SlideShare a Scribd company logo
1 of 27
BASIC COMPUTER
Beginners
Introduction
 A computer is a programmable machine designed to
perform arithmetic and logical operations automatically
and sequentially on the input given by the user and gives
the desired output after processing. Computer
components are divided into two major categories namely
hardware and software. Hardware is the machine itself
and its connected devices such as monitor, keyboard,
mouse etc. Software are the set of programs that make
use of hardware for performing various functions.
Operations
A computer performs five major operations or functions irrespective of
its size and make. These are
 it accepts data or instructions as input,
 it stores data and instruction
 it processes data as per the instructions,
 it controls all operations inside a computer,
and
 it gives results in the form of output
Memory
 Computer’s memory can be classified into two types; primary memory and
secondary memory
Primary Memory can be further classified as RAM and ROM.
 RAM or Random Access Memory is the unit in a computer system. It is the
place in a computer where the operating system, application programs and
the data in current use are kept temporarily so that they can be accessed by
the computer’s processor. It is said to be ‘volatile’ since its contents are
accessible only as long as the computer is on. The contents of RAM are no
more available once the computer is turned off.
 ROM or Read Only Memory is a special type of memory which can only be read
and contents of which are not lost even when the computer is switched off. It
typically contains manufacturer’s instructions. Among other things, ROM also
stores an initial program called the ‘bootstrap loader’ whose function is to
start the operation of computer system once the power is turned on.
. Secondary Memory
 RAM is volatile memory having a limited storage capacity.
Secondary/auxiliary memory is storage other than the
RAM. These include devices that are peripheral and are
connected and controlled by the computer to enable
permanent storage of programs and data.
 Secondary storage devices are of two types; magnetic and
optical. Magnetic devices include hard disks and optical
storage devices are CDs, DVDs, Pen drive, Zip drive etc.
Hard Disk
 Hard disks are made up of rigid material and are
usually a stack of metal disks sealed in a box. The
hard disk and the hard disk drive exist together as
a unit and is a permanent part of the computer
where data and programs are saved. These disks
have storage capacities ranging from 1GB to 80
GB and more. Hard disks are rewritable.
CD & DVD
 Compact Disk (CD) is portable disk having data storage capacity between 650-
700 MB. It can hold large amount of information such as music, full-motion
videos, and text etc. CDs can be either read only or read write type.
 Digital Video Disk (DVD) is similar to a CD but has larger storage capacity and
enormous clarity. Depending upon the disk type it can store several Gigabytes
of data. DVDs are primarily used to store music or movies and can be played
back on your television or the computer too. These are not rewritable
Input / Output Devices
 These devices are used to enter information and
instructions into a computer for storage or processing and
to deliver the processed data to a user. Input/Output
devices are required for users to communicate with the
computer. In simple terms, input devices bring
information INTO the computer and output devices bring
information OUT of a computer system. These
input/output devices are also known as peripherals since
they surround the CPU and memory of a computer system.
Input Devices
 An input device is any device that provides input
to a computer. There are many input devices, but
the two most common ones are a keyboard and
mouse. Every key you press on the keyboard and
every movement or click you make with the
mouse sends a specific input signal to the
computer.
Output Devices
 Output device receives information from the CPU
and presents it to the user in the desired from.
The processed data, stored in the memory of the
computer is sent to the output unit, which then
converts it into a form that can be understood by
the user. The output is usually produced in one of
the two ways – on the display device, or on paper
(hard copy).
COMPUTER SOFTWARE
Computer software is the set of programs that makes the
hardware perform a set of tasks in particular order.
Hardware and software are complimentary to each other.
Both have to work together to produce meaningful results.
Computer software is classified into two broad categories;
system software and application software
System Software
 System software consists of a group of programs that
control the operations of a computer equipment including
functions like managing memory, managing peripherals,
loading, storing, and is an interface between the
application programs and the computer. MS DOS
(Microsoft’s Disk Operating System), UNIX are examples of
system software.
Application software
 Software that can perform a specific task for the
user, such as word processing, accounting,
budgeting or payroll, fall under the category of
application software. Word processors,
spreadsheets, database management systems are
all examples of general purpose application
software
Types of application software are:
 Word processing software: The main purpose of this software is to produce
documents. MS-Word, Word Pad, Notepad and some other text editors are
some of the examples of word processing software.
 Database software: Database is a collection of related data. The purpose of
this software is to organize and manage data. The advantage of this software
is that you can change the way data is stored and displayed. MS access,
dBase, FoxPro, Paradox, and Oracle are some of the examples of database
software.
 Spread sheet software: The spread sheet software is used to maintain
budget, financial statements, grade sheets, and sales records. The purpose of
this software is organizing numbers. It also allows the users to perform simple
or complex calculations on the numbers entered in rows and columns. MS-
Excel is one of the example of spreadsheet software.
 Presentation software: This software is used to display the
information in the form of slide show. The three main
functions of presentation software is editing that allows
