Vous êtes sur la page 1sur 217

BASICS OF IT

BY
PROF. B.K.PATTANAYAK
ASST. PROFESSOR
DEPT. OF COMPUTER SC. & ENGG.
TECHNICAL UNIVERSITY OF ORISSA
INDIA
CONTENTS
• 1.BASICS OF IT
• 2.NUMBERING SYSTEMS
• 3.COMPUTER FUNDAMENTALS
• 4.COMPUTER MEMORY AND PERIPHERAL
DEVICES STRUCTURE
• 5.SOFTWARE
• 6.WINDOWS XP
• 7.WINDOWS XP INTERFACE
• 8.SECURITY AND NETWORKING
1.BASICS OF IT
• 1.0.INTRODUCTION
• 1.1.OBJECTIVES
• 1.2.WHAT IS IT?
• 1.3.DATA PROCESSING SYSTEM
• 1.4.INFORMATION
• 1.5.TYPES OF INFORMATION COMPUTING MODELS
• INTERNET
1.0.INTRODUCTION

• IN THE PRESENT WORLD SCENARIO, PRACTICALLY ALL THE FIELDS OF HUMANLIFE HAS BEEN
CAPTURED BY IT.
• WITH THE IMPLEMENTATION OF IT,THE PRODUCTIVITY AND THE QUALITY HAS GONE TO
UNEXPECTEDLY HIGH LEVELS.
• DEMAND OF IT IN NUMEROUSLY LARGE FIELDS OF HUMAN LIFE,HAS CONVINCINGLY
ENHANCED THE EMPLOYMENT OF YOUNG GENERATION.
• IT HAS MADE THE WORLD ACCESSIBLE AT ANYWHERE AND BY ANYBODY.
• THE MOST WIDELY USED FIELDS OF APPLICATION OF IT ARE:
-BUSINESS APPLICATION
-EDUCATION
-MASS COMMUNICATION
-ENTERTAINMENT
-MANUFACTURING
-MULTIMEDIA APPLICATIONS
-COMPUTER GRAPHICS
-EXPERT SYSTEMS
-DECISION SUPPORT SYSTEMS
1.1.OBJECTIVES
• THE OBJECTIVES BEHIND IMPLEMENTATION OF IT IN DIFFERENT FIELDS OF APPLICATION ARE:
1.BUSINESS APPLICATION:
*MINIMIZATION OF COST
*MAXIMIZATION OF PROFIT
*IMPROVEMENT OF QUALITY
*FLEXIBILITY
2.EDUCATION:
*DISTANCE CLASSROOM TEACHING
*INFORMATIVE
*GLOBALISATION
*LESS COST CONSUMING(E-MATERIALS,SEACH ENGINES)
*PRODUCTIVITY
*LESS COST CONSUMING
3.MASS COMMUNICATION:
*GLOBALISATION
*E-MAIL
4.ENTERTAINMMENT:
*DIGITAL VIDEO
*ANIMATIONS
5.MANUFACTURING:
*MINIMIZATION OF COST
*MAXIMIZATION OF PROFIT
*IMPROVEMENT OF QUALITY
*FLEXIBILITY
6.MULTIMEDIA APPLICATIONS:
*ENTERTAINMENT
7.COMPUTER GRAPHICS:
*TELEVISION(DIGITAL IMAGE)
*COMPUTER AIDED DESIGNING
*COMPUTER AIDED MANUFACTURING
*COMPUTER ANIMATION
8.EXPERT SYSTEMS:
*LARGE DOMAIN OF KNOLEDGE
*GLOBAL QUERY IN THE DOMAIN
*DECISION MAKING
9.DECISION SUPPORT SYSTEMS:
*DECISION MAKING(MANUFACTURING,BUSINESS APPLICATIONS)
1.2WHAT IS IT?
• INFORMATION TECHNOLOGY IS A COLLECTION
OF COMPUTER BASED METHODOLOGIES OF
INFORMATION PROCESSING TO ACHIEVE
OPTIMIZATION IN THE FIELD OF CONCERN,
FOR EXAMPLE, IN MANUFACTURING,THE
OBJECTIVE OF IT IS TO MINIMIZE THE COST AND
TO MAXIMIZE THE PROFIT,WHEREAS IN
EDUCATION,THE INTENTION IS TO ACHIEVE
DISTANCE CLASSROOM TEACHING
1.3.DATA PROCESSING
SYSTEM
• MANIPULATION OF FACTS IS CALLED DATAPROCESSING.IT MAY BE DONE
USING MANUAL OR ELECTRONIC METHODS.THE MAIN PURPOSE OF
ELECTRONIC DATA PROCESSING IS TO DO COMPLEX JOBS AT INCREDIBLE
SPEED.
• A DATA PROCESSING CYCLE CONSISTS OF THREE BASIC STEPS.THESE ARE:
-INPUT CYCLE:IN THIS PHASE,DATA ARE PREPARED IN SOME CONVENIENT
FORM AND ON A MEDIUM MOST SUITABLE FOR ENTRY INTO A PROCESSING
MACHINE,A COMPUTER.

-PROCESSING CYCLE:IN THIS CYCLE,WE MANIPULATE OR COMBINE THE


INPUT DATA WITH OTHER DATA AS PER THE INSTRUCTIONS.

-OUTPUT CYCLE:ONCE DATA ARE PROCESSED,THE RESULTS NEED TOBE


BROUGHT OUT IN A FORM MOST SUAITABLE FOR THE USER.THIS IS CALLED
THE OUTPUT CYCLE.
EXAMPLE
• A MASTER RECORD FILE OF AN EMPLOYEE INCLUDES THE NAME OF THE
EMPLOYEE,IDENTIFICATION NUMBER,PAY SCALE,OTHER INCOMES PER
MONTH,AND DEDUCTIONS EACH MONTH.THE PROCESS OF PREPARING THE
MONTHLY SALARY CHEQUES FOLLOWS THE FOLLOWING STEPS:
• STEP 1 :ORIGINATION:TIME CARDS OF EACH EMPLOYEE WITH ALL THE
DETAILS ARE PREPARED EVERY MONTH AS PER THE SPECIFICATION OF THE
TIME RECORDING MACHINE.
• STEP 2: INPUT:EACH EMPLOYEE WOULD PICK UP HIS TIME CARD EVERYDAY
AND PUNCH IT AT THE TIME OF ENTRY AND EXIT USING A TIME RACORDING
MACHINE.THESE CARDS WILL BE SENT ON THE FIRST DAY OF THE NEXT
MONTH TO A COMPUTER CENTER.
• STEP 3: PROCESSING: AN INBUILT PROGRAM IN THE COMPUTING MACHINE
WILL PROCESS THE CARD OF EACH EMPLOYEE AND CALCULATE HIS
MONTHLY SALARY BASED ON THE TOTL NUMBER OF HOURS WORKED,AT
THE PAY SCALE,AND SUBTRACT THE DEDUCTIONS.
• STEP 4: OUTPUT:THE PRINTER CONNECTED TO THE COMPUTER WILL PRINT
THE COMPUTED FIGURES ON CHEQUES,SPECIALLY DESIGNED FOR USEC ON
THIS MACHINE
1.4.INFORMATION
1.4.1.ENVIRONMENT INFORMATION
COMPRISES:
• 1.4.1.ENVIRONMENT INFORMATION COMPRISES: INFORMATION IS
SUMMARISATION OF DATA.TECHNICALLY DATA ARE NEW FACTS AND FIGURES,THAT ARE
PROCESSED OR MANIPULATED INTO INFORMATION,SUCH AS SUMMARIES AND TOTALS.
INFORMATION MAY BE DEFINED AS “INFORMATION IS THE BEHAVIOUR-INITIARING STIMULUS
BET WEEN A SENDER AND A RECEIVER.IT IS IN THE FORM OF SYMBOLS ARRANGED IN AN ORDER
AND SYMBOLS ARE CODED REPRESENTATION OF DATA.

• DIFFERENCE BETWEEN INFORMATION AND DATA:

DATA MAY BE CONNSIDERED AS SYMBOLS,USUALLY RECORDED OBSERVATIONS,THAT ARE NOT


CURRENTLY AFFECTING BEHAVIOUR.HOWEVER DATA MAY BECOME INFORMATION,IF BEHAVIOUR
IS AFFECTED.

FOR EXAMOLE,THE DATA 45 MAY CONVEY SEVERAL MEANINGS,BUT BY SAYING 45 STUDENTS,IT


REPRESENTS AN INFORMATION.

HENCE, THE RELATIONSHIP BETWEEN DATA AND INFORMATION MAY BE SUMMARIZED AS:

DATA ARE RAW FACTS,WHEREAS INFORMATION IS OBTAINED VAFTER MANIPULATING THE RAW
FACTS.
1.4.3.INTERNAL
INFORMATIONS
• TO UNDERSTAND THE IINTERNAL INFORMATIONS WE SHOULD UNDERSTAND THE LEVELS OF INFORMATION

• DIFFERENT LEVELS OF INFOERMATION ARE:

INTERNATIONALINFORMATION:
WORLDWDE INFORMATION
EXAMPLE-BBC WORLD NEWS

NATIONAL INFORMATION:
STATEWISE OR COUNTRYWISE INFORMATION
OR INTERNAL INFORMATIONS OF ACOUNTRY
EXAMPLE-TIMES OF INDIA

COPORATE INFORMATION:
INTERNAL INFORMATIONS OF A COMPANY.
EXAMPLE-MICROSOFT

DEPARTMENT INFORMATION:
INTERNAL INFORMATIONS OF A DEPARTMENT.
EXAMPLE-DEPARTMENT OF MATHEMATICS

INDIVIDUAL INFORMATION:
INFORMATIONS ABOUT AN INDIVIDUAL,PERSONAL PARTICULARS ETC.
1.4.4.CHARACTERISTICS OF
INFORMATION
• MEANINGFUL: THE INFORMATION SHOULD BE RELEVANT TO THE PROBLEM FOR
WHICH WE ARE COLLECTING THE INFORMATION. FOR EXAMPLE,FOR AN INVENTORY
CONTROL SYSTEM,INFORMATION REGARDING THE PROJECTION OF FUTURE SALES
WILL BE MEANINGFUL.

• SURPRISE ELEMENT: INFORMATION RECEIVED IN AN ORGANISATION MAY CONTAIN


SOME SURPRISE ELEMENT.FOR EXAMPLE,A COMPANY MAY COME TO KNOW THAT IT
HAS FAILED TO RECEIVE A CONTRACT,AS ITS COMPETITOR DID QUOTE LESS PRICE.

• CONFORMITY WITH PREVIOUS KNOWLEDGE: ANY SUDDEN CHANGES IN


INFORMATION MAY SOMETIMES BE MISLEADING,IF THEY DO NOT CONFORM TO
PREVIOUS KNOWLEDGE.

• CORRECTION TO PREVIOUS KNOWLEDGE: THE INFORMATION COLLECTED MAY


CONTAINN SOME DEVIATION FROM INFORMATION COLLECTED PREVIOUSLY.BUT
THERE SHOULD NOT BE A COMPLETE SUDDEN CHANGE.IT MAY BE A
MODIFICATION,CORRECTION,BUT NOT SURPRISE.
• BREVITY: IMPORTANT INFORMATION WITH RELATIVELY USELESS DATA IS
OFTEN CAMOUFLAGED IN DETAILED REPORTS.

• ACCURACY: ACCURACY IS DEFINED AS THE RATIO OF CORRECT


INFORMATION TO THE TOTAL AMOUNT OF INFORMATION PRODUCED
OVER PERIOD.IT IS EXPRESSED IN PERCENT.

• TIMELINESS: INFORMATION SHOULD REACH IN TIME,OTHERWISE IT IS


OF NO USE.

• ACTION ORIENTED: THE INFORMATION SHOULD BE


COMPLETE,OTHERWISE OF NO USE.
1.4.5.PROPERTIES AND SCOPE OF
INFORMATION
• INFORMATION HAS THE FOLLOWING PROPERTIES:
-INFORMATION IS NOT CONSUMED IN USE.
-IT CAN BE SHARED BY MANY AND CAN BE USED
SIMULTANEOUSLY BY MANY WITHOUT ANY LOSS TO ANYONE.
-CONCRETENESS
• THE SCOPE OF INFORMATION MAY BE:
-IN DETAIL OR IN SUMMARY FORM -IT CAN EITHER BE A
COMPLETE SET OF DATA OR ONLY SPECIFIC DATA -IT COULD
BE HARD OR OBJECTIVE, RELYING ON FACTS
-IT COULD BE SOFT OR SUBJECTIVE, RELYING ON INTUITION
INFORMATION ECONOMICS
• COST OF INFORMATION: -HARDWARE COST: IT IS
ONE TIME COST -SYSTEM
ANALYSIS AND DESIGN COST -
COST FOR SPACE AND ENVIRONMENTAL CONTROL FACTORS –
OPERATION COSTS: IT INCLUDES COSTS OF PERSONNEL,
MAINTENANCE, SUPPLIES, FACILITIES
• VALUE OF INFORMATION: -INFORMATION MUST
POSSESS RELEVANCE, AVAILABILITY AND TIMELINESS, TO
HAVE VALUE AND QUALIFY AS INFORMATION -
MEASURE OF QUALITY IS VALIDITY, ACCURACY, AND
PRECISION, SUPPORT FOR EFFECTIVE DECISION MAKING
INFORMATION SYSTEMS
• AN INFORMATION SYSTEM CAN BE DEFINED AS THE
INTERACTION OF MAN AND MACHINE, WHICH, UNDER MAN’S
CONTROL, GATHERS DATA AND BROADCASTS INFORMATION.
• DATA MUST BE EVALUATED, ANALYSED, AND PROCESSED TO
PRODUCE MEANINGFUL INFORMATION
1.4.6. TYPES OF INFORMATION
SYSTEMS
• OFFICE AUTOMATION SYSTEM: -
COMPUTER BASED INFORMATION SYSTEM
-OBJECTIVES ARE TO INCREASE EFFICIENCY AND
PRODUCTIVITY
• TRANSACTION PROCESSING SYSTEM: -IT
UPDATES THE SYSTEM WITH EACH
TRANSACTION LIKE INVOICING, ACCEPTING AN
ITEM, ACCEPTING AN ORDER ETC. -
TRANSACTION PROCESSING CAN BE ON LINE OR
OFF-LINE
1.5.TYPES OF INFORMATION COMPUTING
MODELS
• LOCAL AREA NETWORKS(LAN): IT IS A
COMMUNICATION FACILITY THAT COVERS A
LIMITED GEOGRAPHICAL AREA

