0% found this document useful (0 votes)
11 views6 pages

Basic Computer Skills (B.SC)

The document provides an overview of various computer components, including input and output devices, the CPU's functions, types of software like word processors and spreadsheets, and the concept of cybercrime. It also explains the booting process, computer memory types, network definitions (LAN and MAN), and the use of MS Excel in daily life. Additionally, it discusses the role of antivirus programs, features of the Windows operating system, and the impact of computers in the workplace.

Uploaded by

ubaid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views6 pages

Basic Computer Skills (B.SC)

The document provides an overview of various computer components, including input and output devices, the CPU's functions, types of software like word processors and spreadsheets, and the concept of cybercrime. It also explains the booting process, computer memory types, network definitions (LAN and MAN), and the use of MS Excel in daily life. Additionally, it discusses the role of antivirus programs, features of the Windows operating system, and the impact of computers in the workplace.

Uploaded by

ubaid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

WHAT IS AN INPUT DEVICE?

An input device is any hardware that is used to enter data or instructions into a computer system.
It allows users to communicate with the computer by typing, clicking, speaking, scanning, or
touching.
 Keyboard – to type text and commands
 Mouse – to click, drag, and select items

FUNCTIONS OF CENTRAL PROCESSING UNIT (CPU)


The CPU (Central Processing Unit) is often called the "brain" of the computer because it
performs most of the processing inside a computer. Here's a breakdown of its main functions:
Main Functions of the CPU:
1. Fetch: The CPU retrieves instructions from the computer’s memory (RAM).
2. Decode: It interprets the instructions — figuring out what needs to be done.
3. Execute: It carries out the instructions — this could be performing calculations, moving data,
or making decisions.
4. Store: After processing, it may write back the result to memory for future use.

OUTPUT DEVICES AND ITS FUNCTIONS


output device is any hardware that receives data from a computer and then presents it to the
user — usually in the form of sound, visuals, or physical output. An output device is a
component of a computer system that communicates the result of data processing to the
user.
1. Speaker: Converts digital audio signals into sound — lets you hear music, videos, alerts, etc.
2. Monitor (Display Screen): Displays visual output from the computer — shows your desktop,
apps, videos, etc.
3. Printer: Produces a hard copy of digital content (text or images) on paper.

WORD PROCESSOR AND SPREADSHEET


Word Processor: A word processor is a software used to create, edit, and format text-based
documents. It's mainly designed for writing.
 Examples: Microsoft Word, Google Docs
 Used for: Writing letters, reports, essays, books, or resumes.
Spreadsheet: A spreadsheet is a software used to organize, calculate, and analyze data,
especially numbers. It works in a grid made of rows and columns.
 Examples: Microsoft Excel, Google Sheets
 Used for: Budgets, accounting, data tracking, and calculations.

WHAT IS CYBERCRIME?
Cybercrime is any illegal activity that involves a computer, network, or digital device.
Criminals use technology to commit crimes, either by attacking computers or using them to carry out
other offenses. Cybercrime refers to criminal acts done using computers or the internet, either as the
target or the tool of the crime.
1. Hacking – Unauthorized access to someone’s computer or data.
2. Phishing – Fake emails or messages that trick people into giving personal info.
3. Identity Theft – Stealing someone’s personal information to commit fraud.

