23

Page 24: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

24

B2C = Business - to - Customer

BAL = Basic Assembly Langauge.

BASIC = Beginer's All-Purpose Symbolic Instruction Code.

BCM = Binery Coaded Memory

BDOS = Basic Disc Operating System

BINAC = Binary Automatic Computer

BIND = Berkeley Internet Name Daemon

BIOS = Basic Input Output System

BIS = Business Information System

BIT = Binary Digit

BOOTP = Bootstrap Protocol

BPI = Bytes Per Inch

BPS = Bits Per Second

BROM = Bipolar Read only Memory

BSAM = Basic Sequential Access Method

BSC = Binary Synchronous Communications

CAD = Computer - Aided Design

CAE = Computer - Aided Engineering

CAI = Computer - Aided Instruction

CAID = Computer - Aided Industrial Design

CAL = Computer - Aided Learning

CAM = Computer - Aided Manufacturing (or) Computer AddressMemory

CAQ = Computer - Aided Quality Assurance

CAR = Computer - Aided Reporting

CARD = Computer - Aided Rule Definition

CASE = Computer - Aided Software Engineering

CAT = Computer - Aided Translation

CDE = Computer - Desktop Environment

CDAC = Centre For Development of Advanceed Computing

CDMA = Code Division Multiple Access

CD-R = CD-Recordable

CD-ROM = CD Read-only Memory

CD-RW = CD-Rewritable

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 24

Page 25: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

25

CDSA = Common Data Security Architecture

CERT = Computer Emergency Response Team

CGA = Color Graphics Adapter

CGI = Computer Graphics Interface

CICS = Computer Information Control system

CIM = Computer Input Microfilm

CISC = Complex Instruction Set Computer

CLI = Command Line Interface.

CLIP = Computer Language Information Processing

CML = Computer Managed Learning

CMOS = Complementory Metal - Oxide Semiconductor.

CNC = Computer Numerical Control

COBOL = Common Business - Oriented Language

COM = Component Object Model

CORAL = Class Oriented Ring Associated Language

CORBA = Common Object Request Broker Architecture.

CPS = Character Per Second

CPU = Central Processing Unit.

CRC = Cyclic Redundancy Check

CRM = Customer Relationship Management.

CROM = Control Read Only Memory.

CRT = Cathode Ray Tube.

CRUD = Create, Read, Update and Delete

CSE = Computer Science and Engineering

CSI = Common System Interface.

CT = Computerized Tomography.

CTC = Channel to Channel

CTCP = Client - To - Client Protocal Programing Language.

DAD = Direct Access Devices

DAT = Digital Audio Tape.

DASD = Direct Access Storage Device

DBA = Database Administrator.

DBMS = Database Management System.

DCE = Data Communications Equipment

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 25

Page 26: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

26

DCOM = Distributed Component Object Model

DDE = Dynamic Data Exchange

DDP = Distributed Data Processing

DDR = Double Data Rate

DHTML = Dynamic Hypertext Markup Language.

DLC = Data Link Control

DLL = Dynamic Link Library

DMA = Direct Memory Access.

DMP = Dot Matrix Printer

DND = Drag - and - Drop

DNA = Digital Network Architecture

DNS = Domain Name System

DOS = Disk Operating System

DPI = Dots Per Inch

DTP = Desktop Publishing

DPM = Data Processing Manager

DPS = Data Processing System.

DRAM = Dynamic Storage Area

DR-DOS = Digital Research - Disk Operating System.

DSA = Dynamic Storage Area

DSL = Digital Subscription Line (or)

Domain - Specific Language.

DTE = Data Terminal Equipment

DTR = Data Terminal Read

DVD = Digital Versatile Disk (or) Digital Video Disk

DVI = Digital Visual Interface.

DVR = Digital Video Recorder.

EBCDIC = Extended Binary Coded Decimal Interchange Code.

ECOM = Electronic Computer Oriented Mail

EDI = Electronic Data Interchange

EDP = Electronic Date Processing

EDS = Exchangeable Disk Store.

EDSAC = Electronic Delay Storage Automatic Calculator

EDVAC = Electronic Discrete Variable Automatic Computer.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 26

Page 27: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

27

EEPROM = Electronically Erasable Programmable Read-OnlyMemory

EGA = Enhanced Graphics Array

EGP = Exterior Gateway Protocol

EISA = Extended Industry Standard Architecture.