insertion and formatting of text, including graphics in the
text and executing the slide shows. The best example for
this type of application software is Microsoft PowerPoint.
 Multimedia software: Media players and real players are
the examples of multimedia software. This software will
allow the user to create audio and videos. The different
forms of multimedia software are audio converters,
players, burners, video encoders and decoders.
WINDOWS DESKTOP ELEMENTS
 Start Menu
 Task Bar
 System Tray
 Using 'My Computer‘ for browsing your disk drives
COMPUTER SECURITY
 Security has always been an overriding concern of human kind. For
many organization, information plays a very important role in running
business. Therefore, it becomes necessary to safeguard information
from reaching the illegal hands. When data takes the shapes of digital
form, a different security procedure is required. This branch of
security is called computer security.
 Information technology has also some loopholes associated with it,
like the possibility of stealing of vital information and intentionally
implanting destructive or malicious programs on the other's computer
system. The motive behind such activities is to show down the pace of
an organization and harm it economically. We shall discuss now about
these malicious programs which are often called virus, worms, Trojan
horse, logic bomb, spyware and so on.
Virus
 Virus is a program which has been written to interfere with the normal functioning of
the computer. It does this by clogging the memory of the system by making copies of
itself or it may destroy critical information used by other computer programs.
 There are three main types of viruses: Boot sector viruses which infect the boot sector
in the hard disk and affect the partition table, File viruses attach with executable files.
The commonly infected files are those with COM or EXE extensions. The third, System
viruses infect specific system files such as command.com. Computer viruses can be
grouped into Time Bomb, Trojan Horse, Worm etc. Time Bomb will start on a particular
date, at a particular time. The computer will loose its ability to function properly.
 The virus known as Trojan Horse will enter into a computer through an e-mail or free
programs that have been down loaded from the internet and casue plenty of damage.
Viruses known as Worms are constructed to infiltrate on the legitimate data processing
programs and alter or destroy the data. Worm programs often use network connections
to spread from one computer system to another system, thus, worms attach system
that are linked through communication lines.
Protecting computer system using
antivirus software
 In case the virus is present, it becomes our duty to use some anti-virus
software for preventing virus attacks in future. Anti-virus software
falls into two categories: Scanners and Integrity checkers.
 A scanner is a program that will detect the virus by checking the files
on the disk, the boot sector of the disk and programs in the memory
by looking for the signature of the virus. The signature is a piece of
program code that is unique to the virus. It is very necessary to
update regularly the virus scanner that you have bought. This is
essential because new viruses are constantly appearing.
Windows key Shortcut
 Window key + R –Opens run command.
 Windows key + Up arrow key /down arrow key –Maximize or minimize current
window.
 Window key +M/D –Minimize all/Show desktop.
 Window key + L –Lock Window.
 Window key + E –Open explorer.
 Window key +l –Lock window.
 Window key/Alt + Tab –Move to next window.
 CTRL+SHIFT +ESC –Open task manager.
 Alt + Ctrl+ Del –Options for task manager.
Window Key + R(Run Menu)
 Ms excel –Excel.
 Ms Word –Winword.
 Ms Power Point –Powerpnt.
 Ms Paint –mspaint.
 Notepad –Notepad.
 Wordpad –Wordpad.
 Calculator –Calc.
 Control panel –Control.
 Printers Control –Control Printers.
 Command –Command Printers.
 Internet Explorer –iexplorer.
 Computer management –compmgmt.msc.
 Services Management –services.msc.
 Device management –Devmgmt.msc.
 Disk cleanup –cleanmgr.
 Windows media player –wmplayer.
 Computer Info –msinfo.
Communication
 Inside a computer network many communication programs are installed on
Intranet computers to connect to the internet or even to internal computers.
Web Browsers
A web browser is program to navigate the www and retrieve web pages.It
runs directly on user’s computer and connects to external web servers
,Identified with the www prefix in the internet name , to retrieve web pages.
Example: Google chrome, Mozilla Firefox , an open source software with
23%,Microsoft Internet explorer ,
Search Engines
 A search engine is a special program running on a website which offers to the
user the possibility of searching other websites for specific web pages. The
users needs to connect to the search engine websites and digit the keywords ,
or sometimes even a complete question , and the website returns the list of
relevant web pages.
Search engine use a crawler technique: they continuously go through the
known web pages memorizing their content and trying to discover other web
pages through the contained links . In this way they are able to memorize
most of the www’s pages , even though some not linked websites can remain
unknown to search engines.
Examples: Google ,Yahoo, Bing
Browsers Shortcut
CTRL+T/N -Open new tab.
CTRL +D –Bookmark.
CTRL+J –Display the download window.
CTRL + W –Close tab/window.
SHIFT + B –display bookmark.
SHIFT + W –Close window.
CTRL + SHIFT + T –Undo the close of a tab.
E-Mail
 Email is one of the fundamental internet technologies, a tool used by nearly
every person with an internet connection. It allows you to, at no cost, send a
letter of unlimited length to one person – or many people at once. It arrives
almost instantly, and they can reply straight away. Setting up your own email
account will allow you to communicate with people you know in ways you
never thought possible.
To give you an idea of how email works, your presenter can provide a quick
walkthrough of how to send an email:
 First, a new email is created
 Then, recipient addresses are filled in
 Next, a subject line is entered
 Then the content of the email is typed in And the email is sent.
E-Mail Providers
Gmail
 www.gmail.com
HOTMAIL
 www.hotmail.com
YAHOO MAIL
 mail.yahoo.com
INBOX.COM
 www.inbox.com

