Professional Documents
Culture Documents
INTRODUCTION TO
COMPUTER CONCEPT
Table of Contents
Syllabus..5-8
PRELIM PERIOD
1. Introduction to Computer Concepts.9
A. Data Processing .9
1.) Data Processing Function9-10
a. Types and Elements.10-11
b. Data vs. Information11
2.) Data Processing System (Cycle) ..12-15
B. Computer System16
1.) Introduction to Computer16-20
2.) Historical Developments..20
3.) Characteristics, capabilities and Limitations..
4.) Classification of Computers.
5.) Basic Elements of a Computer System
a. Hardware.
b. Software
c. Peopleware.
2. Data Recording Media..
a. The Punched Card..
b. Paper Tape, Magnetic Tape & Cassette Tape..
c. Diskettes..
d. Hard Disk or Fixed Disk..
e. CD/ DVD
f. Flash Memory Cards
g. Smart Cards
3. Programming Languages
a. Categories of Programming Languages..
b. Features of Programming languages
4. Algorithm and Flowcharts
a. Advantages and Limitations of Flowcharting
b. Types of Flowcharts
c. Flowcharting Templates and Symbol.
MIDTERM PERIOD
1. Number
System
A. Data representation in Computers
B. Binary System
1.) Binary Addition, Subtraction, Multiplication, Division
2.) Decimal-Binary Conversion..
3.) Binary-Decimal Conversion..
C. Conversion of Fractions.
1.) Decimal to Binary
2.) Non-terminating Conversion of Fractions. .
3.) Converting decimal Numbers with Integral and Fractional Parts into Binary
Equivalent.
4.) Converting Binary Numbers with Integral and Fractional Parts into Decimal
Equivalent
D. Octal
System
1.) Decimal Octal Conversion.
2.) Octal-Decimal Conversion
3.) Octal Fractions
4.) Octal Binary Conversion.
5.) Binary Octal Conversion.
E. Hexadecimal System
1.) Decimal Hexadecimal Conversion.
2.) Hexadecimal Decimal Conversion
3.) Hexadecimal Binary Conversion..
4.) Binary Hexadecimal Conversion
FINAL PERIOD
1. Introduction to Windows Operating System.
A. Introduction
1.) Overview of OS
2.) DOS Commands & Utilities.
B. Windows Operating System
1.) To start and close Windows..
2.) Desktop..
3.) Icons
4.) Program Manager
5.) Control Panel..
6.) Windows Explorer..
7.) Basic mouse skill
8.) Parts of Windows screen
9.) Copying, Editing & Printing Files
10.) File Management
Index
4
COURSE CODE
: IT 111
COURSE TITLE
: INTRODUCTION TO COMPUTER CONCEPT
COURSE CREDIT : 3 UNITS
Prerequisite
:
COURSE DESCRIPTION:
At the end of the course, the student will have adequate knowledge necessary to
the understanding and appreciation of computers as data processing tools and of the
fundamental concepts of electronic data processing.
MIDTERM PERIOD
1. Number System
A. Data representation in Computers
B. Binary System
1.) Binary Addition, Subtraction, Multiplication, Division
2.) Decimal-Binary Conversion
3.) Binary-Decimal Conversion
C. Conversion of Fractions
1.) Decimal to Binary
2.) Non-terminating Conversion of Fractions.
3.) Converting decimal Numbers with Integral and Fractional
Parts into Binary Equivalent.
4.) Converting Binary Numbers with Integral and Fractional Parts
into Decimal Equivalent
D. Octal System
1.) Decimal Octal Conversion.
2.) Octal-Decimal Conversion
3.) Octal Fractions
4.) Octal Binary Conversion
5.) Binary Octal Conversion
E. Hexadecimal System
1.) Decimal Hexadecimal Conversion
2.) Hexadecimal Decimal Conversion
3.) Hexadecimal Binary Conversion
4.) Binary Hexadecimal Conversion
FINAL PERIOD
6
Class Standing:
Major Exams:
I.
GRADING SYSTEM:
CSP Class Standing in the Prelim Period
CSM Class Standing in the Midterm Period
CSF Class Standing in the Final Period
PRELIM PERIOD
8
Data Processing
What is Data processing?
Data processing is, broadly, "the collection and manipulation of items
of data to produce meaningful information. In this sense it can be
considered a subset of information processing, "the change (processing)
of information in any manner detectable by an observer."
The term is often used more specifically in the context of a business or
other organization to refer to the class of commercial data processing
applications.
What are the functions of Data processing?
Data Processing Function
Data processing may involve various processes, including:
Validation Ensuring that supplied data is "clean, correct and useful."
Sorting "arranging items in some sequence and/or in different sets."
Summarization reducing detail data to its main points.
Aggregation combining multiple pieces of data.
Analysis the "collection, organization, analysis, interpretation and
presentation of data.".
Reporting list detail or summary data or computed information.
Classifying separates data into various categories
What are the Types of Data Processing?
Data processing goes through a cycle of input, processing and output.
This is done by using specific actions or patterns to attain the needed
outputs. The types of data processing correspond to the specific actions
as discussed below.
9
Recording
This is a type of data processing that pertains to transmitting facts into
various structures or documents. It is also the processing of facts from
intermediary records and data from computations.
Verifying
This pertains to the cautious examination of the documented information
for any inaccuracies.
Duplicating
This data processing pertains to the replication of records into numerous
copies or files.
Sorting
This data processing pertains to assembling or regrouping data in a
preset order, such as an alphabetic or numeric arrangement.
Summarizing and Reporting
This type of data processing wraps up a compilation of facts and
provides conclusions that correspond to the significance of the data
presented.
What are the Elements of Data Processing?
A system, including computer system and associated personnel, that
performs input, processing, storage, output and control functions to
accomplish a sequence on data.
10
Data summarization
Data aggregation
Data validation
Data tabulation
Statistical analysis
Information
Data
Information
12
13
14
COMPUTER SYSTEM
What is Computer System?
The complete computer made up of the CPU, memory and related
electronics (main cabinet), all the peripheral devices connected to it and
its operating system. Computer systems fall into two categories: clients
and servers.
Clients are the user's laptop, desktop and tablet computers and smart
phones, while servers share their data and applications with multiple
15
Introduction to Computer
What are computers?
Computers are machines that perform tasks or calculations according to
a set of instructions, or programs. The first fully electronic computers,
introduced in the 1940s, were huge machines that required teams of
people to operate. Compared to those early machines, today's computers
are amazing. Not only are they thousands of times faster, they can fit on
your desk, in your lap, or even in your pocket.
Computers work through an interaction of hardware and software.
Hardware refers to the parts of a computer that you can see and touch,
including the case and everything inside it. The most important piece of
hardware is a tiny rectangular chip inside your computer called the
central processing unit (CPU), or microprocessor. It's the "brain" of your
computerthe part that translates instructions and performs
calculations. Hardware items such as your monitor, keyboard, mouse,
printer, and other items are often called hardware devices, or devices.
Software refers to the instructions, or programs, that tell the hardware
what to do. A word processing program that you can use to write letters
on your computer is a type of software. The operating system (OS) is
software that manages your computer and the devices connected to it.
Two well-known operating systems are Windows and Macintosh
operating system. Your computer uses the Windows operating system.
16
widely used up until the First World War. Although later inventors
refined Colmar's calculator, together with fellow inventors Pascal and
Leibniz, he helped define the age of mechanical computation.
The real beginnings of computers as we know them today, however, lay
with an English mathematics professor, Charles Babbage (1791-1871).
Frustrated at the many errors he found while examining calculations for
the Royal Astronomical Society, Babbage declared, "I wish to God these
calculations had been performed by steam!" With those words, the
automation of computers had begun. By 1812, Babbage noticed a natural
harmony between machines and mathematics: machines were best at
performing tasks repeatedly without mistake; while mathematics,
particularly the production of mathematic tables, often required the
simple repetition of steps. The problem centered on applying the ability
of machines to the needs of mathematics. Babbage's first attempt at
solving this problem was in 1822 when he proposed a machine to
perform differential equations, called a Difference Engine. Powered by
steam and large as a locomotive, the machine would have a stored
program and could perform calculations and print the results
automatically. After working on the Difference Engine for 10 years,
Babbage was suddenly inspired to begin work on the first generalpurpose computer, which he called the Analytical Engine. Babbage's
assistant, Augusta Ada King, Countess of Lovelace (1815-1842) and
daughter of English poet Lord Byron, was instrumental in the machine's
design. One of the few people who understood the Engine's design as
well as Babbage, she helped revise plans, secure funding from the
British government, and communicate the specifics of the Analytical
Engine to the public. Also, Lady Lovelace's fine understanding of the
machine allowed her to create the instruction routines to be fed into the
computer, making her the first female computer programmer. In the
1980's, the U.S. Defense Department named a programming language
ADA in her honor.
Babbage's steam-powered Engine, although ultimately never
constructed, may seem primitive by today's standards. However, it
outlined the basic elements of a modern general purpose computer and
18
20
22
23
28
You try to bring your old work when you want to make another
copy of it, or when you want to change something in it. A computer
makes all these possible.
5. It is automatics.
You dont have to wait long for a computer to do a certain job. Most of
the time, you just have to click a button and the computers processor
will do the rest of the work.
6. The computer can do two things at the same time.
You may open two or more programs at the same time. You may work
with the first one while you minimize or hide the other program.
7. The computer can be improved and upgraded.
The computer is unlike other machines or appliances that your
parents discard or throw away when they do not function properly
anymore. Today, it is very easy to replace damaged and obsolete
computer parts. You just have to go to the nearby computer store or ask
a service technician to do installation and repair work for your computer.
