Fundamentals-of-Computer-and-IT-BCA Notes (Unit1, Unit2, Unit3 and Unit4)
Fundamentals-of-Computer-and-IT-BCA Notes (Unit1, Unit2, Unit3 and Unit4)
in
Detailed Page no
Contents
Unit-I
Unit-III
10
Spreadsheet: Workbook, worksheets, data types,
operators, cell formats, freeze panes, editing features,
formatting features, creating formulas, using
3|Page
BCA 1 IT www.sbs.ac.in
4|Page
BCA 1 IT www.sbs.ac.in
Information technology (IT) is the use of any computer, storage, networking and other
physical devices, infrastructure and processes to create, process, store, secure and exchange
all forms audio video text image of electronic data.
5|Page
BCA 1 IT www.sbs.ac.in
6|Page
BCA 1 IT www.sbs.ac.in
7|Page
BCA 1 IT www.sbs.ac.in
Hardware
Hardware refers to the physical elements of a computer. This is also sometime called the
machinery or the equipment of the computer. Examples of hardware in a computer are the
keyboard, the monitor, the mouse and the central processing unit. However, most of a
computer's hardware cannot be seen; in other words, it is not an external element of the
computer, but rather an internal one, surrounded by the computer's casing (tower). A
computer's hardware is comprised of many different parts, but perhaps the most important
of these is the motherboard. The motherboard is made up of even more parts that power
and control the computer.
Hardware Components
Computer hardware is a collection of several components working together. Some parts are
essential and others are added advantages. Computer hardware is made up of CPU and
peripherals as shown in image below.
8|Page
BCA 1 IT www.sbs.ac.in
Software
Software, commonly known as programs or apps, consists of all the instructions that tell the
hardware how to perform a task. These instructions come from a software developer in the
form that will be accepted by the platform (operating system + CPU) that they are based on.
For example, a program that is designed for the Windows operating system will only work
for that specific operating system.
A set of instructions that drives computer to do stipulated tasks is called a program. Software
instructions are programmed in a computer language, translated into machine language, and
executed by computer.
Software is capable of performing many tasks, as opposed to hardware which can only
perform mechanical tasks that they are designed for. Software provides the means for
accomplishing many different tasks with the same basic hardware
System software
Application software
System Software
System software operates directly on hardware devices of computer. It provides a platform
to run an application. It provides and supports user functionality. Examples of system
software include operating systems such as Windows, Linux, Unix, etc.
9|Page
BCA 1 IT www.sbs.ac.in
Application Software
An application software is designed for benefit of users to perform one or more tasks.
Examples of application software include Microsoft Word, Excel, PowerPoint, Oracle, etc.
10 | P a g e
BCA 1 IT www.sbs.ac.in
11 | P a g e
BCA 1 IT www.sbs.ac.in
0’s.
12 | P a g e
BCA 1 IT www.sbs.ac.in
Input Unit : The input unit consists of input devices that are attached to the computer.
These devices take input and convert it into binary language that the computer
understands. Some of the common input devices are keyboard, mouse, joystick, scanner
etc.
Central Processing Unit (CPU) : Once the information is entered into the computer by
the input device, the processor processes it. The CPU is called the brain of the computer
because it is the control center of the computer. It first fetches instructions from
memory and then interprets them so as to know what is to be done. If required, data is
fetched from memory or input device. Thereafter CPU executes or performs the required
computation and then either stores the output or displays on the output device. The CPU
has three main components which are responsible for different functions – Arithmetic
Logic Unit (ALU), Control Unit (CU) and Memory registers
Arithmetic and Logic Unit (ALU) : The ALU, as its name suggests performs mathematical
calculations and takes logical decisions. Arithmetic calculations include addition,
subtraction, multiplication and division. Logical decisions involve comparison of two data
items to see which one is larger or smaller or equal.
Control Unit : The Control unit coordinates and controls the data flow in and out of CPU
and also controls all the operations of ALU, memory registers and also input/output
units. It is also responsible for carrying out all the instructions stored in the program. It
decodes the fetched instruction, interprets it and sends control signals to input/output
devices until the required operation is done properly by ALU and memory.
Memory Registers : A register is a temporary unit of memory in the CPU. These are used
to store the data which is directly used by the processor. Registers can be of different
sizes(16 bit, 32 bit, 64 bit and so on) and each register inside the CPU has a specific
function like storing data, storing an instruction, storing address of a location in memory
etc. The user registers can be used by an assembly language programmer for storing
13 | P a g e
BCA 1 IT www.sbs.ac.in
operands, intermediate results etc. Accumulator (ACC) is the main register in the ALU
and contains one of the operands of an operation to be performed in the ALU.
Memory : Memory attached to the CPU is used for storage of data and instructions and
is called internal memory The internal memory is divided into many storage locations,
each of which can store data or instructions. Each memory location is of the same size
and has an address. With the help of the address, the computer can read any memory
location easily without having to search the entire memory. when a program is executed,
it’s data is copied to the internal memory ans is stored in the memory till the end of the
execution. The internal memory is also called the Primary memory or Main memory. This
memory is also called as RAM, i.e. Random Access Memory. The time of access of data is
independent of its location in memory, therefore this memory is also called Random
Access memory (RAM). Read this for different types of RAMs
Output Unit : The output unit consists of output devices that are attached with the
computer. It converts the binary data coming from CPU to human understandable form.
The common output devices are monitor, printer, plotter etc.
A computer consists of input unit that takes input, a CPU that processes the input and an
output unit that produces output. All these devices communicate with each other through a
common bus. A bus is a transmission path, made of a set of conducting wires over which data
or information in the form of electric signals, is passed from one component to another in a
computer. The bus can be of three types – Address bus, Data bus and Control Bus.
Following figure shows the connection of various functional components:
14 | P a g e
BCA 1 IT www.sbs.ac.in
The address bus carries the address location of the data or instruction. The data bus carries
data from one component to another and the control bus carries the control signals. The
system bus is the common communication path that carries signals to/from CPU, main
memory and input/output devices. The input/output devices communicate with the system
bus through the controller circuit which helps in managing various input/output devices
attached to the computer.
SMPS
A switched-mode power supply (SMPS) is an electronic circuit that converts power using
switching devices that are turned on and off at high frequencies, and storage components
such as inductors or capacitors to supply power when the switching device is in its non-
conduction state.
Switching power supplies have high efficiency and are widely used in a variety of electronic
equipment, including computers and other sensitive equipment requiring stable and efficient
power supply.
A switched-mode power supply is also known as a switch-mode power supply or switching-
mode power supply.
15 | P a g e
BCA 1 IT www.sbs.ac.in
Disadvantages:
The computer will be of no use unless it is able to communicate with the outside
world. Input/Output devices are required for users to communicate with the
computer. In simple terms, input devices bring information INTO the computer
and output devices bring information OUT of a computer system. These
input/output devices are also known as peripherals since they surround the CPU
and memory of a computer system.
16 | P a g e
BCA 1 IT www.sbs.ac.in
Input Output
Devices Devices
Keyboard Monitor
Mouse LCD
Joystick Printer
Scanner Plotter
Light Pen
Touch
Screen
I. Input Devices
(a) Keyboard
It is a text base input device that allows the user to input alphabets, numbers
and other
characters. It consists of a set of keys mounted on a board
Alphanumeric keys
It consists of keys for English alphabets, 0 to 9 numbers, and special characters like +
/ * ( ) etc.
17 | P a g e
BCA 1 IT www.sbs.ac.in
Function Keys
There are twelve function keys labeled F1, F2, F3… F12. The functions assigned
to these keys differ from one software package to another. These keys are also
user programmable keys.
Special-function Keys
These keys have special functions assigned to them and can be used only for
those specific purposes. Functions of some of the important keys are defined
below.
Enter
It is similar to the ‘return’ key of the typewriter and is used to execute a command or
program.
Spacebar
This key is used to move the cursor one position to the left and also delete the
character in that position.
Delete
Insert key is used to toggle between insert and overwrite mode during data entry.
Shift
This key is used to type capital letters when pressed along with an alphabet key.
Also used to type the special characters located on the upper-side of a key that
has two characters defined on the same key.
Caps Lock
Cap Lock is used to toggle between the capital lock features. When ‘on’, it locks
the alphanumeric keypad for capital letters input only.
18 | P a g e
BCA 1 IT www.sbs.ac.in
Control keys
Also like the control key, Alt key is always used in combination with other keys to
perform specific tasks.
Esc
This key is usually used to negate a command. Also used to cancel or abort
executing programs.
Numeric Keypad
Numeric keypad is located on the right side of the keyboard and consists of keys
having numbers (0 to 9) and mathematical operators (+ * /) defined on them.
This keypad is provided to support quick entry for numeric data.
Cursor Movement Keys
These are arrow keys and are used to move the cursor in the direction indicated
by the arrow (up, down, left, right).
(b) Mouse
The mouse is a small device used to point to a particular place on the screen and
select in order to perform one or more actions. It can be used to select menu
commands, size windows, start programs etc.
The most conventional kind of mouse has two buttons on top: the left one being
used most frequently.
Mouse Actions
C) Joystick
The joystick is a vertical stick which moves the graphic cursor in a direction the
stick is moved. It typically has a button on top that is used to select the option
pointed by the cursor. Joystick is used as an input device primarily used with
video games, training simulators and controlling robots
D) Scanner
Scanner is an input device used for direct data entry from the source document
into the computer system. It converts the document image into digital form so
that it can be fed into the computer. Capturing information like this reduces the
possibility of errors typically experienced during large data entry.
20 | P a g e
BCA 1 IT www.sbs.ac.in
II. Output Devices
(a) Monitor
Monitor is an output device that resembles the television screen and uses a
Cathode Ray Tube (CRT) to display information. The monitor is associated with a
keyboard for manual input of characters and displays the information as it is
keyed in. It also displays the program or application output. Like the television,
monitors are also available in different sizes.
c) Printer
21 | P a g e
BCA 1 IT www.sbs.ac.in
strikes the paper through a ribbon in order to produce output. Dot-matrix and
Character printers fall under this category.
