A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing. Generally, the term is used to describe a collection of devices that function together as a system.
What Is A Computer?
A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing. Generally, the term is used to describe a collection of devices that function together as a system.
DEFINITION
• An operating system is an intermediary between a computer user and the hardware. • Make the hardware convenient to use. • Manages system resources. • Use the hardware in an efficient manner.
DEFINITION
• An operating system is an intermediary between a computer user and the hardware. • Make the hardware convenient to use. • Manages system resources. • Use the hardware in an efficient manner
The document discusses the history and evolution of computers over several generations from the first generation of vacuum tube computers to the current fifth generation. It covers the characteristics and technologies of each generation including the transition from vacuum tubes to transistors to integrated circuits. The document also provides an overview of computer hardware, software types including operating systems and applications, and how computers accept input, process and store data, and produce output.
Interactive Voice Response System for College automationIRJET Journal
The document describes an interactive voice response (IVR) system for automating college operations. The IVR system allows parents to access student information like attendance, test marks, and fees by calling a number and following voice prompts. The system uses a microcontroller and hardware interfaces to receive touchtone inputs and retrieve requested data from a database to be synthesized into voice responses. It aims to provide convenient access to student records for parents without needing to visit the college in person.
1. The document describes an IoT-based student attendance system that uses fingerprint recognition to identify students and automatically record attendance in real-time.
2. The system uses an ESP8266 microcontroller connected to WiFi to send student fingerprint IDs to a server when scanned. The server then updates attendance records and calculates percentages.
3. Students and teachers can check attendance and assignments in real-time through a mobile app, improving accuracy over traditional paper-based systems while saving time.
Online Voting System using Aadhaar Card and BiometricIRJET Journal
The document proposes an online voting system that uses Aadhaar (India's biometric ID system) for voter authentication. It aims to increase voter turnout and security by allowing people to vote online after authenticating via their Aadhaar number. The system would match the Aadhaar number to voter records retrieved from the Aadhaar database. It analyzes related work on e-voting systems and their security requirements. The proposed system architecture involves voters logging in with their Aadhaar number and casting their vote online, which would then update the database on the server. It aims to reduce issues like fake votes and make the voting process more convenient and transparent.
IRJET- A Study on Automated Attendance System using Facial RecognitionIRJET Journal
The document discusses an automated attendance system using facial recognition. It begins with an introduction to facial recognition and the motivation for developing an automated attendance system. It then reviews previous work on facial recognition algorithms such as PCA, Viola-Jones, and neural networks. The proposed system is described as using SVM on LBP features for facial recognition due to its high accuracy. Key advantages of the proposed system include being cost-efficient, easy to deploy, and preventing time fraud. The document concludes facial recognition can effectively automate attendance tracking in educational or commercial organizations.
What Is A Computer?
A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing. Generally, the term is used to describe a collection of devices that function together as a system.
DEFINITION
• An operating system is an intermediary between a computer user and the hardware. • Make the hardware convenient to use. • Manages system resources. • Use the hardware in an efficient manner.
DEFINITION
• An operating system is an intermediary between a computer user and the hardware. • Make the hardware convenient to use. • Manages system resources. • Use the hardware in an efficient manner
The document discusses the history and evolution of computers over several generations from the first generation of vacuum tube computers to the current fifth generation. It covers the characteristics and technologies of each generation including the transition from vacuum tubes to transistors to integrated circuits. The document also provides an overview of computer hardware, software types including operating systems and applications, and how computers accept input, process and store data, and produce output.
Interactive Voice Response System for College automationIRJET Journal
The document describes an interactive voice response (IVR) system for automating college operations. The IVR system allows parents to access student information like attendance, test marks, and fees by calling a number and following voice prompts. The system uses a microcontroller and hardware interfaces to receive touchtone inputs and retrieve requested data from a database to be synthesized into voice responses. It aims to provide convenient access to student records for parents without needing to visit the college in person.
1. The document describes an IoT-based student attendance system that uses fingerprint recognition to identify students and automatically record attendance in real-time.
2. The system uses an ESP8266 microcontroller connected to WiFi to send student fingerprint IDs to a server when scanned. The server then updates attendance records and calculates percentages.
3. Students and teachers can check attendance and assignments in real-time through a mobile app, improving accuracy over traditional paper-based systems while saving time.
Online Voting System using Aadhaar Card and BiometricIRJET Journal
The document proposes an online voting system that uses Aadhaar (India's biometric ID system) for voter authentication. It aims to increase voter turnout and security by allowing people to vote online after authenticating via their Aadhaar number. The system would match the Aadhaar number to voter records retrieved from the Aadhaar database. It analyzes related work on e-voting systems and their security requirements. The proposed system architecture involves voters logging in with their Aadhaar number and casting their vote online, which would then update the database on the server. It aims to reduce issues like fake votes and make the voting process more convenient and transparent.
IRJET- A Study on Automated Attendance System using Facial RecognitionIRJET Journal
The document discusses an automated attendance system using facial recognition. It begins with an introduction to facial recognition and the motivation for developing an automated attendance system. It then reviews previous work on facial recognition algorithms such as PCA, Viola-Jones, and neural networks. The proposed system is described as using SVM on LBP features for facial recognition due to its high accuracy. Key advantages of the proposed system include being cost-efficient, easy to deploy, and preventing time fraud. The document concludes facial recognition can effectively automate attendance tracking in educational or commercial organizations.
Impressive smart card based electronic voting systemeSAT Journals
Abstract
The impressive smart card based electronic voting system is introduced to ensure apposite voting procedures and voting counts. This idea prevents the illegal acts against the voting system and provides the voter authentication in an effective manner. This proposal plans to provide a fortification for each and every votes. It entirely changes the status of the election process and ensures the integrity of electoral system. The primary idea of this paper is to make the voters as to have a trust in election through the methods of taking fingerprint and providing a smart card to each user to promise their uniqueness in the voting system and reduces the work of election committee. At the same time the result of the election process will be automatically declared to the public. With the help of this method, the person can vote from any election booth easily.
