Digital Documentation
Style:
Set of format commands that can be applied as a single unit on selected document object like page, text, frame etc. Style Change the appearance of that part. Advantage: 1, Improve consistency of document 2. Makes formatting changes very simple
Types of styles 1) Page styles include margins, headers and footers, borders and backgrounds. 2) Paragraph styles control all aspects of a paragraph’s appearance, such as text alignment, tab stops, line spacing etc. 3) Character styles affect selected text within a paragraph, such as the font and size of text, or bold and italic formats. / To open Select Styles and formatting window from format menu. or Press short cut key F11 / Fill format mode is used to apply a style to many different areas quickly without havingto go back to the Styles and Formatting window and double-click every time. / Esc key is used to quit Fill Format mode./ We can create New Styles in two ways 1) New style from a selection 2) Dragging And Drop method / Two ways to modify styles • Updating a style from a selection • Load or copy styles from another document or template
Images:
Methods of inserting images in a text document.a. Drag and Drop, from Clipboard, using scanner and from insert picture dialog box / Solarization: is an image filter that looks like what can happen when there is too much light during photo development. The colours become partly inverted./ Resizing an image means to increase or decrease the size of an image/ select the image and drag the green sizing handles to resize the picture/ Grouping: allows you to combine multiple objects to behave like one object/ Select one object, then hold down the Shift key and select the others you want to include in the group. 2. Choose Format > Group > Group from the menu bar or right-click and choose Group > Group from the pop-up menu. / drawing toolbar:can be opened by clicking on View > Toolbars > Drawing/This toolbar is used to add or edit various drawing shapes like lines, curves, graphics, text arts, text box etc / T icon on drawing toolbar: it is used to add rectangular text box in document. Where user can enter text
Cropping: Cropping means to remove(cut off) unwanted areas from an image/ keep scale and keep image size ? When we select keep scale , the size of the image also change during cropping When we select keep image size , the size(height or width) of the image remains unchanged. When Keep image size is selected, the remaining part of the image is enlarged so that the width and height of the image remains unchanged. /
scaling :Changing height and width of an image or resizing an image without cropping. For this purpose you can drag sizing handles.
Explain any four image filters and their effects Smooth : Softens or blur the image./ Sharpen : Increases the contrast of an image. Posterize : Makes a picture appear like a painting. Charcoal: Displays the image as a charcoal sketch. Pop Art: Converts an image to a pop-art format. /Apply filter on image : Select the image It will display a picture toolbar and select the filter from filter drop menu / We can cancel the filter effect Using short cut key CTRL+Z or Alt+Backspace or by selecting Edit > Undo. /
Text Wrapping: It refers to the relation of graphics to the surrounding text. Its value may be No Wrap, before, After and Parallel
Template
Template : template is a model that you use to create other documents./ Advantage :1. Save time and energy 2. Offer consistency and clarity for all documents/ Creating templates: 1. from a document.2. Create using wizard./ opening new document : 1. Click on File –> New 2. Press Ctrl + N from keyboard/ Steps to open template management dialog box: File Menu > Templates > Organize./ Create a new template from document: Open a new document or existing document , Add the content, formatting and styles as you want
Click on file->template->save Name the template and click on ok button / Set the custom template as default template: open template management dialog box and select the template and click on set as default /
TOC: Table of Content feature of Writer allows you to build an automated index from headings in you document. /A TOC is a list or a table listing all the chapters or section titles or headings along with their commencing page numbers. A TOC is usually given in the beginning of book. / Hierarchy of heading means the clearly defined levels of headings where higher level headings pertain to title, main headings and sub heading pertain to section and sub section. / Insert > Indexes and Tables > Indexes and Tables option used for create TOC. /To protect the table of contents from being changed accidentally, check the Protected against manual changes check box./ Right-click and select Update Index/Table from the pop-up menu. /By default, Writer evaluates 10 levels of headings when it builds the table of contents./
Mail merge is a feature that enables users to send a similar letter or document to multiple recipients. / A mail merge is a method of taking data from a database, spreadsheet, or other form of structured data, and inserting it into documents such as letters, mailing labels, and name tags. /You can also print a set of mailing labels or envelopes by doing a mail merge. /The mail merge wizard is available under tools menu. /A mail merge is used to create form letters, mailing labels, envelopes, directories, and mass e-mail message and fax distributions/ The main document for the mail merge process is the document on which the letter or content is written. The document is prepared to send to a bunch of people / The data sources available for mail merge in the mail merge process: Text files, CSV files, Spreadsheet, OO Database, MySQL or MS Access/ 1. Merge Field: A merge field is where you want to insert the information from a data source into a main document. Merge fields appear with chevrons (« »). / 2. Data Source: Data source is a file that contains the names and addresses or any other information that vary with each version of a mail-merge document./ 3. Main Document: Main document is the document which contains text and graphics. It may be a formal or an official letter./ 4. Two types of data on which mail merge can be applied are Labels and Letters.
