- Various machines have been invented by man to transform data into information. Among them, the computer commands a vital role. Many reasons have influenced to gain this important position and given below are some of the main reasons.
- Speed – The computer is a machine which operates very fast. A task or calculation which takes a long time to be completed through other means can be completed in a very short period using the computer.
- Accuracy – The computer is a machine which operates with a very high rate of accuracy. If there is any error in the operation of the computer, such errors occur due to the errors of the given instructions and data. When preparing a program for the computer, it is a fundamental responsibility of the person who prepares the instructions to ensure the accuracy of it.
- Efficiency – As it is a machine a computer which is installed in a suitable environment can be operated in the same speed continuously without any rest for any duration you need. This will not feel monotony, fatigue and loss of concentration as human beings.
- Versatility – The ability to engage in a number of tasks is a special feature of the computer. Just after finishing one task, the computer can perform another completely different task with the same efficiency.
- Storing and Retrieving – The data and information can be saved in the computer as long as we wish and it can be retrieved instantly when we need them. This is another special feature of a computer.
- No intelligence – Intelligent computers have not been created so far and all computers operate according to the commands or programs given by human beings.
- No feelings – A computer is just another machine we use. Computers do not get feelings such as isolation, loneliness and exhaustion. Therefore, we can use computers to get our work done as we wish.
Friday, September 7, 2012
Special features of the computer
Basic functions of a computer
- Input or inserting data and instructions – Input can be defined as inserting data and instructions needed for a computer.
- Processing – The process of converting data inserted to the computer to information as required can be defined as processing.
- Output or retrieving data or information – Giving the processed data and information to the external force is done under output.
- Storing data or information – Data and information are stored in a way that they can be reused later as required. This is done under storing.
- Controlling – The functions of a computer system and its various devices should be controlled properly. Under controlling the controlling activities done by computer system are considered.
Friday, July 27, 2012
Classification of Computers
According to the generation
- First generation computers - Vacuum tubes were used to design computers of this generation.
- Second generation computers - Transistors were used to design computers of this generation.
- Third generation computers - Integrated Circuits (IC) were used to design computers of this generation.
- Fourth generation computers - Microchips or Microprocessors were used to design computers of this generation.
- Fifth generation computers - Computers that are supposed to have the thinking ability are called fifth generation computers. Scientists are trying hard to develop the fifth generation computers using 'Artificial Intelligence'.
According to the size
- Super computers - Computers which are designed for a specific purpose with very high performance and capabilities are called as such.
- Mainframe computers - These are the large scale computers.
- Mini computers - Medium size computers can be called mini computers.
- Micro computers - Extremely small computers that can be called micro computers.
According to the technological development
- Personal computers (PCs) - Computers designed for individual's use are called personal computers and this type of computers has been widely developed now. Personal computers are also known as ' Desktop Computers'.
- Laptop computers - These are portable computers designed to be carried about. These are known as the 'Note book computers' or 'Portable computers'.
- Palmtop computers - These are the computers that can be held on palm. Palmtops are also called 'Personal Digital Assistants' (PDAs).
- Work station computers - The name 'Workstation computers' is used for desktop computers made with high capacities. These are widely used to design more complex graphic designing and 3D animations and also serve as server computers.
According to the purpose
- Computers designed for usual and day - to - day activities are called General Purpose Computers.
- Computers designed for special purposes such as scientific experiments, battle operations, discovery of oil rigs etc.. are called Special Purpose Computers.
According to the design technology
- Digital computers - Computers designed by using the binary digital number system are called digital computers.
- Analog computers - Computers which are designed considering the physical data such as temperature, thrust, and pressure are called analog computers.
- Hybrid computers - A combination of the above two types of computers can be called hybrid computers.
Thursday, July 26, 2012
Computer Games
Sports have got a special place in our daily life. It not only provides enjoyment, but also increase physical and mental solace. Today the computer with its related equipment are used as gaming equipment. So, as mentioned earlier, it not only provides enjoyment but also helps to increase knowledge in various fields.
When we play computer games, it is an important fact that games can be set according to an individual's age, knowledge level or skill level. Especially games such as chess can be highlighted here.
Such sports will enhance our intelligence, skills to take quick decisions and creativity.