Non-impact printers do not touch the paper while printing. They use chemical,
heat or electrical signals to etch the symbols on paper. Inkjet, Deskjet, Laser,
Thermal printers fall under this category of printers.
When we talk about printers we refer to two basic qualities associated with
printers: resolution, and speed. Print resolution is measured in terms of number
of dots per inch (dpi). Print speed is measured in terms of number of characters
printed in a unit of time and is represented as characters-per-second (cps), lines-
per-minute (lpm), or pages-per-minute (ppm).
Printer uses ink to put data on paper or transparency. There are many types of printers.
4) Laser Printer
Non-impact printers print without having a mechanism to strike against a sheet of paper. Ink
jet, laser and thermal printer are non-impact printer.
Dot Matrix Printer: It uses dots to form a characters on a paper. Dots are made by pins. Dot
matrix printer is made up of steel pins which strike the paper through a inked ribbon to
create a pattern of tiny dots. The quality of print depends upon the number of steel pins in
the machine.
Daisy Wheel printer: In this type of printer, the part that puts the characters looks like a
wheel. Numbers and letters are arranged in a wheel. And the daisy wheel spins until the
correct letter is in position. Then hammer strikes the character against the ribbon, printing it
on the paper.
Line Printer: It prints a complete line of text at a time. It uses drum or chain with all the
characters in the character set on it. The drum or chain moves and prints the necessary
characters in the right place.
Ink jet printer: It prints the character using fine jet of ink which comes out from the tiny
nozzles onto the paper. The ink is kept in reservoir and fed into the firing chambers just
below each nozzle.
Laser Printer: It uses a beam of light (laser beam) to convert binary data into print. The laser
puts an electric charge in the shape of a character on the rotating drum. The dry ink or toner
stick only to the drum where it has been charged. These printers are very fast. They can print
a whole page at once.
23 | P a g e
BCA 1 IT www.sbs.ac.in
Thermal Printer: It uses heat to put the characters on the paper. The paper has a spacial
coating on it. The printer uses heated wires to turn the paper black. It is basically used for
taking ECG in hospital or lab.
d) Plotter
MEMORY
Memory is an internal storage area in a computer, which is availed to store data and
programs either permanently or temporarily. Computer memory is broadly divided into two
groups and they are:
24 | P a g e
BCA 1 IT www.sbs.ac.in
Primary memory and
Secondary memory
When the main memory holds instructions and data when a program is executing, the
auxiliary memory or secondary memory holds data and programs which are not currently in
use and furnishes long term storage.
The primary memory and secondary memory are further classified into distinct groups and
those are explained in the below diagram:
Primary memory:
Primary memory is the only type of memory which is directly accessed by the CPU. The CPU
continuously reads instructions stored in the primary memory and executes them. Any data
25 | P a g e
BCA 1 IT www.sbs.ac.in
that has to be operated by the CPU is also stored. The information is transferred to various
locations through the BUS. Primary memories are of two types. They are:
RAM
ROM
1. RAM: It stands for Random Access Memory. Here data can be stored temporarily, so
this type of memory is called as temporary memory or volatile memory because when
power fails the data from RAM will be erased. The information stored in the RAM is
basically loaded from the computer’s disk and includes information related to the
operating system and applications that are currently executed by the processor. RAM
is considered random access because any memory cell can be directly accessed if its
address is known. RAM is of distinct types like SRAM, DRAM, and VRAM.
2. ROM: It stands for Read Only Memory. In this, the data will be furnished by the
manufacturers regarding the system, so this information can simply be read by the
user but cannot add new data or it cannot be modified. ROMs are of distinct types:
PROM – Programmable Read Only Memory
EPROM – Erasable Programmable Read Only Memory
EEPROM – Electrically Erasable Programmable Read Only Memory
Secondary memory:
Secondary memory or auxiliary memory consists of slower and less expensive device that
communicates indirectly with CPU via main memory. The secondary memory stores the data
and keeps it even when the power fails. It is used to store or save large data or programs or
other information. The secondary storage devices are explained below:
Magnetic disks
Magnetic tape
Optical disk
USB flash drive
Mass storage devices
1. Magnetic disks: Magnetic disks are made of rigid metals or synthetic plastic material. The
disk platter is coated on both the surfaces with magnetic material and both the surfaces can
be used for storage. The magnetic disk furnishes direct access and is for both small and large
computer systems. The magnetic disk comes in two forms:
Floppy disks
Hard disks
26 | P a g e
BCA 1 IT www.sbs.ac.in
2. Magnetic tape: magnetic tape is serial access storage medium and it can store a large
volume of data at low costs. The conventional magnetic tape is in reels of up to 3600 feet
made of Mylar plastic tape. The tape is one-half inch in width and is coated with magnetic
material on one side. The reel of tape is loaded on a magnetic tape drive unit. During any
read/write operation, the tape is moved from one spool to another in the same way as in the
audiocassette tape recorder. The magnetic tape is densely packed with magnetic spots in
frames across its width.
3. Optical drives: optical drives are a storage medium from which data is read and to which it
is written by lasers. Optical disks can store much more data up to 6GB. Optical store devices
are the most widely used and reliable storage devices. The most widely used type of optical
storage devices are explained below:
CD – ROM
DVD – ROM
CD – RECORDABLE
CD – REWRITABLE
PHOTO – CD
4. USB flash drives: USB flash drives are removable, rewritable and are physically much
smaller drives, which have the weight of less than 30g. In the year of 2010, the storage
capacity of the USB flash drives was as large as 256GB. Such devices are a good substitute for
floppy disks and CD – ROMs as they are smaller, faster, have thousands of times more
capacity, and are more durable and reliable. Until 2005, most desktop and laptop computers
had floppy disk drives, but nowadays floppy disk drives have been abandoned in favor of USB
ports. The USB connector is often protected inside a removable cap, although it is not likely
to be damaged if unprotected. USB flash drives draw power from the computer through
external USB connection. The most widely used USB flash drives are the memory cards.
5. Mass storage devices: Mass storage devices refer to the saving of huge data in a persistent
manner. Mass storage machines can store up to several trillion bytes of data and hence are
used to store or save large databases, such as the information of customers of a big retail
chain and library transactions of students in a college. Some of the commonly used mass
storage devices are explained below:
Disk array
Automated tape
CD – ROM jukebox
Number System
27 | P a g e
BCA 1 IT www.sbs.ac.in
The technique to represent and work with numbers is called number system. Decimal
number system is the most common number system. Other popular number systems
include binary number system, octal number system, hexadecimal number system, etc.
When we type some letters or words, the computer translates them in numbers as
computers can understand only numbers. A computer can understand the positional
number system where there are only a few symbols called digits and these symbols
represent different values depending on the position they occupy in the number.
The value of each digit in a number can be determined using −
The digit
The position of the digit in the number
The base of the number system (where the base is defined as the total number of
digits available in the number system)
28 | P a g e
BCA 1 IT www.sbs.ac.in
In any binary number, the rightmost digit is called least significant bit (LSB) and leftmost
digit is called most significant bit (MSB).
And decimal equivalent of this number is sum of product of each digit with its positional
value.
110102 = 1×24 + 1×23 + 0×22 + 1×21 + 0×20
= 16 + 8 + 0 + 2 + 0
= 2610
Example
Binary Number: 101012
29 | P a g e
BCA 1 IT www.sbs.ac.in
Calculating Decimal Equivalent −
Octal number system has eight digits – 0, 1, 2, 3, 4, 5, 6 and 7. Octal number system is also a
positional value system with where each digit has its value expressed in powers of 8, as
shown here −
Decimal equivalent of any octal number is sum of product of each digit with its positional
value.
7268 = 7×82 + 2×81 + 6×80
= 448 + 16 + 6
= 47010
30 | P a g e
BCA 1 IT www.sbs.ac.in
Example
Octal Number: 125708
Calculating Decimal Equivalent −
Decimal equivalent of any hexadecimal number is sum of product of each digit with its
positional value.
27FB16 = 2×163 + 7×162 + 15×161 + 10×160
= 8192 + 1792 + 240 +10
= 1023410
Example
31 | P a g e
BCA 1 IT www.sbs.ac.in
Hexadecimal Number: 19FDE16
Calculating Decimal Equivalent −
Step 2 19FDE16 ((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
Conversions
There are many methods or techniques which can be used to convert numbers from one
base to another. We'll demonstrate here the following −
32 | P a g e
BCA 1 IT www.sbs.ac.in
Example −
Decimal Number: 2910
Calculating Binary Equivalent −
Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7/2 3 1
Step 4 3/2 1 1
Step 5 1/2 0 1
33 | P a g e
BCA 1 IT www.sbs.ac.in
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so
that the first remainder becomes the Least Significant Digit (LSD) and the last remainder
becomes the Most Significant Digit (MSD).
Decimal Number − 2910 = Binary Number − 111012.