Database Management System
Database : Collection of information about an organization in form of tables.
Its advantages : 1. Reduce redundancy 2. Enhance data security 3.Reduce inconsistency 4. Sharing data. 5.enforce stamdards
Flat database: Data is stored in one file E.g Spreadsheet /Relational Database: data is stored in multiple tables are linked via common filed or column
RDBMS : Relational Database Management System. Software that is used to manages database E.g MS Access, Base. Oracle, MySQL./Relation: table is called Relation/ Attribute: Field /Column/ headers in table containing one type or peace of information/Record/Row/Tuple: Row in a table . Record contain a complete unit of information about a person or thing. /Redundancy : duplication of data/Data Inconsistency : Multiple mismatch copy of same data/( .odb) : the file extension of base database is .odb
Primary key: Column that can uniquely identify record in a table /This key can never be duplicated and NULL. /Composite Primary key: Primary key that composite of two or more columns/Alternative keys : All the candidate keys other than the primary key of a relation /Candidate keys: Primary keys and alternative keys together are called the candidate keys. Attributes of a table which can serve as a primary key are called candidate keys. /Foreign key : Non key attribute that is defined as primary key in another table called foreign key. This key is used to enforce referential integrity/
Open Office Base Database of Open office is BASE./The file extension of BASE database is odb /The Base database is composed of four components called tables, reports, query and forms/Report : It is an effective way to represent data in printed format/Form: It is an interface where user can enter, view or change data directly in the table/Query: It is a way to get information from a database as per given condition or criteria./ keyboar Short cut for creating a new database : Ctrl+N/To open database Ctrl+O/Ttwo ways to create database in base (a)From table wizard (b) from Design view /creating forms using : Form wizard and from design view/Two ways to create a query :1.Using Query wizard (2) Using Query Design view/ Two type of Queries summary and detailed Query
SQL structured query language set of commands that is used to create, manipulate and process the database.
1. Data Definition Language (DDL) Commands: create , alter, drop, grant, revoke /2. Data Manipulation Language (DML) Select, Insert, Delete, Update etc. /3. Transaction Control Language (TCL)
COMMIT, ROLLBACK /data type:INT: to store integer values/DECIMAL: to store real or decimal values with exact precision./CHAR: to store fixed length string with a maximum size of 255./VARCHAR: to store variable length string a maximum size of 65,536./DATE: store date values in the format YYYY-MM-DD/DATETIME: store combined date/time values in the YYYY-MM-DD HH:MM:SS format/Binary type: used to store binary data files such as music,image and video files./ Sorting is a process of arranging records in ascending or descending order on the basis of one or more columns . Sorting makes data easier to understand, analyse and visualise /Relationship option in Tools menu is used to create relationship among tables. There are three type of relation one to one, one to many and many to many/Aggregate(summary) Functions : Functions produce a single value from a set of values. Some Functions are :COUNT, SUM, MAX,MIN,AVG/
DISTINCT: keyword is used to remove duplicate column values from table E.g SELECT DISTINCT city from student:/WHERE: used with SELECT command to specify the condition in SQL Query
BETWEEN: The BETWEEN operator defines a range of values The range includes both lower value and upper value.
e.g. to display ECODE, ENAME and GRADE of those employees whose salary is between 40000 and 50000, command is:
SELECT ECODE , ENAME ,GRADE
FROM EMPLOYEE
WHERE GROSS BETWEEN 40000 AND 50000 ;
LIKE:
LIKE operator is used for pattern matching in SQL. Patterns are described using two special wildcard characters:
1. percent(%) –The % character matches any substring.