However, the computer is not a super machine. Thus, it has its own
limitations, like the following:
1. The computer can only do what you tell it to do.
Do not expect the computer to give you something which you
never tell it to do. It will only give you what you ask it.
2. It cannot generate information on its own.
30
Your computer depends on you. It will not run unless you operate
it. In the same way, it cannot give you information you need if you do
not feed it with the necessary data.
3. The computer will give you wrong information if you feed it with
wrong data.
The computer cannot distinguish between correct data and wrong
data. Thus, if you feed your
Computer with wrong data, it will result with the computer giving
wrong information.
4. The computer cannot correct wrong instruction.
If you give the computer wrong instruction, it will not able to do
anything to correct it. It will only stop functioning. Then, the computer
will depend on you to correct your mistake.
What are the Classifications of Computers?
Computers are available in different shapes, sizes and weights, due to
these different shapes and sizes they perform different sorts of jobs from
one another.
They can also be classified in different ways. All the computers are
designed by the qualified computer architectures that design these
machines as their requirements.
A computer that is used in a home differs in size and shape from the
computer being used in a hospital. Computers act as a server in large
buildings, while the computer also differs in size and shape performing
its job as a weather forecaster.
31
Super computer
The biggest in size, the most expensive in price than any other is
classified and known as super computer. It can process trillions of
instructions in seconds. This computer is not used as a PC in a home
neither by a student in a college.
Governments specially use this type of computer for their different
calculations and heavy jobs. Different industries also use this huge
computer for designing their products.
In most of the Hollywood's movies it is used for animation purposes.
This kind of computer is also helpful for forecasting weather reports
worldwide.
Mainframes
Another giant in computers after the super computer is Mainframe,
which can also process millions of instruction per second and capable of
accessing billions of data.
This computer is commonly used in big hospitals, air line reservations
companies, and many other huge companies prefer mainframe because
of its capability of retrieving data on a huge basis.
This is normally too expensive and out of reach from a salary-based
person who wants a computer for his home.
32
Minicomputer
This computer is next in he line but less offers less than mainframe in
work and performance. These are the computers, which are mostly
preferred by the small type of business personals, colleges, etc.
Personal computers
Almost all the computer users are familiar with the personal computers.
They normally know what the personal computer is and what its
functions are.
This is the computer mostly preferred by the home users. These
computers are lesser in cost than the computers given above and also,
small in size; they are also called PCs in short for Personal computers.
This computer is small in size and you can easily arrange it to fit in your
single bedroom with its all accommodation. Today this is thought to be
the most popular computer in all.
Notebook computers
Having a small size and low weight the notebook is easy to carry to
anywhere. A student can take it with him/her to his/her school in his/her
bag with his/her book.
This is easy to carry around and preferred by students and business
people to meet their assignments and other necessary tasks.
The approach of this computer is also the same as the Personal
computer. It can store the same amount of data and having a memory of
the same size as that of a personal computer. One can say that it is the
replacement of personal desktop computer.
33
According to Technology
According to Purpose
According to size
Supercomputers
Mainframe Computers
Minicomputers
Workstations
Microcomputers, or Personal Computers
34
Lap Top
Palm Top
PDA
According to Technology
Analog Computers
Digital Computers
Hydride Computers
RAM
37
What is Hardware?
38
39
Examples of Software:
Microsoft Word
AOL Instant Messenger
Internet Explorer
Mozilla Firefox
Adobe Photoshop
Windows XP
AutoCAD
Microsoft Excel
Pidgin
HyperCam
40
41
Simulation Software: They are used for the simulation of physical and
abstract systems. Computer simulators that are used for simulating
scientific concepts and social ideas, battlefield, vehicle and flight
simulators are some of the popular examples of simulation software.
Programming Languages: They are artificial languages that are used to
write programs that control the functioning of a computer system. They
are the building blocks of computer applications. Go through the
complete list of the different programming languages.
System Software: It is computer software that manages and controls
hardware in order to enable application software to perform its tasks.
System software performs functions like transferring data from memory
to the disk or delivering text onto a display device. Following are the
different kinds of system software.
Device Drivers
Linkers
Loading Programs
Operating Systems
Application Launchers
Archive Utilities
Compression Utilities
Disk Defragmenters
Editor Utilities
Encryption Utilities
Network Managers
Registry Cleaners
System Profilers
System Utilities
Virus Scanners
Screensavers
45
pixels. Screensavers blank the screen or fill it with images, when the
display is not in use.
Content - control software: It refers to the software designed for
controlling content that is permitted for the user to access. It can
determine what content will be available on a particular machine or
network. Content-control software are commonly used at homes and in
schools to restrict the content that can be accessed over the Internet by
children.
Data Recovery Software: Apart from the facility of copying data files,
data recovery software supports user needs of backing up important
computer data. It allows the user to specify what is to be backed up and
when.
Open Source Software: The concept of open source software refers to
computer software, whose source code is available to the users (is in the
public domain). Users are allowed to use, modify, improve and
redistribute open source software. Linux is a well-known example of
open source software.
Proprietary Software: Contrary to open source software, proprietary
software involves restrictions on its use. The creators of proprietary
software restrict source code access through legal means or through
technical measures.
Portable Software: It is an important class of software, which includes
software that is suitable for portable devices. Portable software is used
on portable drives like USB and Palm PDA.
Project Management Software: It refers to the software used for
scheduling, budget management and resource allocation. It comprises
collaboration software and documentation systems.
46
47
48
Audio recording
Compact Cassette
49
Video recording
Videotape
The practice of recording and editing audio using magnetic tape rapidly
established itself as an obvious improvement over previous methods.
Many saw the potential of making the same improvements in recording
television. Television ("video") signals are similar to audio signals. A
major difference is that video signals use more bandwidth than audio
50
51
data storage methods with much greater capacity, such as USB flash
drives, portable external hard disk drives, optical discs, memory cards,
and computer networks.
A hard disk drive (HDD; also hard drive, hard disk, or disk drive) is a
device for storing and retrieving digital information, primarily computer
data. It consists of one or more rigid (hence "hard") rapidly rotating
discs (platters) coated with magnetic material, and with magnetic heads
arranged to write data to the surfaces and read it from them.
Hard drives are classified as non-volatile, random access, digital,
magnetic, data storage devices. Introduced by IBM in 1956, hard disk
drives have decreased in cost and physical size over the years while
dramatically increasing in capacity and speed.
Hard disk drives have been the dominant device for secondary storage of
data in general purpose computers since the early 1960s.[3] They have
maintained this position because advances in their recording capacity,
cost, reliability, and speed have kept pace with the requirements for
secondary storage.
CD/DVD is an optical disc storage format, invented and developed by
Philips, Sony, Toshiba, and Panasonic in 1995. DVDs offer higher
storage capacity than Compact Discs while having the same dimensions.
Pre-recorded DVDs are mass-produced using molding machines that
physically stamp data onto the DVD. Such discs are known as DVDROM, because data can only be read and not written nor erased. Blank
recordable DVD discs (DVD-R and DVD+R) can be recorded once
using a DVD recorder and then function as a DVD-ROM. Rewritable
DVDs (DVD-RW, DVD+RW, and DVD-RAM) can be recorded and
erased multiple times.
DVDs are used in DVD-Video consumr digital video format and in
DVD-Audio consumer digital audio format, as well as for authoring
53
54
Programming Language
What are the Programming Languages?
Programming Language Categories
There are literally thousands of programming languages in the world and
each has its own strengths and weakness. Many are simply for teaching
or language research. These languages do not interest or concern me.
They are frequently limited and almost useless. There is a certain set of
programming fields/categories that I believe are currently distinct
enough to have an independent programming language to represent
them. Each is however, narrow enough that there is no need for more
than one language.
Language Role
Best Candidate
Scripting
Programmer's scripting
Application Development
Low-level
Pure Functional
Complete Core
55
Scripting
The most basic need of for scripting languages is one which is simple to
use because it will be used by those with a minimum of programming
knowledge or in situations where cranking out code which does the job
is all the matters. An example of where this language might be used by
people with more of a programming background is in web scripting.
Examples of languages that might fall into this category are PHP,
JavaScript, Perl, and Python. VB could also be considered in this family
but it is too frequently used for application development today.
There is currently no outstanding candidate language for this category.
When one is chosen I believe it should bare resemblance to the
Application development language but with more bells and whistles to
let one crank things out and make it easier.
Programmer's scripting
Real programmers also often have a need for scripting capabilities.
However, they need a language which is simple and complete. It must
never stand in their way as is all too often the case with standard
scripting languages. It must be able to easily integrate into other
languages.
Better Scheme is an excellent language for use in Programmer's
Scripting. It is simple, complete, powerful and concise. In addition many
programmers are exposed to Scheme or Lisp during their education and
so are already familiar with it. One thing which will most likely be
needed is a good extension to Better Scheme which provides solid
support for object oriented programming because Better Scheme scripts
will frequently need to interact with objects created in other languages.
Application Development
To develop applications a language is needed which is complete and
powerful but very safe. The complexity of large application mandates a
56
compile time safe language. It should also be fairly high level and object
oriented. The only languages which I believe comes close to this today
are Eiffel and Java.
There is currently no outstanding candidate language for this category.
Low-level
For the purpose of operating systems and other low level code we need a
language that operates fast and just above the machine level. Of course
there will always be occasion to slip into assembly but that is by its
nature machine specific and so not considered here.
Both C and C++ can be used for this. They provide the low level power
needed while giving a reasonable level of safety and abstraction.
Pure Functional
Certain tasks can best be done working in a purely function
environment. And these languages while not as widely used today are in
many ways so distinct from others that it is important to keep their
legacy alive in the hopes that they may positively influence more
common languages. The only real example of this today is Haskell since
languages like ML are not purely functional.