More Related Content

What's hot

Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
Mark Santos
 
BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1
Ndubi Amos
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
Kak Yong
 

What's hot (20)

component of computer
component of computercomponent of computer
component of computer
 
Basic hardware familiarization
Basic hardware familiarizationBasic hardware familiarization
Basic hardware familiarization
 
Components of a computer system
Components of a computer systemComponents of a computer system
Components of a computer system
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
COMPONENTS OF COMPUTER SYSTEM UNIT
COMPONENTS OF COMPUTER SYSTEM UNIT  COMPONENTS OF COMPUTER SYSTEM UNIT
COMPONENTS OF COMPUTER SYSTEM UNIT
 
Computer program, computer languages, computer software
Computer program, computer languages, computer softwareComputer program, computer languages, computer software
Computer program, computer languages, computer software
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
 
PPT ON HARDWARE AND CONCEPT
PPT ON HARDWARE AND CONCEPT PPT ON HARDWARE AND CONCEPT
PPT ON HARDWARE AND CONCEPT
 
IGCSE ICT Theory
IGCSE ICT Theory IGCSE ICT Theory
IGCSE ICT Theory
 
Software and hardware presentation
Software and hardware presentationSoftware and hardware presentation
Software and hardware presentation
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Software components
Software componentsSoftware components
Software components
 
Input computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICTInput computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICT
 
1 basic computer course
1 basic computer course1 basic computer course
1 basic computer course
 
Computer Hardware and Software Elements
Computer Hardware and Software ElementsComputer Hardware and Software Elements
Computer Hardware and Software Elements
 