2. Underscore ( _ ) –The _ character matches any character.
e.g. to display names of employee whose name starts with R in EMPLOYEE table, the command is :
SELECT ENAME
FROM EMPLOYEE
WHERE ENAME LIKE ‘R%’ ;
IN : To specify a list of values, the IN operator is used. The IN operator selects values that match any value in a given list of values. E.g.
SELECT * FROM EMPLOYEE
WHERE GRADE IN (‘A1’ , ‘A2’);
NULL: column having no value is said to have NULL value.
USE : to open or select database
To delete all records from employee table :
DELETE FROM EMPLOYEE ;
To add a new column ADDRESS to the EMPLOYEE table, we can write command as :
ALTER TABLE EMPLOYEE ADD ADDRESS VARCHAR(50);
In table EMPLOYEE , change the datatype of GRADE column from CHAR(2) to VARCHAR(2).
ALTER TABLE EMPLOYEE MODIFY GRADE VARCHAR(2);
In table EMPLOYEE , change the column ENAME to EM_NAME and data type from VARCHAR(20) to VARCHAR(30).
ALTER TABLE EMPLOYEE CHANGE ENAME EM_NAME VARCHAR(30);
To delete column GRADE from table EMPLOYEE, we will write :
ALTER TABLE EMPLOYEE DROP GRADE ;
Creating table:
CREATE TABLE employee (ECODE integer , ENAME varchar(20) , GENDER char(1) , GRADE char(2) , GROSS integer ) ;
Inserting record:
INSERT INTO employee VALUES(1001 , ‘Ravi’ , ‘M’ , ‘E4’ , 50000); or
INSERT INTO employee (ECODE , ENAME , GENDER , GRADE , GROSS) VALUES(1001 , ‘Ravi’ , ‘M’ , ‘E4’ , 50000);
To select only ENAME, GRADE and GROSS column from student table :
SELECT ENAME , GRADE , GROSS FROM EMPLOYEE ;
to retrieve everything (all columns) from a table student :
SELECT * FROM student ;
To display details of employee whose name ends with ‘y’.
SELECT * FROM EMPLOYEE WHERE ENAME LIKE ‘%y’ ;
To display names of employee whose name starts with R in EMPLOYEE table, the command is :
SELECT ENAME FROM EMPLOYEE WHERE ENAME LIKE ‘R%’ ;
To display details of employee whose second character in name is ‘e’.
SELECT * FROM EMPLOYEE WHERE ENAME LIKE ‘_e%’ ;
To display details of employee whose grade value is A1 or A2 :
SELECT * FROM EMPLOYEE WHERE GRADE IN (‘A1’ , ‘A2’);
To display ECODE, ENAME and GRADE of those employees whose salary is between 40000 and 50000, command is:
SELECT ECODE , ENAME ,GRADE FROM EMPLOYEE WHERE GROSS BETWEEN 40000 AND 50000 ;
To display the details of employees in EMPLOYEE table in alphabetical order, we use command :
SELECT * FROM EMPLOYEE ORDER BY ENAME ;
display list of employee in descending alphabetical order whose salary is greater than 40000.
SELECT ENAME FROM EMPLOYEE WHERE GROSS > 40000 ORDER BY ENAME desc ;
Change the salary of employee in EMPLOYEE table having employee code 1009 to 55000.
UPDATE EMPLOYEE SET GROSS = 55000 WHERE ECODE = 1009 ;
Update the salary to 58000 and grade to B2 for those employee have employee code is 1001.
UPDATE EMPLOYEE SET GROSS = 58000, GRADE=’B2’ WHERE ECODE = 1009 ; Double the salary of employees having grade as ‘A1’ or ‘A2’ .
UPDATE EMPLOYEE SET GROSS = GROSS * 2 WHERE GRADE=’A1’ OR GRADE=’A2’ ;
to remove the details of those employee from EMPLOYEE table whose grade is A1. DELETE FROM EMPLOYEE WHERE GRADE =’A1’ ;
Constraints: conditions that can be enforced on the attributes of a relation. The constraints come in play whenever we are trying to insert, delete or update a record in a relation// Unique :Means that the values under that column are always unique. E.g.Roll_no number (3) unique /Primary key : means that a column cannot have duplicate values and not even a null value. e.g. Roll_no number (3) primary key /The main difference between unique and primary key constraint is that a column specified as unique may have null value but primary key constraint does not allow null values in the column. /Check constraint : limits the values that can be inserted into a column of a table. e.g. marks number(3) check(marks>=0) The above statement declares marks to be of type number and while inserting or updating the value in marks it is ensured that its value is always greater than or equal to zero. /Default constraint :Is used to specify a default value to a column of a table automatically. This default value will be used when user does not enter any value for that column. e.g. balance number(5)default = 0
JOIN ::Clause is used to combine rows from two or more tables, based on a related/common column between them. The join clause is used to combine tables based on a common column and a join condition.