ENIAC = Electronic Numerical Integrator and Calculator

EPROM = Erasable Programmable Read - Only Memory.

ERP = Enterprise Resource Planning.

EXT = Extended File System

F = F

FAQ = Frequently Asked Questions

FDD = Floppy Disk Drive

FDMA = Frequency - Division Multiple Access.

FIFO = First In - First Out.

FLOPS = Floating - Point Operations Per Second.

FM = Frequency Modulation.

FORTRAN = Formula Translation.

FTP = File Transfer Protocol

FXP = File Exchange Protocol

GAL = Global Address List

GDI = Graphics Device Interface.

GIF = Graphics Interchange Format.

GIGO = Garbage In, Garbage Out.

GIS = Geographic Information System

GPRS = General Packet Radio Service

GPU = Graphics Processing Unit.

GSM = Global System for Mobile Communications.

GUI = Graphical User Interface.

GUID = Globally Unique Identifier.

HAL = Hardware Abstraction Layer.

HDD = Hard Disk Drive

HDL = Hardware Description Language

HTML = Hypertext Markup Language

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 27

Page 28: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

28

HTTP = Hyper Transfer Protocol

IBM = International BusinessMachines

IC = Integrated Circuit

ICMP = Internet Control Message Protocol

IDE = Integrated Drive Electronics

IEEE = Instituteof Electrical and Electronics Engineers

IETF = Internet Engineering Task Force

IDP = Integrated Data Processing

IIS = Internet Information Services

IMMP = Internet Merge Mail Process

IP = Internet Protocol (or) Intellectual Property.

IPS = Instructions Per Second

ISDN = Integrated Services Digital Network

ISO = International Standard Organization

ISP = Internet Service Provider

ITU = International Telecommunication Union

JAR = Java Archive

JIT = Just-In-Time

JPEG = Joint Photographic Experts Group

JRE = Java Runtime Environment

JSP = Java Server Pages

JVM = Java Virtual Machine

KBPS = Kilo Byte Per second

KRL = Knowledge Representation Language

LAN = Local Area Network

LAP = Link Access Protocol

LCD = Liquid Crystal Display

LED = Light Emitting Diode

LIFO = Last In, First Out.