Wk 2 - computers
Wk 2 - computersWk 2 - computers
Wk 2 - computers
 
Bab1
Bab1Bab1
Bab1
 
BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1BCS 100: Introduction to Computer Science Lesson 1
BCS 100: Introduction to Computer Science Lesson 1
 
T1 hardware software
T1 hardware softwareT1 hardware software
T1 hardware software
 
La2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systemsLa2 ict-topic-2-computer-systems
La2 ict-topic-2-computer-systems
 

Similar to Basic computer tutorial

Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cpp
meharikiros2
 

Similar to Basic computer tutorial (20)

system Security
system Security system Security
system Security
 
Computer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cppComputer_Programming_Fundamentals in cpp
Computer_Programming_Fundamentals in cpp
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Computer application
Computer applicationComputer application
Computer application
 
Computer in nursing
Computer in nursingComputer in nursing
Computer in nursing
 
User Hardware and software ppt Ffff.pptx
User Hardware and software ppt Ffff.pptxUser Hardware and software ppt Ffff.pptx
User Hardware and software ppt Ffff.pptx
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
 
System Software
System SoftwareSystem Software
System Software
 
Information communication technology.pptx
Information communication technology.pptxInformation communication technology.pptx
Information communication technology.pptx
 
Basics of Computer for Students
Basics of Computer for StudentsBasics of Computer for Students
Basics of Computer for Students
 
Report-computer hardware,system, and software
Report-computer hardware,system, and softwareReport-computer hardware,system, and software
Report-computer hardware,system, and software
 
Hardware and Software.pptx
Hardware and Software.pptxHardware and Software.pptx
Hardware and Software.pptx
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
B.Ed class-1
B.Ed class-1B.Ed class-1
B.Ed class-1
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer system
 
Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)
 
Computer hw sw
Computer hw swComputer hw sw
Computer hw sw
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Basic computer tutorial