There is currently no outstanding candidate language for this category.
Complete Core
This language may never be used for real programming but I still think it
would be important to have in mind. It would be a core language which
the application, scripting and pure functional languages could build on
and modify. It would have everything truly necessary and little more.
One might think that the lambda calculus would be a minimal example
of this. However, it makes no provision for mutability which is clearly a
key concept to many languages. In addition the lambda calculus has no
concept of types, another important feature of modern languages. There
are no examples of a complete core language today.
57
59
o Simple Sequential
o Selection/Branching structures
o Repetition/Looping structures
o Combination of structures
Basic Symbols
Of the many Symbols available, these 6 Basic Symbols will be used
most:
Start/Stop
Input/output
61
Process, Instruction
2 Additional Symbols
Related to more advanced programming
Examples of Flowchart
Sequential structure
62
Selection/Branching Structure
Repetition/Looping Structure
63
Combination of Structures
64
Reference:
Infoculture The Smithsonian Book of Information Age Inventions, Steven Lubar. Houghton
Mifflin Company, 1993.
Alan Turing: The Enigma Andrew Hodges, 1983. Simon & Schuster, New York.
"The PC Week Stat Sheet: A Decade of Computing," PC Week. February 28, 1994.
"Playing Catch Up" Jim Carlton, Wall Street Journal October 17, 1994.
IBM's Early Computers, Charles J. Bashe, Lyle R. Johnson, John H. Palmer, Emerson Pugh.
65
French, Carl (1996). Data Processing and Information Technology (10th ed.). Thomson.
p. 2. ISBN 1844801004.
Truesdell, Leon E. (1965). The development of punch card tabulation in the Bureau of the
Census, 1890. United States Department of Commerce.
Bohme, Frederick; Wyatt, J. Paul; Curry, James P. (1991). 100 Years of Data Processing: The
Punchcard Century. United States Bureau of the Census.
http://www.fao.org/DOCREP/004/Y2790E/y2790e0c.htm#TopOfPage
MIDTERM PERIOD
Number System
When we type some letters or words, the computer translates them in numbers as
computers can understand only numbers. A computer can understand positional number
system where there are only a few symbols called digits and these symbols represent
different values depending on the position they occupy in the number.
A value of each digit in a number can be determined using
The digit
The position of the digit in the number
66
The base of the number system (where base is defined as the total number of
digits available in the number system).
1
Binary Number System
Base 2. Digits used : 0, 1
67
2
Octal Number System
Base 8. Digits used : 0 to 7
3
Hexa Decimal Number System
Base 16. Digits used : 0 to 9, Letters used : A- F
Example
Binary Number: 101012
Binary Number
Decimal Number
68
Step 1
101012
Step 2
101012
(16 + 0 + 4 + 0 + 1)10
Step 3
101012
2110
Example
Octal Number: 125708
Calculating Decimal Equivalent:
Step
Octal Number
Decimal Number
69
Step 1
125708
Step 2
125708
Step 3
125708
549610
Example
Hexadecimal Number: 19FDE16
Calculating Decimal Equivalent:
Step
Binary Number
Decimal Number
70
Step 1
19FDE16
Step 2
19FDE16
Step 3
19FDE16
Step 4
19FDE16
10646210
computers are a bit more sophisticated, and they are based on the binary number
system (base two) instead of the more familiar (for the moment, at least!) decimal
system. Computers use a variety of different codes. Some are used for numbers, others
for text, and still others for sound and graphics.
Binary Numbers
Normally we write numbers using digits 0 to 9. This is called base 10. However, any
positive integer (whole number) can be easily represented by a sequence of 0's and 1's.
Numbers in this form are said to be in base 2 and they are called binary numbers. Base
10 numbers use a positional system based on powers of 10 to indicate their value. The
number 123 is really 1 hundred + 2 tens + 3 ones. The value of each position is
determined by ever-higher powers of 10, read from left to right. Base 2 works the
same way, just with different powers. The number 101 in base 2 is really 1 four + 0
twos + 1 one (which equals 5 in base 10).
Text
Text can be represented easily by assigning a unique numeric value for each symbol
used in the text. For example, the widely used ASCII code (American Standard Code
for Information Interchange) defines 128 different symbols (all the characters found
on a standard keyboard, plus a few extra), and assigns to each a unique numeric code
between 0 and 127. In ASCII, an "A" is 65," B" is 66, "a" is 97, "b" is 98, and so forth.
72
When you save a file as "plain text", it is stored using ASCII. ASCII format uses 1
byte per character 1 byte gives only 256 (128 standard and 128 non-standard) possible
characters The code value for any character can be converted to base 2, so any written
message made up of ASCII characters can be converted to a string of 0's and 1's.
Graphics
Graphics that are displayed on a computer screen consist of pixels: the tiny "dots" of
color that collectively "paint" a graphic image on a computer screen. The pixels are
organized into many rows on the screen. In one common configuration, each row is
640 pixels long, and there are 480 such rows. Another configuration (and the one used
on the screens in the lab) is 800 pixels per row with 600 rows, which is referred to as a
"resolution of 800x600." Each pixel has two properties: its location on the screen and
its color.
A graphic image can be represented by a list of pixels. Imagine all the rows of pixels
on the screen laid out end to end in one long row. This gives the pixel list, and a
pixel's location in the list corresponds to its position on the screen. A pixel's color is
represented by a binary code, and consists of a certain number of bits. In a
monochrome (black and white) image, only 1 bit is needed per pixel: 0 for black, 1 for
white, for example. A 16 color image requires 4 bits per pixel. Modern display
hardware allows for 24 bits per pixel, which provides an astounding array of 16.7
million possible colors for each pixel!
Compression
Files today are so information-rich that they have become very large. This is
particularly true of graphics files. With so many pixels in the list, and so many bits per
pixel, a graphic file can easily take up over a megabyte of storage. Files containing
large software applications can require 50 megabytes or more! This causes two
problems: it becomes costly to store the files (requires many floppy disks or excessive
room on a hard drive), and it becomes costly to transmit these files over networks and
phone lines because the transmission takes a long time. In addition to studying how
various types of data are represented, you will have the opportunity today to look at a
technique known as data compression. The basic idea of compression is to make a file
shorter by removing redundancies (repeated patterns of bits) from it. This shortened
file must of course be de-compressed - have its redundancies put back in - in order to
be used. However, it can be stored or transmitted in its shorter compressed form,
saving both time and money.
73
Binary System
Binary System
Any number can be represented by any sequence of bits (binary digits), which in turn may be represented by
any mechanism capable of being in two mutually exclusive states. Any of the following rows of symbols can
be interpreted as the binary numeric value of 667:
1010011011
||||||
xoxooxxoxx
ynynnyynyy
Now that we know binary numbers, we will learn how to add them. Binary addition is much like
your normal everyday addition (decimal addition), except that it carries on a value of 2 instead of
a value of 10.
For example: in decimal addition, if you add 8 + 2 you get ten, which you write as 10; in the sum
this gives a digit 0 and a carry of 1. Something similar happens in binary addition when you add
1 and 1; the result is two (as always), but since two is written as 10 in binary, we get, after
summing 1 + 1 in binary, a digit 0 and a carry of 1.
Therefore in binary:
0+0=0
0+1=1
1+0=1
1 + 1 = 10 (which is 0 carry 1)
Example. Suppose we would like to add two binary numbers 10 and 11. We start from the last
digit. Adding 0 and 1, we get 1 (no carry). That means the last digit of the answer will be one.
Then we move one digit to the left: adding 1 and 1 we get 10. Hence, the answer is 101. Note
that binary 10 and 11 correspond to 2 and 3 respectively. And the binary sum 101 corresponds to
decimal 5: is the binary addition corresponds to our regular addition.
74
example:
1 + 11 = ?
Answer: 1 + 11 = 100.
Explanation:
1
1
If we take the first column from the right, we get the binary addition of 1 and 1, which is:
1 + 1 = 10 = 0 carry 1
The rightmost digit of our answer is therefore 0.
The second column from the right becomes: 0 + 1 + 1 (from the carry). In binary addition:
0 + 1 + 1 = 10 = 0 carry 1
Therefore, the second rightmost digit is a 0 and a 1 is carried to the next column. The next
column doesn't exist (there are no numbers), therefore the 1 drops into the next slot of the
answer. So our answer is: 1 0 0
Binary Subtraction
The four possibilities for subtraction are
00=0
11=0
10=1
0 1 = 1 and adjust columns to left in the number in the top row (as illustrated below).
Method: In the case of a column containing 0 1 put down 1 as the answer and in the top
row move to the left a column at a time changing every 0 to a 1 until a 1 is found, change
this 1 to a 0.
Example: Calculate 1001001 1111. (The column being subtracted is shown as shaded.)
Example:
1.)101101 100111 = 110:
0 10
1 0 1 1 10 1
1 0 0 1 1 1
1 1 0
75
1 1 1 1 0 1 0
1 0 0 1 1 1 0 0
3.) 1010110 101010 = 101100:
0
0
1 10 1 10 1 1 0
1 0 1 0 1 0
1 0 1 1 0 0
Binary Division
Follow the same rules as in decimal division. For the sake of simplicity, throw
away the remainder.
For Example: 111011/11
1.) 10011 r 10
_______
11)111011
-11
______
101
-11
______
101
11
______
10
76
Binary Multiplication
A tutorial on how to multiply binary numbers, along with
examples, exercises and answers is presented.
let us first add binary numbers with one digit
0x0=0
0x1=1
1x0=1
1x1=1
The above simple additions are similar to those of decimal.
We now multiply numbers with more than one digit: 1 0 1 1 x 1 0
01
1) The multiplication of binary numbers is similar to the multiplication of decimal numbers.