An equi join is a type of join that combines tables based on matching values in specified columns. The resultant table contains repeated columns. It is possible to perform an equi join on more than two tables.
The SQL NATURAL JOIN is a type of EQUI JOIN and is structured in such a way that, columns with the same name of associated tables will appear once only.
Referential integrity refers to the relationship between tables. Four features of referential integrity are: (a) It is used to maintain the accuracy and consistency of data in a relationship. (b) It saves time as there is no need to enter the same data in separate tables. (c) It reduces data-entry errors. (d) It summarizes data from related tables.
Update cascade: The values modified in the key of the parent table will automatically update the matching values in the child table. This is termed as Update cascade. Delete cascade: Deleting records from a primary key or parent table will automatically lead to deletion of the matching records from the child table. This is termed as Delete cascade.
Self Management Skill
Self-management, also referred to as ‘self-control,’ is the ability to control one’s emotions, thoughts and behaviour effectively in different situations. This also includes motivating oneself, and setting goals.
Stress :our emotional, mental, physical and social reaction to any perceived demands or threats. These demands or threats are called stressors. / Stressors are the reason for stress /Types : Good stress: limited quantity of stress that helps one to keep focused and motivated to do somethign. Bed stress: that is ongoing not lower down.It is also called distress or chronic stress. / Effects of bed stress: irritation, depression, health problem / Feel good chemicals: Dopamine, Endorphins, Serotonins / stress harmons: Cartisol ,adrenaline Stress causal agents : physical, mental, social, finanacial /ABC of stress management A: Adversity or the stressful event. B: Beliefs or the way you respond to the event /C: Consequences or actions and outcomes of the event /Stress management can help you to: • have a joyful life. • focus and complete tasks on time. • be a happy person as you are stress free. • be more energetic and spend quality time with your friends and family. /Three Steps to Manage Stress Step 1: Be aware that you are stressed/Step 2: Identify what is causing you stress Step 3: Apply stress management methods / Management Techniques : Time management, Physical excercise, healthy diet, positivity, yoga , meditation,Going On Vacations with Family and Friends ,Taking nature walks ,Enjoying, sound sleep /
Self-Reliance - Ability to Work Independently :Enhancing Ability to Work Independently :self awareness, self motivation and self regulation/ ability to work independently means ? becoming self-aware, self-monitoring andself-correcting.2. knowing what you need to do. 3. taking the initiative rather than being told what to do. 4. recognising your mistakes and not blaming others. 5. having the ability and the will to learn continuously.
Emotional Intelligence: Emotional intelligence is the ability to identify and manage one’s own emotions, as well as the emotions of others. / It involve three skills ? 1. Emotional awareness 2. Harnessing emotions 3. Managing emotions
Some steps to manage emotional intelligence are 1. Understand your emotions: 2. Rationalise 3. Practise: Do meditation and yoga to keepyourself calm.
Self-awarenes : Knowing Yourself Understanding who you are, what you like or dislike, what are your beliefs, what are your opinions, what is your background , your values/ Interests Things that you like to do in your free time that make you happy /Abilities :An acquired or natural capacity
Self-Motivation :It is a life skill. It is an inner urge to do something, achieve their goals without any external pressure/lure for award or appreciation.
Types of Motivation:
Internal Motivation: LOVE We do things because they make us happy, healthy and feel good. For example, when you perform on your annual day function and you learn something new, such as dancing, singing, etc., you feel good.
External Motivation: REWARD We do things because they give us respect, recognition and appreciation. For example, Suresh participated in a 100m race and won a prize. This motivated him to go for practice every morning.
Qualities of Self-motivated People : Know what they want from life , Are focussed , Know what is important ,Are dedicated to fulfill their dreams
Four steps for building self-motivation : Find out your strengths ,Set and focus on your goals ,Develop a plan to achieve your goals ,Stay loyal to your goals
Goal Setting :Goal setting is a very essential factor in your personal life. The process of goal setting in your life helps you decide on how to live your life, where you want to be, and how you want to be in the future.