Example
Binary Number − 111012
Calculating Decimal Equivalent −
Step 1 21 / 2 10 1
Step 2 10 / 2 5 0
Step 3 5 / 2 2 1
Step 4 2 / 2 1 0
Step 5 1 / 2 0 1
35 | P a g e
BCA 1 IT www.sbs.ac.in
Octal Number − 258 = Binary Number − 101012
Example
Binary Number − 101012
Calculating Octal Equivalent −
Step 2 101012 28 58
Example
Octal Number − 258
Calculating Binary Equivalent −
36 | P a g e
BCA 1 IT www.sbs.ac.in
Example
Binary Number − 101012
Calculating hexadecimal Equivalent −
Example
Hexadecimal Number − 1516
Calculating Binary Equivalent −
38 | P a g e
BCA 1 IT www.sbs.ac.in
Applications of Information Technology
Every day, people use computers in new ways. Computers and other electronic devices are
becoming increasingly affordable. They continue to be more powerful as information-
processing tools as well as easier to use. Humans are continually becoming dependant on IT-
enabled devices for carrying out simple tasks like remembering a phone number to complex
ones like flying a fighter plane. Information Technology has applications in almost all aspects
of our life. Some of the important ones are:
Science and Engineering: Scientific progress in fields like biotechnology is almost entirely
dependent on the use of computers and other microprocessor-controlled devices. Using
supercomputers, meteorologists predict future weather by using a combination of
observations of weather conditions from many sources, a mathematical representation of
the behaviour of the atmosphere, and geographic data. Computer-aided design (CAD) and
computer-aided manufacturing (CAM) programs have led to improved products in many
fields, especially where designs tend to be very detailed. Computer programs make it
possible for engineers to analyse designs of complex structures such as power plants and
space stations.
Business & Commerce: One of the first and largest applications of computers is keeping and
managing business and financial records. Most large companies keep the employment
records of all their workers in large databases that are managed by computer programs.
Similar programs and databases are used in business functions like billing customers; tracking
payments received and payments to be made; and tracking supplies needed and items
produced, stored, shipped, and sold. In fact, practically all the information companies need to
do business involves the use of computers and Information Technology. Almost all the
financial transactions in the world are done electronically. Newer technologies like m-
commerce have enabled almost everybody to carry out routine financial transactions on the
move.
On a smaller scale, many businesses have replaced cash registers with point-of-sale (POS)
terminals. These POS terminals not only print a sales receipt for the customer but also send
information to a computer database when each item is sold to maintain an inventory of items
on hand and items to be ordered. Computers have also become very important in modern
factories. Computer-controlled robots now do tasks that are hot, heavy, or hazardous. Robots
are also used to do routine, repetitive tasks in which boredom or fatigue can lead to poor
quality work.
Education: The advent of Information Technology has changed the meaning of the term
“literate”, with computer literacy being almost as important as basic literacy in many cases.
Computer education is an essential course at the primary level in most schools across the
world. With more Information getting digitized every day, and the internet making it
accessible to anyone across the world, students are increasingly relying on electronic sources
of information rather than physical libraries for their needs. Instructional methodology has
also undergone a sea change with use of images, animations, videos, presentations and e-
learning to complement traditional techniques.
Entertainment: IT has changed the lifestyle of most people. The convergence of various
technologies has created various options for entertainment like games, streaming music and
video, digital television broadcasts, satellite radio, animated movies etc. which can be
accessed with the help of mobile phones, PDAs, notebook computers or on television either
with a cable connection or wirelessly using newer-generation WiFi, CDMA or GPRS
technologies.
40 | P a g e
BCA 1 IT www.sbs.ac.in
Information Technology plays a vital role in most of our daily activities. There is hardly
anyone who has not been affected or influenced by IT. With each passing day, newer
applications of IT are being developed which increase our interaction with and dependence
on IT-enabled devices. Therefore, understanding this technology and using it creatively is
imperative to human progress.
UNIT-2
Introduction:
A language is the main medium of communicating between the Computer systems and the
most common are the programming languages. As we know a Computer only understands
binary numbers that is 0 and 1 to perform various operations but the languages are
developed for different types of work on a Computer. A language consists of all the
instructions to make a request to the system for processing a task. From the first generation
and now fourth generation of the Computers there were several programming languages
used to communicate with the Computer. Here we will go in the detail of the Computer
language and its types.
A Computer language includes various languages that are used to communicate with a
Computer machine. Some of the languages like programming language which is a set of
codes or instructions used for communicating the machine. Machine code is also considered
as a computer language that can be used for programming. And also HTML which is a
computer language or a markup language but not a programming language. Similarly there
are different types of languages developed for different types of work to be performed by
communicating with the machine. But all the languages that are now available are
categorized into two basic types of languages including Low-level language and High level
language.
41 | P a g e
BCA 1 IT www.sbs.ac.in
Low level languages are the machine codes in which the instructions are given in machine
language in the form of 0 and 1 to a Computer system. It is mainly designed to operate and
handle all the hardware and instructions set architecture of a Computer. The main function
of the Low level language is to operate, manage and manipulate the hardware and system
components. There are various programs and applications written in low level languages that
are directly executable without any interpretation or translation. The most famous and the
base of all programming languages “C” and “C++” are mostly used Low level languages till
today. Low level language is also divided into two parts are Machine language and Assembly
language.
Machine Language is one of the low-level programming languages which is the first
generation language developed for communicating with a Computer. It is written in
machine code which represents 0 and 1 binary digits inside the Computer string which
makes it easy to understand and perform the operations. As we know a Computer
system can recognize electric signals so here 0 stands for turning off electric pulse and 1
stands for turning on electric pulse. It is very easy to understand by the Computer and
also increases the processing speed.
42 | P a g e
BCA 1 IT www.sbs.ac.in
The main advantage of using Machine language is that there is no need of a translator or
interpreter to translate the code, as the Computer directly can understand. But there are
some disadvantages also like you have to remember the operation codes, memory address
every time you write a program and also hard to find errors in a written program. It is a
machine dependent and can be used by a single type of Computer.
Assembly Language is the second generation programming language that has almost
similar structure and set of commands as Machine language. Instead of using numbers
like in Machine languages here we use words or names in English forms and also
symbols. The programs that have been written using words, names and symbols in
assembly language are converted to machine language using an Assembler. Because a
Computer only understands machine code languages that’s why we need an Assembler
that can convert the Assembly level language to Machine language so the Computer
gets the instruction and responds quickly.
The main disadvantage of this language is that it is written only for a single type of CPU and
does not run on any other CPU. But its speed makes it the most used low level language till
today which is used by many programmers.
The high level languages are the most used and also more considered programming
languages that helps a programmer to read, write and maintain. It is also the third generation
language that is used and also running till now by many programmers. They are less
independent to a particular type of Computer and also require a translator that can convert
the high level language to machine language. The translator may be an interpreter and
Compiler that helps to convert into binary code for a Computer to understand. There is
various high level programming languages like C, FORTRAN or Pascal that are less
independent and also enables the programmer to write a program.
UNIT-II
Machine Language
A machine language consists of the numeric codes for the operations that a particular
computer can execute directly. The codes are strings of 0s and 1s, or binary digits (“bits”),
which are frequently converted both from and to hexadecimal (base 16) for human viewing
and modification. Machine language instructions typically use some bits to represent
operations, such as addition, and some to represent operands, or perhaps the location of the
next instruction. Machine language is difficult to read and write, since it does not resemble
conventional mathematical notation or human language, and its codes vary from computer
to computer.
The set of binary codes which can be recognize by the computer is known as the machine
code instruction set. A machine language instruction consists of an operation code one or
more operands. The operation code specifies that operation that is to be performed e.g.
read, record etc. the operands identify the quantities to be operated on e.g. the numbers to
be added or the locations where data are stored. But, it is almost impossible to write
programs directly in machine code. For this reason, programs are normally written in
assembly or high level languages and then are translated in the machine language by
different translators.
45 | P a g e
BCA 1 IT www.sbs.ac.in
WORD PROCESSING
Word processing describes the process of creating or editing a document using a word
processor, such as Microsoft Word, Google Docs, or OpenOffice Writer. For example, with a
word processor, a student could create a book report and then print it, save it to a disk,
display it on the screen, or send it over e-mail. Also, a person looking for a job could create a
résumé using a word processor, then e-mail or print and mail it to job recruiters.
46 | P a g e
BCA 1 IT www.sbs.ac.in
Menu bar
Menu bar This is the traditional windows style drop-down menu. When you point to any
menu title and click once with the mouse, the menu will open displaying all the commands
available under this menu. Clicking on the desired command would tell Word to execute
that command. Some commands have ellipses (…) in front of them. These commands have
further sub commands. Commands appearing in dim mode cannot be executed unless the
prerequisite functions required by that command have been performed, e.g. you cannot use
the Copy or Cut command from the Edit menu unless you have selected a piece of text first.
Many commands also have a keyboard shortcuts specified against their names.
Standard toolbar
Standard toolbar Toolbars contain buttons, drop-down menus and other controls that help
you to quickly alter the appearance and arrangement of documents by executing a variety of
word commands. Toolbars are very helpful and convenient in quickly executing commands
without having to go through menus. The standard toolbar contains icons for basic functions
like opening files, saving files, printing files, cut, copy, paste etc.
Formatting toolbar
This contains icons for changing the look of your text (called “formatting” in computer
jargon); for example, there are icons for changing fonts, styles, font sizes, text alignment etc.
Ruler
The Ruler lets you make changes to margins and indents, and helps you create document as
per dimensions required.
Scroll tools
47 | P a g e
BCA 1 IT www.sbs.ac.in
These helps you travel within your document. You can go anywhere, up and down, right and
left in your document mainly by two ways: Using the horizontal and vertical scroll bars with
the help of the mouse; Or using the keyboard to press PgUp, PgDn, Home, End and arrow
keys.
Status bar
Also called the Status Area, this is the normally the last line on your screen. This gives the
following information about your work—
Current Page
Section Number
Current/Total pages in the document
Current Cursor Position (where the cursor is presently located)
Current Line Number
Current Column Number
Record Macro-whether macro recording is On or not
Track Revision-whether revisions have been made or not
Extend Selection
Over type mode-whether you are in Insert mode or overwrite mode
Cursor
Also called the Insertion Pointer, this denotes the place where text, graphics or any other
item would be placed when you type, overwrite or insert them. This looks like a tall, skinny
toothpick and keeps blinking so that you can locate it easily.
Mouse pointer
When your mouse pointer looks like an I-beam you should be able to move it freely on the
screen. This is used for either placing the cursor at the desired place (take the mouse pointer
there and click) or choosing any command either from the menu or from toolbars. The mouse
pointer changes shape when in the process of doing certain tasks and the cursor disappears.