1
x
___ ___ ___ ___
_
_
_
_
__ __ __
___ ___ ___ ___
_ _ _
1
The multiplication of binary numbers is done by shifting by one bit and adding. It can be easily
checked that 1011 which is 11 in decimal multiplied by 1001 which is 9 in binary gives 99 which
is 1100011 in binary.
77
Decimal To Binary
Conversion
To convert a decimal
number to binary, first
subtract the largest
possible power of two,
and keep subtracting the
next largest possible
power form the
remainder, marking 1s
in each column where
this is possible and 0s
where it is not.
Decimal to Fraction
Example 1 - (Convert
Decimal 44 to Binary)
Example 2 - (Convert
Decimal 15 to Binary)
x = 0.5777777...
There is one repeating digit in this decimal, so multiply x by "1"
followed by one zero; that is, multiply by10:
78
Example 3 - (Convert
Decimal 62 to Binary)
10x = 5.777777...
Now subtract the former from the latter:
That is, 9x = 5.2 = 52/10 = 26/5. Solving this, we get x = 26/45. (You can verify this by plugging "26
into your calculator and seeing that you get "0.5777777..." for an answer.)
45"
If there had been, say, three repeating digits (such as in 0.4123123123...), then you would multiply thex by "1"
followed by three zeroes; that is, you would multiply by 1000. Then subtract and solve, as in the above example.
And don't worry if you have leading zeroes, as in "0.004444..."; the procedure will still work.
Decimal to Percent
Decimal-to-percent conversions are simple: just move the decimal point two places to the right.
(Remember, $0.50 is one-half, or 50%, of a dollar.) For example:
0.23 = 23%
2.34 = 234%
0.0097 = 0.97%
(Note that
0.97% is less than one percent. It should not be confused with 97%, which is 0.97 as a decimal.)
Fraction to Decimal
If you remember that fractions are division, then this is easy. The calculator can do the work for you, because you
can just have it do the division. For example:
The bar is placed over the repeating digits, for convenience sake.
79
When converting fractions to decimals, you may be told to round to a certain place or to a certain number of decimal
places. For instance, looking at that last example, 2/7 as a decimal rounded to the nearest tenth (rounded to one
decimal place) is 0.3; to the nearest hundredth (to two decimal places) is0.29; to the nearest thousandths (to three
decimal places) is 0.286; to the nearest ten-thousandths (to four decimal places) is 0.2857; et cetera. If you're not
sure how you should format your answer, then give the "exact" form and the rounded form:
Note that the rounded form can be useful for word problems, where a final answer in rounded form may be more
practical than a repeating decimal.
Ex1: Convert (0.625)10 decimal number to binary number (?)2 using successive multiplication method
1st Multiplication Iteration
Multiply 0.625 by 2
0.625 x 2 = 1.25(Product)
Fractional part=0.25
Carry=1
(MSB)
80
Carry = 0
Carry = 1 (LSB)
The fractional part in the 3rd iteration becomes zero and hence we stop the multiplication iteration.
Carry from the 1st multiplication iteration becomes MSB and carry from 3rd iteration becomes LSB.
Hence, the fractional binary number of the given fractional decimal number (0.625)10 is (0.101)2.
(24)10 = (30)8
(112)10 = (160)8
(2048)10 = (4000)8
81
Octal
10
11
10
12
11
13
12
14
13
15
14
16
15
17
16
20
The following utility will enable you to convert octal to decimal and vice versa
Octal is base 8.
Base 8 is where the only numbers you can use are zero thru to seven. ie: the decimal value for 1 is represented in
octal as 1 but the octal value of 8 (Decimal) is shown as 10 the value of 9 (Decimal) is 11 in octal.
82
Decimal
Octal
Decimal
Octal
Decimal
Octal
11
13
30
36
12
14
40
50
13
15
50
62
14
16
60
74
15
17
70
106
16
20
80
120
17
21
90
132
10
18
22
100
144
11
19
23
500
764
10
12
20
24
1000
1750
21. 2 1
MSD
LSD
= 2 x 81 + 1 x 80 . 2 x 8-1 + 1 x 8-2
= 2 x 8 + 1 x 1 . 2 x ( 1 / 8 ) + 1 x ( 1 / 64 )
83
= 16 + 1 . ( 0. 2 5 ) + ( 0 . 0 1 5 6 2 5 )
= 17 + 0. 265625
= 17 . 265625
Therefore ( 2 1 . 2 1 )8 = ( 1 7 . 2 6 5 6 2 5 )10
= 0 .357
MSD
LSD
= 0 x 1 . 3 x ( 1 / 8 ) + 5 x ( 1 / 64 ) + 7 x ( 1 / 512 )
= 0 . ( 0 . 466796875 )
= 0 . 466796875
= 10 0.01
MSD
LSD
= 1 x 82 + 0 x 81 + 0 x 80 . 0 x 8-1 + 1 x 8-2
84
= 1 x 64 + 0 x 8 + 0 x 1 . 0 x ( 1 / 8 ) + 1 x ( 1 / 64 )
= 64 + 0 + 0 . ( 0 ) + ( 0. 015625 )
= 64 . ( 0. 015625 )
= 64 . 015625
Therefore ( 1 0 0 . 0 1 )8 = ( 64 . 0 1 5 6 2 5 )10
Octal to Binary
Converting from octal to binary is as easy as converting from binary to octal. Simply look up
each octal digit to obtain the equivalent group of three binary digits.
Octal:
Binary
:
000
001
010
011
100
101
110
111
Octal =
Binary =
011
100
101
= 011100101 binary
Binary to Octal
An easy way to convert from binary to octal is to group binary digits into sets of three, starting
with the least significant (rightmost) digits.
Binary: 11100101 =
11 100 101
011 100 101 Pad the most significant digits with zeros if necessary
85
000
001
010
011
100
101
110
111
Octal:
Binary =
011
100
101
Octal =
= 345 oct
Decimal to Hexadecimal
Here is an example of using repeated division to convert 1792 decimal to hexadecimal:
Decimal Number
Operation
Quotient
Remainder
Hexadecimal Result
1792
16 =
112
112
16 =
00
16 =
700
done.
The only addition to the algorithm when converting from decimal to hexadecimal is that a table
must be used to obtain the hexadecimal digit if the remainder is greater than decimal 9.
Decimal:
Hexadecima
l:
Decimal:
10
11
12
13
14
15
Hexadecima
l:
Hexadecimal to Decimal
86
Decimal:
Hexadecima
l:
Decimal:
10
11
12
13
14
15
A2DE hexadecimal:
= ((A) * 163) + (2 * 162) + ((D) * 161) + ((E) * 160)
= (10 * 163) + (2 * 162) + (13 * 161) + (14 * 160)
= (10 * 4096) + (2 * 256) + (13 * 16) + (14 * 1)
= 40960 + 512 + 208 + 14
= 41694 decimal
Hexadecimal to Binary
Converting from hexadecimal to binary is as easy as converting from binary to hexadecimal.
Simply look up each hexadecimal digit to obtain the equivalent group of four binary digits.
Hexadecima
l:
Binary:
1111
Hexadecimal =
Binary =
Hexadecima
l:
Binary:
1010
0010
1101
1110
Binary to Hexadecimal
87
= 1010001011011110 binary
An equally easy way to convert from binary to hexadecimal is to group binary digits into sets of
four, starting with the least significant (rightmost) digits.
Binary: 11100101 = 1110 0101
Then, look up each group in a table:
Binary:
Hexadecima
l:
Binary:
1111
Hexadecima
l:
Binary =
Hexadecimal =
1110
0101
= E5 hex
Conversion of Fractions
Consider the decimal number 11.37510. We already know that the binary value of 11 is 10112.
Now we need to find the binary number for the fractional part 0.37510. The steps below show
how to convert this number to binary using repeated multiplication.
88
0.375*2 = 0.75
Answer:
0.0??
0.75*2 = 1.5
Answer:
0.01?
0.5*2 = 1.0
Answer:
0.011
We can also organize this conversion in table form as we did with the previous one.
1011.0
+ 0.011
1011.011
It is important to note that many decimal fractions do not have an exact representation in binary.
For example, when we convert the decimal fraction 0.110 to binary, our answer looks like this:
0.00011001100110011001100...
Notice how this binary fraction repeats infinitely. Since we cannot represent some fractions
exactly in binary, we cannot perform exact arithmetic with fractions. You may not realize it, but
89
your computer actually has very tiny amounts of error in its computations. You rarely see these
errors because the binary approximations are very close to the exact decimal value. However,
when programmers write programs which perform many mathematical computations, they must
consider this error to ensure their answers are reliable.
Octal
Octal is another number system with less symbols to use than our conventional number system.
Octal is fancy for Base Eight meaning eight symbols are used to represent all the quantities. They
are 0, 1, 2, 3, 4, 5, 6, and 7. When we count up one from the 7, we need a new placement to
represent what we call 8 since an 8 doesn't exist in Octal. So, after 7 is 10.
Octal
1
0
1
1
12
1
7
20
30
7
7
10
0
Deci
mal
10
1
5
16
24
6
3
64
Just like how we used powers of ten in decimal and powers of two in binary, to
determine the value of a number we will use powers of 8 since this is Base Eight.
Consider the number 3623 in base eight.
83
82
81
80
1536+384+16+3
1939
Each additional placement to the left has more value than it did in binary. The third
digit from the right in binary only represented 23-1, which is 4. In octal, that is 831
which is 64.