Goals:They are a set of dreams with a deadline to get them, for example, saving pocket money to buy a favourite mobile phone by a particular date.
Goal setting:It is all about finding and listing your goals and then planning on how to achieve them.
SMART method to set goals. SMART stands for: •Specific: Measureable: Achievable : Realistic: Time bound:
Four Steps for Effective Time Management :Organise ,Pritortise ,Control ,Track
ICT SKILL
ICT stands for Information and CommunicationTechnology. ICT refers to all the methods, tools,concepts related to storing, recording and sending digital information.
A computer system consists of two main parts—the hardware and the software. The physical parts that we can see and touch are called hardware. It is the machinery of a computer.These are the keyboard, monitor, CPU, mouse, printer etc/ Software is a programs use to operate computers or perform specific task.
Operating System: interface between user and computer/ Functions: file and folder management, device management, memory management, process management /Mobile OS:✓ Android ✓ Symbian ✓ Windows Phone✓ iOS /Computer OS:Linux: Free and Open Source OS ,Windows: Developed by Microsoft , BOSS(Bharat Operating System Solutions), Solaris: Free Unix based Operating system /
BIOS A computer automatically runs a basic program called BIOS (Basic Input/Output System) as soon as it is switched on or the power button is pushed on. The BIOS first does a self-test. If the self-test shows that the system is fine, the BIOS will load the Operating System
A login and password is like a key to the lock which allows you to use the computer.
Recycle bin: Files and folders deleted by the user are stored in the Recycle Bin. /File: that contains information in form of text /Folder is a location in computer hardisk: where you can store files and other folders/Start button It is located on the left of the taskbar. Clicking the Start button opens the Start menu and provides access to programs and features/Shut Down:- allows the user to turn off the computer / Control panel: - This allows the user to change various settings of computer/ Search Box: - This allows the user to search a file or a folder / Regular maintenance of the system includes: /CTRL+z — undo CTRL+y — redo CTRL+a — select all CTRL+x — cut CTRL+c — copy CTRL+v — paste CTRL+p — print CTRL+s — save /
Using Keyboard:
Function Keys Keys labeled from F1 to F12 are function keys. /Control keys: Keys, such as Control (CTRL), SHIFT, SPACEBAR, ALT, CAPS LOCK and TAB, are special control keys that perform special functions /Navigation keys: Keys, such as the arrow keys, HOME, END, PAGE UP, and PAGE DOWN are navigation keys. /Command keys: Keys, such as INSERT (INS), DELETE (DEL), and BACKSPACE are command keys.
Using a Mouse :
Point and Click When you click a particular file, it gets selected /Roll Over or Hover Some actions can be done by simply rolling over or hovering over an item. When you bring the mouse over a file in File Explorer, it will show the details of that file/Drag and Drop To move an item, you need to click it, and then holding the mouse button down, move the item to a new location. After you move the item to the new location, you release the mouse button. This is called drag and drop. Double-click Double-clicking means to quickly click the left mouse button twice. When we double click on a file, it will open the file /
Backup : Your Data Backing up data means to save the information present on your computer on another device, such as CD/DVD drives as shown in Figure 3.28 or hard disk. Data can recovered from here in case the computer stops working completely
Notepad (a type of computer application to create simple text files) will have the extension .txt. There are other types like .doc, .xls, etc. An image file usually has an extension .jpg while a sound file usually has .mp3.
Protecting your Data :Use passwords to login to your computer: Install Anti-virus and Firewall: Encrypt Data: Visit only Secure sites:
Threats to Computer
Virus: Viruses are computer programs that can damage the data and software programs or steal the information stored on a computer. / Trojan Horse: It appears to be a useful software program but once it reaches a computer it starts behaving like a virus and destroying data / Worms: These are viruses that replicate themselves and spread /Internet Scams: Sometimes you may receive very attractive offers saying you have won a huge money in a lottery and that you can claim the prize by depositing a certain amount of money. When you deposit the money using credit card or online banking, you not only lose the deposit money but your card / account information may be misused later /Software Piracy: This is stealing of software and includes using or distributing unlicensed and unauthorised copies of a computer program or software./ Identity theft : Where a hacker steals your personal information and assumes your identity. Using this false identity, the hacker can gain access to your account information or perform illegal activity.
spam mails :we get mails from companies who are advertising a product or trying to attract you to their website. Such mails are called SPAM. We should never respond to SPAM and delete it on a regular basis.