LISP = List Processing

LPI = Lines Per Inch

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 28

Page 29: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

29

MAC = Media Access Control

MAN = Metropolitan Area Network

MAR = Memory Address Register

MBPS = Mail Bits per Second

MDA = Mail Delivery Agent

MDI = Multiple Document Interface

MIB = Management Information Base

MICR = Magnetic Ink Character Recognition

MIDI = Musical Instrument Digital Interface

MIMD = Multiple Instruction, Multiple Data

MIMO = Multiple-Input Multiple-output

MIPS = Million Instructions Per Second

MIS = Management Information Systems

MOBO = Mother Board

MODEM = Modulator-Demodulator

MOPS = Mega Operations Per Second

MPEG = Motion Pictures Experts Group

MS-DOS = Microsoft Disk Operating System

MUMPS = Multi-User Multi-Programming System

NAC = Network Adaptor Card

NFS = Network File System

NIC = Network Interface Controller

NNTP = Network NewsTransfer Protocol

NOS = Network Operating System

NSA = Network Security Agency

NTFS = Network Technology File System

NTP = Network Time Protocol

NUMA = Non-Uniform Memory Access

NVR = Network Video Recorder

NVRAM = Non-Volatile Random Access Memory

OASIS = Organization for the Advancement of StructuredInformation Standards

OCR = Optical Charactor Recognition/Reader

OLTP = Online Transaction Processing

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 29

Page 30: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

30

OMR = Optical Mark Recognition/Reader

OOPL = Object Oriented Programming Language

OOPS = Object Oriented Programming System

OPS = Operations Per Second

OSDN = Open Source Developer Network

PABX = Private Automatic Branch Exchange

PAN = Personal Area Network

PBX = Private Branch Exchange

PC = Personal Computer (or) Program Counter

PCB = Printed Circuit Board

PCI = Peripheral Component Interface

PDA = Personal Digital Assistant

PDF = Portable Document Format

PERL = Practical Extraction and Reporting Language

PHP = Hypertext Preprocessor

PIM = Personal Information Manager/Management

PIN = Personal Identification Number

PIO = Programmed Input/Output

PIOCS = Physical Input/Output Control System

PKCS = Public Key Cryptography Standards

PLU = Primary Logical Unit

PMS = Project Management System

PNG = Portable Network Graphics

PnP = Plug-and-Play

POP = Point Of Presence

POP3 = Post Office Protocol V3

POS = Point-of-Sale

POST = Power-On Self Test

PPI = PixelsPer Inch

PPP = Point-to-Point Protocol

PROLOG = Programming in Logic

PROM = Programmable Read Only Memory

PSS = Packet Switched Stem

QA = Quality Assurance

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 30

Page 31: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

31

RAD = Rapid Application Development

RAID = Redundant Array of Independent Disks

RAIT = Redundant Array of Inexpensive Tapes

RAM = Random Access Memory

RAS = Remote Access Service

RDBMS = Relational Data Base Management System

RDOS = Real-time Disk Operating System

RDS = Remote Data Services

RFI = Radio Frequency Interference

RFID = Radio Frequency Identification

RISC = Reduced Instruction Set Computer

ROM = Read Only Memory

RPM = Revolutions Per Minute

RTOS = Real-Time Operating System

SAN = Storage Area Network

SBCS = Single Byte Character Set

SCSI = Small Computer System Interface

SDN = Service Delivery Network

SDRAM = Synchronous Dynamic Random Access Memory

SFTP = Simple File Transfer Protocol

SIM = Subscriber Identity Module

SIMD = Single Instruction Multiple Data

SIMULA = Simulation Language

SIP = Session Initiation Protocol

SISD = Single Instruction, Single Data

SISO = Single-Input and Single-Output

SMIL = Synchronized Multimedia Integration Language

SMS = Short Message Service (or) System Management Server

SMT = Simultaneous Multi-Threading

SMTP = Simple Mail Transfer Protocol

SNA = System Network Architecture

SNOBL = String Oriented Symbolic Language

SOAP = Simple Object Access Protocol

SQL = Structured Query Language

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 31

Page 32: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

32

SRAM = Static Random Access Memory

SRU = Shared Resource Unit

SSI = Small Scale Integration

SVG = Scalable Vector Graphics

SVGA = Super Video Graphics Array

SWT = Standard Widget Toolkit

TCL = Tool Command Language

TCP = Transmission Control Protocol

TCU = Telecommunication Control Unit

TDMA = Time Division Multiple Access

TPI = Tracks Per Inch

TRON = The Real-time Operating System Nucleus

TSIOA = Temporary Storage Input/Outpur Area

UART = Universal Asynchromous Receiver Transmitter

UDDI = Universal Description, Discovery, and Integration

UML = Unified Modeling Language

UNIVAC = Universal Automatic Computer

UPS = Uninterruptible Power Supply

URI = Uniform Resource Identifier

URL = Uniform Resource Locator

URN = Uniform Resiource Name

USB = Universal Serial Bus

UTF = Unicode Transformation Format

UUID = Universally Unique Identifier

UVC = Universal Virtual Computer

VAN = Value Added Network

VAX = Virtual Address eXtension

VBA = Visual Basic for Application

VDAC = Video Digital Analog Converter

VDI = Video Display Interface

VDSL = Very High Bitrate Digital Subscriber Line

VDU = Visual Display Unit

VESA = Video Electronics Standards Association

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 32

Page 33: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

33

VGA = Video Graphics Array

VGC = Video Graphics Controller

VGM = Video Graphics Monitor

VIRUS = Vital Information Resource Under Siege

VLAN = Virtual Local Area Network