• WIDE AREA NETWORK(WAN): IT IS A WIDE AREA


COMMUNICATIONS FACILITY, THAT COVERS A
WIDER GEOGRAPHICAL AREA –RANGING FROM
A FEW KILOMETERS TO THE ENTIRE GLOBE.
• FILE SERVER:
-IT IS A CENTRAL NODE THAT STORES DATA FILES WHICH
USERS CAN ACCESS
-ACTS LIKE A CENTRAL HUB FOR SHARING PERIPHERALS
LIKE PRINTERS, MODEMS ETC.
-A WORKSTATION CAN READ OR WRITE FILES ON THE
FILE SERVER. -IT HAS
TWO LIMITATIONS: *IT DOES NOT
DELIVER DATA CONCURRENTLY TO MULTIPLE USERS,
SINCE FILES ARE VERY LARGE * IF MANY
WORKSTATIONS SEND SIMULTANEOUSLY, TRAFFIC GETS
OVERLOADED AND THE PERFORMANCE IS DECREASED.
• CLIENT/SERVER: -IT HAS THREE
COMPONENTS, i.e. A DATABASE SERVER, A CLIENT
APPLICATION, AND A NETWORK -THE TASK OF THE
SERVER IS TO MANAGE ITS RESOURCE OPTIMALLY AMONG
VARIOUS CLIENTS, THAT CONCURRENTLY REQUEST FOR THE
SAME RESOURCE.
DATABASE SERVER
-MANAGE A SINGLE DATABASE AMONG MANY CONCURRENT
USERS. -CONTROL DATABASE ACCESSES AND
SECURITY REQUIREMENTS -PROTECT DATABASE WITH
BACKUP AND RECOVERY FEATURES -MAINTAIN
GLOBAL DATA INTEGRITY
CLIENT APPLICATION
• PRESENTS AN INTERFACE FOR THE USER
• MANAGES PRESENTATION LOGIC SUCH AS POP
UP LISTS ON A DATA ENTRY FORM
• PERFORMING APPLICATION LOGIC, SUCH AS
CALCULATING FIELDS ON A DATA ENTRY FORM
• VALIDATING DATA ENTRY
• REQUESTING AND RECEIVING DATA FROM
DATABASE SERVER
WHY A CLIENT SERVER SYSTEM IS
BETTER?
• IT CAN DELIVER BETTER RESULTS, SINCE CLIENT
APPLICATION AND DATABASE SERVER SHARE THE
PROCESSING LOAD
• CLIENT WORKS WITH SMALL DATA SETS LIKE A
ROW OF A TABLE, NOT A FILE
• DATABASE SERVER IS INTELLIGENT AND LOCK
AND RETUSN THE ONLY ROW REQUESTED BY
THE CLIENT, WHICH ENSURES SIMULTANEOUS
USE OF SAME DATABASE BY MANY CLIENTS
• BENEFITS OF CLIENT/SERVER SYSTEM ARE:
-SINCE CLIENT AND SERVER RUN ON DIFFEREND
COMPUTERS, EACH COMPUTER CAN BE CHOSEN
COST EFFECTIVELY. -IT IS
VERY RESPONSIVE AND FLEXIBLE TO ANY
HARDWARE SOFTWARE CHANGES
-NEW CLIENTS CAN BE EASILY INSTALLED
1.6. INTERNET
• NETWORK OF NETWORKS: -SEVERAL NETWORKS
ARE INTERCONNECTED VIA ROUTERS -IT USES TCP/IP
PROTOCOL,WHERE TCP BREAKS UP LARGE BATCH OF DATA
INTO LITTLE DATA PACKETS, AND IP ADDS THE DESTINATION
ADDRESS TO THESE PACKETS.
• BASIC TERMINOLOGIES: -
CYBERSPACE: COMPUTER WORLD -WEB
SITE:THE ELECTRONIC STOREFRONT
-WEB BROWSER: SOFTWARE TO GLIDE
THROUGH THE NETWORK, LIKE INTERNET
EXPLORER -
HOME PAGE: THE INTRODUCTORY SCREEN
-PROTOCOL: SET OF RULES TO FOR
TRANSMISSION ON THE NET -
HYPERTEXT TRANSFER PROTOCOL, USED TO
TRANSFER WWW PAGES ON INTERNET
• GETTING CONNECTED:THE BASIC
REQUIREMENTS ARE A COMPUTER (PROCESSOR
386 OR ABOVE), A MODEM, AND A TELEPHONE
LINE AND A BROWSER. THE COMPUTER IS
CONNECTED THROUGH A MODEM TO THE
INTERNET SERVICE PROVIDER.
• E-MAIL: ELECTRONIC MAIL
• WORLD WIDE WEB: ALLOWS THE USER TO JUMP
FROM ONE LOCATION ON THE INTERNET TO
ANOTHER.
• BROWSER: THE SOFTWARE TO NAVIGATE ACROSS THE
INTERNET
• FILE TRANSFER PROTOCOL: LARGE FILES MAY BE ACCESSED.
• INTERNET SERVICE PROVIDER: AUTHORISED ORGANISATIONS
TO PROVIDE CONNECTIONS
• DIAL UP: CONNECTION USING A TELEPHONE LINE
• LEASED LINE: ALSO CALLED A DEDICATED
CONNECTION, WHICH USES A TERMINAL
SERVER, A ROUTER ETC.
• SLIP(SERIAL LINE INTERRUPT PROTOCOL)/ PPP
(POINT TO POINT PROTOCOL): THESE ARE DIAL
UP INTERNET PROTOCOLS, WHICH SWITCHES A
COMPUTER TO INTERNET
• COMMUNICATION ON INTERNET: GLOBAL
COMMUNICATION FOR ALL PURPOSES LIKE
BUSINESS, EDUCATION, ENTERTAINMENT ETC.
2. NUMBERING SYSTEMS
• 2.0. INTRODUCTION: -THE NATURAL
NUMBER SYSTEM IS DECIMAL WHICH USES DIGITS
0,1,2,3,4,5,6,7,8,9 -THE ELECTRONIC
NUMBER SYSTEM IS BINARY WHICH USES TWO DIGITS 0 AND
1, DESIGNATED FOR ON AND OFF RESPECTIVELY
2.1.CLASSIFICATION OF NUMBER
SYSTEMS
• NON-POSITIONAL NUMBER SYSTEMS: -
USED FOR SMALL QUANTITY COUNTS TO
REPRESENT THE OBJECTS, LIKE WITH FINGERS,
STONES ETC.
• POSITIONAL NUMBER SYSTEM: -
USED FOR HUGE QUANTITY COUNTS TO
REPRESENT VALUE, USING CERTAIN WELL
DEFINED SYMBOLS CALLED ‘DIGITS’. A DIGIT IS
DEFINED BY THREE FACTORS, LIKE *VALUE OF
THE DIGIT *BASE OF THE
NUMBER SYSTEM *POSITION OF THE
DIGIT IN THE NUMBER
2.1.1.NUMBER SYSTEMS
• DECIMAL: IT HAS A BASE 10, WITH DIGITS 0,1,2,3,4,5,6,7,8,9.
• BINARY: IT HAS A BASE 2, WITH DIGITS 0,1.
• OCTAL: IT HAS A BASE 8, WITH DIGITS 0,1,2,3,4,5,6,7.
• HEXADECIMAL: IT HAS A BASE 16, WITH DIGITS
0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F.
2.1.2.DECIMAL NUMBER SYSTEM
• IT HAS 10 DIGITS NAMELY 0,1,2,3,4,5,6,7,8,9.
• EACH DIGIT HAS A POSITIONAL VALUE,DETERMINED BY HOW
MANY PLACES IT IS TO THE LEFT OR TO THE RIGHT OF THE
DECIMAL POINT IN THE NUMBER.
2.1.3.BINARY NUMBER SYSTEM
• IT HAS BASE 2, WITH TWO DIGITS 0 AND 1.
• EACH DIGIT IS ALSO KNOWN AS ABIT.
• EACH POSITION, FROM RIGHT TO LEFT, REPRESENTS TWICE AS
MUCH AS THE PREVIOUS POSITION.
• IF 1 IS PRESENT, THE VALUE IS COUNTED, IGNORED IF 0.
2.1.4.OCTAL NUMBER SYSTEM
• IT HAS A BASE 8,WITH DIGITS 0,1,2,3,4,5,6,7.
• THE POSITION VALUE OF A DIGIT TO THE LEFT IS 8 TIMES THE
VALUE OF THE DIGIT TO ITS RIGHT.
• IT IS USED IN MICROPROCESSORS.
2.1.5.HEXADECIMAL
NUMBERS
• IT HAS A BASE 16, AND USES DIGITS
0,1,2,3,4,5,6,7,8,9, AND SYMBOLS A,B,C,D,E,F.
• IT IS USED TO REPRESENT INSTRUCTIONS FOR
MICROPROCESSORS
• THE POSITIONAL VALUE INCREASES 16 TIMES IN
EACH STEP, AS WE MOVE FROM RIGHT TO LEFT,
ACROSS A HEXADECIMAL NUMBER.
2.2.CONVERSIONS BASE TO
ANOTHER
• 2.2.1. DECIMAL TO ANY OTHER SYSTEM: THE STEPS ARE:
-STEP1. DEVIDE THE DECIMAL NUMBER N BY THE
REQUIRED BASE.
-STEP2. KEEP A NOTE OF THE REMAINDER AS THE RIGHT
MOST DIGIT
-STEP3. DEVIDE THE QUOTIENT BY THE NEW BASE
-STEP4. KEEP A NOTE OF THE REMAINDER AS THE NEXT
DIGIT
-REPEAT STEPS 3 AND 4 UNTIL EITHER RHE QUOTIENT IS 0
OR NOT DIVISIBLE
• 2.2.2.DECIMAL TO BINARY CONVERSION:
EXAMPLE
• 2.2.3. DECIMAL FRACTION TO BINARY: THE
PROCEDURE IS TO SUCCESSIVELY MULTIPLY BY
BASE 2 AND COLLECT THE INTEGRAL PART FROM
TOP TO BOTTOM AND PLACE THEM FROM TO
LEFT TO RIGHT AFTER THE DECIMAL POINT.
EXAMPLE
• 2.2.4.DECIMAL TO OCTAL: EXAMPLE
• 2.2.5.DECIMAL FRACTION TO OCTAL EQUIVALENT: EXAMPLE
• 2.2.6.DECIMAL TO HEXADECIMAL: EXAMPLE
• SEE TABLE 2.1 FOR EQUIVALENCE OF ALL NUMBER SYSTEMS.
2.2.7.BINARY TO OCTAL AND
HEXADECIMAL(SHORTCUT
METHOD)
• FOR BINARY TO OCTAL CONVERSION,THE BITS
MAY BE GROUPED INTO THREE EACH FROM
RIGHT TO LEFT, AND EACH GROUP REPLACED BY
THE EQUIVALENT OCTAL DIGIT. EXAMPLE
• FOR BINARY TO HEXADECIMAL CONVERSION,
BITS ARE GROUPED INTO 4 EACH FROM RIGHT
TO LEFT, AND EACH GROUP REPLACED BY ITS
HEXADECIMAL EQUIVALENT. EXAMPLE
• 2.3.1. BINARY TO DECIMAL: EXAMPLE
• 2.3.2. OCTAL TO DECIMAL: EXAMPLE
• 2.3.3. OCTAL FRACTION TO DECIMAL: EXAMPLE
• 2.3.4. HEXADECIMAL TO DECIMAL: EXAMPLE.
• 2.3.5. HEXADECIMAL FRACTION TO DECIMAL: EXAMPLE.
3.COMPUTER
FUNDAMENTALS
• 3.0.INTRODUCTION
• 3.1.CHARACTERISTICS OF A COMPUTER
• 3.2.CRITERIA FOR USING COMPUTERS
• 3.3.HISTORY OF COMPUTERS
• 3.4.GENERATIONS OF COMPUTERS
• 3.5.CLASSIFICATION OF COMPUTERS
• 3.6.APPLICATIONS OF COMPUTERS
• 3.7.BASIC COMPONENTS OF A PC
• 3.8.COMPUTER ARCHITECTURE
• 3.9.CENTRAL PROCESSING UNIT
• 3.10.MAIN MEMORY
3.0. INTRODUCTION
• COMPUTING MEANS CALCULATING
• COMPUTER WAS DESIGNED TO MANIPULATE
NUMBERS AND TO SOLVE ARITHMETIC
PROBLEMS
• HOWEVER, LATER, THE COMPUTER COULD
PROCESS CHARACTERS LIKE NUMBERS
• SINCE, FUNCTION OF A COMPUTER IS MUCH
MORE THAN COMPUTING, IT IS ALSO KNOWN AS
ELECTRONIC DATA PROCESSING DEVICE
DEFINE COMPUTER
• COMPUTER IS AN ELECTRONIC DEVICE WHICH STORES,
RETRIEVES, READS AND PROCESSES THE DATA OR
INFORMATION TO PRODUCE THE MEANINGFUL
RESULTS/OUTPUTS.
• COMPUTER REQUIRES TWO KINDS OF INPUTS:
-RAW DATA -A SET
OF INSTRUCTIONS, CONTAINING THE METHODOLOGY TO
PROCESS THE DATA, CALLED AS A PROGRAM
• A PROCESS IS APROGRAM IN EXECUTION, i.e. THE SEREIS
OF CALCULATIONS, OR SERIES OF CHANGES TO BE DONE
ON THE FETCHED INFORMATION
3.1.CHARACTERISTICS OF A
COMPUTER
• 3.1.1.SPEED: THE SPEED OF A COMPUTER IS
MUCH FASTER AS COMPARED TO THAT OF A
MAN.THE SPEED OF A COMPUTER IS GIVEN IN
THE FOLLOWING UNITS, FOR THE ACCESS TIME:
-Kbps: KILO BITS PER SECOND -
KBPS: KILO bits PER SECOND -Mbps:
MEGA BITS PER SECOND -MBPS: MEGA
BYTES PER SECOND -KIPS: KILO
INSTRUCTIONS PER SECOND -MIPS: MILLION
INSTRUCTIONS
3.1.2.STORAGE
• THE STORAGE CAPACITY OF A COMPUTER IS
MUCH MORE THAN THE MAN CAN REMBER
• THE COMPUTER HAS A PRIMARY (FIXED) AND A
SECONDARY (VARIBLE) STORAGE.
• THE UNITS OF STORAGE ARE: -
NIBBLE ( 4 BITS) -BYTE
(8 BITS) -KILO BYTES
(1024 BYTES) -MEGA BYTES (
1024 KILO BYTES) -GIGA BYTES ( 1024
MEGA BYTES) -TERA BYTES ( 1024 GIGA
BYTES)
• 3.1.3.ACCURACY AND RELIABILITY: -
ACCURACY OF A COMPUTER IS 100% -
COMPUTER DOES NOT MAKE ANY ERROR, UNTIL ANY
EXTERNAL INTERFERRENCE INTERRUPTS ITS WORK,
HENCE IT IS RELIEBLE.
• AUTOMATIC: COMPUTER IS CAPABLE OF
FUNCTIONING AUTOMATIOCALLY, ONCE THE
PROCESS IS INITIATED, AND DOES NOT REQUIRE
EXTERNAL COMMAND IN BETWEEN
• 3.1.5.DILIGENCE/ENDURANCE: DEPENDING ON THE COMPLEXITY
OF THE JOB THE PERFORMANCE OF A MAN MAY VARY, BUT A
COMPUTER WOKS WITH THE SAME SPEED AND ACCURACY,
IRRESPECTIVE OF THE NATURE AND COMPLEXITY OF THE JOB.
• 3.1.6.SCINTIFIC APPROACH: THE APPROACH TO
PROBLEM SOLVING BY A COMPUTER IS TOTALLY
SCINTIFIC (AS PER THE ALGORITHM), OBJECTIVE,
AND CARRIED OUT SEQUENCIALLY.
• VERSATILITY: THE APPLICATION AREA OF A
COMPUTER IS VERY LARGE, LIKE SCIENTIFIC,
BUSINESS, EDUCATION, ENTERTAINMENT, INDUSTRY
ETC.
3.2.CRITERIA FOR USING
COMPUTERS
• TO MAKE AVAILABLE INFORMATION QUICKLY
• TO PROVIDE HIGHLY ACCURATE AND RELIABLE
INFORMATION: DEPENDS ON THE ALGORITHM.
• TO PREPARE REPORTS: FINANCIAL, INVENTORY,
NONFINANCIAL
• TO REDUCE THE PAPER WORK
• TO IDENTIFY THE PROBLEM AREAS:
IDENTIFICATION OF BUSINESS PROBLEM BY
CARRYING OUT THE ANALYSIS OF DATA
3.3.HISTORY OF COMPUTERS
• ABACUS: ADDING MACHINE, DESIGNED BY
CHINA IN450 B.C.
• 1642 A.D. ADDING MACHINES: INVENTED BY
FRENCH SCIENTIST PASCAL, COULD ADD AND
CARRY DIGITS AUTOMATICALLY.
• 1692 A.D. MULTIPLYING MACHINE: DESIGNED BY
GERMAN SCIENTIST LEIBNIZ, COULD CARRY OUT
AUTOMATICALLY MULTIPLICATION OF NUMBERS
• 1833 ANALYTICAL ENGINE: DESIGNED BY
ENGLISH MATHEMATICIAN, CHARLES BABBAGE
FOR AUTOMATIC COMPUTATION OF
MATHEMATICAL TABLE, ALSO CALLED AS
“DIFFERENCE ENGINE”
• ANALYTICAL ENGINE, DESIGNED BY CHARLES
BABBAGE, WHICH COULD PERFORM GENERAL
FUNCTIONS, WITH A MEMORY DEVICE, AN
ARITHMETIC DEVICE, A PUNCHED CARD READER
AS INPUT DEVICE
• 1942 A.D. MARK: THE FIRST ELECTRO
MECHANICAL CALCULATOR, DEVISED IN
UNIVERSITY OF PENSILVANIA USA, WHICH USED
THE PUNCHED CARD CONCEPT.
• 1944 A.D. ENIAC: ELECTRONIC NUMERICAL
INTEGRATOR AND CALCULATOR(ENIAC), DEVISED
AT HARVARD UNIVERSITY,USA, WAS THE FIRST
ELECTRONIC CALCULATOR, WHICH USED
VACCUM TUBES AS MEMORY ELEMENT. IT
COULD PERFORM 300 MULTIPLICATIONS PER
SECOND
• 1947 A.D. EDSAC: ELECTRONIC DELAYED
STORAGE AND CALCULATION(EDSAC) WAS THE
FIRST ELECTRONIC COMPUTER IN THE WORLD,
DEVISED BAT CAMBRIDGE UNIVERSITY,
ENGLAND. IT FIRST IMPLEMENTED “STORED
PROGRAM CONCEPT”
• 1951 A.D. UNIVAC-1: IT WAS THE FIRST
COMMERCIAL COMPUTER, DEVISED BY SPERRY
RAND CORPORATION,USA.
3.4.GENERATIONS OF COMPUTERS
THE EVOLUTION OF THE MODERN COMPUTER
CAN BE VIEWED IN SPECIFIC GENERATIONS AS
PER THE FOLLOWING PARAMETERS:
• TECHNOLOGY
• SPEED
• STORAGE
• SIZE
• RELIABILITY AND DILIGENCE
• SYSTEM COST
3.4.1.FIRST GENERATION
COMPUTERS
• THERMIONIC VALUES AND VACCUM TUBES FOR STORAGE
• SPEED WAS IN MILLI SECONDS
• MAXIMUM CAPACITY OF 20000 POSITIONS
• USED SLOW I/O DEVICES LIKE CARD READER
• EXTREMELY LARGE IN VOLUME
• SYSTEM COST AND WORKING COST VERY HIGH
• USED BINARY CODING
• RELATIVELY UNRELIABLE DUE TO FREQUENT FAILURE OF VACCUM
TUBES
• RESTRICTED TO SCIENTIFIC, COMMERCIAL APPLICATIONS
• EXAMPLES: ENIAC,
EDVAC, EDSAC,UNIVAC,IBM 650
3.4.2.SECOND GENERATION
COMPUTERS
• USED TRANSISTORS AS MEMORY ELEMENTS
• SPEED WAS IN MICROSECONDS
• STORAGE CAPACITY WAS 1,00,000 CHARACTERS
• SIZE REDUCED CONVINCINGLY
• MORE RELIABLE, AND MEAN TIME BETWWEN FAILURE(MTBT)
INCREASED
• USED HIGH SPEED CARD READERS, LINE PRINTERS, AND MAGNETIC
TAPES
• SYSTEM COST,OPERATING COST REDUCED
• USED ASSEMBLY LANGUAGES AND TRANSLATOR PROGRAMS
• LIMITED TO SCIENTIFIC AND COMMERCIAL APPLICATIONS
• EXAMPLES: IBM-1400, IBM-7000, LEO MARK III, ATLAS ETC.
3.4.3.THIRD GENERATION
COMPUTERS
• USED INTEGRATED CIRCUITS ON SILLICON CHIPS FOR STORAGE
• SPEED GREW UPTO NANO-SECONDS
• STORAGE CAPACITY INCREASED TO 5,00,000 CHARACTERS
• USED IMPROVED I/O DEVICES LIKE MAGNETIC INK CHARACTER
READER (MICR), OPTICAL CHARACTER READER(OCR), GRAPH
PRINTERS ETC
• HANDLE EQUIVALENT COMPLEX OPERATIONS
• RELIABILITY AND ACCURACY INCREASED, AND MTBF INCREASED TO
HUNDREDS OF HOURS
• SYSTEM COST, OPERATING COST DECREASED CONVINCINGLY
• EXAMPLE: IBM-360, PDP-II, HONEYWELL 200
3.4.4.FOURTH GENERATION
COMPUTERS
• USED VLSI TECHNOLOGY
• SPEED INCREASED TO PICO SECONDS
• STORAGE CAPACITY INCREASED TO ONE MILLION POSITIONS
• USED ADVANCED I/O DEVICES
• SIZE REDUCED FURTHER
• MTBF FURTHER INCREASED
• USED HIGH LEVEL PROGRAMMING LANGUAGES
• FURTHER REDUCTION IN COST
• USED OPERATING SYSTEMS, CAPABLE OF RECORDING ERRORS
• EXAMPLE: IBM 370, HONEYWELL 6080, PC-386, PC-486, PC-586 ETC.
3.4.5. FIFTH GENERATION
COMPUTERS
• CONTINUING GENERATION
• USE ULTRA LARGE SCALE INTEGRATION(ULSI),
CONTAIN MILLIONS OF COMPONENTS ON A
SINGLE CHIP
• WILL USE INTELLIGENT PROGRAMMING, AND
KNOWLEDGE-BASED PROBLEM SOLVING
TECHNIQUES
• WILL USE ARTIFICIAL INTELLIGENCE
APPLICATIONS LIKE NEURAL NETWORKS,
NATURAL LANGUAGE PROCESSING, MACHINE
LEARNING, EXPERT SYSTEMS, GENETIC
ALGORITHMS ETC.
3.5.CLASSIFICATION OF COMPUTERS
• THE COMPUTERS ARE CLASSIFIED ON THE FOLLOWING
CRITERIA:
• TYPE OF DATA, THEY CAN HANDLE (DIGITAL, ANALOG)
• HYBRID COMPUTERS CAN HANDLE BOTH DATA TYPES
• APPLICATION (SCIENTIFIC OR COMMERCIAL)
• PURPOSE (GENERAL OR SPECIFIC)
• PRICE, SIZE (MAIN FRAME, MINI, MICRO )