Hexadecimal
The hexadecimal system is Base Sixteen. As its base implies, this number system
uses sixteen symbols to represent numbers. Unlike binary and octal, hexadecimal
has six additional symbols that it uses beyond the conventional ones found in
90
decimal. But what comes after 9? 10 is not a single digit but two Fortunately, the
convention is that once additional symbols are needed beyond the normal ten,
letters are to be used. So, in hexadecimal, the total list of symbols to use is 0, 1, 2,
3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. In a digital display, the numbers B and D are
lowercase.
When counting in hexadecimal, you count 0, 1, 2, and so on. However, when you
reach 9, you go directly to A. Then, you count B, C, D, E, and F. But what is next?
We are out of symbols! When we run out of symbols, we create a new digit
placement and move on. So after F is 10. You count further until you reach 19.
After 19, the next number is 1A. This goes on forever.
Hexade
cimal
9 A
1
0
Decima
l
1
9
0
1
1
1
2
1
3
1
4
1
5
1
6
11
1
9
1
A
1
B
17
2
5
2
6
2
7
1C
9
F
A
0
28
1
5
9
1
6
0
Digits are explained as powers of 16. Consider the hexadecimal number 2DB7.
163
162
161
160
8192+3328+176+7
11703
As you can see, placements in hexadecimal are worth a whole lot more than in any
of the other three number systems.
Examples:
278 = 281+780 = 16+7 = 23
308 = 381+080 = 24
43078 = 483+382+081+780= 2247
Decimal Numeral System - Base-10
Decimal numbers uses digits from 0..9.
These are the regular numbers that we use.
Example:
253810 = 2103+5102+3101+8100
92
Reference:
http://www.rapidtables.com/math/number/Numeral_system.htm
tibasicdev.wikidot.com/binandhex
cs.furman.edu/digitaldomain/more/ch6/dec_frac_to_bin.htm
mathforum.org/library/drmath/view/56091.html
FINAL PERIOD
Introduction to Windows Operating System
OVERVIEW of OS
An operating system (OS) is software that manages computer hardware and software resources
and provides common services for computer. The operating system is an essential component of
the system software in a computer system. Application programs usually require an operating
system to function.
93
Time-sharing operating systems schedule tasks for efficient use of the system and may also
include accounting software for cost allocation of processor time, mass storage, printing, and
other resources.
For hardware functions such as input and output and memory allocation, the operating system
acts as an intermediary between programs and the computer hardware, although the application
code is usually executed directly by the hardware and will frequently make a system call to an
OS function or be interrupted by it. Operating systems can be found on almost any device that
contains a computerfrom cellular phones and video game consoles to supercomputers and web
servers.
Examples of popular modern operating systems include Android, BSD, iOS, Linux, OS
X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS. All these examples, except
Windows, Windows Phone and z/OS, share roots in UNIX.
94
The command interpreter for DOS (COMMAND.COM) runs when no application programs are
running. When an application exits, if the transient portion of the command interpreter in
memory was overwritten, DOS will reload it from disk. Some commands are internal built
into COMMAND.COM; others are external commands stored on disk. When the user types a
line of text at the operating system command prompt, COMMAND.COM will parse the line and
attempt to match a command name to a built-in command or to the name of an executable
program file or batch file on disk. If no match is found, an error message is printed, and the
command prompt is refreshed.
External commands were too large to keep in the command processor, or were less frequently
used. Such utility programs would be stored on disk and loaded just like regular application
programs but were distributed with the operating system. Copies of these utility command
programs had to be on an accessible disk, either on the current drive or on the command path set
in the command interpreter.
In the list below, commands that can accept more than one filename, or a filename including
wildcards (* and ?), are said to accept a (file specification) parameter. Commands that can
accept only a single filename are said to accept a filename parameter. Additionally, command line
switches, or other parameter strings, can be supplied on the command line. Spaces and symbols
such as a "/" or a "-" may be used to allow the command processor to parse the command line
into filenames, file specifications, and other options.
The command interpreter preserves the case of whatever parameters are passed to commands,
but the command names themselves and filenames are case-insensitive.
While many commands are the same across many DOS systems (MS-DOS, PC DOS, DRDOS, FreeDOS, etc.) some differ in command syntax or name.
95
DESKTOP
What is desktop?
A desktop computer is a personal computer in a form intended for regular use at a single
location desk/table due to its size and power requirements, as opposed to a laptop whose
rechargeable battery and compact dimensions allow it to be regularly carried and used in
different locations. The most common configuration is a computer monitor, keyboard and mouse,
and a case that houses the main components of the PC, namely the power supply, motherboard,
hard drive, optical drive, and previously the floppy drive. The form factor of the case is typically
an upright tower or (horizontal) desktop. All-in-one computers, that integrate the monitor and
96
main PC components in one unit, are often categorized under the desktop computer umbrella,
particularly if they require an external power source and separate keyboard/mouse. The desktop
category has also encompassed home computers and workstations.
ICONS
What is an Icon?
An icon is generally a flat panel painting depicting Jesus, Mary, Saints and Angels, which
is veneratedamong Eastern Orthodox, Oriental Orthodox, and in certain Eastern Catholic
Churches.
Icons may also be cast in metal, carved in stone, embroidered on cloth, painted on wood, done
in mosaic or fresco work, printed on paper or metal, etc. Icons are often illuminated with a
candle or jar of oil with a wick. (Beeswax for candles and olive oil for oil lamps are preferred
because they burn very cleanly, although other materials are sometimes used.) The illumination
of religious images with lamps or candles is an ancient practice pre-dating Christianity.
Although common in translated works from Greek or Russian, in English iconography does not
mean icon painting, and "iconographer" does not mean an artist of icons, which are painted or
carved, not "written", as they are in those languages.
Comparable images from Western Christianity are generally not described as "icons", although
"iconic" may be used to describe a static style of devotional image.
97
PROGRAM MANAGER
Program Manager is the shell of Windows 3.x and Windows NT 3.x operating systems. This
shell exposed a task-orientedgraphical user interface (GUI), consisting of icons (shortcuts for
programs) arranged into program groups. It replaced MS-DOS Executive, a file manager, as the
default Windows shell.
Program Manager descends from PMShell, the shell for OS/2 1.2, and shares the same
icons.Unlike PMShell, which presented its program groups in a simple list, Program Manager
opens program groups in child windows using the new multiple document interface in Windows
3. It is possible to run PMShell in Windows by using Presentation Manager for Windows; in that
case, PMShell will read the Program Manager groups via DDE.When executables were dropped
into Program Manager from File Manager, Program Manager automatically used the executable's
default icon embedded as data inside the .EXE file. Additionally, the Windows Setup program,
which populated Program Manager with the standard icons of a fresh install, could also be used
to add new icons in bulk after installation. Using SETUP /P from the command line, a standard
layout could be installed on many machines in an enterprise using a single SETUP.INF
configuration file.
Beginning with Windows 3.1, Program Manager contained a StartUp group. Programs and files
placed into that group would be loaded when Windows starts.
Holding down the shift key while mousing FILE then EXIT WINDOWS will save the current
configuration of Program Manager to PROGMAN.INI, including the position of all program
group icons, assuming that auto-arrange has been disabled. This allowed Microsoft testers to try
many different configurations, but the feature remained in the shipped version.
98
In later versions of Microsoft Windows, starting with Windows 95 and Windows NT 4.0,
Program Manager was replaced by Windows Explorer as the default shell. Specifically, theStart
Menu took over program organization and launching duties. However, Windows 95 still gave the
user the option to start Program Manager at boot.
For backward compatibility with old applications[citation needed], Program Manager was still included
in later versions of Windows, and could be accessed by executing PROGMAN.EXEfrom the
command line or Run dialog. If the user wished, it could be used as the default shell by
specifying the Shell value in the registry at eitherHKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon (per machine) or HKCU\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon (per user).
Today, Program Manager has little practical use beyond compatibility with pre-Windows 95
programs.[citation needed] Microsoft removed Program Manager from Windows XP Service Pack 2,
and the executable only serves to convert Program Manager shortcuts to Windows Explorer
shortcuts. In Windows Vista, PROGMAN.EXE has been removed entirely.
CONTROL PANEL
What is a Control Panel?
The Control Panel is a part of the Microsoft Windows graphical user interface which allows
users to view and manipulate basic system settings and controls via applets, such as
adding hardware, adding and removing software, controlling user accounts, and
changing accessibility options. Additional applets can be provided by third party software.
The Control Panel has been an inherent part of the Microsoft Windows operating system
since Windows 2.0, with many of the current applets being added in later versions. Beginning
with Windows 95, the Control Panel is implemented as a special folder, i.e. the folder does not
physically exist, but only contains shortcuts to various applets such as Add or Remove
Programs and Internet Options. Physically, these applets are stored as .cpl files. For example,
99
the Add or Remove Programs applet is stored under the name appwiz.cpl in
the SYSTEM32 folder.
In recent versions of Windows, the Control Panel has two views, Classic View and Category
View, and it is possible to switch between these through an option that appears on either the left
side or top of the window.
Many of the individual Control Panel applets can be accessed in other ways. For
instance, Display Properties can be accessed by right-clicking on an empty area of the desktop
and choosing Properties.
The classic view consists of shortcuts to the various control panel applets, usually without any
description (other than the name). The categories are seen if the user use "Details" view.
The category view consists of categories, which when clicked on display the control panel
applets related to the category. In Windows Vista, the category used applets below the name of
the category.
WINDOW EXPLORER
Windows 95 that year. Later versions were available as free downloads, or in service packs, and
included in the Original Equipment Manufacturer (OEM) service releases of Windows 95 and
later versions of Windows.