VLSI = Very Large Scale Integration

VMS = Virtual Management System

VOIP = Voice Over Internet Protocol

VOU = Video Output Unit

VPN = Virtual Private Network

VPU = Visual Processing Unit

VRML = Virtual Reality Modeling Language

VSAM = Virtual Storage Access Method

VSAT = Very Small Aperture Terminal

VTAM = Virtual Telecommunications Access Method

VTOC = Volume Table of Contents

VTP = Virtual Terminal Protocol

WAN = Wide Area Network

WAP = Wireless Application Protocol (or) Wireless Access Point

WATM = Wireless ATM

WATS = Wide Area Telecommunications Service

WBEM = Web-Based Enterprise Management

Wi-Fi = Wireless Fidelity

WiMAX = Worldwide Interoperability forMicrowave Access

WINS = Windows Internet Name Service

WLAN = Wireless Local Area Network

WORM = Write Once, Read Many

WPAN = Wireless Personal Area Network

WUSB = Wireless Universal Serial Bus

WWAN = Wireless Wide Area Network

WWW = World Wide Web

WYSIWYG = What You See Is What You Get

XAML = eXtensible Application Markup Language

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 33

Page 34: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

34

XHTML = eXtensible Hypertext Markup Language

XML = eXtensible Markup Language

XMS = eXtended Memory Specification

XMPP = eXtenssible Messaging and Presence Protocol

XSL = eXtensible Stylesheet Language

ZISC = Zero Instruction Set Computer

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 34

Page 35: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

35

MS - OFFICE

Microsoft Office is a non-free commercial office saite of different programs that allows you tocreate documents, spread sheets, presentations, posters, send electronic mail. MS-Office servicesfor the Microsft Windows and Mac OS X operating systems, introduced by Microsoft in August 1,1989.

The first version of MS-Office contained Microsoft Word, Microsoft Excel, and Microsoft Powerpoint.Over the years, MS-Office applications have grown substantially closer with shared features such asa common spell checker, OLE data integration and Microsoft Visual Basic for Applications Scriptinglanguage.

The current versions are "MS-Office 2010" for Windows, (2013) released on June 15, 2010. It isalso known as "Version 14.0".

The current versions are "MS-Office 2011" for MAC OS X, released on October 26, 2010.

Components of MS-Office :

Word : Microsoft Word is a word Processor and was previously considered the main program inoffice. It is available for the Windows and Mac platforms. The first version of Word, released in theautumn of 1983, was for the MS-DOS operating. Word is used to create text documents like papers,outlines, and bibliographics.

Excel : Microsoft Excel is a spreadsheet program that originally competed with the dominant Lotus 1-2-3, but eventually out sold it. It is available for the Windows and Mac platforms. Microsoft released thefirst version of Excel for the Windows in November 1987. Excel is used to create spreadsheets,charts, tables, and graphs.

Power Point : Microsoft Power Point is a pouplar presentation Program for Windows and Mac. It isused to create slideshows, composed of text, graphics, video and audio with pretty backgrounds.

Access : Microsoft Office Access Previously known as Microsoft Access, is a relational databasemanagement system from Microsoft that combines the relational Microsoft Jet Database Engine witha graphical user interface and software development tools. MS-Access stores data in its own formatbased on the Access Jet Database Engine. It can also import or link directly to data stored in otherapplications and databases. MS-Access is used to create databases, manage large quantities ofinformation, and create reports.

Outlook: Microsoft-Outlook is a personal information manager and e-mail communication software.It includes an e-mail client, calendar task manager and address book.

Publisher : Microsoft Publisher is used to create visual print materials such as posters, brochuresand newsletters.

Front Page (HTML Editor-Web design) : It is used to create websites.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 35

Page 36: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

36

MS - OFFICE WORD

Word Processor is a software package that enables you to create, edit, print and save docu-ments for future retrieval and reference. One of the main advantage of a word processor over aconventional typewriter is that a word processor enables you to make changes to a document withoutretyping the entire document. Editing a document involves correcting the spelling mistakes, if any,deleting or moving words sentences or paragraphs.

Examples of Word Processing Packages are Softword, Word Star, Word perfect, Microsoft Word,Text Maker, Wordpad, Google docs etc.

Features of Word Processor :

☛ Text is typing into the computer, which allows alterations to be made easily

☛ Text or paragraphs can be copied/moved throughout the document.

☛ Words and sentences can be inserted or deleted.

☛ Spelling can be checked and modified through the spell check facility.

☛ Multiple files/documents can be merged.

☛ Margins and page Length can be adjusted as desired.

☛ Multiple copies of letters can be generated with different address through the mail-merge facility.

Important Components of MS-Word :

1. Title Bar : The Title Bar displays the name of the currently addresses active document. It is alsodisplays the minimize, maximize and close buttons.

2. Menu Bar : The Menu Bar displays at the top of the screen. The main menu further displays a submenu. At any time, only highlighted options can be executed, faded options are not applicable.