SEE TABLE
• 3.5.1.ANALOG COMPUTERS: -
REPRESENT NUMBERS BY PHYSICAL QUANTITIES LIKE VOLTAGE,
POWER . -DERIVE DATA IN
THE FORM OF MEASUREMENTS -
ACCURACY DEPENDS UPON THE PRECISION OF MEASUREMENT
• 3.5.2.DIGITAL COMPUTER: -
REPRESENT NUMBERS IN 0s AND 1s. -CAN
MANIPULATE NUMBERS, LETTERS -USED FOR
BUSINESS AND SCIENTIFIC DATA PROCESSING
• 3.5.3.HYBRID COMPUTERS: -
COMBINES THE FEATURES OF BOTH ANALOG AND DIGITAL
COMPUTERS -HAVE
THE SPEED OF ANALOG COMPUTERS, AND ACCURACY OF DIGITAL
COMPUTERS
3.6.APPLICATIONS OF COMPUTER
• SCIENCE AND TECHNOLOGY: ENGINEERING
APPLICATIONS, SPACE TECHNOLOGY, MEDICINE,
DEFENCE, TELECOMMUNICATION, NETWORKING
• COMMERCIAL APPLICATIONS: BANKING,
PAYROLL SYSTEM, INDUSTRIAL
ADMINISTRATION, BUSINESS ADMINISTRATION
• EDUCATIONAL APPLICATIONS: COMPUTER
ASSISTED LEARNING
3.7. BASIC COMPONENTS OF PC
• ESSENTIAL COMPONENTS: PROCESSOR, HARD DISC, RAM,
MONITOR(VDU), KEY BOARD, DRIVES (HARD DISC, FLOPPY
DISC, CD-ROM), MOUSE
• OPTIONAL COMPONENTS: PRINTERS, SCANNERS,
MODEM, MULTI MEDIA KIT ETC.
3.8.COMPUTER ARCHITECTURE
• A COMPUTER HAS THREE MAJOR FUNCTIONS AND
ACCORDINGLY THREE MAJOR COMPONENTS:
• INPUT DEVICE, FOR INPUT OF DATA
• PROCESSING DEVICE, FOR PROCESSING OF DATA
• OUTPUT DEVICE, FOR OUTPUT OF DATA
3.8.1.FUNCTIONS OF VARIOUS
DEVICES OF COMPUTER
• INPUT DEVICES: -
ENTER USER DATA TO COMPUTER -
ENTER USER INSTRUCTIONS -
ENTER USER COMMANDS TO EXECUTE OR HALT
-BOTH ON LINE AND OFF LINE
• OUTPUT DEVICES: -
DEMONSTRATE RESULTS TO USER -
CONVEY MESSAGES -
RESPOND TO USER QUERIES
• CONTROL UNIT: -
MANTAINS ORDER OF EXECUTION -CONTROLS
DATA FLOW -INTERPRETS
INSTRUCTIONS -COMMUNICATES
INPUT/OUTPUT DEVICES FOR DATA TRANSFER
• ARITHMETIC AND LOGICAL UNIT -
PERFORMS ARITHMETIC OPERATIONS AND
LOGICAL OPERATIONS
• MAIN MEMORY: -
STORES INSTRUCTION AND DATA FOR
PROCESSING -
STORES INTERMEDIATE RESULTS -
DETERMINES THE EFFICIENCY OF COMPUTER
• SECONDARY STORAGE: -
HOLDS BACKUP DATA AND INSTRUCTIONS
-USED FOR DATA TRANSPORTATION -USED
FOR BULK DATA STORAGE
3.8.2.INPUT DEVICES
• INPUT DEVICES ARE USED FOR COMMUNICATING THE
COMPUTER WITH THE EXTERNAL WORLD,
INSTRUCTIONS FROM EXTERNAL WORLD ARE FED TO
THE COMPUTER VIA THE INPUT DEVICES
• EXAMPLES: -
STANDARD INPUT DEVICES: KEY BOARD, MOUSE, JOYSTIC
ETC. -PAPER MEDIA
INPUT DEVICES: PUNCHED CARD READER, PUNCHED
TAPE READER -MAGNETIC MEDIA:
MAGNETIC DISC, MAGNETIC TAPE, MAGNETIC DRUM
ETC. -OPTICAL MEDIA: CD, DVD ETC.
3.8.3.OUT PUT DEVICES
• OUTPUT DEVICES ARE USED TO DEMONSTRATE THE RESULTS
TO THE EXTERNAL WORLD.
• EXAMPLES: -VISUAL DISPLAY
UNIT(VDU) OR MONITOR, PRINTER -
MAGNETIC MEDIA, LIKE MAGNETIC DISC, MAGNETIC TAPE,
MAGNETIC DRUM ETC.
3.9. CENTRAL PROCESSING
UNIT(CPU)
CPU IS THE HEART OF THE COMPUTER, WHERE
ALL OPERATIONS ARE CARRIED OUT. IT HAS
THREE INTERNAL SEGMENTS:
• 3.9.1.RESTERS, WHICH HOLD DATA FETCHED
FROM MEMORY. EXAMPLES ARE INSTRUCTION
REGISTER, PROGRAM COUNTER,
ACCUMULATOR, MEMORY ADDRESS REGISTER,
MEMORY BUFFER REGISTER, ETC.
• 3.9.2. CONTROL UNIT: -
CONTROLS THE SEQUENCE OF PROGRAM
EXECUTION -
CONTROLS FLOW OF DATA BETWEEN DIFFERENT
COMPONENTS -INTERPRETS
INSTRUCTIONS
• 3.9.3.ARITHMETIC AND LOGICAL UNIT: -
PERFORMS ARITHMETIC OPERATIONS
-PERFORMS LOGICAL OPERATIONS
4.COMPUTER MEMORY AND
PERIPHERAL DEVICES
• 4.0.INTRODUCTION
• 4.1.PRIMARY MEMORY OR MAIN MEMORY
• 4.2.SECONDARY MEMORY
• 4.3.COMPUTER PERIPHERALS
• 4.4.OUTPUT DEVICES
• 4.0.INTRODUCTION: -CLASSIFICATION OF
MAMORY
• 4.1. PRIMARY MEMORY OR MAIN MEMORY:
-IT IS THE INTERNAL OR BUILT-IN MEMORY OF THE
PROCESSOR -IT HAS A LIMITED CAPACITY -IT
IS DIRECTLY CONNECTED TO THE SYSTEM BUS
• 4.1.1.FUNCTIONS OF PRIMARY MEMORY:
-HOLDS THE OPERATING SYSTEM TO BOOT THE COMPUTER
-IT HOLDS A COPY OF THE INSTRUCTIONS, ENTERED FROM
THE KEYBOARD BY THE PROGRAMMER -IT HOLDS THE
RESULT TEMPORARILY BEFORE BEING PRESENTED TO THE
OUTPUT DEVICE
• 4.1.2.SECTIONS OF MAIN MEMORY: THE MAIN
MEMORY HAS TWO SECTIONS:
-RANDOM ACCESS MEMORY (RAM): * IT
IS A READ WRITE MEMORY * IT IS
VOLATILE * IT STORES
USERS PROGRAM AND DATA
*TWO TYPES OF RAM: STATIC RAM, WHICH USES
A FLIP FLOP AS MEMORY ELEMENT, AND
DYNAMIC RAM, WHICH USES
CAPACITORS(TRANSISTORS) AS MEMORY
ELEMENT
-READ ONLY MEMORY(ROM): * IT IS A PERMANENT
MEMORY STORAGE *IT SUPPORTS
ONLY READ OPERATION * IT STORES
THE SYSTEM PROGRAMS * IT IS NON-VOLATILE
* TWO TYPES: PROGRAMMABLE (PROM), AND ERASABLE
PROGRAMMABLE (EPROM)
4.2. SECONDARY MEMORY
4.2.1.STORAGE DEVICES (MAGNETIC MEDIA):
• MAGNETIC TAPE: -MADE
OF PLASTIC, COATED ON ONE SIDE WITH AN IRON-OXIDE
BASED MANETISABLE MATERIAL
-DATA ARE RECORDED IN THE FORM OF TINY VISIBLE
SPOTS ON THE MAGNETISED SIDE
-1/2” WIDTH AND 50-2400 FEET LONG -7
TO 9TRACKS RUNNING THE LENGTH OF THE TAPE
-556 TO 6250 CHARACTERS PER INCH -TAPE
RUNS FROM ASUPPLY REEL TO A PICK UP REEL
• MAGNETIC DISC: -
DISC IS COATED WITH A MAGNETISED MATERIAL.
-DATA ARE STORED ON SECTORS IN PARALLEL
TRACKS -DISC ROTATES
AT A SPEED OF 50 OR MORE REVOLUTIONS PER
SECOND -STANDARD SIZES ARE
14”,8”,5.25”,3.5” –SEVERAL DISCS CAN BE
MOUNTED TO A CENTRAL HUB TO FORM A DISC
PACK
TWO TYPES OF MAGNETIC DISCS
• HARD DISC: -MADE OF THIN
CIRCULAR ALLUMINIUM DISCS COATED ON ONE OR BOTH THE
SURFACES WITH A MAGNETISABLE MATERIAL -
MOUNTED ON A SPINDLE SHAFT -MAY HAVE FIXED OR
MOVABLE READ/WRITE HEADS -CAPACITY
40MB, 60MB, 80MB, 260MB, 540MB,….., 80 GB.
• FLOPPY DISC: -
MADE OF A THIN, CIRCULAR PLASTIC MATERIAL COATED
WITH AN OXIDE -ENCLOSED IN
A SQUARE JACKET -HAS ALARGE
CENTRAL HOLE, CALLED DRIVE HOLE FOR MOUNTING
-FLOPPY DISC DRIVE READS FROM OR WRITES INTO THE
DISC, WITH THE READ/WRITE HEAD -
INDEX HOLE REPRESENTS THE STARTING POINT
-WRITE PROTECT NOTCH, WHEN MARKED WITH A
STICKER PROTECTS WRITE OPERATION
ADVANTAGES OF FLOPPY DISC
• ACCESSING AND TRANSFER SPEED IS FAST
• SEMI-RANDOM ACCESS PROCESSING
• PERMANENT TILL NEXT WRITE OPERATION
• DUE TO POSSIBLE INTEGRATION OF FILES, INPUTS MAY BE
PROCESSED COMPREHENSIVELY
• DISC CAN BE STORED OFF-LINE
DRAWBACKS OF FLOPPY DISC
• DISC PACKS ARE EXPENSIVE, AS COMPARED TO MAGNETIC
TAPES
• SEREAL/SEQUENTIAL PROCESSING USING DISCS IS SLOWER
THAN TAPES
• AFTER A WRITE OPERATION, THE OLD CONTENTS ARE ERASED
AND CAN NOT BE RECOVERED
• CONTENTS NOT HUMAN READABLE
4.2.2.COMPACT DISC READ-ONLY-
MEMORY(CD-ROM)/CD-RW
• USES OPTICAL METHODS FOR READ AND WRITE OPERATIONS
• BECAUSE OF HIGH PRECISION, IT CAN HOLD DATA UPTO 600
TO 700 MB.
• CAN STORE, DATA, AUDIO AS WELL AS VIDEO INFORMATION
• CD-ROM IS ONLY READABLE, WHEREAS CD-RW IS WRITBLE
TOO
4.3.COMPUTER PERIPHERALS
INPUT DEVICES
• 4.3.1.PAPER MEDIA DEVICES -PUNCHED CARD
READER: *RECTANGULAR THICK PAPER CARDS,
WHERE DATA ARE STORED PUNCHING COMBINATION HOLES
*CONTAINS 80 VERTICAL COLUMNS, 12 HORIZONTAL ROWS
*TOP ROWS ARE 11 AND 12, AND STARTING FROM 3RD ROW
NUMBERED AS 0,1,….,9.
• 4.3.2.PUNCHED PAPER CARD READER DEVICE:
-INPUT DEVIVE, ASSOCIATED WITH PUNCHED CARDS.
-READS THE CARDS AND TRANSLATES THE CONTENTS TO THE
COMPUTER -SPEED OF THIS DEVICE
IS FROM 300 TO 600 CARDS PER MINUTE
• PUNCHED PAPER TAPE READER: -
CONSISTS OF CONTINUOUS STRIP OF PAPER TAPE IN
WHICH DATA ARE RECORDED SERIALLY BY PUNCHING
HOLES ACROSS THE TAPE -
STANDARD WIDTH IS 1” TO 1.67” -A
CHARACTER IS RECORDED BY PUNCHING HOLES IN A
ROW ACROSS THE WIDTH OF THE TAPE.
-PAPER TAPE REDER CONVERTS THE DATA STORED ON
PAPER TPE TO ELECTRICAL SIGNALS AND SENDS TO THE
CPU -SPEED IS 250 TO 1500
CHARACTERS PER SECOND
4.3.4.OPTICAL MEDIA
DEVICES
• OPTICAL CHARACTER RECOGNITION (OCR):
-INPUT DEVICE, WHICH DETECTS A CHARACTER,
ITS SIZE AND FONT, TO READ NUMERIC AND
ALPHA-NUMERIC CHARACTERS FROM A PRE-
PRINTED DOCCUMENT
-USED IN CREDITCARD BILLING, READING PIN
CODES ETC. -THE
SPEED IS 2000 TO 3000 CHARACTERS PER
MINUTE
• OPTICAL MARK RECOGNITION( OMR ): -
INPUT DEVICE, WHICH RECOGNIZES PHOTO-
ELECTRICALLY THE PRESENCE OF A MARK, BUT
UNLIKE CARD AND PAPER TAPE READERS, THE
MARK IS DETECTED BY REFLECTED LIGHT NOT
TRANSMITTED LIGHT
-DATA MAY BE TRANSMITTED TO THE CPU OR
STORED ONTO ANOTHER MEDIUM -USED
TO CHECK MULTI-ANSWER SCRIPTS -SPEED IS
500 TO 1500 A4 SIZE DOCCUMENT
• MAGNETIC INK CHARACTER RECOGNITION:
-READS DOCCUMENTS WITH CHARACTERES
MARKED WITH INK, WHICH ARE PSSED
THROUGH A MAGNETIC FIELD, WHERE THE INK
COATED CHARACTERS MAGNETIZE THE HEAD OF
THE READER’S HEAD DUE TO MAGNETIC INK
-SPEED IS 2400 CHARACTERS PER SECOND –
EXAMPLE: B-13B, CMC-f
4.3.5.STANDARD INPUT DEVICES
• KEY-BOARD:
• MOUSE: -POINTING INPUT
DEVICE TO COMMUNICATE WITH THE COMPUTER -WORKS IN
WINDOS ENVIRONMENT -HAS TWO BUTTONS, i.e. THE LEFT
CLICK AND THE RIGHT CLICK -HAS A SCROLLING DISC
• SCANNERS: -CONVERTS ANY IMAGE
TO INTO ELECTRONIC FORM BY SHINING LIGHT ONTO THE
IMAGE, AND SENDING THE INTENSITY OF THE REFLECTION AT
EVERY POINT -THE IMAGE SCANNED
BY THE SCANNER CAN BE STORED ONTO MEMORY, AND
MANIPULATED USING SOFTWARE METHODS
• JOYSTICK: -
CONSISTS OF A LEVER, MOUNTED ON A
TRACKBALL, WHICH CONTROLS THE MOVEMENT
OF THE CURSOR ON THE DISPLAY.
-CONTROL OF MOVEMENT OF THE CURSER BY
THE LEVER IS SUPPORTED BY A SOFTWARE
-JOYSTICK SENDS COMMANDS TO THE CPU IN
THE FORM OF ELECTRICAL SIGNALS
• LIGHT PEN: -
USED FOR FREE HAND DRAWING ON SCREEN OF THE
DISPLAY DIRECTLY -CONSISTS
OF A PHOTOELECTRIC CELL, AN AMPLIFIER, HELD IN A
PEN-LIKE STRUCTURE