  • 2. Introduction  A computer is a programmable machine designed to perform arithmetic and logical operations automatically and sequentially on the input given by the user and gives the desired output after processing. Computer components are divided into two major categories namely hardware and software. Hardware is the machine itself and its connected devices such as monitor, keyboard, mouse etc. Software are the set of programs that make use of hardware for performing various functions.
  • 3. Operations A computer performs five major operations or functions irrespective of its size and make. These are  it accepts data or instructions as input,  it stores data and instruction  it processes data as per the instructions,  it controls all operations inside a computer, and  it gives results in the form of output
  • 4. Memory  Computer’s memory can be classified into two types; primary memory and secondary memory Primary Memory can be further classified as RAM and ROM.  RAM or Random Access Memory is the unit in a computer system. It is the place in a computer where the operating system, application programs and the data in current use are kept temporarily so that they can be accessed by the computer’s processor. It is said to be ‘volatile’ since its contents are accessible only as long as the computer is on. The contents of RAM are no more available once the computer is turned off.  ROM or Read Only Memory is a special type of memory which can only be read and contents of which are not lost even when the computer is switched off. It typically contains manufacturer’s instructions. Among other things, ROM also stores an initial program called the ‘bootstrap loader’ whose function is to start the operation of computer system once the power is turned on.
  • 5. . Secondary Memory  RAM is volatile memory having a limited storage capacity. Secondary/auxiliary memory is storage other than the RAM. These include devices that are peripheral and are connected and controlled by the computer to enable permanent storage of programs and data.  Secondary storage devices are of two types; magnetic and optical. Magnetic devices include hard disks and optical storage devices are CDs, DVDs, Pen drive, Zip drive etc.
  • 6. Hard Disk  Hard disks are made up of rigid material and are usually a stack of metal disks sealed in a box. The hard disk and the hard disk drive exist together as a unit and is a permanent part of the computer where data and programs are saved. These disks have storage capacities ranging from 1GB to 80 GB and more. Hard disks are rewritable.
  • 7. CD & DVD  Compact Disk (CD) is portable disk having data storage capacity between 650- 700 MB. It can hold large amount of information such as music, full-motion videos, and text etc. CDs can be either read only or read write type.  Digital Video Disk (DVD) is similar to a CD but has larger storage capacity and enormous clarity. Depending upon the disk type it can store several Gigabytes of data. DVDs are primarily used to store music or movies and can be played back on your television or the computer too. These are not rewritable
  • 8. Input / Output Devices  These devices are used to enter information and instructions into a computer for storage or processing and to deliver the processed data to a user. Input/Output devices are required for users to communicate with the computer. In simple terms, input devices bring information INTO the computer and output devices bring information OUT of a computer system. These input/output devices are also known as peripherals since they surround the CPU and memory of a computer system.
  • 9. Input Devices  An input device is any device that provides input to a computer. There are many input devices, but the two most common ones are a keyboard and mouse. Every key you press on the keyboard and every movement or click you make with the mouse sends a specific input signal to the computer.
  • 10. Output Devices  Output device receives information from the CPU and presents it to the user in the desired from. The processed data, stored in the memory of the computer is sent to the output unit, which then converts it into a form that can be understood by the user. The output is usually produced in one of the two ways – on the display device, or on paper (hard copy).
  • 11. COMPUTER SOFTWARE Computer software is the set of programs that makes the hardware perform a set of tasks in particular order. Hardware and software are complimentary to each other. Both have to work together to produce meaningful results. Computer software is classified into two broad categories; system software and application software
  • 12. System Software  System software consists of a group of programs that control the operations of a computer equipment including functions like managing memory, managing peripherals, loading, storing, and is an interface between the application programs and the computer. MS DOS (Microsoft’s Disk Operating System), UNIX are examples of system software.
  • 13. Application software  Software that can perform a specific task for the user, such as word processing, accounting, budgeting or payroll, fall under the category of application software. Word processors, spreadsheets, database management systems are all examples of general purpose application software
  • 14. Types of application software are:  Word processing software: The main purpose of this software is to produce documents. MS-Word, Word Pad, Notepad and some other text editors are some of the examples of word processing software.  Database software: Database is a collection of related data. The purpose of this software is to organize and manage data. The advantage of this software is that you can change the way data is stored and displayed. MS access, dBase, FoxPro, Paradox, and Oracle are some of the examples of database software.  Spread sheet software: The spread sheet software is used to maintain budget, financial statements, grade sheets, and sales records. The purpose of this software is organizing numbers. It also allows the users to perform simple or complex calculations on the numbers entered in rows and columns. MS- Excel is one of the example of spreadsheet software.