WHAT IS A HYPERLINK?
A hyperlink (or just link) is a clickable element in a digital document or webpage that takes you to
another place, like a different page, website, or section of the same document. A hyperlink is a text,
image, or button that connects to another resource, such as a web page, file, or email address.
1. Text Link – Usually underlined and colored (e.g., Google)
2. Image Link – Clicking an image takes you somewhere else
BOOTING PROCESS OF A COMPUTER SYSTEM
Booting is the process of starting up a computer and getting it ready for use. It involves loading the operating
system (OS) from the storage into the computer’s memory (RAM). This process can be divided into two
stages: Cold Booting (or Hard Booting) and Warm Booting (or Soft Booting).
Stages of the Booting Process:
1. Power-On (Cold Booting):
o Step 1: When you press the power button, electrical power is supplied to the system.
o Step 2: The Power Supply Unit (PSU) provides the necessary power to the computer's
components (e.g., CPU, memory, storage).
2. POST (Power-On Self Test):
o Step 3: The BIOS/UEFI (Basic Input/Output System / Unified Extensible Firmware Interface)
is activated. It is a firmware stored on a chip on the motherboard.
o Step 4: The BIOS/UEFI performs a self-diagnosis called the POST. It checks hardware
components like RAM, CPU, and storage devices to ensure they are functioning correctly. If
everything is fine, it proceeds to the next step; if there's an issue, it may display an error message
or beep codes.
3. Loading the Bootloader:
o Step 5: After successful POST, the BIOS/UEFI looks for the bootable storage device (e.g., hard
drive, SSD, USB, or CD).
o Step 6: The BIOS/UEFI hands control to the bootloader. The bootloader is a small program
located in the boot sector of the storage device.
o Step 7: The bootloader loads the operating system (OS) into the computer’s RAM. In the case
of Windows, this is the Windows Boot Manager; for Linux, it's GRUB.
4. Loading the Operating System:
o Step 8: The operating system begins to load into the computer’s memory (RAM). It starts
essential system services and drivers needed for the hardware to function properly.
o Step 9: After the OS has loaded, the user interface (e.g., desktop in Windows) is displayed,
allowing the user to interact with the computer.
5. Ready for Use:
o Step 10: At this point, the system is fully booted and ready for use. The user can begin
interacting with the operating system and running applications.

USES OF MS EXCEL IN DAILY LIFE


Microsoft Excel is a powerful tool that can be used for many tasks in daily life, whether for personal use, work,
or organizing information. Here are some common uses of MS Excel in everyday scenarios:
1. Budgeting and Personal Finance
 Track monthly expenses: Create a spreadsheet to record income and expenses, helping you stay on top
of your budget.
2. Managing To-Do Lists and Schedules
 Task lists: Organize daily tasks, mark them complete, and prioritize items.
 Weekly schedules: Create time-based schedules to organize your day, week, or month.
3. Data Analysis and Tracking
 Track health and fitness progress: Record your exercise, calories burned, or daily water intake.
 Inventory management: Track stock or items at home, like groceries or clothes.
4. Creating Charts and Visuals
 Data visualization: Use graphs and charts to visually represent your data, like a spending chart or a fitness
progress graph.
5. Creating and Organizing Lists 📋
 Contact lists: Maintain an address book with phone numbers, emails, and other contact information.
 Birthday lists: Keep track of birthdays, anniversaries, and special occasions with reminders.
6. Event Planning
 Guest lists: Organize a guest list for parties, weddings, or any event.
 Event budget: Track costs related to an event, from venue booking to food and decorations.
 RSVP tracking: Monitor event invitations and RSVPs.
VARIOUS TYPES OF COMPUTER MEMORY
Computer memory is a crucial component in any computer system, as it stores data and instructions for the CPU
to process. There are several types of computer memory, each serving a different function.
1. Primary Memory (Volatile Memory): Primary memory refers to the memory that is directly accessible by
the CPU. It is volatile, meaning it loses its content when the power is turned off.
Types of Primary Memory:
 RAM (Random Access Memory): Temporarily stores data and instructions that are actively being used
by the CPU. Characteristics: Fast, but temporary (data is lost when the computer is turned off).
Types of RAM:
o DRAM (Dynamic RAM): Needs to be constantly refreshed to retain data.
o SRAM (Static RAM): Faster than DRAM, but more expensive. Does not need refreshing.
 Cache Memory: A smaller, faster type of memory located inside or close to the CPU. It stores frequently
used data and instructions to speed up processing.
2. Secondary Memory (Non-Volatile Memory): Secondary memory refers to storage devices that hold data
permanently, even when the power is off. It is used to store large amounts of data.
Types of Secondary Memory:
 Hard Disk Drive (HDD): Used for long-term storage of files, applications, and the operating system.
o Characteristics: Relatively slow but offers large storage capacity at a low cost.
 Solid State Drive (SSD): A faster alternative to HDDs for storing data.
 Optical Discs (CD/DVD/Blu-ray): Used for storing media, software, and backup data.
 USB Flash Drive / Pen Drive: Portable storage devices for transferring data between computers.
3. Virtual Memory: Virtual memory is a system that creates the illusion of a larger memory pool than is
physically available by using a portion of the secondary memory (like the hard drive or SSD) as if it were RAM.

WHAT IS LAN (LOCAL AREA NETWORK)?