48 | P a g e
BCA 1 IT www.sbs.ac.in
49 | P a g e
BCA 1 IT www.sbs.ac.in
50 | P a g e
BCA 1 IT www.sbs.ac.in
51 | P a g e
BCA 1 IT www.sbs.ac.in
File management
Opening an ExistingDocument:
Saving a Document
o Open any word document. You can move the cursor to any location
on the screen by using the arrow keys on the keyboard.
o Right arrow key is used to move one position to the right of the
cursor
o Left arrow key is used to move one position to the left of the
cursor.
o Up arrow key is used to move one position to the top of the
cursor.
o Down arrow key is used to move one position to the down of
the cursor.
o Page Up key is used to move down the screen at a time
o Page down key is used to move up the screen at a time
o Hold down Ctrl key and press Home to move to beginning of the
52 | P a g e
BCA 1 IT www.sbs.ac.in
document.
o Hold down Ctrl key and press End to move to end of
the document.
To do these functions,
o Place the cursor at the begining of the text to be selected. Drag the
mouse pointer over the text. The text will now appear in reverse
vedeo as shown below:
o Click Edit menu and then click on Cut option (or) click
icon on the Standard Toolbar. Move the cursor to the place
where you want the text to be pasted.
For copying the text from one location to other location the same
procedure is to be followed. The difference between Cut and Copy is that
while using the Cut option the text will be removed from its original
53 | P a g e
BCA 1 IT www.sbs.ac.in
location and pasted at a new location, where as when using Copy option a
copy of the selected text is pasted at new location without disturbing the
original text.
54 | P a g e
BCA 1 IT www.sbs.ac.in
Searching text
In Find What text box type the word you want to find and then
click Find Next button.
Continue clicking Find Next button until you get the screen shown
below.
Replacingtext
55 | P a g e
BCA 1 IT www.sbs.ac.in
56 | P a g e
BCA 1 IT www.sbs.ac.in
Click ReplaceAll button once. You get the below dialog box.
If your word document contains more than one page, you can
directly go to specified page by clicking Edit menu and then
clicking Go To option. You will get the dialog box as shown below.
10 | P a g e
BCA 1 IT www.sbs.ac.in
11 | P a g e
BCA 1 IT www.sbs.ac.in
12 | P a g e
BCA 1 IT www.sbs.ac.in
In the Enter page number text box, type the required page
number as shown below.
Formatting documents
13 | P a g e
BCA 1 IT www.sbs.ac.in
14 | P a g e
BCA 1 IT www.sbs.ac.in
15 | P a g e
BCA 1 IT www.sbs.ac.in
MS-Word
16 | P a g e
BCA 1 IT www.sbs.ac.in
MS-Excel
MS-PowerPoint
MS-Access
MS-Outlook
17 | P a g e
BCA 1 IT www.sbs.ac.in
MS-Word
MS-Excel
MS-PowerPoint
MS-Access
MS-Outlook
Indenting Paragraphs
Leave the highlighting on and click once more on the Right Indent
button.
Click once on the Left Indent button. Your text
should now be indented by one Tab stop. Each time you click, the
paragraph is moved one tab stop.
18 | P a g e
BCA 1 IT www.sbs.ac.in
19 | P a g e
BCA 1 IT www.sbs.ac.in
20 | P a g e
BCA 1 IT www.sbs.ac.in
Type your name and address as you would at the head of a letter,
but aligned with the left margin e.g.
K.Manohar H.No
10-334/3,
V.P. Nagar,
Malakpet,
Hyderabad.
Move the cursor to the start of each line and press the Tab key.
Just as with the right indent button, your text will move right.
How much it moves will depend on the tab settings, which you
can change in the Format, Tabs menu as shown below.
Font Controlling
22 | P a g e
BCA 1 IT www.sbs.ac.in
23 | P a g e
BCA-1 IT www.sbs.ac.in
You can set Font type, Font Style and Font size and Color
of the selected text.
Click OK button.
24 | P a g e
BCA-1 IT www.sbs.ac.in
MAIL MERGE
Mail merge is a feature within most data processing applications that enables
users to send a similar letter or document to multiple recipients. It enables
connecting a single form template with a data source that contains information
about the recipient’s name, address and other predefined and supported data
Mail merge primarily enables automating the process of sending bulk mail to
customers, subscribers or general individuals. Mail merge works when a data file
is stored that includes the information of the recipients to whom the letter is to
be sent. This file can be a spreadsheet or database file containing separate fields
for each different type of information to be merged within the letter.
The second file is the word document or the letter template. The recipients'
information on the letter template is kept empty. When the mail merge process is
initiated, the recipients' data from spreadsheet or database is fetched and placed
within the empty field in the letter, one by one, until all letters are created.
25 | P a g e
BCA-1 IT www.sbs.ac.in
2. Select your document type. In this demo we will select Letters. Click Next:
Starting document.
26 | P a g e
BCA-1 IT www.sbs.ac.in
3. Select the starting document. In this demo we will use the current (blank)
document. Select Use the current document and then click Next: Select
recipients.
27 | P a g e
BCA-1 IT www.sbs.ac.in
Note that selecting Start from existing document (which we are not
doing in this demo) changes the view and gives you the option to choose
your document. After you choose it, the Mail Merge Wizard reverts
to Use the current document.
28 | P a g e
BCA-1 IT www.sbs.ac.in
4. Select recipients. In this demo we will create a new list, so select Type a
new list and then click Create.
29 | P a g e
BCA-1 IT www.sbs.ac.in
o Create a list by adding data in the New Address List dialog box and
clicking OK.
o Note that now that a list has been created, the Mail Merge Wizard
reverts to Use an existing list and you have the option to edit the
30 | P a g e
BCA-1 IT www.sbs.ac.in
recipient list.
31 | P a g e
BCA-1 IT www.sbs.ac.in
32 | P a g e
BCA-1 IT www.sbs.ac.in
33 | P a g e
BCA-1 IT www.sbs.ac.in
o Click Address block to add the recipients' addresses at the top of the
document.
o In the Insert Address Block dialog box, check or uncheck boxes and select
options on the left until the address appears the way you want it to.
34 | P a g e
BCA-1 IT www.sbs.ac.in
o Note that you can use Match Fields to correct any problems.
Clicking Match Fields opens up the Match Fields dialog box, in which you can
associate the fields from your list with the fields required by the wizard.
6. Press Enter on your keyboard and click Greeting line... to enter a greeting.
35 | P a g e
BCA-1 IT www.sbs.ac.in
7. In the Insert Greeting Line dialog box, choose the greeting line format by
clicking the drop-down arrows and selecting the options of your choice, and
then click OK.
8. Note that the address block and greeting line are surrounded by chevrons
(« »). Write a short letter and click Next: Preview your letters
36 | P a g e
BCA-1 IT www.sbs.ac.in
37 | P a g e
BCA-1 IT www.sbs.ac.in
Click Print to print your letters or Edit individual letters to further personalize
some or all of the letters.
38 | P a g e
BCA-1 IT www.sbs.ac.in
UNIT-III
SPREADSHEET
A spreadsheet or worksheet is a file made of rows and columns that help sort
data, arrange data easily, and calculate numerical data. What makes a
spreadsheet software program unique is its ability to calculate values using
mathematical formulas and the data in cells.
Spreadsheet overview
Below is a basic example of what a Microsoft Excel spreadsheet looks like, as well
as all the important features of a spreadsheet highlighted.
39 | P a g e
BCA-1 IT www.sbs.ac.in
In the above example, this spreadsheet is listing three different checks, the date,
their description, and the value of each check. These values are then added
together to get the total of $162.00 in cell D6. That value is subtracted from the
check balance to give an available $361.00 in cell D8.
Finance
Spreadsheets are ideal for financial data, such as your checking account
information, budgets, taxes, transactions, billing, invoices, receipts, forecasts, and
any payment system.
Forms
Form templates can be created to handle inventory, evaluations, performance
reviews, quizzes, time sheets, patient information, and surveys.
Lists
Managing a list in a spreadsheet is a great example of data that does not contain
numbers, but still can be used in a spreadsheet. Great examples of spreadsheet
lists include telephone, to-do, and grocery lists.
Sports
Spreadsheets can keep track of your favorite player stats or stats on the whole
team. With the collected data, you can also find averages, high scores, and
statistical data. Spreadsheets can even be used to create tournament brackets.
WORKBOOK
41 | P a g e
BCA-1 IT www.sbs.ac.in
1. The Font Group. The font group commands change the appearance of text
within a cell or of the cell itself.
2. The Alignment Group. The alignment group commands change the position
of text within a cell or cells.
3. The Number Group. The number group commands change the format of
numbers and dates within a cell.
1. Click on a cell in one of the corners of the range of cells you wish to select
43 | P a g e
BCA-1 IT www.sbs.ac.in
2. Hold the left mouse button down and drag horizontally and vertically until the
range you wish to select is highlighted:
44 | P a g e
BCA-1 IT www.sbs.ac.in
You can select all the cells in a row by clicking on the number to the left of the
row:
You can select all the cells in a column by clicking on the letter at the top of the
column:
45 | P a g e
BCA-1 IT www.sbs.ac.in
46 | P a g e
BCA-1 IT www.sbs.ac.in
47 | P a g e
BCA-1 IT www.sbs.ac.in
48 | P a g e
BCA-1 IT www.sbs.ac.in
49 | P a g e
BCA-1 IT www.sbs.ac.in
1. Select the cell or cells in which you wish to bold the text.
2. On the Home tab, in the Font group, click the Bold command.
1. Select the cell or cells in which you wish to italicize the text.
2. On the Home tab, in the Font group, click the Italic command.
1. Select the cell or cells in which you wish to underline the text.
2. On the Home tab, in the Font group, click the Underline command.
50 | P a g e
BCA-1 IT www.sbs.ac.in
1. Select the cell or cells in which you wish to change the font.
2. On the Home tab, in the Font group, click the arrow to the right of
the Font command.