Basic Tips for Taking Care of Devices: 1. keep the screen, keyboard and mouse clean.(First we should not eat anything over a keyboard.You can clean a keyboard with a soft brush. Avoid eating and keeping glasses of water or cups of coffee near a computer ) 2. Handle and move your laptop carefully and avoid dropping or banging it against a hard surface. Even a short fall can damage the screen or the hard disk and make the device useless. 3.Keep the computer cool: If a computer, laptop or mobile device gets overheated, the internal parts can be damaged. 4.Do not overcharge your battery: Sometimes we keep a device plugged in for charging even after it is fully charged. If we leave the device plugged in for a long time 5.Do not run too many programs at a time.the computer can become slow and even crash.
Electronic Spreadsheet( Advanced )
Subtotal and consolidating data commands available in data menu and what if analysis tools are available in tools menu
Consolidating data : Data Consolidation allows you to gather together your data from separate worksheets into a master worksheet. /Sub Total : The Subtotal command allows you to automatically create groups and use common functions like SUM, COUNT, and AVERAGE to help summarize your data./ What if Analysis Tools: Scenarios, Goal Seek and Solver / scenario A scenario is essentially a saved set of cell values for your calculations.We can create many scenarios . Each scenario is named, and can be edited and formatted separately.Each can be printed /
Goal Seek: Goal seeking is the process of finding the correct input value when only the output is known. It deals with equations with only one unknown variables. Goal Seek tool need three parameters. The formula cell: contains the formula we want to resolve. The target value: The required value that we want our formula to to resolve to. The variable cell. contains the unknown data that we want to find a value
Solver : It is more elaborate form of Goal Seek. The difference is that the Solver deals with equations with multiple unknown variables.
Advantages of multiple sheets in a workbook : 1.keep information organized.2.Different data can be stored in separate sheets for better organization./ A Cell reference refers to a cell or a range of cells on a worksheet and can be used to find the values or data that you want formula to calculate. / [Cell reference]Referencing Other Sheets: two ways to reference cells in other sheets: by entering the formula directly using the keyboard or by using the mouse. / Hyperlink: Link to another document such as spreadsheet , text document , image file or a web site. Hyperlink is a link , clicking on which open the linked document. /Absolute hyperlink hyperlink that contains the full address of the destination file or of the Web site. Mostly Absolute Hyperlinks are link to webpages or web contents. An absolute link will stop working only if the target is moved./Relative hyperlink: contain relative address not full address/Linking To External Data: You can insert data from other Calc sheet or Excel sheet. This option is available in insert menu/ Linking To Registered Data Sources:You can insert data from database such as mysql, base, MS access. But First you need to register the data source with OpenOffice.org.
Web application and security
SESSION 2 : NETWORKING FUNDAMENTALS
Computer network: collection of computers interconnected by communication channels / Advantages: File transfer / data sharing/hardware sharing internet sharing/ Usage network based application sharing/ WWW(w3 ) : World Wide Web. worldwide collection of hyperlinked web documents/ Web Brower: Software used to explore Web sites and interface between the user and the World Wide Web. e,g chrome, firefox, MS edge, Opera mini , safari etc. / Web Server: A Web server is a computer that stores web sites and their related files for viewing on the Internet. E.g IIS server, tomcat, weblogic etc./ ISP:An Internet service provider (ISP) is an organisation which provides you with access to the Internet E.g. Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, JIO etc./ Internet connectivity :Wired : Dial up, DSL, Cable Internet Access/Wireless: 3G, wimax, Wi-Fi / DSL:Digital subscriber line(DSL) provides Internet access by transmitting digital data over wires of a local telephone network. /wi-fi :Technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections. /Devices can connect to a network resource such as Internet through a device called the Wireless Access Point (WAP)./
WiMax:(Worldwide Interoperability for Microwave Access) mobile broadband connectivity across cities and countries/ 3G:short for 3rd Generation is a Technology used for mobile for higher data transfer speeds/ MODEM :Device that converts digital computer signals into analog signals and vice versa. MOdulator/DEModulator. /Expand following terms : LAN(local area network) / WAN(wide area network ) / PAN(personal area network) / MAN(metropolitan area network) P2P(PEER-TO-PEER) / MODEM (MOdulator/DEModulator) / ISP(Internet service provider) / DSL(Digital subscriber line) / WIMAX(Worldwide Interoperability for Microwave Access) / WIFI (Wireless Fidelity)/ WWW(World Wide Web) 3G ( 3rd Generation ) WAP(Wireless Access Point)/P2P network :All computers have an equal status are called peer to peer networks. /Client server network :Where one computer work as server and other all are worked as client computers . The Server computer provide services and client computers requiest for services/
Instant Messaging (IM) is a form of communication over the internet that offers an instantaneous transmission of text and audio video messages from sender to receiver. Most IM software includes the option to transfer files, audio chat, video chat, video conferencing transfer images etc.