Keywords- Electronic voting system, authentication, biometric fingerprinting method, smart card
IRJET- E-Voting System for Election using Fingerprint and Aadhar NumberIRJET Journal
This document proposes an online voting system for Indian elections that uses fingerprint and Aadhar number for authentication. It aims to increase security and voting percentages while reducing costs. The system would allow voters to verify their votes were cast correctly. It discusses issues with existing paper and EVM systems like tampering and a lack of verification. The proposed system has modules for voter registration using biometrics, authentication at voting time, casting and recording votes, and counting votes. It aims to provide a secure, practical online solution to address current problems with Indian election processes.
This document provides guidelines for the Master of Computer Applications (MCA) project at Indira Gandhi National Open University. It outlines the calendar for project submission, the process for approving project proposals, eligibility criteria for project guides, points to consider when preparing project proposals and reports, assessment guidelines, software areas, and reimbursement for guides. Students must work on their project for at least six months, preferably in industry. The objective is to develop quality software using standard practices like requirements analysis, design, development, testing and documentation. Topics should be complex enough to justify an MCA project.
IRJET- Syllabus and Timetable Generation SystemIRJET Journal
The document describes a proposed system called the Syllabus and Timetable Generation System that aims to automatically generate timetables and syllabi for educational institutions. It uses an algorithm that takes inputs like number of classes, subjects, days in a week, and lectures per day to randomly generate timetables for multiple classes without clashes. The algorithm employs recursion to prevent clashes across class timetables. It also includes a static faculty assignment method. The proposed system was able to automatically generate timetables and syllabi for 4 classes with 10 subjects, demonstrating the effectiveness of the algorithm in solving the complex task of timetable scheduling.
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET Journal
This document describes a research project on a home automation system for disabled people using Bluetooth technology and an Android application. The system allows users to remotely control home appliances like lights, fans, and irrigation systems through a mobile app. It uses an Arduino board connected to sensors and appliances via relays. The app communicates with the Arduino over Bluetooth to send on/off signals. This provides safety, convenience and energy savings for disabled, elderly or injured users. The system aims to improve users' quality of life through remote home automation with a low-cost, easy to install design.
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...IJECEIAES
In order to protect the data in the smartphone, there is some protection mechanism that has been used. The current authentication uses PIN, password, and biometric-based method. These authentication methods are not sufficient due to convenience and security issue. Non-Intrusive authentication is more comfortable because it just collects user’s behavior to authenticate the user to the smartphone. Several non-intrusive authentication mechanisms were proposed but they do not care about the training sample that has a long data collection time. This paper propose a method to collect data more efficient using Optimized Active Learning. The Support Vector Machine (SVM) used to identify the effect of some small amount of training data. This proposed system has two main functionalities, to reduce the training data using optimized stop rule and maintain the Error Rate using modified model analysis to determine the training data that fit for each user.Finally, after we done the experiment, we conclude that our proposed system is better than Threshold-based Active Learning. The time required to collect the data can reduced to 41% from 17 to 10 minutes with the same Error Rate.
A database is simply an organized collection of related data, typically stored on disk, and accessible by possibly many concurrent users. Databases are generally separated into application areas.
A Database Management System (DBMS) is a set of programs that manages any number of databases.
This document summarizes a research paper that proposes an automated attendance monitoring system using face recognition. The system works by capturing images of students in a classroom, detecting faces in the images, recognizing the faces and comparing them to a database of student faces. Faces that do not match the database are identified as absent students. The system then sends SMS alerts about the absent students to their mobile numbers. The paper describes the methodology, hardware and software components of the system including the camera, display unit, microcontroller and MATLAB software. It provides results of testing the system and concludes the automated attendance system can help reduce issues with traditional manual attendance methods.
Analog to Digital Converter (ADC) is a device that converts an analog quantity (continuous voltage) to discrete digital values.
The PIC microcontroller can be used in various electronic devices like alarm systems, electronic gadgets and computer control systems.
College Collaboration Portal with Training and PlacementIOSR Journals
This document summarizes a student project to automate the training and placement activities at a college. The existing manual system is time-consuming and error-prone. The proposed system is a web application that will allow students to register and update profiles online, receive notifications by email, and help administrators select students for interviews based on company requirements. It aims to reduce manual work, provide statistics and improve communication between students, alumni and the training and placement cell.
The document describes the methodology used to develop a Campus News Information System Android application. It discusses using the Android SDK, Eclipse IDE, and phpMyAdmin to build the application. The application will use components like Shared Preferences, Notification Manager, and SQLite to store and retrieve data from the campus server. The goal is to create a system that allows students and faculty to access campus information from their Android devices via a HTTP-based connection. This overcomes limitations of prior approaches that used Bluetooth technology.
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...Nischal Lal Shrestha
This document provides a minor project report on developing a real-time classroom attendance system using face detection and recognition. The system utilizes the Viola-Jones algorithm for face detection and Local Binary Patterns Histogram (LBPH) for face recognition. It was developed by 4 students as a partial fulfillment of their Bachelor of Software Engineering degree at Nepal College of Information Technology. The report describes the methodology, system implementation including image acquisition, preprocessing, detection, recognition, and GUI development, as well as the deliverables, schedule, and future work.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Speech Based Search Engine System Control and User InteractionIOSR Journals
The document discusses a proposed speech-based search engine system to help visually impaired users interact with computers without keyboards or mice. The system would allow users to control the computer and search for information using only voice commands through speech recognition and synthesis technologies. It aims to make computers more accessible for visually impaired people and others who have difficulty using keyboards and mice. The proposed system could provide educational benefits and allow independent computer use through spoken interactions. A feasibility analysis found the system would be economically and technically feasible to implement using existing hardware, software and open-source technologies.