Computer games help to improve the knowledge, creativity and analyzing skills not only on mathematics, science and technology but also on many other subjects like language, music and art. Computer games are popular media that helps mental relaxation and reducing physical fatigue.
However, addiction to computer games and gambling are the bad sides of computer games.
When we play computer games, it is an important fact that games can be set according to an individual's age, knowledge level or skill level. Especially games such as chess can be highlighted here.
Such sports will enhance our intelligence, skills to take quick decisions and creativity.
Computer games help to improve the knowledge, creativity and analyzing skills not only on mathematics, science and technology but also on many other subjects like language, music and art. Computer games are popular media that helps mental relaxation and reducing physical fatigue.
However, addiction to computer games and gambling are the bad sides of computer games.
Saturday, May 19, 2012
Identify the various categories of website users and describe in detail.
- Expert users (meaning with extended experience in the application) expects advance features and capabilities. They will want more customization options. Since they have a stable mental model of the application structure they feel free to explore the application and try new things. They will not be too worried about making mistakes since they feel secure that they will know how to bypass them.
- Novice users: on the other hand, are new to the system and will need a simple and basic interface. Since they are new in the system they will expect more secure ways of doing things in the system (for example they will choose the templates or wizards to do their first steps in the system). Novice users' interface should provide simple ways to achieve important frequently performed tasks. When designing to novice users we should remember what the main use cases and don't shadow them with unnecessary features.
- Users with special needs: Users with special needs who are not sufficiently visually impaired to require assisted technologies can still be frustrated by poor contrast, problematic color schemes, or tiny, unreadable text. Up to 10% of men are color blind to some extent, and the increasing number of older users is less likely to have 20/20 vision than those designing the pages.
Thursday, May 3, 2012
*What is meant by attachment facility?
The attachment information with e-mail.
These attached information can be sent as attached files.
The files may be text files or document files.
By the attachment facility we can send any number of files with email.
*What is the use of email dictionary?
While sending email the email dictionary helps to know the meaning of the word, if we need.
*What is the use of spell check?
It helps to make spelling corrections in the email which we typed.
*What is the use of treasures?
The facility which gives different words in similar meaning.
*What is mean by inbox?
Inbox is which we receives all the emails to a person who holds email address.
*How can we erase the unwanted email?
Select the unwanted emails and press the delete button.
The attachment information with e-mail.
These attached information can be sent as attached files.
The files may be text files or document files.
By the attachment facility we can send any number of files with email.
*What is the use of email dictionary?
While sending email the email dictionary helps to know the meaning of the word, if we need.
*What is the use of spell check?
It helps to make spelling corrections in the email which we typed.
*What is the use of treasures?
The facility which gives different words in similar meaning.
*What is mean by inbox?
Inbox is which we receives all the emails to a person who holds email address.
*How can we erase the unwanted email?
Select the unwanted emails and press the delete button.
Wednesday, May 2, 2012
Software
*What is a software?
Software refers to the set of computer programs, procedures and associated documents.
*What are the types of software?
Application Software
System Software
*What is an application software?
Application software is a set of programs designed to carry out operations for specified purpose.
*What is system software?
System software is a set of programs designed to control the operation of a computer system.
Software refers to the set of computer programs, procedures and associated documents.
*What are the types of software?
Application Software
System Software
*What is an application software?
Application software is a set of programs designed to carry out operations for specified purpose.
*What is system software?
System software is a set of programs designed to control the operation of a computer system.
Friday, April 20, 2012
what are the major factors to be concerned when buying a computer for yourself?
- Choose a specialty store, consumer electronics store, retail chain, limited service discount chain, local computer builder or mail-order/Internet vendor, based on your hardware and service needs.
- Buy when you need to buy. No matter how long you wait for the best deal, the same configuration will cost less in six months.
- Decide which features you'll need based on what you're going to do with the computer. For example, if you're going to be creating graphics, sound and video, you'll want plenty of RAM. If you're going to be doing heavy computational tasks (searching large databases, watching video), you'll want a super processor.
- Decide if you want a laptop, which you can carry around with you, or a desktop model.
- Choose a computer brand based on quality, price and technical support.
- Based on your likely needs, determined earlier, figure out the core configuration you need, including processor and speed, amount of RAM and hard drive size.