  • 15.  Presentation software: This software is used to display the information in the form of slide show. The three main functions of presentation software is editing that allows insertion and formatting of text, including graphics in the text and executing the slide shows. The best example for this type of application software is Microsoft PowerPoint.  Multimedia software: Media players and real players are the examples of multimedia software. This software will allow the user to create audio and videos. The different forms of multimedia software are audio converters, players, burners, video encoders and decoders.
  • 16. WINDOWS DESKTOP ELEMENTS  Start Menu  Task Bar  System Tray  Using 'My Computer‘ for browsing your disk drives
  • 17. COMPUTER SECURITY  Security has always been an overriding concern of human kind. For many organization, information plays a very important role in running business. Therefore, it becomes necessary to safeguard information from reaching the illegal hands. When data takes the shapes of digital form, a different security procedure is required. This branch of security is called computer security.  Information technology has also some loopholes associated with it, like the possibility of stealing of vital information and intentionally implanting destructive or malicious programs on the other's computer system. The motive behind such activities is to show down the pace of an organization and harm it economically. We shall discuss now about these malicious programs which are often called virus, worms, Trojan horse, logic bomb, spyware and so on.
  • 18. Virus  Virus is a program which has been written to interfere with the normal functioning of the computer. It does this by clogging the memory of the system by making copies of itself or it may destroy critical information used by other computer programs.  There are three main types of viruses: Boot sector viruses which infect the boot sector in the hard disk and affect the partition table, File viruses attach with executable files. The commonly infected files are those with COM or EXE extensions. The third, System viruses infect specific system files such as command.com. Computer viruses can be grouped into Time Bomb, Trojan Horse, Worm etc. Time Bomb will start on a particular date, at a particular time. The computer will loose its ability to function properly.  The virus known as Trojan Horse will enter into a computer through an e-mail or free programs that have been down loaded from the internet and casue plenty of damage. Viruses known as Worms are constructed to infiltrate on the legitimate data processing programs and alter or destroy the data. Worm programs often use network connections to spread from one computer system to another system, thus, worms attach system that are linked through communication lines.
  • 19. Protecting computer system using antivirus software  In case the virus is present, it becomes our duty to use some anti-virus software for preventing virus attacks in future. Anti-virus software falls into two categories: Scanners and Integrity checkers.  A scanner is a program that will detect the virus by checking the files on the disk, the boot sector of the disk and programs in the memory by looking for the signature of the virus. The signature is a piece of program code that is unique to the virus. It is very necessary to update regularly the virus scanner that you have bought. This is essential because new viruses are constantly appearing.
  • 20. Windows key Shortcut  Window key + R –Opens run command.  Windows key + Up arrow key /down arrow key –Maximize or minimize current window.  Window key +M/D –Minimize all/Show desktop.  Window key + L –Lock Window.  Window key + E –Open explorer.  Window key +l –Lock window.  Window key/Alt + Tab –Move to next window.  CTRL+SHIFT +ESC –Open task manager.  Alt + Ctrl+ Del –Options for task manager.
  • 21. Window Key + R(Run Menu)  Ms excel –Excel.  Ms Word –Winword.  Ms Power Point –Powerpnt.  Ms Paint –mspaint.  Notepad –Notepad.  Wordpad –Wordpad.  Calculator –Calc.  Control panel –Control.  Printers Control –Control Printers.  Command –Command Printers.
  • 22.  Internet Explorer –iexplorer.  Computer management –compmgmt.msc.  Services Management –services.msc.  Device management –Devmgmt.msc.  Disk cleanup –cleanmgr.  Windows media player –wmplayer.  Computer Info –msinfo.
  • 23. Communication  Inside a computer network many communication programs are installed on Intranet computers to connect to the internet or even to internal computers. Web Browsers A web browser is program to navigate the www and retrieve web pages.It runs directly on user’s computer and connects to external web servers ,Identified with the www prefix in the internet name , to retrieve web pages. Example: Google chrome, Mozilla Firefox , an open source software with 23%,Microsoft Internet explorer ,
  • 24. Search Engines  A search engine is a special program running on a website which offers to the user the possibility of searching other websites for specific web pages. The users needs to connect to the search engine websites and digit the keywords , or sometimes even a complete question , and the website returns the list of relevant web pages. Search engine use a crawler technique: they continuously go through the known web pages memorizing their content and trying to discover other web pages through the contained links . In this way they are able to memorize most of the www’s pages , even though some not linked websites can remain unknown to search engines. Examples: Google ,Yahoo, Bing
  • 25. Browsers Shortcut CTRL+T/N -Open new tab. CTRL +D –Bookmark. CTRL+J –Display the download window. CTRL + W –Close tab/window. SHIFT + B –display bookmark. SHIFT + W –Close window. CTRL + SHIFT + T –Undo the close of a tab.
  • 26. E-Mail  Email is one of the fundamental internet technologies, a tool used by nearly every person with an internet connection. It allows you to, at no cost, send a letter of unlimited length to one person – or many people at once. It arrives almost instantly, and they can reply straight away. Setting up your own email account will allow you to communicate with people you know in ways you never thought possible. To give you an idea of how email works, your presenter can provide a quick walkthrough of how to send an email:  First, a new email is created  Then, recipient addresses are filled in  Next, a subject line is entered  Then the content of the email is typed in And the email is sent.
  • 27. E-Mail Providers Gmail  www.gmail.com HOTMAIL  www.hotmail.com YAHOO MAIL  mail.yahoo.com INBOX.COM  www.inbox.com