Main objective of this paper is to improve the existing Indian voting system. In the present voting system, one can easily poll the fake vote by various wrong methods. This may lead to a big democratic problem. By implementing some changes in the previous systems, we can make the polling process more secured and counting process fast and efficient. By using biometric in voting systems, the process of polling will be more secured than the existing system. In this system, no one can vote instead of the legit voter. All voter information is stored in this system. Here, we are using the fingerprint for the verification purpose. Every individual has a unique fingerprint. So, there will not be any kind of misconduct done while using this system. At the time of counting, the process can be done by connecting the system to the computer making the process faster. Thakurendra Singh | Chirag Sharma | Rahul Sharma | Avadh Pratap Sharma | Yogesh Kumar Upadhayay "Biometric Electronic Voting Machine" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30597.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30597/biometric-electronic-voting-machine/thakurendra-singh
The Evolution of Computers, 1st, 2nd, 3rd, 4th & 5th Generation
Computers in the form of personal desktop computers, laptops and tablets have become such an important part of everyday living that it can be difficult to remember a time when they did not exist. In reality, computers as they are known and used today are still relatively new. Although computers have technically been in use since the abacus approximately 5000 years ago, it is modern computers that have had the greatest and most profound effect on society.
First Generation Computers •First generation computers bore little resemblance to computers of today, either in appearance or performance. The first generation of computers took place from 1940 to 1956 and was extremely large in size. The inner workings of the computers at that time were unsophisticated. •
Computers in the form of personal desktop computers, laptops and tablets have become such an important part of everyday living that it can be difficult to remember a time when they did not exist.
Software crisis Software crisis is a term used in the early days of computing science for the difficulty of writing useful and efficient computer programs in the required time. The software crisis was due to the rapid increases in computer power and the complexity of the problems that could not be tackled. With the increase in the complexity of the software, many software problems arose because existing methods were insufficient. The term "software crisis" was coined by some attendees at the first NATO Software Engineering Conference in 1968 at Garnish, Germany.
Software crisis Software crisis is a term used in the early days of computing science for the difficulty of writing useful and efficient computer programs in the required time. The software crisis was due to the rapid increases in computer power and the complexity of the problems that could not be tackled.
Software crisis Software crisisis a term used in the early days of computing science for the difficulty of writing useful and efficient computer programs in the required time. The software crisis was due to the rapid increases in computer power and the complexity of the problems that could not be tackled. With the increase in the complexity of the software, many software problems arose because existing methods were insufficient. The term "software crisis" was coined by some attendees at the first NATO Software Engineering Conference in 1968 at Garnish, Germany.
Impressive smart card based electronic voting systemeSAT Journals
Abstract
The impressive smart card based electronic voting system is introduced to ensure apposite voting procedures and voting counts. This idea prevents the illegal acts against the voting system and provides the voter authentication in an effective manner. This proposal plans to provide a fortification for each and every votes. It entirely changes the status of the election process and ensures the integrity of electoral system. The primary idea of this paper is to make the voters as to have a trust in election through the methods of taking fingerprint and providing a smart card to each user to promise their uniqueness in the voting system and reduces the work of election committee. At the same time the result of the election process will be automatically declared to the public. With the help of this method, the person can vote from any election booth easily.
Keywords- Electronic voting system, authentication, biometric fingerprinting method, smart card
IRJET- E-Voting System for Election using Fingerprint and Aadhar NumberIRJET Journal
This document proposes an online voting system for Indian elections that uses fingerprint and Aadhar number for authentication. It aims to increase security and voting percentages while reducing costs. The system would allow voters to verify their votes were cast correctly. It discusses issues with existing paper and EVM systems like tampering and a lack of verification. The proposed system has modules for voter registration using biometrics, authentication at voting time, casting and recording votes, and counting votes. It aims to provide a secure, practical online solution to address current problems with Indian election processes.
This document provides guidelines for the Master of Computer Applications (MCA) project at Indira Gandhi National Open University. It outlines the calendar for project submission, the process for approving project proposals, eligibility criteria for project guides, points to consider when preparing project proposals and reports, assessment guidelines, software areas, and reimbursement for guides. Students must work on their project for at least six months, preferably in industry. The objective is to develop quality software using standard practices like requirements analysis, design, development, testing and documentation. Topics should be complex enough to justify an MCA project.
IRJET- Syllabus and Timetable Generation SystemIRJET Journal
The document describes a proposed system called the Syllabus and Timetable Generation System that aims to automatically generate timetables and syllabi for educational institutions. It uses an algorithm that takes inputs like number of classes, subjects, days in a week, and lectures per day to randomly generate timetables for multiple classes without clashes. The algorithm employs recursion to prevent clashes across class timetables. It also includes a static faculty assignment method. The proposed system was able to automatically generate timetables and syllabi for 4 classes with 10 subjects, demonstrating the effectiveness of the algorithm in solving the complex task of timetable scheduling.
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET Journal
This document describes a research project on a home automation system for disabled people using Bluetooth technology and an Android application. The system allows users to remotely control home appliances like lights, fans, and irrigation systems through a mobile app. It uses an Arduino board connected to sensors and appliances via relays. The app communicates with the Arduino over Bluetooth to send on/off signals. This provides safety, convenience and energy savings for disabled, elderly or injured users. The system aims to improve users' quality of life through remote home automation with a low-cost, easy to install design.
Optimized Active Learning for User’s Behavior Modelling based on Non-Intrusiv...IJECEIAES
In order to protect the data in the smartphone, there is some protection mechanism that has been used. The current authentication uses PIN, password, and biometric-based method. These authentication methods are not sufficient due to convenience and security issue. Non-Intrusive authentication is more comfortable because it just collects user’s behavior to authenticate the user to the smartphone. Several non-intrusive authentication mechanisms were proposed but they do not care about the training sample that has a long data collection time. This paper propose a method to collect data more efficient using Optimized Active Learning. The Support Vector Machine (SVM) used to identify the effect of some small amount of training data. This proposed system has two main functionalities, to reduce the training data using optimized stop rule and maintain the Error Rate using modified model analysis to determine the training data that fit for each user.Finally, after we done the experiment, we conclude that our proposed system is better than Threshold-based Active Learning. The time required to collect the data can reduced to 41% from 17 to 10 minutes with the same Error Rate.