- Determine additional drives you need: CD-ROM, DVD-ROM, CD recorder, Zip.
- Select peripherals and additional hardware such as modems, sound cards, video cards and speakers.
- Decide how many extra internal card slots and disk-drive bays you'll need in order to allow room for future expansion.
- Determine what pre-installed software you want or need. Get at least an operating system, such as Windows, an anti-virus program, and programs for word processing, spreadsheets, databases and keeping your checkbook.
- Choose the length of warranty or service coverage appropriate to your needs.
Wednesday, April 11, 2012
Computer technologies used in the Insurance Company
Technology pays a tremendous role in the modern insurance
industries. The use of computers, specifically, has allowed changes with regard
to how data is retained and transactions conducted. Computers also link up
branches from anywhere in the world. Communication and information transfer
happens in a matter of moments. These functions make computers an extremely
valuable tool in the insurance industries.
Computers are instrumental to the way the Insurance Company
performs its business. This technology allows Insurance to be able to take
transactions and update accounts in real time. Online Insuring is another
effect of computer technology on the insuring industry; computers allow people
to set up automatic payments from their bank accounts to such places as utility
companies and insurance groups. The insurance industry uses sophisticated
computer software to analyse risk. Automated underwriting systems adjust
premiums and recommend acceptance or denial of risk for a potential client.
With the use of the Internet, insurance companies are able to access
information which will determine whether they accept client or not.
Computers decrease the amount of time needed to perform
complex calculations and allow professionals in this industry to calculate many
formulas at the same time. Computers also increase the efficiency of this
industry by reducing the potential of humans to err and make incorrect
calculations. Computer technology makes this information more easily accessible
and also requires less amount of physical space. Records can be backed up
easily with computer storage.
Friday, March 30, 2012
Comparison of Primary Storage Devices & Secondary Storage Devices.
The storage devices
are broadly classified into secondary storage and primary storage. The
secondary storage is known as peripheral storage, and is used to stores
information of the computer that is not in current use. The secondary storage
is typically slower and is of higher capacity than primary storage. The
secondary storage is almost non – volatile. The secondary storage is slow due
to serial access.
The primary storage is
used to refer for local random access disk storage and is properly called
secondary storage. If this type of storage is called primary storage, then the
term secondary storage would refer to offline. This usually occurs in the
slower, larger forms of storage which is used to develop vendors to provide
secure device management services, authentication services, as well as
encryption for data. There is software and application based solutions; however
software – based encryption solutions can impact performance during the storage
process. Vendors provide hardware based solutions, which are appliances that
provide authentication to protect the data. These devices are taken into
account for the different requirements of securing data on primary or secondary
storage. The primary storage performance and access specifications for the tape
environment and requires the encrypting to tape would require integration with
backup schemas for primary storage scenarios.
Wednesday, March 28, 2012
Describe generally about total computer system & computer networking
A total computer system is comprised of many internal and external devices. The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral devices connected to it and its operating system. Computer systems fall into two broad divisions: clients and servers. Client machines fall into three categories from low to high end: laptop, desktop and workstation. Servers range from small to large: low-end servers, mid range servers and mainframes.
A computer network is a group of computers that shares information across wireless or wired technology. Computer networks used to only be available for corporations but they are affordable for small businesses and individuals. Computer networking requires two computers, a protocol and the hardware to connect them. Collection of two or more computers that are interconnected with each other to perform data communication using the data communication protocol through communications media (wired or wireless), so these computers can share information, data, programs, and use of hardware together.
Thursday, March 15, 2012
Benefits of Adobe Dreamweaver
Browser Development - Dreamweaver is the only web design software that develops web pages that can be viewed by all web browsers.
Quick Development Time - By incorporating easy-to-create templates as well as a reusable page library, Dreamweaver can be used by experienced developers to create a robust web site quickly.
Data Processing - By using Spry Data and Java scripting to handle dynamic data, Dreamweaver replaces back - end databases.
Table less Layouts - Dreamweaver offers table less layouts for web pages. Images and text no longer need to be placed in tables.
Split Development Screen - Dreamweaver 8 offers the developer a split screen. Half the screen displays the code for using HTML and the other half of the screen is a visual representation allowing for WYSIWYG (What You See Is What You Get) development.