51 | P a g e
BCA-1 IT www.sbs.ac.in
To change the size of the font of text or numbers in cells in Microsoft Excel:
1. Select the cell or cells in which you wish to change the font size.
2. On the Home tab, in the Font group, click the arrow to the right of the Font
Size command. Select a font size from the drop down menu:
52 | P a g e
BCA-1 IT www.sbs.ac.in
CELL REFERENCING
A cell reference refers to a cell or a range of cells on a worksheet and can be used
in a formula so that Microsoft Office Excel can find the values or data that you
want that formula to calculate.
In one or several formulas, you can use a cell reference to refer to:
For example:
Cell references in Excel are very important. Understand the difference between
relative, absolute and mixed reference, and you are on your way to success.
Relative Reference
By default, Excel uses relative references. See the formula in cell D2 below. Cell
D2 references (points to) cell B2 and cell C2. Both references are relative.
1. Select cell D2, click on the lower right corner of cell D2 and drag it down to cell
D5.
54 | P a g e
BCA-1 IT www.sbs.ac.in
Cell D3 references cell B3 and cell C3. Cell D4 references cell B4 and cell C4. Cell
D5 references cell B5 and cell C5. In other words: each cell references its two
neighbors on the left.
Absolute Reference
See the formula in cell E3 below.
1. To create an absolute reference to cell H3, place a $ symbol in front of the
column letter and row number ($H$3) in the formula of cell E3.
55 | P a g e
BCA-1 IT www.sbs.ac.in
The reference to cell H3 is fixed (when we drag the formula down and across). As
a result, the correct lengths and widths in inches are calculated.
Mixed Reference
Sometimes we need a combination of relative and absolute reference (mixed
reference).
1. See the formula in cell F2 below.
56 | P a g e
BCA-1 IT www.sbs.ac.in
2. We want to copy this formula to the other cells quickly. Drag cell F2 across one
cell, and look at the formula in cell G2.
Do you see what happens? The reference to the price should be a fixed reference
to column B. Solution: place a $ symbol in front of the column letter ($B2) in the
formula of cell F2. In a similar way, when we drag cell F2 down, the reference to
the reduction should be a fixed reference to row 6. Solution: place a $ symbol in
front of the row number (B$6) in the formula of cell F2.
Result:
57 | P a g e
BCA-1 IT www.sbs.ac.in
Note: we don't place a $ symbol in front of the row number of $B2 (this way we
allow the reference to change from $B2 (Jeans) to $B3 (Shirts) when we drag the
formula down). In a similar way, we don't place a $ symbol in front of the column
letter of B$6 (this way we allow the reference to change from B$6 (Jan) to C$6
(Feb) and D$6 (Mar) when we drag the formula across).
3. Now we can quickly drag this formula to the other cells.
What is a formula?
=A2 * D2 / 2
HERE,
"=" tells Excel that this is a formula, and it should evaluate it.
"A2" * D2" makes reference to cell addresses A2 and D2 then multiplies the
values found in these cell addresses.
"/" is the division arithmetic operator
"2" is a discrete value
We will work with the sample data for the home budget to calculate the subtotal.
60 | P a g e
BCA-1 IT www.sbs.ac.in
=C4*D4
HERE,
The following animated image shows you how to auto select cell address and
apply the same formula to other rows.
61 | P a g e
BCA-1 IT www.sbs.ac.in
Functions increase user productivity when working with excel. Let's say you
would like to get the grand total for the above home supplies budget. To make it
simpler, you can use a formula to get the grand total. Using a formula, you would
have to reference the cells E4 through to E8 one by one. You would have to use
the following formula.
= E4 + E5 + E6 + E7 + E8
62 | P a g e
BCA-1 IT www.sbs.ac.in
=SUM (E4:E8)
As you can see from the above function used to get the sum of a range of cells, it
is much more efficient to use a function to get the sum than using the formula
which will have to reference a lot of cells.
Common functions
Let's look at some of the most commonly used functions in Excel. We will start
with statistical functions.
01 SUM Math & Trig Adds all the values in a range of cells =SUM(E4:E8)
57 P a g e
|
BCA-1 IT www.sbs.ac.in
07 SUMIF Math & Trig Adds all the values in a range of cells =SUMIF(D4:D
that meet a specified criteria. 8,">=1000",C
=SUMIF(range,criteria,[sum_range]) 4:C8)
09 DAYS Date & Time Returns the number of days between =DAYS(D4,C4)
two dates
10 NOW Date & Time Returns the current system date and =NOW()
time
Numeric Functions
As the name suggests, these functions operate on numeric data. The following
table shows some of the common numeric functions.
58 | P a g e
BCA-1 IT www.sbs.ac.in
59 | P a g e
BCA-1 IT www.sbs.ac.in
String functions
These functions are used to manipulate text data. The following table shows some
of the common string functions.
60 | P a g e
BCA-1 IT www.sbs.ac.in
61 | P a g e
BCA-1 IT www.sbs.ac.in
These functions are used to manipulate date values. The following table shows
some of the common date functions
61 | P a g e
BCA-1 IT www.sbs.ac.in
2 DAYS Date & Time Find the number of days between =DAYS(D6,C6)
two dates
3 MONTH Date & Time Returns the month from a date =MONTH("4/
value 2/2015")
4 MINUTE Date & Time Returns the minutes from a time =MINUTE("12
value :31")
5 YEAR Date & Time Returns the year from a date =YEAR("04/0
value 2/2015")
People often use charts and graphs in presentations to give management, client,
or team members a quick snapshot into progress or results. You can create a
chart or graph to represent nearly any kind of quantitative data — doing so will
save you the time and frustration of poring through spreadsheets to find
relationships and trends.
62 | P a g e
BCA-1 IT www.sbs.ac.in
It’s easy to create charts and graphs in Excel, especially since you can also store
your data directly in an Excel Workbook, rather than importing data from another
program. Excel also has a variety of preset chart and graph types so you can select
one that best represents the data relationship(s) you want to highlight.
To generate a chart or graph in Excel, you must first provide Excel with data to
pull from. In this section, we’ll show you how to chart data in Excel 2016.
1. Highlight the cells that contain the data you want to use in your graph
by clicking and dragging your mouse across the cells.
2. Your cell range will now be highlighted in gray and you can select a
chart type.
63 | P a g e
BCA-1 IT www.sbs.ac.in
Once you input your data and select the cell range, you’re ready to choose your
chart type to display your data. In this example, we’ll create a clustered column
chart from the data we used in the previous section.
Once your data is highlighted in the Workbook, click the Insert tab on the top
banner. About halfway across the toolbar is a section with several chart options.
Excel provides Recommended Charts based on popularity, but you can click any of
the dropdown menus to select a different template.
64 | P a g e
BCA-1 IT www.sbs.ac.in
1. From the Insert tab, click the column chart icon and select Clustered
Column.
1. Excel will automatically create a clustered chart column from your selected
data. The chart will appear in the center of your workbook.
2. To name your chart, double click the Chart Title text in the chart and type a
title. We’ll call this chart “Product Profit 2013 - 2017.”
We’ll use this chart for the rest of the walkthrough. You can download this same
chart to follow along.
65 | P a g e
BCA-1 IT www.sbs.ac.in
There are two tabs on the toolbar that you will use to make adjustments to your
chart: Chart Design and Format. Excel automatically applies design, layout, and
format presets to charts and graphs, but you can add customization by exploring
the tabs. Next, we’ll walk you through all the available adjustments in Chart
Design.
66 | P a g e
BCA-1 IT www.sbs.ac.in
Adding chart elements to your chart or graph will enhance it by clarifying data or
providing additional context. You can select a chart element by clicking on
the Add Chart Element dropdown menu in the top left-hand corner (beneath
the Home tab).
Although graphs and charts are distinct, Excel groups all graphs under the charts
categories listed in the previous sections. To create a graph or another chart type,
follow the steps below and select the appropriate graph type.
1. Highlight the cells that contain the data you want to use in your graph
by clicking and dragging your mouse across the cells.
67 | P a g e
BCA-1 IT www.sbs.ac.in
3. Once the text is highlighted you can select a graph (which Excel refers to as
chart). Click the Insert tab and click Recommended Charts on the toolbar.
Then click the type of graph you wish to use.
68 | P a g e
BCA-1 IT www.sbs.ac.in
Now you have a graph. To customize your graph, you can follow the same steps
explained in the previous section. All functionality for creating a chart remains the
same when creating a graph.
If you don’t need to make a data visualization, you can also create a table in Excel
using preexisting data. There are two ways to format a data set as a table:
1. To format data as a table, click and drag your mouse across the cells with
the data range, click the Home tab, and click the Format as Table drop-
69 | P a g e
BCA-1 IT www.sbs.ac.in
2. Click New Table Style… (You will also see an option to use PivotTables. This
feature is outside the scope of this how-to, but the concept is explained in
the following
3. section).
70 | P a g e
BCA-1 IT www.sbs.ac.in
4. A dialogue box opens and you can choose which aspects of the selected
range to include in your formatted table. Click the blue OK button.
71 | P a g e
BCA-1 IT www.sbs.ac.in
Features of MS PowerPoint
72 | P a g e
BCA-1 IT www.sbs.ac.in
Don’t confuse SmartArt with the similarly named WordArt. Where WordArt just
allows you to display text using a wide variety of different formats and effects,
SmartArt is a comprehensive and flexible business diagram tool that greatly
improves upon the ‘Diagram Gallery’ feature found in previous versions of Office.
2) Inserting Shapes
73 | P a g e
BCA-1 IT www.sbs.ac.in
If you need to include some sort of diagram in your presentation, then the
quickest and easiest way is probably to use SmartArt. However, it is important to
be able to include shapes independently of SmartArt and worth being familiar
with the various Drawing Tool format options.