• BAR-CODE READER: -
USED TO DECODE BAR-CODED DATA -
USUALLY USED TO READ PRICES -A
BARCODE REPRESENTS A UNEVEN SEQUENCE OF
VERTICAL DARK/LIGHT BARS OR LINES
-BARCODER READS THE BAR CODE USING A LASER BEAM
• DIGITAL CAMERA: -GENERATES DIGITAL
PHOTO IMAGES -CONSISTS OF A SMALL SCREEN, WHERE THE
PHOTO IS SELECTED -PHOTOS FROM A DIGITAL CAMERA
CAN BE TRANSFERRED TO A COMPUTER, AND STORED ONTO
IT -PHOTOS GENERATED ON A DIGITAL CAMERA CAN BE
EDITED
• SMART CARDS: -IT IS A PORTABLE NON-
VOLATILE STORAGE DEVICE -USED AS
INTERFACES TO A MOBILE ECONOMY
-THIS CARD HOLDS THE USER IDENTIFICATION NUMBER,
MONEY, AND IMPORTANT INFORMATIONS -TWO TYPES:
CREDIT CARDS, DEBIT CARDS
4.4.OUTPUT DEVICES
• 4.4.1.VISUAL DISPLAY UNIT(VDU) : MONITOR
-AN OUTPUT DEVICE -CONSISTS OF A
CATHODE RAY TUBE -THE BASIC DISPLAY UNIT IS A PIXEL -
THREE USES * ALPHANUMERIC
DISPLAY * GRAPHIC DISPLAY *
INPUT THROUGH A LIGHT PEN
• 4.4.2. STRUCTURE OF A RASTER SCAN CRT:
-FRAME BUFFER STORES THE BIT PATTERN FOR EACH OBJECT
ON THE SCREEN OF THE DISPLAY -VIDEO
CONTROLLER READS THE BIT PATTERN AND ACTIVATES THE
CORRESPONDING PIXELS
ASSIGNMENT
• Q.1. DISTINGUISH BETWEEN DATA AND INFORMATION. WHAT ARE THE
DIFFERENT LEVELS OF INFORMATION, EXPLAIN WITH EXAMPLES.
• Q.2. EXPLAIN THE HEXADECIMAL NUMBER SYSTEM. FOR A GIVEN DECIMAL
NUMBER, HOW CAN YOU OBTAIN THE EQUIVALENT HEXA DECIMAL
NUMBER, EXPLAIN WITH AN EXAMPLE. FIND OUT THE DECIMAL
EQUIVALENT OF ( 0.6AE8 ) 16
• Q.3. GIVE A COMPARATIVE STUDY OF 1st, 2nd,3rd AND 4th GENERATIONS OF
COMPUTERS
• Q.4. GIVE A BRIEF CLASSIFICATION OF COMPUTER’S MEMORY. DISTINGUISH
BETWEEN RAM AND ROM. HOW DOES THE MEMORY CAPACITY DEPEND
UPON THE BUS WIDTH, EXPLAIN WITH AN EXAMPLE.
• Q.4. DISTINGUISH BETWEEN A)
APPLICATION SOFTWARE AND SYSTEM SOFTWARE B)
COMPILER AND INTERPRETER C) HIGH
LEVEL PROGRAMMING LANGUAGES AND LOW LEVEL PROGRAMMING
LANGUAGES
4.4.3. PRINTERS
• OUTPUT DEVICE, CATEGORIZED INTO TWO
TYPES: -
IMPACT PRINTERS, WHICH CONSIST OF PHYSICAL
CHARACTERS, OF FIXED SIZE AND FONT,
MOUNTED ON A LEVER, AND THE CHARACTER IS
PRINTED, WHEN THE LEVER HITS ON TO A
RIBBON, WRAPPED ON A PAPER
-NON-IMPACT PRINTERS, WHICH USE THERMAL
METHOD, OR A MAGNETIZED INK, OR A LASER
BEAM TO PRINT THE CHARACTERS
IMPACT PRINTERS
• DOT MATRIX PRINTERS: -EACH CHARACTER IS
GENERATED BY A MATRIX OF DOTS -PRINTS
ONE CHARACTER AT A TIME -TWO TYPES( SIZE ): 5/7”, 7/9”
-STANDARD SPEEDS ARE 180, 240, 260, 300, 360 CHARACTERS
PER SECOND -THERE ARE 80,
132, 136 COLUMN PRINTERS
• DAISY WHEEL PRINTER: - CONSISTS OF A
PLASTIC DAISY WHEEL, WHICH TRAVELS ACROSS THE WIDTH
OF THE PRINTER AND PRINTS THE CHARACTERS -
HAS A BETTER QUALITY THAN THE DOT MATRIX PRINTER
-SIMILAR TO AN ELECTRONIC TYPEWRITER
-SPEED IS 180-280 CHARACTERS/SEC
• LINE PRINTERS: -PRINT
ONE LINE AT A TIME -TWO
TYPES: *DRUM/BARREL
PRINTER, WHERE CHARACTERS ARE MOUNTED ON THE SURFACE OF
THE DRUM, WHICH ROTATES, AND CHARACTER IS PRINTED BY A
HAMMAR HITTING ON TO THE REQUIRED CHARACTER, PLACING A
RIBBON-WRAPPED PAPER BETWEEN THE DRUM AND THE
HAMMER,SPEED 160-254 CHARACTERS/SEC
*CHAIN PRINTER,WHERE CHARACTERS ARE MOUNTED OUTSIDE A
REVOLVING CHAIN, WHICH MOVES IN BOTH DIRECTION, AND
CHARACTER IS PRINTED, BY HITTING A HAMMER ONTO THE CHAIN,
MOUNTED WITH A RIBBON-WRAPPED PAPER
NON-IMPACT PRINTERS
• THERMAL PRINTERS: -
NON-IMPACT MATRIX PRINTER -
PRINTS ON A SPECIAL THERMAL PAPER
• INK-JET PRINTER:
-PAGE AND NON-IMPACT PRINTER
-CHARACTERS ARE PRINTED, BY SPRAYING A
MAGNETISED INK ON TO THE PAPER
-BETTER QUALITY THAN DOT MATRIX PRINTERS
• LASER PRINTERS: -PAGE
AND NON-IMPACT PRINTERS -USES A
SPECIAL PROCESSOR TO INTERPRET THE DATA SENT BY
CPU AND TO CONTROL THE LASER BEAM, WHICH PRINTS
THE CHARACTERS -FASTER AND OF
HIGH QUALITY
• PLOTTERS: -
USED FOR GRAPHICAL OUTPUT -
POPULAR IN ENGINEERING DRAWING AND CAD
-THREE TYPES(DRUM, FLATBED, ELECTROSTATIC)
5.SOFTWARE
• 5.0.INTRODUCTION
• 5.1.CLASSIFICATION OF SOFTWARE
• 5.2.COMPUTER PROGRAMMING LANGUAGES
• 5.3.TRANSLATORS (LANGUAGE PROCESSORS)
• 5.4.OPERATING SYSTEM
• 5.5.4GL(4TH GENERATION LANGUAGE)
5.0.INTRODUCTION
• COMPUTER SOFTWARE REFERS TO THE OPERATIONAL
ASPECTS OF A COMPUTER. IT CONSISTS OF A SET OF
COMMANDS OR INSTRUCTIONS, WHICH INTERPRETS THE
DESIRE OF THE USER, WHAT IT EXPECTS FROM THE
COMPUTER. IT IS ALSO CALLED AS A COMPUTER PROGRAM,
WHICH IS WRITTEN IN A PROGRAMMING LANGUAGE.
5.1.CLASSIFICATION OF SOFTWARE
COMPUTER SOFTWARE IS CLASSIFIED INTO TWO
TYPES:
• APPLICATION SOFTWARE
• UTILITY/SYSTEM SOFTWARE: -
PROGRAMMING LANGUAGES ( HIGH LEVEL
LANGUAGES, LOW LEVEL LANGUAGES )
-OPERATING SYSTEM -
WORD PROCESSING -
DATABASE MANAGEMENT SYSTEM -
ELECTRONIC SPREAD SHEET
5.1.1.UTILITY/SYSTEM SOFTWARE
• IT IS A SET OF INTEGRATD PROGRAMS, WHICH SUPPORT
THE FUNCTIONING OF A COMPUTER, AND IS COMMLY
SUPPLIED BY THE MANUFACTURER OF THE HARDWARE.
EACH HARDWARE HAS ITS SUPPORTING SOFTWARE,
EMBBEDED ON IT.
• EXAMPLES OF COMMERCIAL UTILITY SOFTWARE: WORD
PROCESSING( MS-WORD), DBMS(MS-ACCESS, ORACLE),
ESS( MS-EXCEL, LOTUS 1-2-3)
• EXAMPLES OF SYSTEM SOFTWARE: LANGUAGE
PROCESSORS( COMPILER, ASSEMBLER, INTERPRETER),
LOADER, LINKER, EDITOR
5.1.2.APPLICATION
SOFTWARE
• AN APPLICATION SOFTWARE IS A SET OF PROGRAMS,
DESIGNED BY THE USER, ORIENTED AROUND A SPECIFIC TASK,
LIKE SCIENTIFIC PROBLEMS, BUSINESS PROBLEMS
• EXAMPLES ARE LIBRARY MANAGEMENT, PAYROLL
MANAGEMENT, INVENTORY MANAGEMENT ETC.
OPERATING SYSTEM
• INTEGRATED SET OF SYSTEM PROGRAMS,
WHICH SUPERVISE THE PROCESSING FUNCTIONS
OF THE COMPUTER AS WELL AS THE EXTERNAL
DEVICES.
• FUNCTIONS OF OS ARE: -
USER INTERFACE -
MEMORY MANAGEMENT -
I/O MANAGEMENT -
CPU SCHEDULING -
PROCESS SCHEDULING -
ERROR DETECTION AND CORRECTION -
SYSTEM DEAD-LOCK PREVENTION
5.2.COMPUTER PROGRAMMING
LANGUAGES
• 5.2.1.LOW LEVEL LANGUAGES: LOW
LEVEL LANGUAGES ARE MACHINE ORIENTED,
AND MACHINE DEPENDENT, WHERE EACH
INSTRUCTION CORRESPONDS TO A MACHINE
INSTRUCTION
• ADVANTAGES OF LLL: -
PROCESSING SPEED IS HIGH -
PROGRAM TRANSLATION NOT REQUIRED -IT
OCCUPIES LESS MEMORY SPACE
• DISADVANTAGES OF LLL: -
INSTRUCTIONS ARE DIFFICULT TO READ, WRITE
AND UNDERSTAND. -DIFFICULT
TO UPDATE AND DEBUGG INSTRUCTIONS
-DIFFICULT TO REMEMBER ADDRESS SEQUENCES
OF INSTRUCTIONS -
PROGRAMMING METHODOLOGY VARY FROM
MACHINE TO MACHINE -ONLY
SPECIALISTS CAN OPERATE WITH THESE
LANGUAGES -DIFFICULT
TO CONSTRUCT COMPLEX LOGIC INSTRUCTIONS
CATEGORIES OF LLL
• MACHINE LANGUAGE: -
TOTALLY MACHINE DEPENDENT -
INSTRUCTIONS ARE IN BINARY FORMAT
• ASSEMBLY LANGUAGE: -
MNEMONICS ARE USED FOR OPERATION CODES
-ALPHANUMERIC SYMBOLS ARE USED FOR ADDRESSES
-MNEMONICS ARE IN ENGLISH, AND UNDERSTANDABLE
-EACH MACHINE HAS ITS OWN ASSEMBLY LANGUAGE,
DEPENDENT UPON ITS INTERNAL ARCHITECTURE
• ASSEMBLER: TRANSLATES ASSEMBLY LANGUAGE
PROGRAM TO MACHINE LANGUAGE
5.2.2. HIGH LEVEL LANGUAGES(HLL)
• MACHINE INDEPENDENT HUMAN READABLE
LANGUAGES, CONSIST OF ENGLISH-LIKE
STATEMENTS