Key features of IM :1) Text message can be sent from one person to another(similar to SMS) 2) Audio calling and conferencing 3) Video calling and conferencing 4) File Transfers 5) Message History (Save messages for future reference)
Different type of IM softwares:Two kinds of IM Software:-
1) Application Based:- downloaded and installed on user’s computer. Eg. Google Talk , Yahoo! Messenger , Skype ,zoom, whatsapp, hangouts, line, MS teams, Google Meet, Telegram, GoSMS Pro, Messenger , Rediff Bol etc. / 2) Web Based:- accessed using browsers such as Internet Explorer etc. Eg. MSN Web Messenger , Yahoo! Messenger for the Web , Meebo , IMO etc./
Google Talk:Google Talk is an instant messaging service that provides both text and voice communication developed by Google Inc. Google Talk can also be used for making video calls and to view updates from the GMAIL mailbox. Before you start using Google Talk, a Gmail account is required.
Blog(web blog): is a web page that serve as a online journal or diary where online entries are posted,You can use a blog to convey messages about events, announcements, news, reviews, etc.
Blogger: author of blog is called blogger. Who blogs or write contents for blog
blog account: Before you start using a blog, a blog account is required.
Blog Address: Unique address of your Blog over internet. This is used to view your blog.
Blogging: It is the act of writing a post for a blog.
Blog post: the content put on blog by blogger are called blog post
Type of blogs: personal blogs, company blogs, Personal blogs , Micro blogs , News and views
Micro blogs: This is a new type of blog where one can post very short comments that others can follow. Twitter is best example of micro blog, where one can post 140 characters with each entry called a tweet.
Wordpress :It is a free web service that you can use to create a beautiful website or blog.
Web page: One single page with information designed in html language is called webpage / Website: Collection of webpages / 5 websites that provide blog service are www.WordPress.com / www.blogger.com/www.blog.com/www.weebly.com/www.blogsome.com /offline blog editor: If you do not have an active internet connection, you can create blogs using a blog application and publish the blog whenever internet connectivity is available//offline blog editors: Qumana • Windows Live Writer • Blogdesk • Blogjet • Marsedi /Online transactions: Transactions over the internet E.g. Like purchasing of goods, selling of goods, booking a ticket, payment of fees / E- commerce : electronic commerce where customers can buy or sell goods over the Internet. / E-Commerce:1) For Buying Goods :- amazon, jabong, myntra, flipkart ,meesho, ebay etc. 2) For Booking of Tickets :- IRCTC , Redbus etc./ Online payment tools : credit, debit card , cash on delivery(COD ) or by internet banking. / Chat spoofing: Spoofing means to trick or deceive someone via chat/Email spoofing :ending an email with a forged email address which appears to be original. These mails are infected mails which contain worms. /: /Phishing :- The act of acquiring personal information and sensitive data from personal computers for use in fraudulent activities. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website. /various ways to protect yourself from viruses & other malware. 1.
Keep the operating system and software applications up to date
2. Use antivirus and antispyware software/3.Do not share personal information/4.Keeping your username and password private/•Using strong passwords/Do not respond to mails from unknown users:/•Install firewalls:/Use encryption software to protect your data from unauthorized users./Clear browser cookies frequently/Never install software from unknown sources/Remove unwanted or unknown software
general guideline for managing strong passwords.
•Never use personal information/•Include a combination of letters, numbers, and symbols:/•Never repeat passwords: /•Avoid using real words:/•Keep the length of the password at least 12-14 characters if permitted. /• Use capital and lower-case letters./•Use random password generators if possible. Example of a strong password: u1vX:,4Hd{]$/ Cookies are files created by websites that store in your computer/