3. Tool Bar : Too Bar helps to perform a task faster and with great ease. The most commonly toolbars are formatting tool bar and the standard tool bar. At any point of time, any tool bar can bemade ON or OFF through the tool bar option of view menu.

☛ Standard Toolbar : The standard Toolbar has buttons for commonly performed tasks like save,cut, copy, paste, print, sorting and adding a column of numbers etc.

☛☛☛☛☛ Formatting Toolbar : The Formatting Toolbar has buttons for various formatting operations likebold, italic, underline, left alignment, centre alignment, right alignment and changing text size orstyle etc.

4. Ruler Bar : The Ruler Bar allows you to format the vertical alignment of text in a document.

5. Scroll Bar : The scroll Bar helps you scroll the content or body of document by click in on thebuttons with the arrow marked on them to move up and down and left and right of a page.

There are two Scroll Bars :

☛ Horizontal Scroll Bar.

☛ Vertical Scroll Bar.

6. Status Bar : The Status Bar displays information about the currently active document like pagenumber, column number, line number of the cursor position.

7. Workspace : The Workspace is the actual working area of the document. It is the area in thedocument window were you enter/type the text of your document.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 36

Page 37: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

37

Menu Bar Options :

� File Menu : � Edit Menu

☛ New (Ctrl+N) ☛ Undo (Ctrl+Z)

☛ Open (Ctrl+O) ☛ Redo (Ctrl+Y)

☛ Recent Documents ☛ Repeat (Ctrl+Shift+Y)

☛ Close ☛ Cut (Ctrl+X)

☛ Save (Ctrl+S) ☛ Copy (Ctrl+C)

☛ Save As (Ctrl+Shift+S) ☛ Paste (Ctrl+V)

☛ Save All ☛ Paste Special (Ctrl+Shift+V)

☛ Reload ☛ Select Text (Ctrl+Shift+I)

☛ Versions ☛ Select All (Ctrl+A)

☛ Export ☛ Find & Replace (Ctrl+H)

☛ Exports as PDF ☛ Auto Text (Shift+F3)

☛ Send ☛ Fields

☛ Properties ☛ Index Entry

☛ Templates ☛ Hyperlink (Ctrl+K)

☛ Page Preview ☛ Object

☛ Print (Ctrl+P)

☛ Printer Settings

☛ Exit (Ctrl+Q)

� View Menu : � Insert :

☛ Print Layout ☛ Manual Break

☛ Page break prieview ☛ Fields

☛ Taskpane ☛ Special character

☛ Toolbars ☛ Formatting Mark

☛ Formula Bar ☛ Section

☛ Status Bar ☛ Footnote/Endnote

☛ Header & Footer ☛ Caption

☛ Comments ☛ Bookmark

☛ Custom Views ☛ Cross-Reference

☛ Full Screen (Ctrl+Shift+J) ☛ Note (Ctrl+Alt+N)

☛ Zoom ☛ Script

☛ Indexes and Tables

☛ Envelope

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 37

Page 38: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

38

☛ Frame

☛ Table (Ctrl+F12)

☛ Horizontal Ruler

☛ Picture

☛ Object

� FORMAT : � TABLE :

☛ Default Formatting ☛ Insert

☛ Character ☛ Delete

☛ Paragraph ☛ Select

☛ Bullets and Numbering ☛ Merge Cells

☛ Page ☛ Split Cells

☛ Change Case ☛ Protect Cells

☛ Columns ☛ Merge Table

☛ Sections ☛ Split Table

☛ Styles and Formatting (F11) ☛ Auto Format

☛ Auto Correct ☛ Autofit

☛ Anchor ☛ Heading rows repeat

☛ Wrap ☛ Convert

☛ Alignment ☛ Sort

☛ Arrange ☛ Formula (F2)

☛ Flip ☛ Number Format

☛ Group ☛ Table Boundaries

☛ Object ☛ Table Properties

☛ Picture

� TOOLS : � WINDOW :

☛ Spelling and Grammer (F7) ☛ New Window

☛ Language ☛ Close Window (Ctrl+W)

☛ Word Count

☛ Outline Numbering

☛ Line Numbering

☛ Footnotes/End notes

☛ Gallery

☛ Media Player

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 38

Page 39: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

39

☛ Bibliography Database � HELP :

☛ Mail Merge Wizard ☛ Open Offie Org Help (F1)

☛ Sort ☛ What's This?