A LAN is a network that connects computers and devices in a small geographic area, like a home, school,
office, or building.
WHAT IS MAN (METROPOLITAN AREA NETWORK)?
A MAN is a network that connects multiple LANs within a city or large campus. It is larger than a LAN but
smaller than a WAN (Wide Area Network).
LAN vs. MAN – Local Area Network vs. Metropolitan Area Network

Feature LAN (Local Area Network) MAN (Metropolitan Area Network)


Full Form Local Area Network Metropolitan Area Network
Coverage Area Small area (e.g., a room, office, school, Larger area (e.g., a city or large campus)
home)
Range Up to a few kilometers Up to 50 kilometers or more
Ownership Usually owned, managed, and maintained May be owned by an organization or a service
privately provider
Speed High speed (e.g., 100 Mbps to 1 Gbps or Moderate speed (lower than LAN but higher
more) than WAN)
Cost Low installation and maintenance cost Higher cost due to broader coverage and
infrastructure
Example Office computers connected together Universities, city-wide government networks
Technology Ethernet, Wi-Fi Fiber optics, leased lines, wireless microwave
Used links
Reliability Very reliable in a controlled environment Less reliable than LAN due to more external
factors
CREATE AND USE A PRESENTATION IN MS POWERPOINT
Microsoft PowerPoint is a popular tool used to create presentations with slides that include text, images,
graphs, and videos.
1. Opening PowerPoint and Creating a New Presentation:
Step 1: Open Microsoft PowerPoint from computer or device.
Step 2: Choose Blank Presentation or a Template (pre-designed themes and layouts) to start.
2. Adding and Editing Slides:
Step 1: To add a new slide, click the "New Slide" button in the Home tab or press Ctrl + M (Windows)
or Cmd + M (Mac).
Step 2: Choose a slide layout (e.g., Title Slide, Title and Content, etc.) depending on the content you
want to present.
Step 3: Click on the placeholder text to enter title or content.
3. Formatting Text:
Step 1: Highlight the text you want to format.
Step 2: Use options from the Home tab to change:
o Font style, size, and color
o Bold, Italic, Underline
o Text alignment (left, center, right)
4. Inserting Images, Videos, and Shapes:
Step 1: Go to the Insert tab in the toolbar.
Step 2: To add an image:
o Click Pictures to insert an image from your computer. Or click Online Pictures
Step 3: To add shapes or icons, click on Shapes or Icons in the Insert tab.
Step 4: You can also insert charts, tables, and SmartArt.
5. Adding Transitions and Animations:
Step 1: To add slide transitions (how one slide changes to the next), go to the Transitions tab.
o Select a transition style (e.g., Fade, Push, Wipe) and apply it.
Step 2: To add animations (effects for text or objects on a slide), go to the Animations tab.
o Choose an animation effect and apply it to your text or objects.
6. Presenting the Slides:
Step 1: To start the presentation, click the Slide Show tab or press F5.
Step 2: Use the arrow keys or click the mouse to navigate between slides.
Step 3: To exit the slideshow, press Esc.
7. Saving Your Presentation:
Step 1: Go to the File tab and select Save or Save As.
Step 2: Choose the location and file format (e.g., PowerPoint Presentation .pptx or PDF .pdf).
Step 3: Name your file and click Save.

DIFFERENCE BETWEEN HARDWARE AND SOFTWARE:


What is Hardware?
Hardware is the physical parts of a computer that you can see and touch. It includes all the
equipment and
components that make the computer work.
Examples of Hardware: Keyboard Monitor Mouse Printer
What is Software?
Software is a set of programs or instructions that tells the hardware what to do. It is not physical
you can’t touch it.
Examples of Software:
 Microsoft Word (used for typing documents)
 Google Chrome (used for browsing the internet)
 Windows 11 (an operating system)
ROLE OF AN ANTIVIRUS PROGRAM
An antivirus program is software designed to detect, prevent, and remove malicious software (malware) from
your computer system. It plays a crucial role in protecting your data, privacy, and overall system performance.
1. Malware Detection: Antivirus software constantly scans your system to look for known viruses and
suspicious behavior. It checks files, applications, emails, and downloads using:
 Signature-based detection: Matches files against a database of known virus definitions.
 Heuristic analysis: Analyzes the behavior of programs to detect unknown or new threats.
 Real-time scanning: Monitors activity in real time to catch threats as they happen.
2. Malware Removal: Once malware is detected, the antivirus software can:
 Quarantine infected files (isolates them so they can't spread)
 Delete harmful files permanently
 Repair infected files if possible
3. System Protection: Antivirus programs offer various forms of protection to keep your system safe:
 Email protection: Scans email attachments and links for phishing or malicious content.
 Web protection: Blocks unsafe websites and warns you of potential dangers.
 Firewall integration: Works with or includes a firewall to prevent unauthorized network access.
 USB scanning: Automatically scans external devices for threats when plugged in.
Why Antivirus is Important:
 Prevents data theft and identity fraud
 Protects against viruses, ransomware, trojans, spyware, and worms
 Keeps your personal and financial information safe
 Reduces the risk of system crashes or slowdowns caused by malware
Popular Antivirus Software:
 Norton
 Kaspersky
 McAfee
 Bitdefender
 Avast
 Windows Defender (built-in on Windows systems)