Internet Explorer is one of the most widely used web browsers, attaining a peak of about
95% usage share during 2002 and 2003. Its usage share has since declined with the launch
of Firefox (2004) and Google Chrome (2008), and with the growing popularity of operating
systems such as OS X, Linux and Android that do not run Internet Explorer. Estimates for
Internet Explorer's overall market share range from 27.4% to 54.13%, as of October
2012 (browser market share is notoriously difficult to calculate). Microsoft spent over US$100
million per year on Internet Explorer in the late 1990s, with over 1000 people working on it by
1999.
Since its first release, Microsoft has added features and technologies such as basic table display
(in version 1.5);XMLHttpRequest (in version 5), which aids creation of dynamic web pages;
and Internationalized Domain Names (in version 7), which allow Web sites to have nativelanguage addresses with non-Latin characters. The browser has also received scrutiny throughout
its development for use of third-party technology (such as the source code of Spyglass Mosaic,
used without royalty in early versions) and security and privacy vulnerabilities, and both the
United States and the European Unionhave alleged that integration of Internet Explorer with
Windows has been to the detriment of other browsers.
The latest stable release is Internet Explorer 11, with an interface allowing for use as both a
desktop application, and as aWindows 8 application.
Versions of Internet Explorer for other operating systems have also been produced, including
an Xbox 360 version called Internet Explorer for Xbox and an embedded OEM version called
Pocket Internet Explorer, later rebranded Internet Explorer Mobile, which is based on Internet
Explorer 9 and made for Windows Phone, Windows CE, and previously, based on Internet
Explorer 7 for Windows Mobile. It remains in development alongside the desktop
101
versions. Internet Explorer for Mac andInternet Explorer for UNIX (Solaris and HP-UX) have
been discontinued.
From January 12, 2016, only the most recent version of Internet Explorer on each operating
system will be supported, depending on operating system it will be IE 11 or could be down to IE
9 for older Windows versions.
On April 26, 2014, Microsoft issued a security advisory relating to a vulnerability that could
allow "remote code execution" in Internet Explorer versions 6 to 11.[10] The vulnerability was
resolved with a security update May 1, 2014.
Mouse skill was a game-based computer tutorial aimed at teaching new users how to operate a
computer mouse[1] at a time when many were unfamiliar with this feature of a computer.
Mouse Practice was created using Macro Mind Director and released in 1992 by Apple for
the Macintosh computer platform. It involved the user learning the key functions of the mouse by
controlling a scuba diver in an underwater environment.
Another program, Mouse Basics, served a similar purpose on earlier Macintosh computers, but
did not have the game-based approach of Mouse Practice.
102
A window screen, also known as insect screen or bug screen is designed to cover the opening
of a window. The mesh is usually made of metal wire, fiberglass, or other synthetic fiber and
stretched in a frame of wood or metal. It serves to keep leaves, debris, insects, birds, and other
animals from entering a building or a screened structure such as a porch, without blocking fresh
air-flow. Most houses in Australia, the United States andCanada and other parts of the world
have screens on the window to prevent entry of disease carrying insects like mosquitoes and
house flies. Formerly, screens were required to be replaced by glass storm windows in the winter,
especially in regions like the northern United States and Canada, but now combination storm and
screen windows are available, which allow glass and screen panels to slide up and down.
Desktop The opening screen of windows 98.
Icons a pictorial representation of a program or file.
Taskbar Is the bar that shows the tasks that are open and also contains the start button, the
lunch buttons, and the system tray.
Launch Buttons start certain window programs immediately
System Tray Contain programs that started the same time window 98 did.
Task buttons Show what programs are running
Window a program or group of icons that is open.
Title bar Displays the name of the window, or the document in the window
Menu bar Show one or two words commands that commands the computer what to do.
Tool bar icons that give shortcuts to different commands contained in the menu bar.
Work area the white area in the middle of the window.
Status bar Gray bar at the bottom that gives hints about what you are doing.
Mouse buttons- Left, right, and center - Left mouse button chooses things; Right mouse button
brings up a short cut menu, Center if present controls the scrolling bar.
Click - chooses things
Drag and drop It moves objects by clicking and holding left mouse button down and moving
mouse
Double click opens things.
103
FILE MANAGEMENT
A file manager or file browser is a computer program that provides a user interface to
manage files and folders. The most common operations performed on files or groups of files
include creating, opening (e.g. viewing, playing, editing or printing), renaming, moving or
copying, deleting and searching for files, as well as modifying file attributes, properties and file
permissions. Folders and files may be displayed in a hierarchical tree based on their directory
structure. Some file managers contain features inspired by web browsers, including forward and
back navigational buttons.
104
.Microsoft
Word Application
Introduction to MS Word
Microsoft Word is a word-processing program that can be used to create professionallooking documents such as reports, resume, letters, memos and newspapers. It includes many
powerful tools that can be used to enhance the appearance of documents and collaborate with
others. This handout provides an overview of Microsoft Word user interface and covers how to
perform basic task such as creating, saving, editing, formatting and printing documents, as well
as getting help.
105
b.
Creating
Documents
To create New Document:
1.) Click the FILE tab, and then click the New. The New page of the Backstage
view displays thumbnails of the available templates and templates categories.
2.) Under Available Templates, click Blank Document.
3.) Click the Create button. A new blank document opens in a new window.
NOTE: You can also press CTRL + N to create a new document.
c. Opening a New File
When you open a file in Microsoft Office, you have several options for how the file
opens. You can open the original file for editing, open a copy, or open the file as read-only, which
prevents you from saving the file unless you save it by using another name.
106
Open a file
When you open a file as a copy, the program creates a duplicate of the file, and you
look at the duplicate. Any changes that you make are saved to the copy. The program gives
the copy a new name. The default is to addCopy (1) of to the beginning of the file name.
1.) Click the Microsoft Office Button
107
Using Microsoft Windows XP, to create a shortcut to a folder on a network file server,
Web server, or removable media (such as flash drive, CD, or DVD), use My Network
Places on the My Places bar in the Opendialog box.
Using Windows Vista, to create a shortcut to a folder on a network file server, Web
server, or removable media removable media (such as flash drive, CD, or DVD),
use Navigation pane in the Open dialog box.
The Recently used files list on the File menu or the Recent Documents list available
when you click theMicrosoft Office Button
displays a list of the last few files that
you opened. Click the file name to open the file.
The My Recent Documents folder in the Open dialog box lists the previous files and
folders that you have opened.
d. Entering Text
Let us see how easy is to enter text in a word document. Hope you are aware that when
you start a word, it displays a new document by default as shown below:
108
Document area is the area where where you type your text. The flashing vertical bar is called the
insertion point and it represents the location where text will appear when you type.
So just keep your mouse cursor at the text insertion point and start typing whatever text you
would like to type. I typed only two word "Hello Word" as shown below. The text appears to the
left of the insertion point as you type:
109
There are following two important points which would help you while typing:
You do not need to press Enter to start a new line, as the insertion point reaches the end of
the line, Word automatically starts a new one. You would need to press enter if you want to have
a new paragraph.
When you want to add more than one space between words, use the Tab key instead of
the spacebar. This way you can properly align text when you use proportional fonts.
110
1.) On the Tools menu, click Options, and then click the Save tab.
2.) Select the Save AutoRecover info every check box.
3.) In the minutes box, enter the interval for how often you want to save files. The more
frequently your files are saved, the more information is recovered if there is a power
failure or similar problem while a file is open.
** Auto Recovery is not a replacement for regularly saving your files. If you choose not to save
the recovery file after opening it, the file is deleted and your unsaved changes are lost. If you
save the recovery file, it replaces the original file (unless you specify a new file name)
Speed up saving a file
1.) On the Tools menu, click Options, and then click the Save tab.
2.) To save only the changes to a file, select the Allow fast saves check box, and then
continue to save as you work on the file.
** To save a complete file, clear the Allow fast saves check box when you finish working on
the file, and then save it one last time. A full save occurs when this check box is cleared
111
2.) If you want to save the document in a different folder, locate and open the folder.
3.) In the File name box, type a name for the document.
4.) Click
Formatting Documents
a. Formatting Text changing fonts, fonts size and text color
To create and design effective documents, you need to know how to format text. In
addition to making your document more appealing, formatted text can draw the reader's
attention to specific parts of the document and help communicate your message.
In this lesson, you'll learn to format the font size, style, and color; highlight the text; and
use the Bold, Italic, Underline, and Change Case commands.
Formatting text
Formatted text can emphasize important information and help organize your document.
In Word, you have many options for adjusting the font of your text, including size, color, and
inserting special symbols. You can also adjust the alignment of the text to change how it is
displayed on the page.
To change the font size:
1.
2.
Click the drop-down arrow next to the Font Size box on the Home tab. A
drop-down menu appears.
3.
Select the desired font size from the menu. Alternatively, you can type the
value that you want and then press Enter on your keyboard.
112
You can also use the Grow Font and Shrink Font commands to change the size.
2.
Click the drop-down arrow next to the Font box on the Home tab.
The Font drop-down menu appears.
3.
Move the mouse pointer over the various fonts. A live preview of the font will
appear in the document.
113
4.
Select the font you wish to use. The font will change in the document.
2.
Click the Font Color drop-down arrow on the Home tab. The Font
Color menu appears.
3.
Move the mouse pointer over the various font colors. A live preview of the
color will appear in the document.
114
4.
Select the font color you wish to use. The font color will change in the
document.
Your color choices aren't limited to the drop-down menu that appears. Select More
Colors at the bottom of the list to access the Colors dialog box. Choose the color
that you want, then click OK.
To highlight text:
1.
From the Home tab, click the Text Highlight Color drop-down arrow.
The Highlight Color menu appears.
2.
3.
4.
To switch back to the normal cursor, click the Text Highlight Color command.
115
2.
Click the Bold (B), Italic (I), or Underline (U) command in the Font group on
the Home tab.
2.
Click the Change Case command in the Font group on the Home tab.
3.