☛ Calculate (Ctrl ++) ☛ Get Help Online

☛ Update ☛ Translate This Application

☛ Macros ☛ Report a Problem

☛ Extension Manager ☛ About Open Office. Org

☛ XML Filter Settings

☛ Auto Correct Options

☛ Customize

☛ Options

Formatting : There are two ways of formatting a document.

☛ Auto Formatting : MS-Word analyzes the selected texts and it applies the relevant formats.

☛ Customized Formatting : You can also format each and every element such as character, margins etc. Yourself by choosing customized formatting.

Customized Formatting is divided into three types :

1. Character Formatting : Bold, Italic, Underline, Drop Caps, subscripts and Superscripts

2. Line Spacing : Single Line Spacing, Double Line Spacing

3. Alignment : Left-alignment, Right-alignment, Centre-alignment and Justification

Mail Merge : Mail Merge is the process of transferring selected information from one document toanother document. For example, sending a document or letter to many persons who reside at differ-ent locations. The letters may contain the address of each receipient, in addition to the standardinformation contained in the letter. One way of doing this is to print the letters bechanging the address each time in the document after printing such a letter. But this would mean a lotof effort and time and also results in bad organisation. Such problems are taken care of by the MailMerge facility.

Page Break : Page Break is also known as "automatic or soft page break". To insert and remove HardPage Break (User defined Page break), bring the cursor to the insertion point where you want thepage break. Choose "Break" from the "Insert" menu bar or press "Ctrl+Enter".

Types of Page Margins : 1. Left Margin

2. Right Margin

3. Top Margin

4. Bottom Margin

Default left margin in MS-Word document is "1.25".

Gutter Margin : A margin that is added to the binding side of page when printing is known as "GutterMargin".

☛ "Winword.exe" file is used to start MS-Word.

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 39

Page 40: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

40

MS - OFFICE EXCEL

Spread Sheet : Spread Sheet consists a standard grid, which may be scrolled and zoomed. Text,numeric or date values or formulas may be entered into the selected cell through the formula bar atthe top of the screen.

Features of Spread Sheet : 1. Cell Formatting

2. Multiple Worksheets

3. Searching & Sorting

4. Import/Export

5. Functions

6. Charts

Examples of Spread sheet are MS-Excel, Kspread, Lotus 1-2-3 etc.

MS-Excel : MS-Excel is a windows spreadsheet application. It is quite useful in entering, editing,analysis and storing of data.

Features of MS-Excel :

1. Auto Format : To choose many preset table formatting options.

2. Auto Sum : To add the contents of a cluster of adjacent cells.

3. Auto Fill : To fill cells with repetitive or sequential data.

4. List Auto Fill : It automacally extends cell formatting when a new item is added to the end of a list.

5. Wizard : It guides to work effectively while you work by displaying various helpful tips and techniques based on what you are doing.

6. Charts : This feature helps in presenting a graphical representation of your data in the form of Pie,Bar, Line charts.

7. Auto Shapes Toolbar : This feature helps to draw a number of geometrical shapes, arrows,flowchart elements, stars and more.

8. Pivot Table : It flips and sums data in seconds and allows you to perform data analysis andgenerating reports like periodic financial statements, statistical reports etc.

Components of the Excel Window :

Active Cell : Present working cell in a MS-Excel document. It has a dark border around it to indicateyour present position in the worksheet. Click the mouse on a cell to make it active.

Cell : The intersection of a row and a column is called as "Cell".

Name box: The name box displays the reference of the selected cell.

Formula bar : Formula bar is used to enter and edit worksheet data. The contents of the active cellalways appear in the formula bar. The Formula bar is located under the toolbar at the top of the Excelworksheet.

Worksheet Tabs : An Excel workbook consists of multiple worksheets. Use the Worksheet tabs atthe bottom of the screen to navigate between worksheet within a workbook.

Fill handle : The lower right corner of the active cell has a small box called "Fill handle". The FillHandle helps you copy data and create services of information. Your Mouse changes to a cross-hair

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 40

Page 41: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

41

when you are on the Fill Handle. For example, if you type sunday in the active cell and then drag the FillHandle over five cells, Excel automatically inserts monday, tuesday etc.