FEATURES OF WINDOWS OPERATING SYSTEM


Windows is a graphical operating system developed by Microsoft, widely used in homes, schools, and
businesses. It provides a user-friendly interface and supports a wide range of applications.
Features of Windows OS:
1. Graphical User Interface (GUI)
 Windows uses a graphical interface with icons, buttons, and windows.
 Users can interact using a mouse, keyboard, or touchscreen instead of typing long commands.
2. Multitasking
 Windows allows you to run multiple applications at the same time.
 Example: You can browse the internet, listen to music, and type a document all at once.
3. File Management System
 Provides easy-to-use tools like File Explorer to:
o Create, copy, move, rename, and delete files or folders
o Organize files using folders, drives, and libraries
4. Taskbar and Start Menu
 The Taskbar lets you switch between open applications and see running programs.
 The Start Menu gives access to programs, settings, and power options (shut down, restart, etc.).
5. Control Panel / Settings
 Used to change system settings, such as:
o Display and resolution
o User accounts
o Sound and devices
o Network settings
IMPACT OF COMPUTERS IN THE WORKPLACE
Computers have transformed modern workplaces in almost every industry. From speeding up tasks to enabling
global communication, their role is vital. However, they also bring certain challenges.
1. Increased Efficiency and Productivity: Computers allow for faster data processing, calculations, and
automation of routine tasks. Employees can complete more work in less time (e.g., typing, editing, and printing
documents quickly).
2. Better Communication: Tools like email, video calls, chat apps (e.g., Zoom, Teams, Slack) enable quick
and global communication. Easier collaboration between team members — even across different locations.
3. Data Management and Storage
 Computers can store large amounts of information digitally, reducing the need for paper records.
 Information can be organized, searched, and retrieved quickly.
4. Improved Accuracy and Quality
 Software reduces human errors in calculations, spelling, or formatting (e.g., spreadsheets, grammar
checkers).
 Data analysis and reports are more precise and reliable.
5. Remote Work and Flexibility
 Computers and internet access allow employees to work from home or remotely.
 Flexible work schedules have become possible and more common.
6. Professional Development
 Online training, courses, and tutorials can help employees learn new skills or improve existing ones.
 Encourages lifelong learning and career growth.
7. Automation and Innovation
 Repetitive tasks (e.g., data entry, scheduling, inventory control) can be automated.
 Promotes innovation in how work is done (e.g., using AI, machine learning, cloud computing).
8. Dependence on Technology: Heavy reliance on computers can make workplaces less functional during
system failures. Downtime due to technical issues can affect productivity.
9. Reduced Human Interaction: Overuse of digital tools may reduce face-to-face communication and social
interaction. May lead to a less personal or collaborative environment.

WHAT IS CYBERSECURITY?
Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks,
unauthorized access, and damage. It involves implementing technologies, processes, and policies to defend
against cyber threats that can compromise personal, organizational, and governmental information.
Components of Cybersecurity:
1. Network Security: Protects the integrity, confidentiality, and accessibility of networks and data. This
includes firewalls, encryption, and intrusion detection systems.
2. Information Security: Ensures that data is protected from unauthorized access, alteration, or
destruction. This can include both physical security and digital security measures like encryption and
access controls.
3. Application Security: Focuses on ensuring that software applications are free from vulnerabilities that
could be exploited by attackers. This involves regular updates, patches, and secure coding practices.
4. Endpoint Security: Secures devices like smartphones, laptops, and desktops that connect to the
network. Anti-virus software and device encryption are common protections.
5. Identity and Access Management (IAM): Ensures that only authorized individuals can access certain
data or systems. It involves using strong authentication methods (like multi-factor authentication) and
setting user permissions.

You might also like