116
2.
Select one of the four alignment options from the Paragraph group on
the Home tab.
o
Align Text Left: Aligns all selected text to the left margin.
Center: Aligns text an equal distance from the left and right margins.
Align Text Right: Aligns all selected text to the right margin.
Justify: Justified text is equal on both sides and lines up equally to the
right and left margins. Many newspapers and magazines use full
justification.
You can use Word's convenient Set as Default feature to save all of
the formatting changes you've made and automatically apply them to new
documents. To learn how to do this, read our article Changing Your Default Settings
in Word.
117
or Align Right
118
3. To paste data, position the cursor where you want the data to be pasted and choose
with the quick info textCustomizing of local layout Clipboard Paste (CTRL+V).
The text is pasted at the current cursor position. The transferred data remains on the
clipboard until you use Cut or Copy again to move or copy new texts on the clipboard.
You can paste data in fields of another SAP screen or external application.
119
Result
The clipboard now contains all the information from the fields you have selected,
including the field names and short descriptions. You can use this method to copy the content of
all selected input fields into a screen with the same layout. Because the field names are appended
to the previous input field, they will be truncated. Be aware that in this mode you copy only the
visible part of the fields; the non-visible part of scrollable input fields will also be truncated. This
feature can also be used for copying SAP information and pasting it into an external program,
such as Microsoft Word.
In the Clip Art task pane, in the Search for text box, type a word or phrase that describes
the clip art that you want, or type all or some of the file name of the clip art.
2
3
To limit the search results to a specific collection of clip art, in the Search in list,
select the check box next to each collection that you want to search.
For more information about collections, see About Clip Organizer collections.
To limit the search results to clip art, in the Results should be list, select the Clip
Art check box. You can also select the check boxes next to Photographs,
Movies, and Sounds to search those media types.
Click Go.
TIP To insert clip art into the notes pages of your Office PowerPoint 2007 presentation,
switch to Notes view, and then do the procedure above.
c.Handling Objects in a File
The following code read 3 obj and write them into a file. however im unable to retrieve objects
properly using the below code. data is duplicated and is not in order
plz help
old code :
#include<fstream.h>#include<conio.h>
class mail
{ public: char un[25];
// user name char pd[25];
// passsword
void reg(int);
} obj[5];
void mail::reg(int k){ int i; i=k;
clrscr(); cout<<"Enter user name ( enter unique name )\n"; cin>>un;
cout<<"Enter password\n"; cin>>pd;
ofstream filout; filout.open("email",ios::app||ios::binary); if(!filout) { cout<<"cannot open
file\n"; } else { cout<<"\n "<<i; filout.write((char *)&obj[i],sizeof(mail)); filout.close();
}
cout<<"You are now registered. \n"; getch();
}
// end of sign up or register func
121
void main(){
int t; clrscr(); obj[0].reg(0); obj[1].reg(1); obj[2].reg(2);
mail obj2;
ifstream filein; filein.open("email",ios::in||ios::binary); if(!filein) { cout<<"Unable to open
file to read\n"; } else { while(!filein.eof()) {
filein.read((char *)&obj2,sizeof(obj2));
cout<<"username "<<obj2.un<<" passwword "<<obj2.pd<<"\n"; } filein.close(); }
getch();
}
Tip Word adds text above the header or footer area to show whether you're on an odd or even
page. Again, this reminder is for your benefit only; it does not appear in the document, but only
in header and footer view.
But odd and even headers and footers apply across the whole document, so what happens if you
have different chapters or sections? Read on to find out.
e.Constructing a Table
Introduction
You may want to consider using HTML tables in your website. In addition to creating HTML
tables to present data in rows and columns, you can also create HTML tables to organize
information on your web page.
The process of creating an HTML table is similar to the process that you used to create your web
page and any elements that you may have already included in your page, such as links or frames.
Coding HTML tables into your web page is fairly easy since you need only understand a few
basic table codes.
Cell tags:
<TD> </TD>
Constructing an HTML table consists of describing the table between the beginning table tag,
<TABLE>, and the ending table table tag, </TABLE>. Between these tags, you then construct
each row and each cell in the row. To do this, you would first start the row with the beginning
row tag, <TR>, and then build the row by creating each cell with the beginning cell tag, <TD>,
adding the data for that cell, and then closing the cell with the ending cell tag, </TD>. When you
finish all of the cells for a row, you would then close the row with the ending row tag,
</TR>.Then, for each new row, you would repeat the process of beginning the row, building
each cell in the row, and closing the row.
The following table is an example of a basic table with three rows and two columns of data.
Data 1
Data 2
Data 3
Data 4
Data 5
Data 6
123
This table contains no border, title, or headings. If you wish to add any of these elements to your
table, you need to include additional HTML codes. The codes for these elements are explained
in the next section.
Adding a border, title, and headings
In addition to the basic table tags, several options are available for adding additional elements to
your table. For example, if you add a border, title, and column headings to the table in the
previous section, the table would then resemble the following:
TABLE TITLE
Column
A
Column B
Data 1
Data 2
Data 3
Data 4
Data 5
Data 6
The following codes generated the border, TABLE TITLE, and Column A and Column B
headings for this table:
<TABLE BORDER="5">
<TR>
<TH COLSPAN="2">
<H3><BR>TABLE TITLE</H3>
</TH>
</TR>
<TH>Column A</TH>
<TH>Column B</TH>
Note: If you wish to view the codes that generated the Data 1 through Data 6 cells, refer to the
previous section.
Notice that the beginning table tag, <TABLE>, now includes the border tag, BORDER="5",
which places a border around the table and frames each cell. The number that you ascribe to the
border tag, BORDER=n, sets the width of the table border. Depending on how you design your
table, you can then determine the border size that best suits your table and the overall design of
your web page.
124
To add a title to your table, you would place the title and the attributes of that title between the
row commands, <TR> and </TR>. The heading codes, <TH> and </TH>, define a heading cell
and, by default, these codes center the heading and set it in bold type. However, if you want the
title to span across the columns below it, you need to include the COLSPAN=n code. Since this
table has two columns, the COLSPAN="2" code was necessary. To add emphasis to the header,
you can use the header commands to make the text larger. In this table, notice that the <H3> and
</H3> commands made the title larger. Finally, the <BR> tag created a space above the title.
The individual column headings are also described by the heading codes, <TH> and </TH>.
Since these codes, by default, center the heading and set it in bold type, no additional commands
or attributes were included in the heading commands.
Polishing your table
To give your table a more polished look, you can include commands that will adjust the size of
your table, add space in the cell, add space between rows, and align the data in a cell. Working
with these commands is basically a process of trial and error to create the most appealing
presentation of your information. The type of table that you create and the overall design of your
web site will help you determine what works best for your table.
Some of the commands that enable you to customize your table include:
The WIDTH=n% command sets the width of your table as a percentage of the screen.
The letter n designates the percentage that you assign to this command. For example, if you
want the width of your table to be one half the width of the screen, you would include the
WIDTH="50%" command in the beginning table command.
9
10 The CELLPADDING=n command adjusts the vertical dimension of the cells. The letter
cell. For example, if you wish to place the data in the center of each cell in a row, you would
include the ALIGN=CENTER command within the row command.
13 The VALIGN=(TOP, MIDDLE, or BOTTOM) command will vertically align the data in
a cell. For example, if you wish to place the data in the center of each cell in a row, you
would include the ALIGN=MIDDLE command within the row command.
125
In addition to the codes that were explained in the previous sections, the table below now
includes some of these commands.
TABLE TITLE
Column
A
Column B
Data 1
Data 2
The following codes, along with codes previously discussed, created this table:
<TABLE BORDER="5" WIDTH="50%" CELLPADDING="4" CELLSPACING="3">
<TR>
<TH COLSPAN="2"><BR><H3>TABLE TITLE</H3>
</TH>
</TR>
<TR>
<TH>Column A</TH>
<TH>Column B</TH>
</TR>
<TR ALIGN="CENTER">
<TD>Data 1</TD>
<TD>Data 2</TD>
</TR>
</TABLE>
Notice that the TABLE command now includes the WIDTH="50%" command. This command
extends the table across one half of the width of the text. Also, the CELLPADDING="4"
command increases the vertical dimension of the cells, and the CELLSPACING="3" command
increases the border around the cells. Finally, the ALIGN="CENTER" command places Data 1
and Data 2 in the center of the cell.
f.Laying out the Columns & Rows
Overview
includes a number of facilities for laying out the components of an application. This guide
describes the following application layout features:
The simple default layout with a sidebar for inputs and a large main area for output.
126
In Print Layout view, click where you want to insert the note reference mark.
On the References tab, in the Footnotes group, click Insert Footnote or Insert
Endnote.
1
In the Number format box, click the format that you want.
To use a custom mark instead of a traditional number format, click Symbol next
to Custom mark, and then choose a mark from the available symbols.
Click Insert.
NOTE This will not change the existing symbols. It will only add new ones.
Word inserts the note number and places the insertion point next to the note number.
1
Double-click the footnote or endnote number to return to the reference mark in the
document.
1
TOP OF PAGE
Change the number format of footnotes or endnotes
1 Place the insertion point in the section in which you want to change the footnote or
endnote format. If the document is not divided into sections, place the insertion point
anywhere in the document.
128
On the References tab, click the Footnote & Endnote Dialog Box Launcher.
In the Number format box, click the option that you want.
Click Apply.
TOP OF PAGE
Create a footnote or endnote continuation notice
If a footnote or endnote is too long to fit on a page, you can create a continuation notice to let
readers know that a footnote or endnote is continued on the next page.
1
Make sure that you are in Draft view by clicking Draft next to View on the status bar.