Page break : To set page break within the worksheet, select the row you want to appear just belowthe page break by clicking the row's label.

Merged Cells : Combine two or more cells together and formatting one big cell is known as "Mergingof Cells"

Cell References : Each cell of the worksheet has a unique reference. For example, K7, refers to thecell containing column number "K" and row number "7".

Wrapper Text : It gives you the ability to put a lot of information into one cell without "Spilling over" intoan adjacent cell.

Charts : Charts help you display data in more meaning full way. We can use the chart wizard tocreate a chart and we can use the chart Type command to change an existing chart. The availablechart types are column charts, Bar Charts, Line Charts, Pie charts, XY charts, Stock charts, areacharts, grant charts, histograms etc.

Key Board Shortcuts in Excel :

☛ Ctrl + 0 = Hide column

☛ Ctrl + 1 = Format Menu

☛ Ctrl + 2 = Bold

☛ Ctrl + 3 = Italics

☛ Ctrl + 4 = Underline

☛ Ctrl +5 = Strike through

☛ Ctrl + 9 = Hide Row

☛ Ctrl + ; (Semicolon)= To enter the date

☛ Ctrl + : (Colon) = To enter the time.

☛ Ctrl + Pageup or Page Down = To move between worksheets

☛ Ctrl + Shift + " (Quotation Mark) = Copy the value from the cell above the current cell.

☛ Ctrl + '(Apostrophe)= Copy the formula from the cell above the current cell.

☛ Ctrl + Shift + $ = Currency Format

☛ Ctrl + Shift + ~ = General Number Format

☛ Ctrl + Shift + ! = Comma Number Format

☛ Ctrl + Shift + % = Percentage Number format

☛ Ctrl + Shift + ) = Unhide Column

☛ Ctrl + Shift + ( = Unhide Row

☛ Alt + Enter = Auto Sum

☛ Shift + F3 = To access the paste Function dialog box

☛ Ctrl + Shift + & (or) Ctrl + Shift + _ = To apply or remove borders to all cells

☛ Ctrl + Shift + [ = To trace errors

By default MS-Excel consists of three (3) sheets. A worksheet is a set of cells aligned in rows and

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 41

Page 42: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

42

columns.

A MS-Word An Excel work sheet consists of 16,384 columns (A, B, C, .... XFD) and 10,48,576 rows.The first cell in Excel worksheet is labeled as "A1".

To save and protect the workbook by

☛ Write Reservation Password

☛ Protection Password

☛ Read-Only Recommended.

Legend : The box on the chart that contains the name of each individual record is called "Legend".

Formulas : In Excel worksheet, all formulas start with the "=" sign. To build a formula, first select thecell in which you want the results to appear. After the = sign, type the cells you want to add or subtractalong with the mathematical operation you wish to perform.

For example, = C3+C4+C5, = B4-C4.

The easiest way to copy a formula is with the Fill Handle in the lower right corner of the cell.

Functions : A function is a predefined formula that operates on one or more values and returns one ormore values. All functions consist of a function name followed by a set of arguments in brackets. Thearguments specify the values or cells to be used by the function. The maximum number of argumentsallowed in a function is 30.

For example, SUM, MIN, MAX, AVERAGE, HYPERLINK, LOOKUP, COLUMN, HLOOKUP, ADDRESS,AREAS, CHOOSE, ROMAN, RAND etc.

Examples of Commonly Used Formulas :

This table is used with the sample formula below :

Type of Equation of cell 1/3 Result

Addition of Two Cells = A2+B3 46

Addition of a Constant = B1+25 53

Addition of a column of cells = SUM (A1:A3) 28

Addition of a Row of cells = SUM (B2:C2) 105

Addition of a Range of cells = SUM (B1:C3) 237

Addition of Scattered cells = SUM (A1B3C2) 43

Subtraction of a Constant = C110 85

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 42

Page 43: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

43

Subtraction of a cell = B2-B1 63

Multiplication of Two Cells = B3*C3 20

Multiplication by a Constant = A3 * 20 60

Multiplication by a% = A1*40 10

Multiplication by a% = B1*25% 7

Division by a cell = A2/C2 3

Division by a Constant = C1/5 19

Exponentiation(Squaring) = B3⌃2 16

Exponentiation (Cubing) = C3⌃3 125

Square Roots = SQRT(A1) 5

Square Roots = A1⌃0.5 5

Cube Roots = B1⌃(1/3) 3.036589

Increasing by a Percentage (4%) = A1+(A1*.04) 26

Increasing by a Percentage (4%) = A1*1.04 26

Increasing by a Percentage (4%) = A1+(A1*4%) 26

Decreasing by a Percentage (8%) = A1-(A1*.08) 23

Decreasing by a Percentage (8%) = A1*.92 23

Decreasing by a Percentage (8%) = A1-(A1*8%) 23

Calculate a Percentage (Part/sum) = A3/$D$3 25% (Formats as a%)