Features of Adobe Dreamweaver
1. Spry framework for Ajax - With Adobe Dreamweaver, you can
visually design, develop, and deploy dynamic user interfaces using the spry
framework for Ajax. The Spry framework for Ajax is a JavaScript library for web
designers that allow designers to build pages that provide a richer experience
for their users. Unlike other Ajax frameworks, Spry is accessible to both
designers and developers alike, as 99% of it is actually HTML.
2. Spry widgets - Spry widgets are prebuilt, common user
interface components that you can customize using CSS, and then add to your web
pages. With Dreamweaver, you can add a number of spry widgets to your pages,
including XML-driven lists and tables, accordions, tabbed interfaces, and form
elements with validation.
3. Spry effects - Spry effects are a simple, elegant
way of enhancing the look and feel of your website. You can apply them to almost
any element on an HTML page. You can add Spry effects to enlarge, shrink, fade,
and highlight elements; visually alter a page element for a certain period of
time; and more.
4.
Advanced Photoshop CS3 integration - Dreamweaver includes enhanced integration with
Photoshop CS3. Now, designers can simply select any portion of a design in
Photoshop even across multiple layers and paste it directly into a Dreamweaver
page. Dreamweaver presents a dialog box where you can specify optimization
options for the image. Should you ever need to edit the image, simply double click
the image to open the original layered PSD file in Photoshop for editing.
5.
Browser Compatibility Check - The new Browser Compatibility Check feature in Dreamweaver
generates reports that identify CSS-related rendering issues in a variety of
browsers. In code view, issues are flagged with green underlining, so you know
exactly where the problem is. After you identify the problem, you can quickly fix
it if you know the solution.
6.
Adobe CSS Advisor - The Adobe CSS Advisor website contains information on the latest CSS
issues, and is accessible directly from the Dreamweaver user interface during
the Browser Compatibility Check process. More than a forum, a wiki page, or a
discussion group, CSS Advisor makes it easy for you to comment with suggestions
and improvements to existing content, or to add new issues for the benefit of
the entire community.
7.
Manage CSS - The
Manage CSS feature makes it easier for you to move CSS rules from document to
document, from the head of a document to an external sheet, between external
CSS files, and more. You can also convert inline CSS to CSS rules, and place
them where you need them just by dragging and dropping.
Wednesday, March 14, 2012
How do you manage multiple e-mail accounts in Microsoft Outlook?
1. Outlook can manage all your e-mail
account for you, becoming one central place to work with all your messages.
a. Sending Messages from Multiple Accounts.
When you are sending
messages, you are in control of which account Outlook uses. You can tell
Outlook to use a different account.
·
When
you create a new message, Outlook assumes you’ll want to use the default
account to send it unless you specific a different account.
·
If
you are replying to a message, Outlook uses the account that the message came
in on. If you receive a message sent to your account, and you click Reply or Reply to all, Outlook would assume you want to send the reply using
that account.
·
When
you forward a message, Outlook will assume you want to do so using the same
account as the original message.
·
You
tell Outlook which e-mail account to use when you have the message window open.
When you have multiple accounts set up, you will see an Account Button below the Send Button. Click the account button, and Outlook will
display a menu containing all your e-mail accounts. Select one, and Outlook uses
that one to send your message.
b. Changing the Default Account.
·
You
may sometimes decide that you want Outlook to use a different e-mail account as
your default. If you want to change the default, follow these steps:
I.
Go
to the main Outlook menu and click Tools>Account
Settings to open the Account Setting dialog box.
II.
On
the e-mail tabbed page of the Account Setting dialog box, find the box listing
all your e-mail accounts. Click the account you want to make your new default
account.
III.
In
the space above the account list, find and Click Set as Default. Outlook dims this option until you select a new
account to use as default.
IV.
The
list rearranges itself so the new default option appears at the top of the
list.
V.
Click
Close.
·
Another
step to change default account:
I.
Go
to control Panel.
II.
Click
on User Accounts and Family Safety.
III.
Click
on mail.
IV.
Click
on E-mail accounts.
V.
Click
the account you want to make your new default account.
How do you save the Contact from an email message you receive?