• USES A COMPILER TO TRANSLATE THE PROGRAM


IN HLL TO MACHINE LANGUAGE

• PROGRAM IN A HLL IS KNOWN AS SOURCE


CODE, AND A PROGRAM IN MACHINE
LANGUAGE KNOWN AS OBJECT CODE
ADVANTAGES AND DISADVANTAGES
OF HLL
• ADVANTAGES: 1. HLL
STATEMANTS ARE HUMAN READABLE, EASY TO
UNDERSTAND 2.
EASY TO UPDATE AND DEBUG STATEMENTS
3. EASY TO REMEMBER THE ADDRESS SEQUENCES OF
STATEMENTS 4. EASY TO
CONSTRUCT COMPLEX LOGIC STATEMENTS
5. MACHINE INDEPENDENT
• DISADVANTAGES: 1.
PROCESSING SPEED IS TOO SLOW 2.
OCCUPIES MORE MEMORY SPACE
• EXAMPLES: FORTRAN, BASIC, PL/1, COBOL, LISP, PROLOG,
C , ALGOL ETC.
5.3.TRANSLATORS
• STEPS IN PROBLEM SOLVING: -
PROBLEM DEFINITION -
PROBLEM ANALYSIS -
ALGORITHM DEVELOPMENT -
PROGRAM CODING -
PROGRAM TRANSLATION -
PROGRAM EXECUTION -
PROGRAM GEBUGGING -
PROGRAM DOCCUMENTATION
• TYPES OF TRANSLATORS: COMPILERS,
ASSEMBLERS
5.3.1.COMPILERS
• TRANSLATOR FOR HLL, CONSISTS A SET OF
INSTRUCTIONS, PROVIDED BY MANUFACTURERS
• TRANSLATES A PROGRAM IN HLL TO A MACHINE
LANGUAGE PROGRAM
• PHASES OF A COMPILER: -
LEXICAL ANALYSIS ( FORMS LEXICAL TOKENS )
-SYNTACTIC ANALYSIS ( IDENTIFIES VALID SYNTACTIC
CONSTRUCTS ) -INTERMEDIATE
CODE GENERATION -CODE
OPTIMIZATION -OBJECT
CODE GENERATION
5.3.2. INTERPRETER
• TRANSLATOR TO TRANSLATE PROGRAM IN HLL INTO MACHINE
CODE
• IT TRANSLATES AND EXECUTES STATEMENT BY STATEMENT
• IN CASE OF AN ERROR IT STOPS UNTIL THE ERROR IS
RECTIFIED , AND THEN CONTINUES
COMPILER VS. INTERPRETER
• COMPILER TRANSLATES THE ENTIRE PROGRAM BEFORE EXECUTION,
BUT INTERPRETER TRANSLATES AND EXECUTES LINE BY LINE
• COMPILER REQUIRES MORE MEMORY, BUT INTERPRETER REQUIRES
LESS MEMORY
• IN A COMPILER SYNTAX ERRORS ARE CHECKED AFTER TRANSLATION
OF ENTIRE PROGRAM, BUT IN INTERPRETER, ERROR CHECKED AFTER
EACH LINE
• COMPILER HAS NO ROLE IN EXECUTION, BUT INTERPRETER HAS
• IN COMPILER DEBUGGING IS SLOW, BUT IN INTERPRETER
DEBUGGING IS FASTER
• IN CASE OF COMPILER EXECUTION TIME IS LESS, BUT IN
INTERPRETER EXECUTION TIME IS MORE
5.3.3.LOADER
• LOADS THE PROGRAM TO MAIN MEMORY
(LOADING)
• ASSIGNS STORAGE TO A PROGRAM IN MAIN
MEMORY(STORAGE ALLOCATION)
• PROGRAM RELOCATION
• LINKING OF PROGRAMS
• THREE TYPES OF LOADERS: -
ABSOLUTE LOADER -
BOOTSTRAP LOADER -
RELOCATABLE LOADER
LINKER
• PROGRAMS WHICH INTEGRATES DIFFERENT
MODULES OF A PROGRAM TO EXECUTE THE
MODULES AS A SINGLE PROGRAM, MOSTLY
USED FOR HLL.
• THREE TYPES: -
LINKING LOADER, WHICH PERFORMS
RELOCATION, LOADING AND LINKING -
LINKAGE EDITOR, WHICH LINKS THE USER
MODULES -
DYNAMIC LINKER, LINKS THE PROGRAMS
DURING EXECUTION
5.4. OPERATING SYSTEM
• SET OF COMPLEX PROGRAMS, WRITTEN IN MACHINE
LANGUAGE, ENABLES COMPUTER TO WORK EFFICIENTLY
• ACTS AS AN INTERFACE BETWEEN THE USER AND THE
COMPUTER, ENABLES CONVINIENT USE OF THE COMPUTER
SYSTEM, AND EFFICIENT USE OF THE COMPUTER HARDWARE
FACILITIES PROVIDED BY OS ARE
• COMMUNICATES THE COMPUTER WITH THE OPERATOR
BY MEANS OF THE CONSOLE KEYBOARD
• CONTROLS THE FLOW OF PROGRAMS, BY LOADING AND
DISLOADING PROGRAMS FREQUENTLY
• DETECTION AND RECOVERY OF ERRORS
• ALLOCATION OF PERIPHERALS TO PROGRAMS
• WARNS OPERATOR WHEN PERIPHERALS NEED
ALTERATION
• SUPERVISES COMPILATION AND EXECUTION OF
PROGRAMS
COMPONENTS OF OS
• PROCESS MANAGEMENT(ASSIGNING
PROGRAMS TO CPU, IF THERE ARE SEVERAL
PROGRAMS IN MEMORY
• MEMORY MANAGEMENT( ALLOCATE MEMORY
SPACE TO PROGRAMS, LOADED FROM
SECONDARY MEMORY)
• I/O MANAGEMENT( SHARING OF I/O DEVICES BY
DIFFERENT PROGRAMS)
• FILE MANAGEMENT( STORAGE AND ACCESS TO
FILES)
GOALS OF OS
• RELIABILITY( ERROR DETECTION AND RECOVERY)
• PROTECTION( MEMORY, FILES )
• INTEGRITY ( LINKING OF DIFFERENT PROGRAMS)
• EXTENDIBILITY( WIDE RANGE OF FUNCTIONS)
• FLEXIBILITY( INSTALLATION OF NEW COMPONENTS)
• ADAPTABILITY: INDEPENDENT OF MACHINE
• EFFICIENCY( FASTER OPERATION
• SERVICEABILITY ( RECOVERY FROM ERRORS WITHIN THE OS ITSELF )
• CONVINIENCE ( GRAPHICAL USER INTERFACE )