Average of a Column = AVG (B1:B3) 41

Average of a Row = AVG (A3:C3) 4

Average of a Range = AVG (B1:C2) 57

Formula referring to a cell = Sheet2.C4 The contents ofin another worksheet Cell C4 in Sheet 2

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 43

Page 44: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

44

MS-OFFICE POWERPOINT

Presentation Program : A Presentation program is a computer software package used to displayinformation, normally in the form of a slide show.

For example, Microsoft Powerpoint, Corel Presentations, Google docs, harward graphics etc.

MS-Powerpoint is a non-free commercial presentation program developed by Microsoft. MS-PowerPoint presentations consist of a number of idnividual pages known as "Slides". The "Slide" analogy isa reference to the slide projector. Slides may contain text, graphics, sound, movies, and other objects,which may be arranged freely.

When you start Powerpoint, you can start with a blank presentation, or you can begin from atemplate or use the "Auto Content Wizard".

Auto Content Wizard : The Auto Content Wizard is a series of step-by-step instructions designed toassist you. The Template button accesses slide templates to help create a consistent, Professionallook for your slide presentation.

Slide Layout : The arrangement of elements such as title, subtitle text, pictures, tables etc. is called"Layout". Slide Layouts define containers, positioning and formatting for all of the content that appearson a slide. Slide Layouts are classified as two types.

1. Standard Layouts : When you open a blank presentation in Powerpoint, the default layout calledTitle Slide appears, but there are other standard layouts that you can apply and use.

2. Custom Layout : You can create reusable custom layouts that specify the number, size andlocation of placeholders, background content etc.

Template : A file which contains readymade styles that can be used for a presentation is called"Template". After choosing a Pre-defined template, color scheme option has to be chosen to changethe background color. For example, "Ellipse Motion" is a Pre-defined animation scheme. The availabletemplates will appear in the Task Pane, and once you select one, Powerpoint will apply it to all theslides.

Powerpoint Views :

1. Normal View : It Provides a what-you-see-is-what-you-get mode for working with your slides. Itprovides a comprehensive view for each slide with notes and outline.

2. Outline View : In the outline view, the screen is predominantly occupied by a list of the slide titlesand bulleted items that are a part of those slides.

3. Slide Show View : It is also called preview. It is used to run the whole presentation.

4. Notes View : Each page corresponds to a slide in your presentation and includes a reduce imageof the slide. You can draw and type in Notes view the way you can in slide view.

5 Slide Sorter View : It presents thumbnail images of all of the slides in the presentation andallows, through a simple dragging and dropping operation, a slide to be moved from one place inthe presentation to another.

Slide Master : The slide Master in a template is a slide that controls the formatting, text and objectsthat appear on every slide in your presentation. For example, if you want a small picture to appear onevery slide, place that picture on the slide Master. Changes you make to the slide master also appearon each slide in you presentation. The Slide Master has boxes already setup for the slide title and text.They are called the "Master Title" and the "Master Body" object.

Slide Transition : A special effect used to introduce a slide in a slideshow is called "Slide Transition".This features adds special effects to modify the appearance of the slides and the timing betweeneach slide. Transition effects help define how a presentation move from one slide to the next.

Animation defines how you want your listed information to come in and out of the presentation.

WEEW

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 44

Page 45: DATABASE MANAGEMENT SYSTEM (DBMS)€¦ · Downloaded from  1 . 2 File Management System (FMS) : A software package that allows users to define data items, place

45

Computers

❂ DBMS & E-Commerce❂ Data Communications & Networks❂ Internet & Security❂ Ms-Office, Shortcuts Abbrivations

Sowmya - Computer PDF

7/21/2015 Downloaded from www.exampundit.in 45