If your document contains both footnotes and endnotes, a message appears. Click View
footnote area or View endnote area, and then click OK.
1
In the note pane list, click Footnote Continuation Notice or Endnote Continuation
Notice.
1
In the note pane, type the text that you want to use for the continuation notice. For
example, type Endnotes continued on the next page.
1
TOP OF PAGE
Delete a footnote or an endnote
When you want to delete a note, you work with the note reference mark in the document
window, not the text in the note.
129
In the document, select the note reference mark of the footnote or endnote that you want
to delete, and then press DELETE.
H.Mail-Merge
Mail merge is a software function describing the production of multiple (and potentially large
numbers of) documents from a single template form and a structured data source. The letter may
be sent out to many "recipients" with small changes, such as a change of address or a change in
the greeting line. Both WordStar (via an ancillary program) and WordPerfect offered this
capacity for CP/M and MS-DOS systems. MS Word Mail Merge allows a user to send letters or
documents to many people simultaneously; users simply create one document that contains the
information that will be the same in each version, and then add placeholders for the information
that will be unique to each version.
Now used generically, the term "mail merge" is a process to create personalized letters and preaddressed envelopes or mailing labels mass mailings from a form letter a word processing
document which contains fixed text, which will be the same in each output document, and
variables, which act as placeholders that are replaced by text from the data source.
The data source is typically a spreadsheet or a database which has a field or column for each
variable in the template. When the mail merge is run, the word processing system creates an
output document for each row in the database, using the fixed text exactly as it appears in the
template, but substituting the data variables in the template with the values from the matching
columns.
Mail merging is done in following simple steps:
19 Creating a Main document.
20 Creating a Data Source.
21 Adding the merge fields into main document.
22 Merging the data with the main document.
A common usage is for creating "personalised" letters, where a template is created, with a field
for "Given Name", for example. The templated letter says "Dear <Given Name>", and when
executed, the mail merge creates a letter for each record in the database, so it appears the letter is
more personal. It is often used for Variable Data Printing.
130
Another common usage is for creating address labels from a Customer Relationship
Management database, or for mass emails with pertinent information in them, perhaps a
username and password.
INDEX
Infoculture The Smithsonian Book of Information Age Inventions, Steven Lubar. Houghton
Mifflin Company, 1993.
Alan Turing: The Enigma Andrew Hodges, 1983. Simon & Schuster, New York.
"The PC Week Stat Sheet: A Decade of Computing," PC Week. February 28, 1994.
"Playing Catch Up" Jim Carlton, Wall Street Journal October 17, 1994.
IBM's Early Computers, Charles J. Bashe, Lyle R. Johnson, John H. Palmer, Emerson Pugh.
French, Carl (1996). Data Processing and Information Technology (10th ed.). Thomson.
p. 2. ISBN 1844801004.
Truesdell, Leon E. (1965). The development of punch card tabulation in the Bureau of the
Census, 1890. United States Department of Commerce.
Bohme, Frederick; Wyatt, J. Paul; Curry, James P. (1991). 100 Years of Data Processing: The
Punchcard Century. United States Bureau of the Census.
http://www.fao.org/DOCREP/004/Y2790E/y2790e0c.htm#TopOfPage
http://www.rapidtables.com/math/number/Numeral_system.htm
tibasicdev.wikidot.com/binandhex
cs.furman.edu/digitaldomain/more/ch6/dec_frac_to_bin.htm
mathforum.org/library/drmath/view/56091.html
BIO-DATA
Personal Data
Name
City Address
Telephone/ Cellphone
Provincial Address
Date of Birth
Place of Birth
Civil Status
Sex
Citizenship
:
:
:
:
:
:
:
:
:
Height
Weight
Religion
Fathers Name
Occupation
Mothers Name
Occupation
Their Address
City
Languages or Dialects you
Can Speak or Write
Person to be contacted
In case of Emergency
His/ Her Address and
Telephone No.
:
:
:
:
:
55
50 kg
Iglesia Ni Cristo
Gabriel Aque Jr.
Businessman
: Emilia Vino-Aque
: OFW
: Blk. 14, Lot 1, Phase 2, Sampaguita West, Sampaguita, Lipa
: English and Tagalog
: Marinet Catibog/ Donny Catibog
: #265 Kapitan Simeon Luz St., Brgy 2, Lipa City
: 757 49 22
Educational Background
College
Address
Inclusive Date of Attendance
Course
Special Skills
:
:
:
:
Secondary
: Batasan Hills National High School
Address
: IBP Road, Batasan Hills, Quezon City
Inclusive date of Attendance : 2009 - 2013
Elementary
: Payatas A Elementary School / Cermino Memorial School
Address
: Ilang-Ilang St., Payatas A / San Juan Bautista St., Payatas A,
Quezon City
Inclusive date of Attendance : 2005 - 2009 / 2001 2005
Character Reference
Name
Position/Occupation
Address
: Donny Catibog
: Aircraft Mechanic A, Qatar Airways
: Doha, Qatar
Name
Position/Occupation
Address
: Emilia Vino
: Office Clerk. Azizi Investments
: API Tower Suite No.902 Sheik Zayed Road, Dubai, UAE
Name
Position/Occupation
Address
BIO-DATA
Personal Data
Name
City Address
Cellphone/Telephone
Provincial Address
Date Of Birth
Place Of Birth
Civil Status
Sex
Citizenship
Height
Wieght
Religion
Fathers Name
Occupation
Mothers Name
Occupation
Their Address
Languages/ Dialects
You Can Speak/Write
Person To Be Contacted
In case of Emergency
His/Her Address
And Telephone No:
Educational Background
College
Address
Inclusive Date of attendance
Course
Special Skills
Secondary
Address
Inclusive Date of Attendance
Elementary
Address
Inclusive Date Of Attendance
Name
Position/Occupation
Address
Name
Position
Address
:Female
:Filipino
:52
:40kgs.
:Roman Catholic
:Roberto V. Bandojan
:Chief Mechanic
:Marissa S. Bandojan
:Housewife
:BLK 2 Lot 8 San Isidro Homes,Lipa City
:Engligh, Tagalog
:Marissa S. Bandojan
: BLK 2 Lot 8 San Isidro Homes,Lipa City
:09282077795
135
BIO-DATA
Personal Data
Names
City Address
Telephone/cell phone
Provincial
Date of Birth
Place of Birth
Civil Status
Sex
Citizenship
Height
Weight
136
Religion
Fathers Name
Occupation
Mothers Name
Occupation
Their Address
Languages or dialects you
Can Speak
Person to be Contact
In case of Emergency
His/Her Address and
Telephone No.
: Roman Catholic
: Jun Q Alday
: Factory Worker
: Elvie M Alday
: Housewife
: Bagoong Pook Lipa lipa city Batangas
: English/Tagalog
: Jun Alday
: Lipa City Batangas
: 0918-667-84-07
Education Background
College
Address
Inclusive Date of Attendance
Course
Special Skills
Secondary
Address
Inclusive Date of Attendance
Elementary
Address
Inclusive Date of Attendance
Name
Position/occupation
Address
Character References
Gina rosita
Teacher
Tambo Lipa City
Name
Position/occupation
Address
Asst.Prof O. DIaz
Head, teacher
PhilSCA Fernando Air Base Lipa City
137
BIO-DATA
Personal Data
Name
City Address
Telephone/ Cellphone
Provincial Address
Date of Birth
Place of Birth
Civil Status
Sex
Citizenship
Height
:
:
:
:
:
:
:
:
:
:
138
Weight
Religion
Fathers Name
Occupation
Mothers Name
Occupation
Their Address
Languages or Dialects you
Can Speak or Write
Person to be contacted
In case of Emergency
His/ Her Address and
Telephone No.
:
:
:
:
58 kg
Catholic
Babiera Julius B.
Restaurant Crew
: Babiera Ruby P.
: HouseWife
: Brgy. Cuayan Angeles City Pampanga
: English and Tagalog
: Hernandez Raul
: Calingatan Mataas Na Kahoy Batangas
: 461 - 22 - 37
Educational Background
College
Address
Inclusive Date of Attendance
Course
Special Skills
:
:
:
:
Secondary
: Angeles City National High School
Address
: Blvd. Arayat Angeles City Pampanga
Inclusive date of Attendance : 2009 - 2013
Elementary
: Calingatan Elementary School
Address
: Calingata Mataas Na Kahoy Batangas
Inclusive date of Attendance : 2003 - 2009
Character Reference
Name
Position/Occupation
Address
: Aurea P. Dungca
: Teacher
: Angeles City Pampanga
Name
Position/Occupation
Address
: Manolo Estrella
: Civil Engineer
: Calingatan Mataas Na Kahoy Batangas
Name
Position/Occupation
Address
139
BIO-DATA
Personal Data
Name
City Address
Telephone/Cellphone
Provincional Address
Date of Birth
Place of Birth
Civil Status
Sex
Citizenship
Height
Weight
Religion
Fathers Name
Occupation
Mothers Name
Occupation
Their Address
Languages or Dialects you
can Speak or Write
Person to be Contacted
in case of Emergency
His/Her Address and
Telephone No.
: Female
: Filipino
: 53
: 50 kgs.
: Roman Catholic
: Arnel Agrao
: Employee
: Lani Peralta Agrao
: Housewife
: 448 Purok 5, Bagongpook, Lipa City, Batangas
: English, Tagalog
: Lani P. Agrao
: 0909-105-87-55
EDUCATIONAL BACKGROUND
College
Address
Inclusive Date of Attendance
Course
Special Skills
Secondary
Address
Inclusive date of Attendance
Elementary
Address
Inclusive date of Attendance
Character References
Name
Position/ Occupation
Address
Name
Position/ Occupation
Address
Name
Position/ Occupation
Address
142