• EXAMPLES OF OS: -DOS (


MS-DOS, PC-DOS, OS/2 ) -UNIX (FOR
NETWORKING ENVIRON MENT )
5.5.4GL(FOURTH GENERATION
LANGUAGES)
• EASY TO LEARN
• HIGH PRODUCTIVITY
• HLL WITH VERY FEW INSTRUCTIONS
• FASTER PROGRAMMING
• MOSTLY USED TO WORK WITH DATABASES
• CONSISTS OF A QUERY LANGUAGE, WHICH
ANSWERS TO QUERIES FROM THE DATABASE
• SOME HAVE REPORT GENERATORS
THE FUNCTIONAL CATEGORIES OF
4GL ARE:
• REPORT GENERATORS
• RETRIEVAL AND UPDATE LANGUAGES
• DECISION SUPPORT TOOLS
• GRAPHIC GENERATORS
• APPLICATION PACKAGES
• APPLICATION GENERATORS
• CODE GENERATION: 3GL CODE FROM 4GL STATEMENTS
6. WINDOWS XP
• 6.0. INTRODUCTION
• 6.1. OBJECTIVES
• 6.2. FEATURES OF WINDOWS XP
• 6.3. COMPARISION- PROFESSIONAL VS. HOME
EDITION
• 6.4. WINDOWS XP INSTALLATION
• 6.5. ACTIVATING WINDOWS XP
• 6.6. SECURITY FEATURES OF WINDOWS XP
• 6.7. ACCESSING USER ACCOUNTS
• 6.8. GETTING HELP
6.0. INTRODUCTION
• NEW DESKTOP OPERATING SYSTEM, DIFFERENT FROM
PREVIOUS VERSIONS
• WINDOWS XP HAS TWO PRODUCTS, NAMELY:
- WINDOWS XP HOME EDITION:
*BUDGET-PRICED VERSION, MEANT FOR USE OF PC AT
HOME OR AT SMALL BUSINESS
*INTENDED FOR NON TECHNICAL USERS, AND DON’T
NEED TO CONNECT TO CORPORATE NETWORK
* COMPATIBLE TO ANY PC -
WINDOWS XP PROFESSIONAL:
*INCLUDES ALL FEATURES OF HOME EDITION, AND SOME
NETWORKING AND SECURITY COMPONENTS * IT IS USED
FOR HIGH PERFORMANCE HARDWARE
• WINDOWS XP HAS INHERITED RELIABILITY CRASH-PROOF
FOUNDATION FROM WINDOWS 2000
• IR HAS INHERITED USER-FRIENDLY FEATURE AND SYSTEM
UTILITY FROM WINDOWS 98
• SYSTEM PROPERTIES: SEE DIAGRAM
6.1. OBJECTIVES
• IT IS ASSUMED THAT ALL FEATURES OF
WINDOWS 98 ARE AVAILABLE IN WINDOWS XP
• NEW FEATURES OF WINDOWS XP
• TYPE OF INSTALLATION
• PRE INSTALLATION PREPARATION
• ACTIVATION OF WINDOWS XP
• USER AND GROUP CREATION, PERMISSIONS AND
SECURITY
• PROGRAM INSTALLATION
6.2. FEATURES OF WINDOWS XP
• 1. NEW WINDOWS ENGINE: -
BOTH VERSIONS OF WINDOWS XP HAVE ROBUST
AND RELIABLE KERNEL INTRODUCED IN
WINDOWS 2000 - FULLY
PROTECTED MEMORY MODEL - TIGHTLY
INTEGRATED SECURITY - HARDWARE
ABSTRACTION LAYER, THAT PROTECTS SYSTEM
COMPONENTS FROM POORLY WRITTEN
PROGRAMS - TOTALLY CRASH-
PROOF
• 2. ROBUST SYSTEM PROTECTION TOOLS:
- DRAWBACK OF PREVIOUS WINDOWS VERSIONS WAS THE “ DLL hell
“, WHERE POORLY WRITTEN PROGRAMS COULD REPLACE CRUCIAL
SYSTEM FILES WITH OUTDATED VERSIONS
- WINDOWS XP MONITORS THESE CRUCIAL SYSTEM FILES,
PRESERVING THE CORRECT VERSION, AND ALLOWING THE
INSTALLED PROGRAM TO USE ITS OWN DLL FILE
- FOR ADDITIONAL PROTECTION, USE THE SYSTEM RESTORE UTILITY
TO ROLL BACK TO PREVIOUS CONFIGURATIONS
• 3. DEVICE DRIVER ROLL BACK: IT GIVES WARNING WHEN ANYBODY
ATTEMPTS TO INSTALL AN UNASSIGNED DRIVER THAT HAS NOT
BEEN CERTIFIED AS COMPATIBLE WITH WINDOWS XP. IT HAS ALSO
CAPABILITIES TO UNINSTALL A DRIVER AND RESTORE PREVIOUS
VERSION
• 4. SECURITY FEATURES: -
PASSWORD-PROTECTED LOGINS AND ABILITY TO
SET PERMISSIONS ON FILES AND FOLDERS MAKE
IT POSSIBLE TO SHARE PC WITH OTHERS
- A FRIENDLY WELCOME SCREEN AND EASY-TO-
USE ADMINISTRATIVE TOOLS MAKE IT EASY TO
SET UP A SHARED PC, WHERE EACH HAS A
CUSTOMIZED DESKTOP AND START MENU
• 5. 3-D WINDOWS AND BUTTONS: - WINDOWS AND
BUTTONS TAKE ON A 3-D APPEARANCE WITH ROUNDED
EDGES AND SLEEK SHADOWS - THERE IS A SHIFT IN
COLOUR AS THE MOUSE POINTER PASSES OVER THE
BUTTONS, TABS AND OTHER INTERFACE ELEMENTS
• 6. FRIENDLY WELCOME SCREEN: -
ADMINISTRATOR OF WINDOWS XP MACHINE
CAN DEFINE A USER ACCOUNT FOR EACH
PERSON ALLOWED TO USE THAT COMPUTER
- THE WELCOME SCREEN LISTS EACH
AUTHORIZED USER, WHERE EACH USER CLICKS
HIS OR HER NAME AND ENTERS A PASSWORD TO
JUMP TO ITS PERSONALIZED DESKTOP
- ON A SHARED PC, ONE CAN SWITCH BETWEEN
USERS WITHOUT HAVING TOCLOSE DOWN THE
RUNNING PROGRAMS
• 7. START MENU IMPROVEMENTS: - START MENU USES
TWO COLUMNS - IT ORGANIZES SHORTCUTS TO THE
PROGRAMS THAT ARE USED MOST OFTEN, TO LOCATIONS
WHERE THE PERSONAL FILES ARE STORED, AND TO SYSTEM
FOLDERS AND TOOLS - SEE DIAGRAM 6.3
6.3. COMPARISION BETWEEN
PROFESSIONAL AND HOME EDITION
THE COMMON FEATURES AVAILABLE IN BOTH
PROFESSIONAL EDITION AND HOME EDITION OF
WINDOWS XP ARE:
• OPERATING SYSTEM KERNEL IS IDENTICAL IN BOTH
• THE WEB BROWSER WORKS THE SAME IN BOTH
• FILE AND FOLDER MANAGEMENT ARE THE SAME IN
BOTH
• TECHNIQUES OF WINDOWS EXPLORER IS THE SAME
ADDITIONAL FEATURES OF
WINDOWS XP PROFESSIONAL ARE:
• SUPPORT FOR MULTIPLE PROCESSORS: UPTO TWO CPUS
• SUPPORT FOR 64-BIT CPUS: INTEL ITANIUM PROCESSOR
• ADVANCED SECURITY FEATURES: SUPPORT FOR ENCRYPTING FILE
SYSTEMS, INTERNET PROTOCOL SECURITY, ASSIGN COMPLEX
ACCESS CONTROLS TO FILES
• INTERNET INFORMATION SERVICES: ONE CAN
SET UP A PERSONAL WEB SERVER USING
INTERNET INFORMATION SERVICES
• REMOTE DESKTOP CONNECTION: ONE CAN
CONFIGURE A WINDOWS XP PROFESSIONAL
MACHINE TO ALLOW REMOTE ACCESS, EITHER
ACROSS A LAN OR OVER THE INTERNET. THE
CLIENT MACHINE MIGHT BE EVEN A 32-BIT
MACHINE
• DOMAIN MEMBERSHIP: ON A CORPORATE
NETWORK, IT CAN JOIN A DOMAIN AND TAKE
ADVANTAGE OF DOMAIN-BASED MANAGEMENT
FEATURES SUCH AS GROUP POLICIES OR
ROAMING PROFILES
• DYNAMIC DISKS: IT ALLOWS TO CREATE DISK
VOLUMES THAT SPAN MULTIPLE HARD DRIVES,
WHICH ALLOWS TO INCREASE THE STORAGE
CAPACITY AND PERFORMANCE OF DRIVES
6.4. WINDOWS XP INSTALLATION
• IT HAS THREE STRATEGIES:
• 1. CLEAN INSTALL: -SETS A
FRESH NEW COPY OF WINDOWS XP, REPLACING
ANY PREVIOUS VERSION OF WINDOWS, ON THE
PARTITION WHERE IT IS SET UP, ERASING ALL
THE FILES IN THIS PARTITION.
- IT CAN BE STARTED BY BOOTING DIRECTLY
FROM THE CD
• 2. UPGRADE OVER AN EXISTING WINDOWS VERSION:
- POSSIBLE TO UPGRADE TO WINDOWS XP PROFFESSIONAL OR
HOME EDITION, FROM WINDOWS 98, OR WINDOWS MILLENIUM
EDITION OR WINDOWS NT OR WINDOWS 2000 PROFESSIONAL
- BUT WINDOWS 95 CAN NOT BE UPGRADED TO WINDOWS XP
- SETUP PRESERVES ALL USER SETTINGS AND INSTALLED PROGRAMS
- ATTEMPTS TO UPGRADE ALL DEVICE DRIVERS TO WINDOWS XP
VERSIONS
• 3. SIDE-BY-SIDE (MULTIBOOT) INSTALLATIONS: -USED
TO PRESERVE AN EXISTING COPY OF WINDOWS. - WHEN SETUP
IS FINISHED, OS IS CHOSEN FROM BOOT MENU
-INSTALL NEW VERSION ON A NEW PARTITION
6.4.1. PREPARATION BEFORE
INSTALLATION:
• 1. MINIMUM SYSTEM REQUIREMENTS: -
233 MHZ PROCESSOR FROM PENTIUM/
CELERON FAMILY OR COMPATIBLE
- 64 MB OF RAM
- 1.5 GB OF DISK SPACE -A
VIDEO ADAPTER CAPABLE OF SUPER VGA
(800X600) RESOLUTION -
RECOMMENDED CONFIGURATION IS ATLEAST
300 MHZ CPU WITH 128 MB OF RAM, A MOUSE,
A KEYBOARD, AND A CD-ROM OR DVD DRIVE
• 2. CHECK HARDWARE AND SOFTWARE
COMPATIBILITY: DOWNLOAD UPDATED DRIVERS
AND UPGRADED PACKS BEFORE RUNNING THE
SETUP, AND COPY THEM TO FLOPPY DISKS.
• BACK UP DATA FILES AND SYSTEM SETTINGS:
FOR AN UPGRADE , A RELIABLE BACK UP
PROGRAM SHOULD BE USED TO MAKE SAFE
COPY OF IMPORTANT DATA
• DISABLE ANTIVIRUS SOFTWARE AND OTHER
SYSTEM UTILITIES, BEFORE GETTING STARTED
6.4.2. PERFORMING A CLEAN
INSTALLATION
• SAFEST WAY TO START IS TO BOOT FROM WINDOWS XP
CD.
• INSERT THE WINDOWS XP CD AND RESTART THE
COMPUTER
• WATCH FOR A BOOT PROMPT AND PRESS A KEY TO
BOOT FROM CD
• FOLLOWING WILL BE A SET OF TEXT MODE SET UP
SCREENS
• IF THE SYSTEM CONTAINS A WORKING VERSION OF
WINDOWS, THE SCREEN APPEARS TO REPAIR THE
INSTALLATION. KEY Esc CAN BE PRESSED TO BYPASS IT
AND REACH THE DISK SETUP SCREEN (FIGURE 6.4)
WITH THE SETUP SCREEN THE
FOLLOWING CAN BE DONE:
• SELECT AN EXISTING PARTITION ON WHICH TO
INSTALL WINDOWS XP: - IT IS
USED ONLY IF AN EMPTY PARTITION ALREADY
CREATED AND FORMATTED FOR SETTING UP
WINDOWS, OR IF PLANNING TO INSTALL
WINDOWS XP ON AN EXISTING PARTITION THAT
CURRENTLY CONTAINS DATA OR PROGRAMS BUT
NO OS - THIS OPTION IS NOT USED
IF A PREVIOUS VERSION OF WINDOWS IS
ALREADY INSTALLED IN A SELECTED PARTITION
• CREATE A NEW PARTITION FROM UNPARTITIONED
SPACE:
- THIS OPTION IS USED TO SET UP ONE OR MORE
PARTITIONS ON A NEW DRIVE OR ON AN EXISTING DRIVE
AFTER DELETING PARTITIONS
- BY DEFAULT, SETUP OFFERS TO USE ALL
UNPARTITIONED SPACE ON THE CURRENT DISK
• DELETE AN EXISTING PARTITION: THIS OPTION IS USED
FOR CLEAN INSTALL ON A DRIVE THAT CURRENTLY
CONTAINS AN EARLIER VERSION OF WINDOWS
STEPS FOR SETUP OF WINDOWS XP
FOR NEW INSTALLATION
• 1. BOOT THE COMPUTER WITH WINDOWS XP CD
• 2. PERFORM ALL REQUIRED STEPS TO START SET UP
• 3. CHOOSE INSTALL WINDOWS XP FROM WELCOME TO MICROSOFT
WINDOWS XP MENU ( FIG. 6.5)
• 4. SELECT NEW INSTALLATION (ADVANCED) FROM INSTALLATION
TYPE LIST, AND CLICK NEXT TO CONTINUE
• 5. WHEN PROMPTED, ACCEPT THE END USER LICENSE AGREEMENT
AND ENTER THE 25-CHARACTER PRODUCT KEY
• 6. SELECT APPROPRIATE OPTIONS FROM THE SETUP OPTIONS
DIALOGUE BOX ( FIG. 6.6 )
• 7. CLICK THROUGH THE REMAINING STEPS OF THE WIZARD AND
ALLOW THE COMPUTER TO RESTART ( AT THIS POINT DON’T BOOT
FROM CD)
ACTIVATING WINDOWS XP
• WINDOWS XP INCLUDES A NEW ANTIPARACY
FEATURE CALLED WINDOWS PRODUCT
ACTIVATION (WPA), A MECHANISM DESIGNED
TO ENFORCE LICENSE RESTRICTIONS,
PREVENTING CASUAL COPYING.
• AFTER SET UP COMPLETES, IT MUST BE
ACTIVATED WITHIN 30 DAYS, EITHER BY
CONNECTING TO MICROSOFT ACTIVATION
SERVER OVER INTERNET, OR BY CALLING TO THE
CUSTOMER SERVICE AT A WPA CLEARING HOUSE
• UNDER MOST CIRCUMSTANCES, ACTIVATION IS
AUTOMATIC AND INSTANTANEOUS: BUYING A
COPY OF WINDOWS XP, INSTALLATION TAKES A
FEW SECONDS, BUT ON TELEPHONE IT TAKES
LONGER
• ACTIVATION IS NOT REGISTRATION: IT DOESNOT
REQUIRE ANY PERSONAL INFORMATIONS,
UNLESS TO CHOOSE TO REGISTER COPY OF
WINDOWS XP
• REINSTALL WINDOWS FOR UNLIMITED NUMBER
OF TIMES ON THE SAME HARDWARE: DURING
THE ACTIVATION, WINDOWS XP TRANSMITS AN
ENCRYPTED FILE THAT SERVES AS A FINGERPRINT
OF KEY COMPONENTS IN THE SYSTEM. TO
REINSTALL, WINDOWS XP ON THE SAME
HARDWARE, THE ACTIVATION SERVER CHECKS
THE NEW FINGERPRINT AGAINST THE ONE
STORED IN ITS DATABASE. IF THEY MATCH,
ACTIVATION IS AUTOMATIC.
• MULTIPLE HARDWARE UPGRADES MAY REQUIRE
TO REACTIVATE WINDOWS: THE ACTIVATION
SOFTWARE IS DESIGNED TO PREVENT ATTEMPTS
TO CLONE AN ACTIVATED COPY OF WINDOWS
AND INSTALL IT ON ANOTHER COMPUTER. IF
FOUR OR MORE HARDWARE COMPONENTS OF A
COMPUTER IN A LIST OF 10 COMPONENTS ARE
REPLACED WITHIN 120 DAYS OR LESS, THE
ACTIVATION TECHNIQUE PRESUMES AS IF THE
OS IS INSTALLED ON ANOTHER COMPUTER
6.6. SECURITY FEATURES OF
WINDOWS XP
• EACH SECURABLE SYSTEM-RESOURCE LIKE A FILE OR A
PRINTER HAS A SPECIFIED OWNER WHO CAN USE IT
• TO DETERMINE WHICH USERS HAVE ACCESS TO A
RESOURCE, WINDOWS ASSIGNS A SECURITY ID (SID) TO
EACH USER ACCOUNT, WHICH IS A UNIQUE NUMBER
• DURING A LOG ON, THE OS VALIDATES ITS USER NAME
AND PASSWORD, AND THEN CREATES A SECURITY
ACCESS TOKEN, WHICH INCLUDES THE USER NAME AND
SID PLUS INFORMATION ABOUT SECURITY GROUPS. USER
GETS A COPY OF THE ACCESS TOKEN DURING EACH
ACCESS
6.6.1. PERMISSIONS AND RIGHTS
WINDOWS DISTINGUISHES TWO TYPES OF
ACCESS PRIVILLEGES:
• PERMISSIONS: A PERMISSION IS THE ABILITY TO
ACCESS A PARTICULAR OBJECT IN SOME DEFINED
MANNER, FOR EXAMPLE MODIFYING A PRINTER
QUEUE.
• RIGHTS: A RIGHT IS THE ABILITY TO PERFORM A
PARTICULAR SYSTEMWIDE ACTION, LIKE
LOGGING ON OR RESETTING THE CLOCK
6.6.2. USER ACCOUNTS
• A USER ACCOUNT, CREATED BY ADMINISTRATOR, CONSISTS OF
USER NAME AND PASSWORD, WHICH IS USED DURING
LOGGING ON.
• WINDOWS CONTROLS, MONITORS AND RESTRICTS ACCESS TO
SYSTEM RESOURCES BASED ON THE PERMISSIONS AND
RIGHTS
6.6.3. ACCOUNT TYPE
• COMPUTER ADMINISTRATOR: -
CREATE, CHANGE, AND DELETE USER ACCOUNTS
AND GROUPS - INSTALL
PROGRAMS - SHARE
FOLDERS - SET
PERMISSIONS -
ACCESS ALL FILES -
TAKE OWNERSHIP OF FILES -
GRANT RIGHTS TO OTHER USER ACCOUNTS AND
TO THEMSELVES - LOG ON IN SAFE
MODE
• LIMITED: MEMBERS OF USER GROUP ARE
CLASSIFIED AS LIMITED ACCOUNTS.
- CHANGE THE PASSWORDN OF THEIR OWN
ACCOUNT - USE
PROGRAMS, INSTALLED ON THE COMPUTER
- VIEW PERMISSIONS -
CREATE, CHANGE AND DELETE FILES IN THEIR
OWN FOLDERS -
VIEW FILES IN SHARED DOCCUMENT FOLDERS
• GUEST ACCOUNT: THEY HAVE PRIVILLEGES
SIMILAR TO LIMITED ACCOUNTS. A USER
LOGGED ON WITH A GUEST ACCOUNT CAN NOT
CREATE A PASSWORD FOR THE ACCOUNT
• UNKNOWN ACCOUNT: ACCOUNT, WHICH IS NOT
AN ADMINISTRATOR, NOT A USER, NEITHER A
GUEST, IS AN UNKNOWN ACCOUNT. IT IS
AUTOMATICALLY CREATED, IF THE COMPUTER IS
UPGRADED FROM AN EARLIER VERSION OF
WINDOWS
• LOCAL SETTINGS: IT IS A HIDDEN FOLDER,
CONTAINING SETTINGS, AND FILES NOT
BELONGING TO THE PROFILE( MACHINE-SPECIFIC
OR VERY LARGE), LIKE -
APPLICATION DATA( MACHINE-SPECIFIC )
- HISTORY ( INTERNET EXPLORER ) -
TEMP: TEMPORARY FILES CREATED BY
APPLICATIONS -
TEMPORARY INTERNET FILES
• MY DOCCUMENT: DEFAULT TARGET FOR MY DOCCUMENTS
SHORTCUT THAT APPEARS ON THE START MENU
• NETHOOD: HIDDEN FOLDER THAT CONTAINS SHORTCUTS
THAT APPEAR IN MY NETWORK PLACES
• PRINTHOOD: HIDDEN FOLDER, THAT CONTAINS SHORTCUTS
TO ITEMS IN THE PRINTERS AND FAXES FOLDER
• RECENT: HIDDEN FOLDER CONTAINS SHORTCUTS
TO RECENTLY USED DOCCUMENTS
• SEND TO: HIDDEN FOLDER CONTAINS
SHORTCUTS TO FOLDERS AND APPLICATIONS
THAT APPEAR IN THE SEND TO SUB MENU
• START MENU: FOLDER CONTAINING THE ITEMS
THAT APPEAR ON THE ALL PROGRAMS
SUBMENU
• TEMPLATES: HIDDEN FOLDER, CONTAINING
SHORTCUTS TO DOCCUMENT TEMPLATES
6.6.4. USER PROFILE
USER PROFILE INCLUDES THE FOLLOWING
FOLDERS
• APPLICATION DATA: CONTAINS APPLICATION
SPECIFIC DATA, LIKE WORD PROCESSING, A
CUSTOM DICTIONARY
• COOKIES: CONTAINS INTERNET EXPLORER
COOKIES
• DESKTOP: CONTANS ALL ITEMS STORED ON THE
DESKTOP
• FAVOURITES: CONTAINS INTERNET EXPLORER
FAVOURITES
TYPES OF USER PROFILES ARE:

• LOCAL USER PROFILES

• ROAMING USER PROFILES

• MANDATORY USER PROFILES


6.7. ACCESSING USER ACCOUNT
• 6.7.1. CREATING USER ACCOUNT: IN THE CONTROL PANEL,
THERE IS A LINK CALLED CREATE A NEW ACCOUNT, WHICH
ALLOWS TO CREATE A NEW USER ACCOUNT. THE BASIC
REQUIREMENT IS TO CHOOSE A NAME AND CHOOSE AN
OPTION BETWEEN ADMINISTRATOR OR LIMITED ACCOUNT
• 6.7.2. ACCOUNT SETTINGS: -
NAME: CHANGING THE NAME AFTER CREATING A SHORT
NME WITHOUT SPACE ALLOWS THE USER TO CREATE A
FRIENDLY NAME THAT APPEARS ON THE SCREEN, START
BAR - PASSWORD: USER
CAN CREATE A PASSWORD AND STOREA HINT FOR IT
- PICTURE: USER CAN CHANGE THE PICTURE ASSOCIATED
WITH THE ACCOUNT NAME
- ACCOUNT TYPE: WITH USER ACCOUNTS, ONE CAN
CHANGE IT TO COMPUTER ADMINISTRATOR OR LIMITED
- NET PASSPORT: ONE CAN SET UP HIS/HER OWN
ACCOUNT TO USE A .NET PASSPORT
• 6.7.3. DELETING AN ACCOUNT:
• ADMINISTRATOR CAN DELETE ANY ACCOUNT EXCEPT THAT IS
CURRENTLY LOGGED ON.
• TO DELETE AN ACCOUNT, OPEN USER ACCOUNTS AND CLICK
THE NAME OF THE ACCOUNT TO DELETE
• THEN CLICK DELETE THE ACCOUNT
6.7.4. LOGGING OFF AND LOCKING
• LOG OFF: TO LOG OFF CHOOSE START, LOG OFF
AND CLICK LOG OFF. WITH THIS, ALL PROGRAMS
ARE CLOSED
• SWITCH USERS: TO SWITCH USERS, PRESS THE
WINDOWS LOGO KEY+L OR CHOOSE START, LOG
OFF AND THEN CLICK SWITCH USERS. IN BOTH
CASES, WELCOME SCREEN FOR FAST USER
SWITCHING WILL APPEAR. IN THIS OPTION THE
USER’S PROGRAM CONTINUE TO RUN
• LOCK THE COMPUTER: TO LOCK THE COMPUTER, PRESS THE
WINDOWS LOGO KEY+L OR PRESS Ctrl+Alt+Delete AND CLICK
LOCK COMPUTER. IN THIS OPTION, WHICH IS AVAILABLE ONLY
WHEN FAST USER SWITCHING IS DISABLED, USER’S
PROGRAMS CONTINUE TO RUN
CREATE A SHORTCUT FOR LOCKING
THE COMPUTER
• 1. RIGHT-CLICK THE DESKTOP AND CHOOSE NEW, SHORTCUT
• 2. ON THE FIRST PAGE OF CREATE SHORTCUT WIZARD, TYPE
“rundll32.exe user32.dll,LockWorkstation” AND CLICK NEXT.
• 3. TYPE A NAME FOR THE SHORTCUT AND CLICK FINISH
• 4. RIGHT-CLICK THE NEW SHORTCUT AND CHOOSE PROPERTIES
• 5. ON THE SHORTCUT TAB, CLICK CHANGE ICON
• 6.IN THE TEXT BOX, TYPE “shell32.dll” AND PRESS ENTER
• 7. SELECT AN ICON AND THEN CLICK OK
• 8. IN THE SHORTCUT KEY BOX, TYPE THE SHORTCUT KEY TO USE
• 6.7.5. ADMINISTRATOR LOGIN: TO LOG ON AS
ADMINISTRATOR, IF WELCOME SCREEN IS ENABLED,
PRESS Ctrl+Alt+Delete TWICE TO DISPLAY THE LOG ON TO
WINDOWS DIALOGUE BOX. TYPE “Administrator” IN THE
USER NAME BOX, AND ENTER THE PASSWORD.
• 6.7.6. SETTING A PASSWORD: THE SIMPLEST WAY TO SET
A PASSWORD FOR THE USER, IS THE USER ACCOUNTS IN
CONTROL PANEL. CLICK THE NAME OF THE USER, SET A
PASSWORDAND THEK CLICK “Create A Password”. A
WINDOW LIKE FIG.6.11 WILL APPEAR ON THE SCREEN.
PROVISION OF PASSWORD HINT IS THERE FOR THE USER.
6.8. GETTING HELP
• TO GET HELP CLICK START, HELP AND SUPPORT, AND ANTER. THE
HOME PAGE (FIG.6.12) WILL APPEAR ON THE SCREEN.
SEARCHING FOR HELP TOPIC:
• 1. CLICK A CATEGORY FROM THE PICKA HELP TOPIC LIST ON THE
HOME PAGE TO DISPLAY ITS LIST OF TOPICS.
• 2. ENTER A WORD OR PHRASE IN THE SEARCH BOX.
• 3. CLICK THE GREEN ARROW TO THE RIGHT OF THE SEARCH BOX TO
PERFORM THE SEARCH.
• 4. CLICK A TOPIC TITLE FROM THE LIST ON THE LEFT TO DISPLAY ITS
CONTENTS ON ITS RIGHT
• SEARCH RESULTS ARE BROKEN INTO FOLLOWING GROUPS:
SUGGESTED TOPICS:
FULL-TEXT SEARCH MATCHES:
MICROSOFT KNOWLEDGE BASE
7. WINDOWS XP INTERFACE
• 7.0. INTRODUCTION
• 7.1. OBJECTIVES
• 7.2. WINDOWS XP USER INTERFACE
• 7.3. START MENU
• 7.4. WORKING WITH RECENTLY OPENED DOCCUMENT
• 7.5. TOOL BAR
• 7.6. DESKTOP
• 7.7. WINDOW EXPLORER
• 7.8. RECYCLE BIN
• 7.9. LOCATING FILES
• 7.10. WINDOWS MEDIA PLAYER
• 7.11. IMAGE FORMAT
• 7.12. ENCRYPTION FILE SYSTEM
• 7.13. AUTOMATING WINDOWS XP
7.0. INTRODUCTION
• WINDOWS XP OFFERS THE MOST COMPREHENSIVE
WINDOWS INTERFACE SINCE WINDOWS 95
• THE DEFAULT WINDOWS XP COLOR SCHEME IS BOLDER
AND EDGIER.
• IT TAKES FULL ADVANTAGE OF VIDEO HARDWARE THAT IS
CAPABLE OF 24-BIT AND 32-BIT TRUE COLOUR SETTINGS
• WINDOWS BUTTONS TAKE A 3-D APPEARANCE
• SYSTEM ICONS IN WINDOWS XP ARE BRIGHTER AND
RICHER, AND EACH ICON IS AVAILABLE IN THREE SIZES(
16X16,32X32,48X48 PIXELS)
7.1. OBJECTIVES
• CONTROLLING AND CUSTOMIZING WINDOWS XP START
MENU
• WORKING WITH RECENTLY OPENED DOCCUMENT
• MANAGING TOOL BAR
• MANAGING DESKTOP ICON
• BATCH PROGRAMMING, TASK SCHEDULING, WINDOWS
SCRIPTING
• VARIOUS OPTIONS AND TASK BAR OF WINDOW
EXPLORER
• ENCRYPTION AND DECRYPTION, MEDIA PLAYER, AND
IMAGE FORMATS
• VARIOUS OPTIONS OF RECYCLE BIN
7.2. WINDOWS XP USER INTERFACE
VARIOUS METHODS FOR STARTING A PROGRAM:
• CLICK THE PROGRAM’S SHORTCUT ON THE START MENU
• CLICK THE PROGRAM’S ICON ON THE QUICK LUNCH TOOL BAR OR
ANOTHER TOOL BAR
• DOUBLE-CLICK THE PROGRAM’S ICON ON THE DESKTOP OR IN
ANOTHER FOLDER
• TYPE THE NAME OF THE PROGRAM’S EXECUTABLE FILE IN ANY OF
THE FOLLOWING LOCATIONS: - IN THE RUN
DIALOGUE BOX ( START=> RUN/WINDOWS LOGO KEY+R )
- IN THE ADDRESS TOOL BAR WITH THE FILES PATH
• PRESS THE SHORTCUT KEY ASSIGNED TO A PROGRAM SHORTCUT.
7.3. START MENU
See figure 7.1
7.3.1. CONTROLLING THE CONTENTS OF THE START
MENU:
• IT IS CUSTOMIZABLE( FIG.7.2)
• POSSIBLE TO ADD, MOVE, COPY, DELETE, SORT AND
RENAME MOST MENU ITEMS
• PINNED ITEM LIST: ITEMS AT TOP OF THE MENU ALWAYS
APPEAR IN THE MENU
• RECENTLY USED PROGRAM LIST: WINDOWS ADDS THE
MOST USED PROGAMS TO THIS MENU AUTOMATICALLY
• ALL PROGRAMS BUTTON: TRADITIONAL MENU OF ALL
INSTALLED PROGRAMS
• 7.3.2. ADDING AN ITEM TO THE START MENU:TO ADD A PROGRAM
TO THE PINNED ITEM LIST, RIGHT-CLICK IT AND CHOOSE PIN TO
START MENU
• 7.3.3. DELETING AN ITEM FROM MENU: -
CLICK THE START BUTTON AND THEN RELEASE THE MOUSE BUTTON
- RIGHT-CLICK THE ITEM -
FOR AN ITEM ON THE PINNED ITEMS LIST OR MOST FREQUENTLY
USED PROGRAM LIST CHOOSE REMOVE FROM THIS LIST OPTION.
FOR AN ITEM IN THE ALL PROGRAMS MENU, CHOOSE DELETE FROM
THE SHORTCUT MENU AND THEN CLICK YES FOR CONFIRMATION.
• 7.3.4. RENAMING A MENU ITEM: -
CLICK THE START BUTTON AND RELEASE MOUSE BUTTON - RIGHT-
CLICK THE MENU ITEM TO RENAME AND CHOOSE RENAME
- EDIT THE NAME AND CLICK OK
7.3.5. MANAGING THE MOST FREQUENTLY USED
PROGRAM LIST:
• THE ITEMS THAT APPEAR ON THE DEFAULT
START MENU BETWEEN THE PINNED ITEMS LIST
AND THE ALL PROGRAMS LINK
• IT DOES NOT APPEAR IN THE CLASSIC START
MENU
• IT INCLUDES SHORTCUTS TO ONLY .exe FILES
• THE NUMBER OF PROGRAMS CAN BE 0 TO 30
7.4.WORKING WITH RECENTLY
OPENED DOCCUMENTS
7.4.1. REMOVING ITEMS FROM THE DOCCUMENTS MENU:
• TO CLEAR THE WHOLE MENU -
RIGHT-CLICK THE START BUTTON, CHOOSE PROPERTIES, AND CLICK
CUSTOMIZE. - FOR THE
DEFAULT START MENU, CLICK THE ADVANCED TAB AND CLICK CLEAR
LIST, FOR A CLASSIC START MENU CLICK THE CLEAR BUTTON
• TO ENABLE THE POLICY THAT CLEARS THE LIST AUTOMATICALLY
AFTER EACH LOG OFF - AT A COMMAND
PROMPT, TYPE gpedit.msc TO OPEN GROUP POLICY
- OPEN USER CONFIGURATION|\ ADMINISTRATIVE TEMPLATE\
START MENU AND TASK BAR -
DOUBLE-CLICK THE CLEAR HISTORY OF RECENTLY OPENED
DOCCUMENTS ON EXIT POLICY - ON THE
SETTING TAB, SELECT ENABLED
7.4.2. REMOVING THE RECENT DOCCUMENTS MENU:

• TO REMOVE MY RECENT DOCCUMENTS FROM THE DEFAULT START


MENU, RIGHT-CLICK THE START BUTTON, CHOOSE PROPERTIES, AND
CLICK CUSTOMIZE. ON THE ADVANCED TAB OF THE CUSTOMIZE
START MENU, CLEAR THE LIST MY MOST RECENTLY OPENED
DOCCUMENTS BOX

• TO REMOVE THE DOCCUMENTS FROM THE CLASSIC START MENU,


GROUP POLICY IS USED. AT A COMMAND PROMPT, TYPE gpedit.msc
TO START GROUP POLICY. OPEN USER CONFIGURATION\
ADMINISTRATIVE TEMPLATES\ START MENU AND TASK BAR.
DOUBLE-CLICK REMOVE DOCCUMENTS MENU FROM START MENU
AND SELECT ENABLED
7.5. TOOL BAR( FIG. 7.5 )
• IT IS A COLLECTION OF ICONS THAT SIMPLIFY COMMON
PLACE TASKS. WINDOWS INCLUDES A TOOLBAR CALLED
QUICK LAUNCH THAT ADDS THREE ICONS TO THE TASK
BAR: INTERNET EXPLORER, SHOW DESKTOP, AND
WINDOWS MEDIAPLAYER
• ADDRESS: PROVIDES A PLACE TO RUN A PROGRAM.
ENTER AN INTERNET ADDRESS OR THE PATH OF A
PROGRAM, DOCCUMENT, OR A FOLDER AND PRESS
ENTER
• LINKS: PROVIDES A SET OF SHORTCUTS TO SELECTED
INTERNET SITES
• DESKTOP: PROVIDES COPIES OF ALL THE ICONS
CURRENTLY DISPLAYED ON THE DESKTOP
7.5.1. INSTALLING AND REMOVING
TOOLBARS
TO INSTALL A NEW OR REMOVE A TOOLBAR
• RIGHT-CLICK ANY UNOCCUPIED PLACE OF THE TASKBAR OR ANY
EXISTING TOOLBAR.
• CHOOSE TOOLBARS FROM THE SHORTCUT MENU AND THEN
CHOOSE FROM THE SUBMENU
• A CHECK MARK ON THE LEFT OF A TOOLBAR’S NAME MEANS THAT
IT IS ALREADY DISPLAYED ON THE TASKBAR