Not only will they be useful if you do need to manually draw a diagram (and
SmartArt doesn’t suit all diagrams), but they can also be applied to objects on a
slide that you might not immediately think of as shapes. For example the box that
contains your slide title or your content. This can be anything from text to a video,
or even the individual shapes in a SmartArt diagram.
As you can see, the gallery of available shapes is very extensive. Once you have
selected your chosen shape, you can just click in your slide to insert a default
version of the shape or, to set a particular size and position, click and drag with
the mouse to create the shape and size you want.
3) Inserting an Image
74 | P a g e
BCA-1 IT www.sbs.ac.in
Here are two content type icons which appear in new content Placeholders for
inserting pictures. You can Insert Picture from File or Insert Clip Art. Alternatively,
the Illustrations group of the Insert ribbon tab includes the same two tools. In
addition, PowerPoint 2010 has a new ‘Screenshot’ option that allows you to
capture an entire window or part of a window for inclusion on a slide. You can
also copy any image and just paste it directly to a slide.
Insert Picture from File allows you to browse to an image file saved somewhere
on your system whereas Clip Art is held in an indexed gallery of different media
types. Clip Art is not limited to pictures: ‘The Results should be:’ box lets you
choose between: ‘All media file types’ and one or more of the following different
types:
Illustrations
Photographs
Video
Audio
Once you have found the image you want to use, click on it to insert it into the
current slide. You can now re-size and move the image accordingly with further
editting options available when you right click the desired image.
75 | P a g e
BCA-1 IT www.sbs.ac.in
4) Slide Transitions
Properly used, slide transitions can be make your presentations clearer and more
interesting and, where appropriate, more fun. Badly used, the effect of slide
transitions can be closer to irritating or even nauseating. Simple animation effects
are often used to add interest to bullet point text. Much more extreme animation
effects are available but, in most cases, should be used sparingly if at all.
In PowerPoint 2010 & 2013 there is also a separate Transitions ribbon tab that
includes a gallery of different transition effects. These can be applied to selected
slides or all slides. If you want to apply different transition effects to different
groups of slides, then you might want to choose ‘Slide Sorter’ view from the
Presentation Views group of the View ribbon.
76 | P a g e
BCA-1 IT www.sbs.ac.in
5) Adding Animations
Whereas the transition effects are limited to a single event per slide, animations
can be applied to every object on a slide – including titles and other text boxes.
Many objects can even have animation applied to different components, for
example each shape in a SmartArt graphic, each paragraph in a text box and each
column in a chart. Animations can be applied to three separate ‘events’ for each
object:
77 | P a g e
BCA-1 IT www.sbs.ac.in
Templates
A PowerPoint design template is a pre-made design you can use to lend
cohesiveness, visual organization and appeal to your presentation. All you have to
do is add your own content; the rest is already designed into the template. Even
though individual slides can have different layouts and graphics, templates help
the whole presentation go together as an attractive package.
Powerpoint: Formatting a Slide
78 | P a g e
BCA-1 IT www.sbs.ac.in
79 | P a g e
BCA-1 IT www.sbs.ac.in
You can make a chart in PowerPoint or Excel. If you have lots of data to
chart, create your chart in Excel, and then copy it into your presentation. This is
also the best way if your data changes regularly and you want your chart to
always reflect the latest numbers. In that case, when you copy and paste the
chart, keep it linked to the original Excel file.
To create a simple chart from scratch in PowerPoint, click Insert > Chart and pick
the chart you want.
81 | P a g e
BCA-1 IT www.sbs.ac.in
2. Click the chart type and then double-click the chart you want.
3. In the worksheet that appears, replace the placeholder data with your own
information.
82 | P a g e
BCA-1 IT www.sbs.ac.in
Moreover, there are generally two types of animations you can use to make your
presentation come alive. These are:
Transitions
The first type of animation is called transition animation; these are animations
added in between slides. When you transition from slide 1 to slide 2, you can add
an animation in between the slides. You can view the different transition options
by going to the Transitions pane on the PowerPoint ribbon.
83 | P a g e
BCA-1 IT www.sbs.ac.in
The default view shows 10 transitions, but if you click on the little arrow like you
see in the screenshot above, then you’ll see many more options like you see here:
Transition animations have additional effect options. You will notice this when
you click on the transition you want to use. The Effect Options button won’t be
grayed out, and you can select additional settings.
For example, I selected ‘Reveal’ as my transition animation. Available effect
options would be:
Smoothly from right
84 | P a g e
BCA-1 IT www.sbs.ac.in
You can also adjust the timing and duration of each transition as well as set how
you want the slides to advance so that the transition can take place.
85 | P a g e
BCA-1 IT www.sbs.ac.in
Feel free to play around with the transition animations and effect options that
work best with your presentation.
Animations
The second type of animations brings the objects or elements within your slide to
life. If you want to animate text, an image, shape, graph or chart, this is the type
of animation you select.
You first to have to click on the object you want to animate, then click on the
Animations tab.
86 | P a g e
BCA-1 IT www.sbs.ac.in
The default view shows 8 animations, but if you click on the little arrow like you
see on the screenshot above, then you’ll see many more options like you see
here:
87 | P a g e
BCA-1 IT www.sbs.ac.in
If you use this type of animation for an object, that object will enter the
Exit animations. The icons for this type of animation are colored red. The
Emphasis animations. The icons for this kind of animation are colored
yellow. The object won’t enter or exit the slide (unless you’ve added that
particular animation to the same object) but will emphasize and draw
Motion path animations. This type of animation will allow you to move an
object from one spot to another. You can specify or draw the path you want
In the next sections, we’ll go over how to add the 4 different types of
animations to your slides.
88 | P a g e
BCA-1 IT www.sbs.ac.in
To add entrance animations to any object in PowerPoint, here’s what you need to
do:
1. Click on the object you want to animate. In this example, we will use a blue
smiley face.
2. Select the animation you want to use. For this example, we used
the entrance animation – fade animation. We set the duration to 2.75 seconds.
You will notice in the screenshot below that the fade animation has no effect
options (the button is greyed out).
89 | P a g e
BCA-1 IT www.sbs.ac.in
2 – There are no Effect Options for Fade Animation (the button is grayed out and
not clickable)
3 – You can adjust settings via the Advanced Animation, Timing, and Animation
Pane sections
4 – The number (1) refers to the fact that we’ve added 1 animation to our object
(this is the Fade animation).
As you can see, adding animations to an object is no rocket science. You can even
add entrance, exit, emphasis and motion path animations to a single object!
It’s so easy adding animations to presentation slides that you can easily lose
control. Therefore, you’ll find yourself animating all objects on your slides and
adding slide transitions as well. Nevertheless, it might look fun to you, but in
reality, it can distract your audience’s attention from the message you’re trying to
convey in your presentation.
90 | P a g e
BCA-1 IT www.sbs.ac.in
So here are some guidelines you should following when adding animations to
PowerPoint:
1. Simplicity is key. Simple animations like fade and appear may not be as
impressive as other animations available, but these add a touch of elegance
to well-timed slides. It makes your slides look clean and simple.
2. Limit the number of animations on a slide. One or two animations per slide
should suffice. There’s really no need to animate every single object on each
slide.
3. Time your presentation well. Make sure your objects appear right after you
introduce it. This keeps your audience’s interest piqued.
4. Don’t forget to practice. Practicing your timings and your animations are key
to a successful presentation.
POWERPOINT SLIDESHOW
A PowerPoint slideshow (PPT) is a presentation created on software from
Microsoft that allows users to add audio, visual and audio/visual features to a
presentation. It is considered to be a multimedia technology and also acts as a
tool for collaboration and content sharing. PowerPoint is included in Microsoft
Office, making it one of the most well-known and widely used brands of
presentation software.
A PowerPoint slideshow is also known as a PowerPoint presentation
Slide Show view is the view that you use when showing the presentation to
others. One slide appears onscreen at a time, completely filling the screen. You
may have used this view already — to check your work — while you were creating
the presentation.
You can start Slide Show view from the first slide or from the current slide. The
following table summarizes the methods of doing each.
91 | P a g e
BCA-1 IT www.sbs.ac.in
Then, after you’re in Slide Show view, you can show your presentation. Here’s
how:
Move to the next slide (in any of these ways):
o Click the mouse.
o Press any key on the keyboard (except Backspace or the left arrow).
o Right-click to display a shortcut menu and then choose Next.
Move to the previous slide (in any of these ways):
o Press Backspace or the left arrow on the keyboard.
o Right-click to display a shortcut menu and choose Previous.
Jump to a specific slide:
o a.Right-click to display a shortcut menu.
o b.Point to Go to Slide.
o c.Click the slide you want to display.
92 | P a g e
BCA-1 IT www.sbs.ac.in
UNIT – D
Secure Electronic Transaction,
Types ofPayment System: Digital Cash, Electronic Cheque, Smart Card,
Credit/Debit
Card E-Money, Bit Coins and Crypto currency, Electronic Fund Transfer
(EFT), Unified Payment Interface (UPI), Immediate Payment System (IMPS),
Digital Signature and Certification Authority.
Introduction to Bluetooth, Cloud Computing, Big Data, Data Mining, Mobile
Computing and Embedded Systems and Internet of Things (IoT)
Electronic Payment is a financial exchange that takes place online between buyers
and sellers. The content of this exchange is usually some form of digital financial
instrument (such as encrypted credit card numbers, electronic cheques or digital
93 | P a g e
BCA-1 IT www.sbs.ac.in
94 | P a g e
BCA-1 IT www.sbs.ac.in
Requirements in SET :
SET protocol has some requirements to meet, some of the important
requirements are :
It has to provide mutual authentication i.e., customer (or cardholder)
authentication by confirming if the customer is intended user or not and
merchant authentication.
It has to keep the PI (Payment Information) and OI (Order Information)
confidential by appropriate encryptions.