A database is simply an organized collection of related data, typically stored on disk, and accessible by possibly many concurrent users. Databases are generally separated into application areas.
A Database Management System (DBMS) is a set of programs that manages any number of databases.
This document summarizes a research paper that proposes an automated attendance monitoring system using face recognition. The system works by capturing images of students in a classroom, detecting faces in the images, recognizing the faces and comparing them to a database of student faces. Faces that do not match the database are identified as absent students. The system then sends SMS alerts about the absent students to their mobile numbers. The paper describes the methodology, hardware and software components of the system including the camera, display unit, microcontroller and MATLAB software. It provides results of testing the system and concludes the automated attendance system can help reduce issues with traditional manual attendance methods.
Analog to Digital Converter (ADC) is a device that converts an analog quantity (continuous voltage) to discrete digital values.
The PIC microcontroller can be used in various electronic devices like alarm systems, electronic gadgets and computer control systems.
College Collaboration Portal with Training and PlacementIOSR Journals
This document summarizes a student project to automate the training and placement activities at a college. The existing manual system is time-consuming and error-prone. The proposed system is a web application that will allow students to register and update profiles online, receive notifications by email, and help administrators select students for interviews based on company requirements. It aims to reduce manual work, provide statistics and improve communication between students, alumni and the training and placement cell.
The document describes the methodology used to develop a Campus News Information System Android application. It discusses using the Android SDK, Eclipse IDE, and phpMyAdmin to build the application. The application will use components like Shared Preferences, Notification Manager, and SQLite to store and retrieve data from the campus server. The goal is to create a system that allows students and faculty to access campus information from their Android devices via a HTTP-based connection. This overcomes limitations of prior approaches that used Bluetooth technology.
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...Nischal Lal Shrestha
This document provides a minor project report on developing a real-time classroom attendance system using face detection and recognition. The system utilizes the Viola-Jones algorithm for face detection and Local Binary Patterns Histogram (LBPH) for face recognition. It was developed by 4 students as a partial fulfillment of their Bachelor of Software Engineering degree at Nepal College of Information Technology. The report describes the methodology, system implementation including image acquisition, preprocessing, detection, recognition, and GUI development, as well as the deliverables, schedule, and future work.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Speech Based Search Engine System Control and User InteractionIOSR Journals
The document discusses a proposed speech-based search engine system to help visually impaired users interact with computers without keyboards or mice. The system would allow users to control the computer and search for information using only voice commands through speech recognition and synthesis technologies. It aims to make computers more accessible for visually impaired people and others who have difficulty using keyboards and mice. The proposed system could provide educational benefits and allow independent computer use through spoken interactions. A feasibility analysis found the system would be economically and technically feasible to implement using existing hardware, software and open-source technologies.
Main objective of this paper is to improve the existing Indian voting system. In the present voting system, one can easily poll the fake vote by various wrong methods. This may lead to a big democratic problem. By implementing some changes in the previous systems, we can make the polling process more secured and counting process fast and efficient. By using biometric in voting systems, the process of polling will be more secured than the existing system. In this system, no one can vote instead of the legit voter. All voter information is stored in this system. Here, we are using the fingerprint for the verification purpose. Every individual has a unique fingerprint. So, there will not be any kind of misconduct done while using this system. At the time of counting, the process can be done by connecting the system to the computer making the process faster. Thakurendra Singh | Chirag Sharma | Rahul Sharma | Avadh Pratap Sharma | Yogesh Kumar Upadhayay "Biometric Electronic Voting Machine" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30597.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30597/biometric-electronic-voting-machine/thakurendra-singh
The Evolution of Computers, 1st, 2nd, 3rd, 4th & 5th Generation
Computers in the form of personal desktop computers, laptops and tablets have become such an important part of everyday living that it can be difficult to remember a time when they did not exist. In reality, computers as they are known and used today are still relatively new. Although computers have technically been in use since the abacus approximately 5000 years ago, it is modern computers that have had the greatest and most profound effect on society.
First Generation Computers •First generation computers bore little resemblance to computers of today, either in appearance or performance. The first generation of computers took place from 1940 to 1956 and was extremely large in size. The inner workings of the computers at that time were unsophisticated. •
Computers in the form of personal desktop computers, laptops and tablets have become such an important part of everyday living that it can be difficult to remember a time when they did not exist.
Software crisis Software crisis is a term used in the early days of computing science for the difficulty of writing useful and efficient computer programs in the required time. The software crisis was due to the rapid increases in computer power and the complexity of the problems that could not be tackled. With the increase in the complexity of the software, many software problems arose because existing methods were insufficient. The term "software crisis" was coined by some attendees at the first NATO Software Engineering Conference in 1968 at Garnish, Germany.
Software crisis Software crisis is a term used in the early days of computing science for the difficulty of writing useful and efficient computer programs in the required time. The software crisis was due to the rapid increases in computer power and the complexity of the problems that could not be tackled.
Software crisis Software crisisis a term used in the early days of computing science for the difficulty of writing useful and efficient computer programs in the required time. The software crisis was due to the rapid increases in computer power and the complexity of the problems that could not be tackled. With the increase in the complexity of the software, many software problems arose because existing methods were insufficient. The term "software crisis" was coined by some attendees at the first NATO Software Engineering Conference in 1968 at Garnish, Germany.
Management • The act, art, or manner of managing, handling, controlling directing, etc. • Origin: to train (a horse) in his paces; cause to do exercises of the manage • To control the movement or behavior of; handle; manipulate • To have charge of; direct; conduct; administer • To get (a person) to do what one wishes
Management
• The act, art, or manner of managing, handling, controlling directing, etc. • Origin: to train (a horse) in his paces; cause to do exercises of the manage • To control the movement or behavior of; handle; manipulate • To have charge of; direct; conduct; administer • To get (a person) to do what one wishes
Introduction Tally is the world's fastest and most powerful concurrent Multi-lingual business Accounting and Inventory Management software. Tally designed exclusively to meet the needs of small and medium businesses, is a fully integrated, affordable and highly reliable software. Tally is easy to buy, quick to install, and easy to learn and use. Tally is designed to automate and integrate all your business operations, such as sales, finance, purchasing, inventory, and manufacturing. With Tally, accurate, up-to date business information is literally at your fingertips anywhere. The powerful new features and blazing speed and power of Tally combined with enhanced MIS, Multi-lingual, Data Synchronization and Remote capabilities help you simplify all your business processes easily and cost-effectively.