TO REMOVE A TOOL BAR THAT IS NOT ON THE TASKBAR


• RIGHT-CLICK AN UNOCCUPIED PART OF THE TOOLBAR, CHOOSE
TOOLBARS, AND THEN CHOOSE FROM THE SUBMENU
• CLICK THE CLOSE BUTTON ON A FLOATING TOOLBAR TO REMOVE IT
FROM THE DESKTOP
7.6. DESKTOP( FIG. 7.6, 7.7 )
THE DEFAULT DESKTOP ICONS ARE MY COMPUTER, MY
DOCCUMENTS, RECYCLEBIN, INTERNET EXPLORER, MY
NETWORK PLACES
TO CONTROL WHICH OF THESE SYSTEM ICONS
APPEARING ON DESKTOP:
• RIGHT-CLICK AN UNOCCUPIED AREA OF THE DESKTOP
AND CHOOSE PROPERTIES. ALTERNATIVELY, OPEN
DISPLAY IN CONTROL PANEL
• IN DISPLAY PROPERTIES, CLICK THE DESKTOP TAB AND
THEN CLICK CUSTOMIZE DESKTOP
• IN THE DESKTOP ICONS SECTION OF THE GENERAL TAB,
SELECT THE ITEMS TO APPEAR
7.6.1.CHANGING THE BACKGROUND(
FIG. 7.8.1, 7.8.2 )
TO CHANGE THE SIZE OF THE ICONS
• RIGHT-CLICK THE DESKTOP, AND CHOOSE PROPERTIES
• CLICK THE APPEARANCE TAB, AND CLICK EFFECTS
• IN THE EFFECTS DIALOGUE BOX, SELECT USE LARGE ICONS
7.6.2. REMOVING WEB CONTENT
FROM DESKTOP
• POINT TO THE TOP EDGE OF THE WEB ITEM AND
CLICK THE CLOSE BUTTON ( THE X ICON )
• POINT TO THE TOP EDGE OF THE ITEM AND
CHOOSE CLOSE FROM THE CONTROL MENU
• IN THE DESKTOP ITEMS DIALOGUE BOX, CLICK
THE WEB TAB AND THEN CLEAR THE CHECK BOX
NEXT TO WINDOW NAME
7.6.3. REMOVING THE UNNEEDED
ICONS FROM THE NOTIFICATION
AREA
• WINDOWS XP PROVIDES METHODS TO HIDE ICONS THAT’RE NOT IN
USE
• THE ICONS ARE HIDDEN AT THE LEFT BOTTOM CORNER, THE
HIDDEN ICONS AREA IS MARKED BY AN ARROW
• TO SEE THE HIIDEN ICONS THE ARROW AT THE LEFT BOTTOM
CORNER MUST BE CLICKED
7.7. WINDOWS EXPLORER(FIG.7.11)
TO SWITCH BETWEEN TASKS AND CLASSIC FOLDERS FOLLOW
THESE STEPS:
• IN WINDOWS EXPLORER, CHOOSE TOOLS, FOLDER OPTION
• ON THE GENERAL PANE OF THE FOLDER OPTIONS OF THE
DIALOGUE BOX, SELECT USE WINDOWS CLASSIC FOLDERS
7.7.1. USING THE DETAILS SECTION
OF THE TASK PANE
• THE LOWEST SECTION OF THE TASK PANE IS LIKE A DIALOGUE
BOX, WHICH PROVIDES USEFUL INFORMATIONS LIKEBACH
ITEM SELECTED ( JPEG IMAGE ), DIMENSIONS, SIZE, DATE ETC (
FIG. 7.12 )
7.7.2. CUSTOMIZING THE TOOL BARS
• WINDOWS EXPLORER OFFERS THREE TOOL BARS: STANDARD
BUTTONS, ADDRESS BAR, AND LINKS. CUSTOMIZING THE TOOL BARS
CAN BE DONE IN THE FOLLOWING STEPS:
• 1. CHOOSE VIEW, TOOLBARS, CUSTOMIZE. THEN A DIALOGUE BOX
APPEARS
• 2.TO ADD A BUTTON, SELECT IN THE LEFT BOX AND CLICL ADD. TO
REMOVE A BUTTON SELECT IN THE RIGHT BOX, AND CLICK REMOVE
• 3. TO CHANGE THE POSITION OF A BUTTON, SELECT IN THE RIGHT
BOX AND CLICK MOVE UP OR MOVE DOWN. ALTERNATIVELY, DRAG A
BUTTON TO REQUIRED POSITION
• 4. TO CHANGE THE POSITION OF OR ELIMINATE DESCRIPTIVE TEXT,
SELECT FROM THE TEXT OPTIONS LIST
• 5. TO CHANGE THE SIZE OF THE TOOLBAR ICONS, CHOOSE FROM
THE ICONS OPTIONS LIST
7.7.3. DISPLAYING THE STATUS BAR
• THE WINDOWS XP VERSION OF WINDOWS
EXPLORER DOES NOT DISPLAY THE STATUS BAR
BY DEFAULT.
• TO MAKE THE STATUS BAR VISIBLE, CHOOSE
VIEW, STATUS BAR.
• THE STATUS BAR SHOWN HERE, PROVIDES
USEFUL INFORMATION, SUCH AS THE NUMBER
OF OBJECTS SELECTED AND THEIR TOTAL SIZE
7.7.4. EXPLORER BAR
• TO VIEW, EXPLORER BAR COMMAND OPENS A
MENU ON WHICH USER CAN CHOOSE ANY ONE
OF THE FIVE EXPLORER BARS: SEARCH,
FAVOURITES, MEDIA, HISTORY, AND FOLDERS.
• THE SELECTED EXPLORER BAR APPEARS ALONG
THE LEFT EDGE OF THE WINDOWS EXPLORER
WINDOW, REPLACING THE TASK PANE, IF IT IS
DISPLAYED
SEARCH BAR:
• CHOOSING THE SEARCH EXPLORER BAR
DISPLAYS THE SEARCH ASSISTANT, WHICH HELPS
IN SEARCH FOR FILES AND FOLDERS.
• THE SEARCH BAR CAN BE OPENED BY EITHER KEY
F3 OR BY Ctrl+E.
• IT CAN ALSO BE OPENED AND CLOSED BY
CLICKING THE SEARCH BUTTON THAT APPEARS
IN THE STANDARD BUTTONS TOOLBAR
FAVOURITES BAR
• MOST USERS STORE LINKS TO COMMONLY VISITED INTERNET SITES
IN THEIR FAVOURITE FOLDER. THE SIMPLEST WAY TO ADD A FOLDER
TO FOVOURITES BAR IS:
• 1. DISPLAY THE DESIRED FOLDER TO ADD IN WINDOWS EXPLORER
• 2. DISPLAY THE FAVOURITES EXPLORER BAR
• 3. CLICK AND ADD TO FAVOURITES BUTTON AT THE TOP OF THE
FAVOURITES BAR
• 4. CLICK CREATE IN TO EXPAND THE DIALOGUE BOX TO PLACE THE
NEW FAVOURITE IN AN EXISTING FAVOURITES SUBFOLDER OR TO
PLACE IT IN A NEW FOLDER. OTHERWISE CLICK OK
• TO ADD A FILE TO THE FAVOURITES BAR, HOLD DOWN THE ALT KEY
WHILE DRAGGING THE FILE TO THE FAVOURITES BAR
MEDIA BAR:
• THE MEDIA EXPLORER BAR PROVIDES LINKS TO
VARIOUS PLACES WITHIN WINDOWSMEDIA.COM
• TO GO STRAIGHT TO THE HOME PAGEOF
WINDOWSMEDIA.COM, CLICK THE PLAY BUTTON
AT THE BOTTOM OF THE MEDIA BAR.
• THE MEDIA BAR HAS NO KEYBOARD SHORTCUT
AND NO TOOLBAR BUTTON IN WINDOWS
EXPLORER.
• FOLDERS BAR:
• FOLDER IS PROBABLY THE MOST USEFUL
EXPLORER BAR FROM A FILE-MANAGEMENT
PROSPECTIVE
• THE FOLDERS BAR DISPLAYS ALL STORAGE
RESOURCES, BOTH LOCAL AND REMOTE, IN A
HIERARCHICAL TREE
• THE TREE CAN BE USED AS A NAVIGATIONAL
TOOL AND AS A TOOL TO COPY OR MOVE TO A
TARGET
7.7.5. CHOOSING VIEW OPTIONS
THERE ARE SIX DIFFERENT WAYS OF VIEWING ITEMS IN A FOLDER
• DETAILS VIEW: IT PRESENTS A COLUMNAR DISPLAY OF FILE NAMES AND
ATTRIBUTES
• LIST VIEW: IT OFFERS A COMPACT DISPLAY, CONSISTING ONLY OF SMALL
ICONS AND FILE NAMES
• THUMBNAILS VIEW: IT PRESENTS DISPLAYS PREVIEW OF FILE CONTENTS
• TILES VIEW: IT GENERATES LARGER AND MORE COLOURFUL ICONS VIEW. IN
THIS VIEW, WINDOWS EXPLORER ALSO DISPLAYS A GENEROUS THREE LINES
OF TEXT TO DESCRIBE EACH FILE
• FILMSTRIP VIEW: IT SHOWS THE CURRENTLY SELECTED PICTURE, WHICH
APPEARS IN A LARGE SIZE, IN THE CENTRE OF THE WINDOW ( FIG. 7.14 )
MAKING ALL FOLDERS USE THE SAME VIEW:
• 1. CHOOSE TOOLS, FOLDER OPTIONS.
• 2. CLICK THE VIEW TAB.
• 3. CLICK APPLY TO ALL FOLDERS
7.7.6. CUSTOMIZING DETAILS VIEW (
FIG. 7.15 )
• IN DETAILS VIEW, WINDOWS EXPLORER PRESENTS A TABLE OF
PROPERTIES FOR EACH FOLDER AND FILE
• WITH THE CHOOSE DETAILS DIALOGUE BOX, ONE CAN ALSO
REARRANGE THE ORDER IN WHICH COLUMNS APPEAR, AND
CHANGE THE WIDTH OF ANY COLUMN
7.7.7. CHANGING A FILE TYPE’S ICON
( FIG. 7.16 )
• 1. SELECT THE FILE TYPE IN FILE TYPES LIST
• 2. CLICK ADVANCED.
• 3. CLICK CHANGE BUTTON
• 4. CHOOSE A NEW ICON FROM THE CHANGE
ICON DIALOGUE BOX, AND SELECT IT.
• IF YOU DON’T FIND AN ICON OF YOU R CHOICE
IN THE CHANGE ICON DIALOGUE BOX, THEN
CLICK BROWSE AND NAVIGATE TO ANOTHER
PROGRAM
7.8.RECYCLE BIN
• 7.8.1. USING AND CONFIGURING THE RECYCLE BIN
• IT PROVIDES PROTECTION AGAINST ACCIDENTAL ERASURE OF FILES
• IN MOST CASES, WHEN SOMEONE DELETE ONE OR MORE FILES OR
FOLDERS, THE DELETED ITEMS GO TO THE RECYCLE BIN.
• RECOVERY FROM A LOST FILE CAN ALWAYS BE DONE THROUGH THE
RECYCLE BIN
• WHEN IT FILLS UP, WINDOWS BEGINS EMPTYING IT, PERMANENTLY
DELETING THE FIRST FILES IN A FIRST COME FIRST SERVE BASIS

HOWEVER, THE FOLLOWING TYPES OF DELETIONS DON’T GO TO RECYCLE


BIN
• FILES STORED ON REMOVABLE DISK
• FILES ON NETWORK DRIVES
• FILES DELETED FROM COMPRESSED( ZIPPED ) FOLDERS
BY DELETING AN ITEM HOLDING THE Shift KEY, THE ITEM IS PERMANENTLY
DELETED AND NOT STORED IN RECYCLE BIN
• 7.8.2. RESTORING FILES AND FOLDERS:
• DELETED FOLDERS ARE SHOWN ONLY AS FOLDERS, AND
IT IS NOT POSSIBLE TO SEE THE NAMES OF THE ITEMS
CONTAINED WITHIN THE FOLDER
• RESTORATION OF A DELETED FOLDER IS DONE BY THE
WINDOWS
• TO RESTORE AN ITEM, SELECT IT AND THEN CLICK
RESTORE THIS ITEM IN THE TASK PANE
• THE RESTORE COMMAND PUTS THE ITEM BACK IN THE
FOLDER FROM WHICH IT WAS DELETED
• IF THE FOLDER DOES NOT CURRENTLY EXIST, WINDOWS
ASKS PERMISSION TO RECREATE IT
7.9. LOCATING FILE
SPECIFYING SEARCH TYPE: SEARCH COMPANION CAN PERFORM
THREE BASIC KINDS OF FILE SEARCHES:
• DIGITAL MEDIA
• DOCCUMENTS
• ALL FILES AND FOLDERS
EACH OF THESE SEARCH TYPES ENTAILS A SET OF DEFAULTS ABOUT
WHERE AND HOW THE COMPANION SHOULD WORK
• SEARCH COMPANION BEGINS WITH MY DOCCUMENTS AND ITS
SUBFOLDERS AND THEN SEARCHES THE REMAINDER OF YOUR
LOCAL HARD DISKS
• REARCH COMPANION OMITS SYSTEM FOLDERS
• SEARCH COMPANION OMITS HIDDEN FILES
• SEARCH COMPANION LOOKS ONLY FOR THE FILES THAT CAN BE
CREATED BY END USERS EMPLOYING REGISTERED APPLICATIONS
SEARCHING FOR ALL FILES AND
FOLDERS
• TO SEARCH FOR ANYTHING AND EVERYTHING, CHOOSE SEARCH
FROM THE START MENU
• THEN CLICK ALL FILES AND FOLDERS
• THEN A SEARCH PANE( FIG. 7.17 ) APPEARS
• ONE CAN SEARCH BY FILE NAME OR BY FILE CONTENT OR BOTH
• SEARCH COMPANION LOCATES ITEMS WHOSE NAMES INCLUDES THE
SEARCH STRING

A SEARCH HAS FOLLOWING DEFAULT CHARACTERISTICS


• SEARCH COMPANION LOCATES ALL LOCAL HARD DISKS
• SEARCH COMPANION SEARCHES SYSTEM FOLDERS AND THE
RECYCLE BIN
7.10. WINDOWS MEDIA PLAYER
• PLAYBACK CONTROLS:
• THE PLAY BUTTON BECOMES A PAUSE BUTTON, WHEN
THE WINDOWS MEDIA PLAYER IS PLAYING
• THE MUTE BUTTON CAN BE USED FOR SILENCE AND
THEN FOR MUSIC AGAIN
• THE NEXT AND PREVIOUS BUTTONS FOR MOVE AHEAD
OR BACK ONE ITEM
• STOP BUTTON, TO STOP PLAYING
• VOLUME CONTROL BUTTON
• SEEK BUTTON TO MOVE TO A DIFFERENT PLACE WITHIN
THE ITEM THAT IS CURRENTLY PLAYING
7.11. IMAGE FORMAT
• BMP: SAVES THE FILE IN THE WINDOWS BIT MAP FORMAT, BECAUSE
IT DOES NOT SUPPORT COMPRESSION

• JPG: EXTENSION TO IDENTIFY IMAGES IN JPEG FORMAT. IT USES A


COMPRESSION TECHNIQUE, BUT THE TECHNIQUE IS LOSSY.

• TIF: EXTENSION FOR TAGGED INTERCHANGE FILE FORMAT, WHICH IS


COMPATIBLE WITH MANY APPLICATIONS. IT USES A LOSSLESS
COMPRESSION TECHNIQUES

• PNG: EXTENSION FOR PORTABLE NETWORK GRAPHICS, WHICH IS


PLATFORM INDEPENDENT, HIGHLY COMPRESSIBLE, AND SAFE FOR
USE ON WEBPAGES, BECAUSE COMPATIBLE TO ALL MODERN
BROWSERS
7.12. ENCRYPTION FILE SYSTEM
• THE FILE IS READABLE ONLY IN A USER ACCOUNT

• ENCRYPTION IS THE PROCESS OF ENCODING SENSITIVE


DATA USING A KEY ALGORITHM. WITHOUT THE CORRECT
KEY, THE DATA CAN NOT BE DECRYPTED

• MICROSOFT WINDOWS XP USES ENCRYPTION FOR NTFS


VOLUME, FOR ENCRYPTING DATA BETWEEN A WEB
BROWSER AND A SERVER, USING A SECURE SOCKETS
LAYER(SSL), IN VIRTUAL PRIVATE NETWORKS(VPN), AND
ENCRYPTING OR SIGNING E-MAIL MESSAGES
ENCRYPTING FOLDERS AND FILES(
FIG. 7.20)
• 1. RIGHT-CLICK THE FOLDER, CHOOSE
PROPERTIES,CLICK THE GENERAL TAB, AND THEN
CLICK THE ADVANCED BUTTON
• 2. SELECT ENCRYPT CONTENTS TO SECURE DATA
• 3. CLICK OK TWICE
• IF THE FOLDER CONTAINS ANY FILES OR
SUBFOLDERS, WINDOWS THEN CONFIRMS IT
WITH A CONFIRMATION MESSAGE
DECRYPTING FOLDERS AND FILES
• THE USER CAN DECRYPT DATA ONLY WITH ITS PRIVATE
KEY.
• THE PROCESS OF DECRYPTION IS DONE TRANSPARENTLY.
THE USER WORKS WITH ITS ENCRYPTED FILES LIKE WITH
ANY OTHER UNENCRYPTED FILE
• WHEN WINDOWS DETECTS THAT A FILE IS BEING
ACCESSED BY THE USER, IT FINDS ITS CERTIFICATE AND
USES ITS PRIVATE KEY TO DECRYPT THE DATA, AS IT IS
READ FROM THE DISK
• TO PERMANENTLY DECRYPT A FOLDER OR A FILE, CLEAR
THE ENCRYPT CONTENTS TO SECURE DATA CHECK BOX.
ALLOWING OTHERS TO USE
ENCRYPTED FILES(FIG.7.22)
• 1. RIGHT-CLICK AN ENCRYPTED FILE AND
CHOOSE PROPERTIES. ON THE GENERAL TAB
CLICK ADVANCED.
• 2. IN ADVANCED ATTRIBUTES DIALOGUE BOX,
CLICK DETAILS
• 3. IN THE ENCRYPTION DETAILS DIALOGUE BOX,
CLICK ADD
• 4. SELECT THE NAME OF THE USER TO GIVE HIM
ACCESS, AND THEN CLICK OK
7.13. AUTOMATING WINDOWS XP
MICROSOFT WINDOWS PROVIDES SEVERAL METHODS
TO AUTOMATE THE TASKS, LIKE BACKING UP DATA, OR
CLEANING THE HARD DISK ETC
• TASK SCHEDULER: THIS SERVICE LAUNCHES PROGRAMS
ON A REGULAR SCHEDULE, OR UPON CERTAIN EVENTS,
LIKE LOGGING ON
• BATCH PROGRAMS: PROVIDE A RELIABLE WAY TO RUN A
SEQUENCE OF PROGRAMS. SUCH PROGRAMS CAN BE
STARTED FROM THE COMMAND PROMPT
• WINDOWS SCRIPT HOST: THIS FEATURE ALLOWS TO RUN
SCRIPTS WRITTEN IN VB SCRIPT, JSCRIPT, AND OTHER
LANGUAGES
7.13.1. AUTOMATING COMMAND
SEQUENCES WITH BATCH
PROGRAMS
• A BATCH PROGRAM IS A TEXT FILE THAT CONTAINS A SEQUENCE OF
COMMANDS TO BE EXECUTED
• DEFINE THE SEQUENCE OF COMMANDS, NAME THE SEQUENCE,
AND THEN EXECUTE THE COMMANDS BY ENTERING THE NAME AT
A COMMAND PROMPT
7.13.2.USING BATCH COMMANDS
• BATCH COMMANDS MAKE SENSE ONLY WHEN USED WITH A
BATCH PROGRAM.
• WINDOWS XP HAS THE SAME BATCH PROGRAM COMMANDS
AS MS-DOS
• THE LIST OF COMMANDS ARE GIVEN IN TABLE 7.1
7.13.3. CREATING A SIMPLE BATCH
PROGRAM
• THIS PROGRAM IS TO CONNECT TO A DIAL-UP
CONNECTION BY REPEATEDLY DIALING DIFFERENT
CONNECTIONS UNTIL A SUCCESSFUL CONNECTION IS
MADE. IF A CONNECTION FAILS, THEN THE PROGRAM
SHOULD TRY ANOTHER DIAL-UP CONNECTION
• THIS BATCH PROGRAM RELIES ON Rasdial.exe, THE
COMMAND-LINE VERSION OF THE DIALING COMPONENT
USED BY DIAL-UP CONNECTIONS
• TO CREATE A BATCH PROGRAM, USE A PLAIN-TEXT
EDITOR, SUCH AS NOTEPAD, AND SAVE THE FILE WITH
.bat OR .cmd EXTENSION
8.SECURITY AND NETWORKING
• 8.0. INTRODUCTION
• 8.1. OBJECTIVE
• 8.2. SIMPLE FILE SHARING
• 8.3. INTERNET INFORMATION SERVICES
• 8.4. PEER TO PEER NETWORKING

Vous aimerez peut-être aussi