95 | P a g e
BCA-1 IT www.sbs.ac.in
When you purchase goods and services online, you pay for them using an
electronic medium. This mode of payment, without using cash or cheque, is called
an e-commerce payment system and is also known as online or electronic
payment systems.
The growing use of internet-based banking and shopping has seen the growth of
various e-commerce payment systems and technology has been developed to
increase, improve and provide secure e-payment transactions.
1. Digital Cash
Digital Cash acts much like real cash, except that it’s not on paper. Money in your
bank account is converted to a digital code. This digital code may then be stored
on a microchip, a pocket card (like a smart card), or on the hard drive of your
computer.
96 | P a g e
BCA-1 IT www.sbs.ac.in
The concept of privacy is the driving force behind digital cash. The user of
digital cash is assured an anonymous transaction by any vendor who accepts
it. Your special bank account code can be used over the internet or at any
participating merchant to purchase an item. Everybody involved in the
transaction, from the bank to the user to the vendor, agree to recognize the
worth of the transaction, and thus create this new form or exchange.
This example shows how digital cash might work through a banking
institution. The bank creates a digital bank note by signing a message which
specifies the serial number (with a primary or public key) and value of the note,
and sends it to Person A. Person A, as he withdraws it, uses Chaum's technique (A
Cryptography technique) to alter the serial number so that the bank will not
recognize the note as being from this withdrawal. This note is now returned to
the bank with the new serial number. The bank now has a note with a new serial
number. Person A then pays Person B electronically by sending the bank note to
him. Person B checks the note's validity by decrypting using the bank's public key
to check its signature (new serial number validity). Person B then sends the note
to the bank, which checks the serial number to confirm that this bank note hasn't
been spent before. The serial number is now different from that in Person A’s
withdrawal, thereby pre- venting the bank from linking the two transactions. The
enabling bank merely checks the new serialized key account for the amount of the
transaction and transfers the money by sending out a depository notice. Person B
97 | P a g e
BCA-1 IT www.sbs.ac.in
using the same encrypting technique returns the depository notice with the new
serialize account.
2. Electronic Cheque:
An electronic check or e check is a form of payment made via the Internet, or
another data network, designed to perform the same function as a conventional
paper check. Since the check is in an electronic format, it can be processed in
fewer steps.
Additionally, it has more security features than standard paper checks including
authentication, public key cryptography, digital signatures, and encryption,
among others.
98 | P a g e
BCA-1 IT www.sbs.ac.in
99 | P a g e
BCA-1 IT www.sbs.ac.in
3. Smart Card
Smart Card It is a plastic card embedded with a microprocessor that has the
customer’s personal information stored in it and can be loaded with funds to
make online transactions and instant payment of bills. The money that is loaded
in the smart card reduces as per the usage by the customer and has to be
reloaded from his/her bank account.
A smart card is a physical card that has an embedded integrated chip that acts as
a security token. Smart cards are typically the same size as a driver's license or
credit card and can be made out of metal or plastic. They connect to a reader
either by direct physical contact (also known as chip and dip) or through a short-
range wireless connectivity standard such as radio-frequency identification
(RFID).The chip on a smart card can be either a microcontroller or an embedded
memory chip. Smart cards are designed to be tamper-resistant and use
encryption to provide protection for in-memory information. Those cards with
microcontroller chips can perform on-card processing functions and can
manipulate information in the chip's memory.
100 | P a g e
BCA-1 IT www.sbs.ac.in
Smart cards are used for a variety of applications, though most commonly are
used for credit cards and other payment cards
Smart card microprocessors or memory chips exchange data with card readers
and other systems over a serial interface. The smart card itself is powered by an
external source, usually the smart card reader. A smart card communicates with
readers either via direct physical contact or using a short-range wireless
connectivity standard such as RFID . The card reader then passes data from the
smart card to its intended destination, usually a payment or authentication
system connected to the smart card reader over a network connection.
3. Credit Card
Credit Card The most popular form of payment for e-commerce transactions is
through credit cards. It is simple to use; the customer has to just enter their credit
card number and date of expiry in the appropriate area on the seller’s web page.
To improve the security system, increased security measures, such as the use of a
card verification number (CVN), have been introduced to on-line credit card
payments. The CVN system helps detect fraud by comparing the CVN number
with the cardholder's information.
Users can swipe the credit card to make a payment or use it for online
transactions. After you apply for a credit card, simply make sure that the
101 | P a g e
BCA-1 IT www.sbs.ac.in
borrowed amount is repaid within the stipulated time frame to avoid penalty
charges. Your credit card details are always secured with the card issuer and you
should not share your credit card information with anyone to avoid fraud.
The credit company provider may also grant a line of credit (LOC) to cardholders,
enabling them to borrow money in the form of cash advances. Issuers customarily
pre-set borrowing limits, based on an individual's credit rating. A vast majority of
businesses let the customer make purchases with credit cards, which remain one
of today's most popular payment methodologies for buying consumer goods and
services.
4. Debit Card
Debit Card Debit cards are the second largest e-commerce payment medium in
India. Customers who want to spend online within their financial limits prefer to
pay with their Debit cards. With the debit card, the customer can only pay for
purchased goods with the money that is already there in his/her bank account as
opposed to the credit card where the amounts that the buyer spends are billed to
him/her and payments are made at the end of the billing period.
need to carry cash or physical checks to make purchases. In addition, debit cards,
also called check cards, offer the convenience of credit cards and many of the
same consumer protections when issued by major payment processors like Visa
or Mastercard.
Unlike credit cards, debit cards do not allow the user to go into debt
Debit cards serve a dual purpose: They allow the user to withdraw money from
his or her checking account through an ATM or through the cash-back function
many merchants offer at the point of sale. In addition, they also allow the user to
make purchases.
ATM cards, by contrast, only allow the user to withdraw money from an ATM,
while credit cards only allow purchases unless the credit card holder has a PIN-
enabled cash advance feature (and the cash advance will incur interest, unlike
withdrawing cash from a checking account).
103 | P a g e
BCA-1 IT www.sbs.ac.in
Cryptocurrencies are not only used as payment systems but can also be used to
execute contracts and run programs. Anyone can create a digital currency, so at
any given time there can be hundreds, or even thousands, of cryptocurrencies in
circulation.
104 | P a g e
BCA-1 IT www.sbs.ac.in
Electronic Funds Transfer (EFT) is a system of transferring money from one bank
account directly to another without any paper money changing hands. One of the
most widely-used EFT programs is direct deposit, through which payroll is
deposited straight into an employee's bank account. However, EFT refers to any
transfer of funds initiated through an electronic terminal, including credit card,
ATM and point-of-sale (POS) transactions. It is used for both credit transfers, such
as payroll payments, and for debit transfers, such as mortgage payments.
Transactions are processed by the bank through the Automated Clearing House
(ACH) network, the secure transfer system that connects all financial institutions.
For payments, funds are transferred electronically from one bank account to the
billing company's bank, usually less than a day after the scheduled payment date.
Types of EFTs
105 | P a g e
BCA-1 IT www.sbs.ac.in
Advantages of EFT:
The main advantage of an electronic funds transfer is time. Since all the
transaction is done automatically and electronically, the bank doesn’t need to pay
a person to do it, a person to drive the loans to the other bank, the cost of the
transport, the cost of the maintenance of the transport, insurance and the gas of
the transport. EFT’s have revolutionized modern banking.
Other benefit is immediate payment, which brings an up to date cash flow. You
won’t hear either about lost checks causes by the inefficiency of normal mail
106 | P a g e
BCA-1 IT www.sbs.ac.in
(nowadays known as snail mail for its velocity compared to emails) and up to
date bookkeeping.
There are numerous ways of transferring money from one bank account to
account. With the increasing technology, online money transfer has become the
easiest way of transferring money from one bank to another without any
difficulty. Here are three major means of transferring money.
1. NEFT
2. RTGS
3.UPI
4. IMPS
Stated simply, if an individual wishes to transfer a sum of money from his bank
account to another person’s bank account, he can do so through the process
of NEFT, instead of withdrawing money and then paying it in cash or by
writing
107 | P a g e
BCA-1 IT www.sbs.ac.in
out a cheque. The main benefit offered by NEFT is that it can transfer funds from
108 | P a g e
BCA-1 IT www.sbs.ac.in
any account of any branch to any other bank account located at any given place.
The only condition is that both the sender and receiver branches should be NEFT-
enabled
In the process of NEFT, you just have to enter the details of the beneficiary for the
first time after which you can just select the beneficiary from the list, enter the
amount and send. Take a look at some of the benefits of NEFT transactions that
could make your daily transactions simpler:
109 | P a g e
BCA-1 IT www.sbs.ac.in
Real Time Gross Settlement (RTGS) is an electronic form of funds transfer where
the transmission takes place on a real time basis.
In India, transfer of funds with RTGS is done for high value transactions, the
minimum amount being Rs 2 lakh. The beneficiary account receives the funds
transferred, on a real time basis. The main difference between RTGS and National
Electronic Funds Transfer (NEFT) is that while transfer via NEFT takes place in
batches (with settlements and transactions being netted off), in the case of RTGS,
the transactions are executed individually and on gross basis.
The customer initiating the funds transfer through RTGS has to have the Indian
Financial System Code (IFSC) of the beneficiary's bank, along with the name of the
beneficiary, account number and name of the bank. The bank branches, both at
the initiating and receiving end, have to be RTGS-enabled for the transaction to
be processed. Customers with Internet banking accounts can do RTGS
transactions on their own
No bank account detail is needed for the money transfer through UPI. Only
mobile number or name is sufficient and the transactions can be done 24/7. UPI-
enabled apps allow the transfers up to Rs 1 lakh.
111 | P a g e
BCA-1 IT www.sbs.ac.in
Immediate Payment Service or IMPs an instant fund transfer service and it can be
used anytime. IMPS can be simply defined as NEFT+RTGS.