The document discusses various topics related to web servers and web development including:
- The difference between local and remote servers, with local servers hosting files on the user's own machine and remote servers hosting files on another computer accessed over the internet.
- Popular web server software like Internet Information Services (IIS) which is used to host ASP.NET and ASP web applications, and Personal Web Server (PWS) which allows individuals to publish and share content.
- The difference between static websites with fixed HTML pages and dynamic websites whose content changes based on a database or CMS.
- Other topics covered include installing web servers, client-side vs server-side scripting, and introducing HTML.
Data are raw facts and figures. Data are represented by values.
example 20,45,100 etc.
Information is processed data. It is obtained after the processin
This document is a project report submitted by Alok Sharma for a summer training internship on a Console Based Billing System. The report provides details of the project including objectives to create a convenient billing solution and generate financial reports. It discusses the existing manual system and problems with it. The proposed computerized system aims to be more user friendly, support data sharing and modification, and strategic decision making through easy report generation. A feasibility analysis is also included covering technical, behavioral, economic and product aspects.
What is Data Mining? Data Mining is defined as extracting information from huge sets of data. In other words, we can say that data mining is the procedure of mining knowledge from data.
Introduction To Database Management Systemcpjcollege
Database Management System (DMBS)
• Collection of interrelated data • Set of programs to access the data • DMBS contains information about a particular enterprise • DBMS provides an environment that it both convenient and efficient to use
Registers in Computer Architecture Register is a very fast computer memory, used to store data/instruction in-execution. A Register is a group of flip-flops with each flip-flop capable of storing one bit of information. An n-bit register has a group of n flip-flops and is capable of storing binary information of n-bits.
This presentation summarizes the student's internship working on a machine learning project to predict loan approvals. The internship tasks included working with Python libraries and machine learning algorithms to build and develop a model using loan dataset. The project involved classifying loan applications as approved or rejected. Key skills gained included Python, machine learning algorithms, software engineering, and soft skills like communication, time management and teamwork.
order processing system for student music store Abstract 2107ioshean
The ORDER PROCESSING System was first completely manual. Hence, it is designed in such a way keeping in mind the changes that would meet the customer’s requirements.
The document provides an introduction to information technology. It defines key terms like data, information, and IT. It describes the components of IT including hardware, software, databases, networks, and human resources. It also discusses different types of computers like mainframes, supercomputers, handheld computers, microcomputers/PCs, and laptops. It covers the characteristics and generations of computers from the first generation using vacuum tubes to the current fifth generation using ULSI technology.
This document provides an overview of Intelligent Process Automation (IPA), which combines Robotic Process Automation (RPA) with artificial intelligence technologies. IPA aims to automate end-to-end business processes using software robots or "bots" that can think, learn, and adapt on their own. The document discusses how IPA builds upon RPA by incorporating machine learning, natural language processing, computer vision and other AI capabilities. Benefits of IPA include increased accuracy, scalability, flexibility and the ability to free up human workers to focus on more complex tasks. The document also outlines various IPA technologies, applications, implementation strategies and challenges organizations may face with IPA.
A documentation on electronic voting using the workflow model of software engineering and the complete SRS included in it included the test cases scenarios etc.
The document is a lecture note on basic concepts of taxation from Chanderprabhu Jain College of Higher Studies & School of Law. It defines key terms like taxes, direct and indirect taxes, income, assessment year, financial year. It distinguishes between capital and revenue receipts and discusses the differences between direct and indirect taxes. It also explains the concepts of application of income versus diversion of income and gives examples. Finally, it provides an overview of the different sections related to assessment under the Income Tax Act.
Socio-Legal Dimensions of Gender (LLB-507 & 509 )cpjcollege
This paper intends to sensitize the students about the changing
dimensions of gender and also familiarizes them with the subtle manifestations of inequality rooted in our society.
The objective of the paper is to apprise the students with the laws relating to marriage, dissolution, matrimonial remedies, adoption, contemporary trends in family institutions in India, in particular the Hindus and Muslims.
Alternative Dispute Resolution (ADR) [LLB -309] cpjcollege
Alternative Dispute Resolution has become the primary means by which cases are resolved now days, especially commercial, business disputes. It has emerged as the preferred method for resolving civil cases, with litigation as a last resort. Alternative Dispute Resolution provides an overview of the statutory, procedural, and case law underlining these processes and their interplay with litigation. A significant theme is the evolving role of
professional ethics for attorneys operating in non-adversarial settings. Clients and courts increasingly express a preference for attorneys who are skilled not only in litigation but in problem-solving, which costs the clients less in terms of time, money and relationship. The law of ADR also provides an introduction to negotiation and mediation theory.
Environmental Studies and Environmental Laws (: LLB -301)cpjcollege
The objective of this paper is to acquaint the students with the environmental issues and the measures taken for its protection along with the norms prevailing at international and national
level
The paper will focus on the civil procedures followed in instituting a suit. The students will be familiarised with certain important concepts and practical skill development activity will provide insights into the actual working of the court procedures.
The objective of this paper is to provide an understanding of basic concepts of Indian Constitution and various organs created by the Constitution and their functions.
The document discusses various topics related to corporate law including types of companies, forms of business organization, shares, debentures, and securities. It provides information on sole proprietorships, partnerships, corporations, limited liability companies (LLCs), and different types of companies such as private companies and public companies. The document also defines key terms like shares, share capital, debentures, debenture bonds, and classifications of company securities.
It is an indispensable complementary part of our legal system without the study of which no advocate is suitably equipped with the basic requisites required to go to the court.