To save an e-mail address, name, or other contact information from an
e-mail message that you receive, you add it to your Microsoft Outlook contacts.
After this information is added to Contacts, it is automatically included in
your Outlook Address Book.
In a message that you receive, right-click the name of the sender, and
then click Add to Outlook Contacts.
A contact form opens, with the
sender’s name and e-mail address already filled in.
Click Save and close.
After it is added to your main Outlook Contacts folder, which is the
default contact folder displayed in the Outlook Address Book, the contact can
be copied to any other Contact folders you have created. New contact folders
are automatically added to the Address Book, and the new information is also
available to you there.
Briefly explain Information viewer, Drafts, Search box, Navigation pane?
1. Information Viewer.
The Information viewer is where most of the action happens in Outlook.
When you are reading email, you look in the Information Viewer to read your
message; if you are adding or searching for contacts, you see contact names
here. The Information Viewer is also where you can do all sorts of fancy
sorting tricks that each module in Outlook lets you perform. Also you can
browse calendar data in the Information Viewer.
2. Drafts.
Draft will save the message until you finish composing. You don’t have to
send every message right way, just save it in Draft and finish it later on.
Draft folder is used for keeping work in progress. If you are sending an
e-mail to someone and you don’t have all the information available to finish
the e-mail off then you can save it to Drafts. By saving an e-mail to Draft you
can come back to it later at your convenience.
3. Search box.
Outlook 2007 offers a new search tool, called instant search. Near the
top of the Information Viewer pane, in the centre of the screen, you see the
instant search box. This box has a little magnifying glass on the right and
some text on the left. Click the box and type the 1st few letters of
a word that you want to find. Almost immediately, the Information Viewer screen
goes blank, and then shows only the items containing the text you entered. When
outlook displays the items it found, the magnifying glass is replaced byû. Clear the search result by clicking theû.
4.
Navigation Pane.
The Navigation Pane, located next to the main window, is made up of 2
areas.
· An
expandable folder list that provides access to your personal Microsoft Office
Outlook Web Access folders and any folders you create. The folders are
displayed in a hierarchy that you can expand to view the folder contents or
collapse to view only the top-level folder. The plus sign icon next to a folder
indicates that the folder contains sub folders. To view the sub folders, click
the plus sign.
·
A
set of buttons that provide one click access to your inbox, calendar, contact,
and Task folders and to your organization’s public folders. An options button
allows you to set user option, such as calendar or task reminder. A horizontal
splitter bar located between the folder list and the buttons allow you to
collapse the button into a button tray. When you click any folder or button in
the Navigation Pane, it contents are displayed in the outlook Web Access main
window.
How do you add a new e-mail account in Outlook?
1. Start Outlook.
2. On the Tools menu, click Account
Settings.
3. On the e-mail tab, click New.
4. In the Add New E-mail Account dialog box, click Microsoft Exchange, POP3, IMAP, or HTTP and then click Next.
5. Configure the new e-mail account. We
can configure the new e-mail account automatically or manually.
I.
To
configure the new e-mail account automatically, follow these steps under Auto Account Setup in the Add New E-mail Account dialog box.
a) In the Your Name box, type your full name.
b) In the E-mail Address box, type your e-mail address.
c) In the Password box, type the password that your ISP provided.
d) In the Retype Password box, retype the password, and then click Next to begin the Auto Account Setup
process. Outlook 2007 will try to
automatically configure your account settings and server settings. If your
account is successfully configured, the Add
New E-mail account dialog box indicates that the account was created
successfully. This dialog box also indicates the type of e-mail server to which
you successfully connected.
e) Click Finish, and then close to
complete the account setup.
II.
To
configure the new e-mail account manually, follow these steps in the Add New
E-mail Account dialog box.
a) Click to select the Manually Configure Server Settings
check box, and then click Next.
b) Click Internet E-mail and then click Next.
c) Under User Information, follow these steps:
1. In the Your Name box, type your full name.
2. In the E-mail address box, type your full e-mail address.
d) Under Server Information, click the type of e-mail account that you have
in Account type box.
v If you clicked POP3 or IMAP in the account type box, follow these steps:
1.
In
the Incoming mail server box, type
the name of the server. This is the server that holds your messages before you
download them to the computer.
2.