In order to avoid fraud complaints, the cap on transaction limit is set very low. For
IMPS transfer, you just need to know the destination account holder's IMPS id
(MMID) and his/her mobile number.
Step 1:Using your Customer ID and Password into Net Banking/Mobile Banking
Step 2: Go to Funds Transfer tab (Other Bank Account)
Step 3: Select Debit / Credit Account, mode of transfer as IMPS and beneficiary
account
Step 4: Enter the amount to be transferred and click on Submit
Step 5: Click on the confirm button
Step 6: Recheck all the information and approve the transaction using OTP (one
time password) received on your registered mobile number
Step 7: And at last, confirm by clicking on the submit button.
Through IMPS, you can transfer money 24/7, But RTGS & NEFT can be done only
in working hours on weekdays + a few hours on Saturdays only. Other than NEFT,
RTGS and IMPS, you can also transfer your money through UPI and cheque.
The major feature of IMPS is that it is available at all times for usage. It transfers
funds instantly and is a great banking platform in case of emergencies. The
transaction charges of this platform are also very nominal and the transfer limit
is also considerable, approximately Rupees 2 lakhs per day. Moreover, IMPS is
available on mobile too which makes it super-convenient.
DIGITAL SIGNATURE
112 | P a g e
BCA-1 IT www.sbs.ac.in
Digital signatures, like handwritten signatures, are unique to each signer. Digital
signature solution providers, such as DocuSign, follow a specific protocol,
called PKI. PKI requires the provider to use a mathematical algorithm to generate
two long numbers, called keys. One key is public, and one key is private.
When a signer electronically signs a document, the signature is created using the
signer’s private key, which is always securely kept by the signer. The
mathematical algorithm acts like a cipher, creating data matching the signed
document, called a hash, and encrypting that data. The resulting encrypted data
is the digital signature. The signature is also marked with the time that the
document was signed. If the document changes after signing, the digital signature
is invalidated.
As an example, Jane signs an agreement to sell a timeshare using her private key.
The buyer receives the document. The buyer who receives the document also
receives a copy of Jane’s public key. If the public key can’t decrypt the signature
(via the cipher from which the keys were created), it means the signature isn’t
Jane’s, or has been changed since it was signed. The signature is then considered
invalid.
Introduction to Bluetooth
Bluetooth is a short-range wireless communication technology that allows devices
such as mobile phones, computers, and peripherals to transmit data or voice
wirelessly over a short distance. The purpose of Bluetooth is to replace the cables
that normally connect devices, while still keeping the communications between
them secure.
Bluetooth Technology
114 | P a g e
BCA-1 IT www.sbs.ac.in
115 | P a g e
BCA-1 IT www.sbs.ac.in
Cloud computing is the delivery of different services through the Internet. These
resources include tools and applications like data storage, servers, databases,
networking, and software.
Cloud computing is a popular option for people and businesses for a number of
reasons including cost savings, increased productivity, speed and efficiency,
performance, and security.
116 | P a g e
BCA-1 IT www.sbs.ac.in
Cloud computing is a general term for anything that involves delivering hosted
services over the Internet. These services are broadly divided into three
categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and
Software-as-a-Service (SaaS). The name cloud computing was inspired by the
cloud symbol that's often used to represent the Internet in flowcharts and
diagrams
117 | P a g e
BCA-1 IT www.sbs.ac.in
Regardless of the kind of service, cloud computing services provide users with a
series of functions including:
Email
Storage, backup, and data retrieval
Creating and testing apps
Analyzing data
Audio and video streaming
Delivering software on demand
Big Data
Data
Big Data is also data but with a huge size. Big Data is a term used to describe a
collection of data that is huge in size and yet growing exponentially with time. In
short such data is so large and complex that none of the traditional data
management tools are able to store it or process it efficiently.
(i) Volume – The name Big Data itself is related to a size which is enormous. Size
of data plays a very crucial role in determining value out of data. Also, whether a
particular data can actually be considered as a Big Data or not, is dependent upon
the volume of data. Hence, 'Volume' is one characteristic which needs to be
considered while dealing with Big Data.
118 | P a g e
BCA-1 IT www.sbs.ac.in
Variety refers to heterogeneous sources and the nature of data, both structured
and unstructured. During earlier days, spreadsheets and databases were the only
sources of data considered by most of the applications. Nowadays, data in the
form of emails, photos, videos, monitoring devices, PDFs, audio, etc. are also
being considered in the analysis applications. This variety of unstructured data
poses certain issues for storage, mining and analyzing data.
(iii) Velocity – The term 'velocity' refers to the speed of generation of data. How
fast the data is generated and processed to meet the demands, determines real
potential in the data.
Big Data Velocity deals with the speed at which data flows in from sources like
business processes, application logs, networks, and social media sites,
sensors, Mobile devices, etc. The flow of data is massive and continuous.
(iv) Variability – This refers to the inconsistency which can be shown by the data
at times, thus hampering the process of being able to handle and manage the
data effectively.
Access to social data from search engines and sites like face book, twitter are
enabling organizations to fine tune their business strategies.
119 | P a g e
BCA-1 IT www.sbs.ac.in
DATA MINING
Data mining is the process of analyzing hidden patterns of data according to
different perspectives for categorization into useful information, which is
collected and assembled in common areas, such as data warehouses, for efficient
analysis, data mining algorithms, facilitating business decision making and other
information requirements to ultimately cut costs and increase revenue.
Data mining is also known as data discovery and knowledge discovery.
120 | P a g e
BCA-1 IT www.sbs.ac.in
The first step in data mining is gathering relevant data critical for business.
Company data is either transactional, non-operational or metadata. Transactional
data deals with day-to-day operations like sales, inventory and cost etc. Non-
operational data is normally forecast, while metadata is concerned with logical
database design. Patterns and relationships among data elements render relevant
information, which may increase organizational revenue. Organizations with a
strong consumer focus deal with data mining techniques providing clear pictures
of products sold, price, competition and customer demographics.
121 | P a g e
BCA-1 IT www.sbs.ac.in
1. Financial Analysis
2. Biological Analysis
3. Scientific Analysis
4. Intrusion Detection
5. Fraud Detection
6. Research Analysis
Market Basket Analysis is a technique which gives the careful study of purchases
done by a customer in a super market. The concept is basically applied to identify
the items that are bought together by a customer. Say, if a person buys bread,
what are the chances that he/she will also purchase butter. This analysis helps in
122 | P a g e
BCA-1 IT www.sbs.ac.in
promoting offers and deals by the companies. The same is done with the help of
data mining.
Mobile Computing
Mobile Computing is a technology that allows transmission of data, voice and
video via a computer or any other wireless enabled device without having to be
connected to a fixed physical link. The main concept involves −
Mobile communication
Mobile hardware
Mobile software
Mobile communication
The mobile communication in this case, refers to the infrastructure put in place
to ensure that seamless and reliable communication goes on. These would
include devices such as protocols, services, bandwidth, and portals necessary to
facilitate and support the stated services. The data format is also defined at this
stage. This ensures that there is no collision with other existing systems which
offer the same service.
123 | P a g e
BCA-1 IT www.sbs.ac.in
Mobile Hardware
Mobile hardware includes mobile devices or device components that receive or
access the service of mobility. They would range from portable laptops,
smartphones, tablet Pc's, Personal Digital Assistants.
124 | P a g e
BCA-1 IT www.sbs.ac.in
These devices will have a receptor medium that is capable of sensing and
receiving signals. These devices are configured to operate in full- duplex,
whereby they are capable of sending and receiving signals at the same time.
They don't have to wait until one device has finished communicating for the
other device to initiate communications.
Above mentioned devices use an existing and established network to operate on.
In most cases, it would be a wireless network.
Mobile software
Mobile software is the actual program that runs on the mobile hardware. It deals
with the characteristics and requirements of mobile applications. This is the
engine of the mobile device. In other terms, it is the operating system of the
appliance. It's the essential component that operates the mobile device.
Since portability is the main factor, this type of computing ensures that users are
not tied or pinned to a single physical location, but are able to operate from
anywhere. It incorporates all aspects of wireless communications.
125 | P a g e
BCA-1 IT www.sbs.ac.in
System
A system is an arrangement in which all its unit assemble work together
according to a set of rules. It can also be defined as a way of working, organizing
or doing one or many tasks according to a fixed plan. For example, a watch is a
time displaying system. Its components follow a set of rules to show time. If one
of its parts fails, the watch will stop working. So we can say, in a system, all its
subcomponents depend on each other.
Embedded System
As its name suggests, Embedded means something that is attached to another
thing. An embedded system can be thought of as a computer hardware system
having software embedded in it. An embedded system can be an independent
system or it can be a part of a large system. An embedded system is a
microcontroller or microprocessor based system which is designed to perform a
specific task. For example, a fire alarm is an embedded system; it will sense only
smoke.
126 | P a g e
BCA-1 IT www.sbs.ac.in
127 | P a g e
BCA-1 IT www.sbs.ac.in
Advantages
Easily Customizable
Low power consumption
Low cost
128 | P a g e
BCA-1 IT www.sbs.ac.in
Enhanced performance
Disadvantages
129 | P a g e
BCA-1 IT www.sbs.ac.in
Internet Of Things(IOT)
The internet of things, or IoT, is a system of interrelated computing devices,
mechanical and digital machines, objects, animals or people that are provided
with unique identifiers (UIDs) and the ability to transfer data over a network
without requiring human-to-human or human-to-computer interaction.
A thing in the internet of things can be a person with a heart monitor implant, a
farm animal with a biochip transponder, an automobile that has built-
in sensors to alert the driver when tire pressure is low or any other natural or
man-made object that can be assigned an IP address and is able to transfer data
over a network.
130 | P a g e
BCA-1 IT www.sbs.ac.in
131 | P a g e
BCA-1 IT www.sbs.ac.in
132 | P a g e
BCA-1 IT www.sbs.ac.in
133 | P a g e