This document provides an overview of key concepts in international relations discussed in a political science class, including:
- Democracy and its key principles such as majority rule, protection of minority rights, and consent of the governed.
- Federalism and its features such as division of powers between central and state/provincial governments.
- The parliamentary system in India and features such as a ceremonial head of state, executive drawn from the legislature, and collective responsibility of ministers.
- Concepts in international relations like power, sovereignty, and the elements and limitations of national power, including international law, morality, and world public opinion.
This paper focuses on various aspects of health care law including the constitutional perspective, obligations, and negligence of medical professionals and remedies available to
consumers of health care.
The object of this paper is to focus on land reforms in India, Constitutional provisions related to land reforms, Land Acquisition, Rehabilitation, and Resettlement Act,2013, Urban Real Estate Development Laws and the Provisions of the Rent Laws under the
Delhi Rent Control Act, 1958.
Business Environment and Ethical Practices (BBA LLB 213 )cpjcollege
The objective of the course is to familiarize students with the different aspects of business environment and ethical practices to be adopted by organizations in conducting their business.
The document provides information about human resource management (HRM) including definitions of HRM, its components, nature, scope, importance, evolution, policies, challenges, and trends. It also discusses the differences between personnel management and HRM as well as HRM and strategic HRM. Additionally, it covers topics related to human resource planning such as meaning, importance, job analysis, and future personnel needs. The document appears to be lecture notes on an introduction to HRM course provided by Ms. Pallavi Sharma.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Computer Applications
1. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Semester: FIRST Semester
Name of the Subject:
COMPUTER APPLICATIONS
BASICS OF COMPUTERS
UNIT-I
2. 2
What Is A Computer?
A computer is an electronic device, operating under the control of
instructions (software) stored in its own memory unit, that can accept data
(input), manipulate data (process), and produce information (output) from the
processing. Generally, the term is used to describe a collection of devices that
function together as a system.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
3. 3
Devices that comprise a computer system
Printer
(output)
Monitor
(output)
Speaker
(output)
Scanner
(input)
Mouse
(input)
Keyboard
(input)
System unit
(processor, memory…)
Storage devices
(CD-RW, Floppy, Hard
disk, zip,…)
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
4. 4
What Does A Computer Do?
•Computers can perform four general operations, which
comprise the information processing cycle.
• Input
• Process
• Output
• Storage
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
5. 5
What Do Computers Do?
• Input, Process, Output, & Store data
Input Process Output
Store Data
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
6. 6
Data and Information
• All computer processing requires data, which is a collection of raw
facts, figures and symbols, such as numbers, words, images, video and
sound, given to the computer during the input phase.
• Computers manipulate data to create information. Information is data
that is organized, meaningful, and useful.
• During the output Phase, the information that has been created is put
into some form, such as a printed report.
• The information can also be put in computer storage for future use.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
7. 7
Why Is A Computer So Powerful?
• The ability to perform the information processing cycle with amazing
speed.
• Reliability (low failure rate).
• Accuracy.
• Ability to store huge amounts of data and information.
• Ability to communicate with other computers.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
8. 8
How Does a Computer Know what to do?
• It must be given a detailed list of instructions, called a computer
program or software, that tells it exactly what to do.
• Before processing a specific job, the computer program corresponding
to that job must be stored in memory.
• Once the program is stored in memory the compute can start the
operation by executing the program instructions one after the other.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
9. 9
What Are The Primary Components Of A Computer ?
• Input devices.
• Central Processing Unit
(containing the control unit and
the arithmetic/logic unit).
• Memory.
• Output devices.
• Storage devices.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
10. 10
Uses of Computer
PC at Home
Common uses for the computer within the home
• Computer games
• Working from Home
• Banking from Home
• Connecting to the Web
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
11. 11
Uses of Computer
• Office Applications
• Stock Control
• Stock control is ideal for automation and in many companies it
is now completely computerized. The stock control system keeps
track of the number of items in stock and can automatically order
replacement items when required.
• Accounts / Payroll
• In most large organizations the accounts are maintained by a
computerized system. Due to the repetitive nature of accounts a
computer system is ideally suited to this task and accuracy is
guaranteed.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
12. 12
Uses of Computer
• Automated Production Systems
• Many car factories are almost completely automated and the cars are
assembled by computer-controlled robots. This automation is becoming
increasingly common throughout industry.
• Design Systems
• Many products are designed using CAD (Computer Aided Design)
programs to produce exact specifications and detailed drawings on the
computer before producing models of new products.
13. 13
Uses of Computer
Computers in Daily Life
• Accounts
• Games
• Educational
• On-line banking
• Smart ID cards
• Supermarkets
• Working from home (Tele-working)
• Internet
14. 14
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
15. 15
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
16. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Semester: FIRST Semester
Name of the Subject:
COMPUTER APPLICATIONS
INTRODUCTION TO COMPUTER
SOFTWARES
UNIT-II
17. 17
• Software is a set of electronic instructions that tells the computer how
to do certain tasks. A set of instructions is often called a program.
• When a computer is using a particular program, it is said to be
running or executing the program.
• The two most common types of programs are system software and
application software.
Bringing the Machine to Life –
What is Software?
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
18. 18
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
19. 19
• System software exists primarily for the computer itself, to help the
computer perform specific functions.
• One major type of system software is the operating system (OS). All
computers require an operating system.
• The OS tells the computer how to interact with the user and its own
devices.
• Common operating systems include Windows, the Macintosh OS,
OS/2, and UNIX .
Bringing the Machine to Life –
System Software
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
20. 20
• Application Software consists of programs that tell a computer how
to produce information
• Application software tells the computer how to accomplish tasks the
user requires, such as creating a document or editing a graphic image.
• Some important kinds of application software are:
Word processing programs Spreadsheet software
Database management Presentation programs
Graphics programs Networking software
Web design tools and browsers Internet applications
Communications programs Utilities
Entertainment and education Multimedia authoring
Bringing the Machine to Life - Applications
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
21. What is an Operating System?
• A program that acts as an intermediary between a user of a computer
and the computer hardware.