In
the outgoing mail server (SMTP) box,
type the name of the outgoing e-mail server.
v If you clicked HTTP in the Account Type
box, follow these steps:
1.
In
the HTTP Service Provider box, click
the appropriate service provider for this account. For example, click one of
the following:
Ø Hot mail
Ø MSN
Ø Other
2.
If
you clicked other in the HTTP Service Provider box, type the URL
to the mailbox in the Server URL box.
e)
Under
logon information, follow these steps:
1.
In
the User Name box, type your user
name.
2.
In
the Password box, type the password
that your ISP provided.
3.
If
you want outlook to remember your e-mail account password, click to select the Remember Password checkbox.
f)
If
your ISP require it, click to select the Require
logon using secure Password Authentication check box to logon by using
secure password authentication.
g)
Click
Test Account settings. This feature
calls a dialog box that displays, in a step-by-step manner, each phase of the
testing of the configuration that you entered. When you click Test Account Settings, the following
process occurs:
Ø The connectivity of the system to the
Internet is confirmed.
Ø You are logged on to the SMTP Server.
Ø You are logged on to the POP3 Server.
Ø It is determined whether the POP3
Server must be logged on to first. If it is required, outlook automatically
sets the log on to incoming mail server
before sending mail option.
Ø A test message is sent. This message
explains any changes that outlook made to the initial setup.
h)
If
you want to modify your e-mail account any more, click More Settings to open the Internet
E-mail Settings dialog box.
i) Click Next,
and then click Finish.
How do you create a setup application to distribute your application
Before we can distribute our application, we must
build an application file with an .app extension, an executable file with an
.exe extension, or a COM component (automation server) with a .dell extension.
Prior to building our application, make sure that our project includes
the necessary files for our application, as well as any resource files, such as
graphics files or templates. For more information about the types of files we
can include in our application, see "Including Resources in
Applications" in the Visual FoxPro online Help.
The development environment of Visual FoxPro contains many features and
files that are licensed for our use only. If our application contains any of
these features or files, we must remove them from our application before
creating our Setup program. For a list of redistributable files, see
Redist.txt, located in our Visual FoxPro directory (C:\Program Files\Microsoft
Visual FoxPro 7) and "Removing Restricted Visual FoxPro Features and
Files" in the Visual FoxPro online Help.
When we choose the type of build we want to create, consider the size of
our final application file and whether users have Visual FoxPro installed on
their computers.
- Application (.app) file this file requires that the user have a copy of
Visual FoxPro installed. An .app file typically is smaller than an .exe
file.
- Executable
(.exe) file this file includes the
Visual FoxPro loader, so users are not required to have Visual FoxPro
installed.
- COM Server (.dull)
files Used to create a file that
can be called by other applications.
Three options that deployment wizard offers
- The Package option helps we package a project's files into a .cab
file that can then be deployed, and in some cases creates a setup program
that installs the .cab files. The wizard determines the files we need to
package and leads us through all the choices that must be made in order to
create one or more .cab files for our project.
- The Deploy option helps we deliver our packaged applications to the appropriate distribution media, such as floppies, a network share, or a Web site.
- The Manage Scripts option lets we view and manipulate the scripts we have saved from previous packaging and deployment sessions in the wizard. Each time we use the wizard, we save a script that contains all the choices we made. We can reuse these scripts in later sessions if we want to use similar settings and make the same choices as we did previously.
Exe Files
An exe file is a file that ends with the extension
".exe" otherwise known as an executable
file. When one clicks on an exe file, a built-in routine automatically
executes code that can set several functions into motion. Exe files are used to
install and run programs and routines.
An exe file is just one of several types that are recognized by various
operating systems. Text files, which are files that do not generate code but
simply display text, end in txt. Microsoft Word saves files with the doc
extension, short for document. Another common file type is the
compressed or zipped file, which uses the zip extension.
The exe file is one of the most useful types of files precisely because
it runs programs; however, this also makes it potentially harmful. It can be
used as a delivery system for viruses or other malicious routines. Outwardly,
the infected exe file might seem quite benign. Clicking on it might appear to
launch nothing more than an animated cartoon or simple arcade game. However,
unseen code can be running in the background, infecting or compromising the
computer.
Subscribe to:
Posts (Atom)