• Operating system goals:
– Execute user programs and make solving user problems easier.
– Make the computer system convenient to use.
• Use the computer hardware in an efficient manner.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
22. Computer System Structure
• Computer system can be divided into four components
– Hardware – provides basic computing resources
• CPU, memory, I/O devices
– Application programs – define the ways in which the system
resources are used to solve the computing problems of the
users
• Word processors, compilers, web browsers, database
systems, video games
– Users
• People, machines, other computers
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
23. Four Components of a Computer System
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
24. Operating System Definition
• OS is a resource allocator
– Manages all resources
– Decides between conflicting requests for efficient and fair
resource use
• OS is a control program
– Controls execution of programs to prevent errors and improper
use of the computer
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
25. Operating System Definition (Cont.)
• No universally accepted definition
• “Everything a vendor ships when you order an operating system” is
good approximation
– But varies wildly
• “The one program running at all times on the computer” is the kernel.
Everything else is either a system program (ships with the operating
system) or an application program
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
26. Computer Startup
• bootstrap program is loaded at power-up or reboot
– Typically stored in ROM or EEPROM, generally known as firmware
– Initializates all aspects of system
– Loads operating system kernel and starts execution
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
27. Computer System Organization
• Computer-system operation
– One or more CPUs, device controllers connect through common bus
providing access to shared memory
– Concurrent execution of CPUs and devices competing for memory
cycles
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
28. Computer-System Operation
• I/O devices and the CPU can execute concurrently.
• Each device controller is in charge of a particular device type.
• Each device controller has a local buffer.
• CPU moves data from/to main memory to/from local buffers
• I/O is from the device to local buffer of controller.
• Device controller informs CPU that it has finished its operation by causing
an interrupt.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
29. Common Functions of Interrupts
• Interrupt transfers control to the interrupt service routine generally, through
the interrupt vector, which contains the addresses of all the service routines.
• Interrupt architecture must save the address of the interrupted instruction.
• Incoming interrupts are disabled while another interrupt is being processed
to prevent a lost interrupt.
• A trap is a software-generated interrupt caused either by an error or a user
request.
• An operating system is interrupt driven.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
30. 30
Computer Software
•Computer software is the key to productive use of computers. Software can be
categorized into two types:
• Operating system software
• Application software.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
31. 31
Operating System Software
Operating system software tells the computer how to perform the
functions of loading, storing and executing an application and how to
transfer data.
Today, many computers use an operating system that has a graphical user
interface (GUI) that provides visual clues such as icon symbols to help
the user. Microsoft Windows 98 is a widely used graphical operating
system. DOS (Disk Operating System) is an older but still widely used
operating system that is text-based.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
32. 32
Application Software
•Application Software consists of programs that tell a computer how to
produce information. Some of the more commonly used packages are:
•
• Word processing
• Electronic spreadsheet
• Database
• Presentation graphics
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
33. 33
Word Processing
• Word Processing software is used to create and print documents. A key
advantage of word processing software is that users easily can make
changes in documents.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
34. 34
Electronic Spreadsheets
• Electronic spreadsheet software allows the user to add, subtract, and
perform user-defined calculations on rows and columns of numbers.
These numbers can be changed and the spreadsheet quickly
recalculates the new results.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
35. 35
Database Software
• Allows the user to enter, retrieve, and update data in an organized and
efficient manner, with flexible inquiry and reporting capabilities.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
36. 36
Presentation Graphics
• Presentation graphic software allows the user to create
documents called slides to be used in making the presentations.
Using special projection devices, the slides display as they
appear on the computer screen.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
37. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Semester: FIRST Semester
Name of the Subject
COMPUTER APPLICATIONS
DESKTOP COMPONENTS
UNIT-III
38. Spreadsheets Basics
• Excel is a “spreadsheet” which holds different kinds of information
• It performs calculations with mathematical and statistical functions
• Constants - entries that do not change
• Formulas - combination of constants and functions
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
39. Using Functions in Excel
• Use spreadsheets in decision making; use Goal Seek and Scenario Manager
to evaluate multiple conditions
• Use financial functions (PMT, etc.)
• Use fill handle and AutoFill capability
• Use pointing to create a formula
• Statistical Functions — MAX, MIN, AVERAGE, COUNT
• Use functions over arithmetic expressions
• Decision making functions (IF and VLOOKUP (vertical lookup))
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
40. SUM(number1, number 2,…)
• Example
=SUM(3, 2) equals 5
• If cells A2:E2 contain 5, 15, 30, 40, and 50: =SUM(A2:C2) equals
50 =SUM(B2:E2, 15) equals 150
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
41. AVERAGE(number 1, number 2,…)
• Examples
If A1:A5 is named Scores and contains the numbers 10, 7, 9, 27, and 2,
then:
=AVERAGE(A1:A5) equals 11
=AVERAGE(Scores) equals 11
=SUM(A1:A5)/COUNT(A1:A5) equals 11
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
42. SIN(number)
• IMPORTANT NOTE:
– Angle (number) must be provided in radians If your argument is in
degrees, multiply it by PI()/180 to convert it to radians.
=SIN(PI()) equals 1.22E-16, which is approx. 0
=SIN(PI()/2) equals 1
=SIN(30*PI()/180) equals 0.5, the sine of 30 degrees
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
43. COUNT
• COUNT counts the number of cells that contain numbers & numbers
within the list of arguments.
• Value 1, 2,…, are 1 to 30 arguments that can contain or refer to a variety of
different types of data, but only numbers are counted.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
44. COUNTIF(range,criteria)
Counts the number of cells within a range that meet the given criteria.
Suppose A3:A6 contain "apples", "oranges", "peaches", "apples", respectively:
COUNTIF(A3:A6,"apples") equals 2
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
46. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
47. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
48. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
49. Some Useful Functions
• IF
• TIME
functions
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
50. Conditional Functions
• Conditional functions allow the software to perform conditional tests and
evaluate a condition in your worksheet. Depending on whether the
condition is true or false, different values will be returned to the cells.
• =IF is the most important conditional function
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
51. If
=IF(condition, action if true, action if false)
This tests the “condition” to determine if specific results or cell contents are
true or false.
The instructions to be executed can return cell contents that are labels as well
as values.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
52. Logical Operators
• To perform conditional tests, logical operators are required.
= Equal
< Less than
> Greater than
<= Less than or Equal to
>= Greater than or Equal to
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
53. Logical Functions
And(logical1, logical2) Returns true if each
condition is true
Or(logical1, logical2) Returns true if either
condition is true
Not(logical) Returns true if the
condition is f
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
54. Examples
=IF(AND(B11<>0,G11=1),10,0) means that if the value in B11 is not equal to 0
and the value in G11 is equal to 1, assign the number 10. Otherwise, assign
the number 0.
=IF(OR(E13=“Profit”,F15>G15),”Surplus”,”Deficit”) means that if either E13
contains the word “Profit” or the contents of F15 are greater than or equal to
the contents of G15, assign the label “Surplus”. Otherwise, assign the label
“Deficit”.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
55. VLOOKUP Function
• Searches for a value in the leftmost column of a table, and then returns a
value in the same row from a column you specify in the table. Use
VLOOKUP instead of HLOOKUP when your comparison values are
located in a column to the left of the data you want to find.
Syntax:
=VLOOKUP(lookup_value,table_array,
col_index_num,range_lookup)
– If range_lookup is TRUE, the values in the first column of table_array
must be placed in ascending order: ..., -2, -1, 0, 1, 2, ..., A-Z, FALSE,
TRUE; otherwise VLOOKUP may not give the correct value. If
range_lookup is FALSE, table_array does not need to be sorted.
56. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Semester: FIRST Semester
Name of the Subject
COMPUTER APPLICATIONS
COMPUTER NETWORKS
UNIT-IV
57. Networking
• Computer network A collection of computing devices that are connected in
various ways in order to communicate and share resources
Usually, the connections between computers in a network are made using
physical wires or cables
However, some connections are wireless, using radio waves or infrared signals
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
58. 15-58
Networking
• The generic term node or host refers to any device on a network
• Data transfer rate The speed with which data is moved from one place
on a network to another
• Data transfer rate is a key issue in computer networks
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
59. 15-59
Networking
• Computer networks have opened up an entire frontier in the world of
computing called the client/server model
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
60. 15-60
Networking
• File server A computer that stores and manages files for multiple users on
a network.
• Web server A computer dedicated to responding to requests (from the
browser client) for web pages
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
61. 15-61
Types of Networks
• Local-area network (LAN) A network that connects a relatively small
number of machines in a relatively close geographical area
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
62. 15-62
Types of Networks
• Various configurations, called topologies, have been used to administer
LANs
– StarRing topology A configuration that connects all nodes in a closed
loop on which messages travel in one direction
– topology A configuration that centers around one node to which all
others are connected and through which all messages are sent
– Bus topology All nodes are connected to a single communication line
that carries messages in both directions
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
63. Types of Networks
Various network topologies
15-10
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
64. 15-64
Types of Networks
• Wide-area network (WAN) A network that connects two or more local-
area networks over a potentially large geographic distance
– Often one particular node on a LAN is set up to serve as a gateway to
handle all communication going between that LAN and other networks
• Communication between networks is called internetworking
– The Internet, as we know it today, is essentially the ultimate wide-
area network, spanning the entire globe
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
65. 15-65
Types of Networks
Metropolitan-area network (MAN) The communication
infrastructures that have been developed in and around large cities
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
66. 15-66
Internet Connections
• Internet backbone A set of high-speed networks that carry Internet traffic
These networks are provided by companies such as AT&T, GTE, and IBM
• Internet service provider (ISP) A company that provides other
companies or individuals with access to the Internet
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
67. 15-67
Internet Connections
• There are various technologies available that you can use to connect a
home computer to the Internet
– A phone modem converts computer data into an analog audio signal
for transfer over a telephone line, and then a modem at the destination
converts it back again into data
– A digital subscriber line (DSL) uses regular copper phone lines to
transfer digital data to and from the phone company’s central office
– A cable modem uses the same line that your cable TV signals come in
on to transfer the data back and forth
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
68. 15-68
Internet Connections
• Broadband A connection in which transfer speeds are faster than 128 bits
per second
– DSL connections and cable modems are broadband connections
– The speed for downloads (getting data from the Internet to your home
computer) may not be the same as uploads (sending data from your
home computer to the Internet)
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
69. Packet Switching
• To improve the efficiency of transferring information over a shared
communication line, messages are divided into fixed-sized, numbered
packets
• Network devices called routers are used to direct packets between networks
Figure 15.4
Messages
sent by
packet
switching
15-18
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
70. 15-70
Open Systems
• Proprietary system A system that uses technologies kept private by a
particular commercial vendor
– One system couldn’t communicate with another, leading to the need
for
• Interoperability The ability of software and hardware on multiple
machines and from multiple commercial vendors to communicate
– Leading to
• Open systems Systems based on a common model of network architecture
and a suite of protocols used in its implementation
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
71. 15-71
Open Systems
• The International Organization
for Standardization (ISO)
established the Open Systems
Interconnection (OSI)
Reference Model
• Each layer deals with a
particular aspect of network
communication
The layers of the OSI Reference Model
72. 15-72
Network Protocols
• Network protocols are layered such that each one relies on the protocols
that underlie it
• Sometimes referred to as a protocol stack
Layering of key network protocols
73. 15-73
TCP/IP
• TCP stands for Transmission Control Protocol
TCP software breaks messages into packets, hands them off to the IP
software for delivery, and then orders and reassembles the packets at
their destination.
• IP stands for Internet Protocol
IP software deals with the routing of packets through the maze of
interconnected networks to their final destination
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
74. 15-74
TCP/IP (cont.)
• UDP stands for User Datagram Protocol
– It is an alternative to TCP
– The main difference is that TCP is highly reliable, at the cost of
decreased performance, while UDP is less reliable, but generally faster.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)