Professional Documents
Culture Documents
DATAB
ASE MAN
AGEMENT SY
STEM (DBMS)
ABASE
MANA
SYSTEM
Data : Data means collection of rawfacts and figures.
Information : Data that has been processed into useful form is known as Information. Information is
the processed data.
Database : A database is a collection of information organized into interrelated tables of data and
specifications of data objects.
Attribute : a single data item related to a database object.
Field a field is a single unit of data stored as part of a database record. Each record is made up of
one or more fields, which correspond to the columns in a database table. collection of characters
referred as "Field". Fields are often also referred to as attributes.
Cell : an intersection of row and column is known as "cell".
Tuple : Tuple means a collection of one or more attributes. A collection of cells vertically is known as
"Tuple".
Record : A collection of cells horizontally is known as "Record". A database record consists of one set
of tuples for a given relational table. In a relational database, records correspond to rows in each table.
A related set of data which are contained in fields.
Table : A set of rows and columns.
Entity : An entity is a single object about which data can be stored.
Key: Key is a unique field in a record used to distinguish one record from another. A database key is
an attribute used to identify data in some manner. Each table has a primary key which uniquely
identifies records.
Query : A statement that extracts information from the database. Queries are the primary mechanism for retrieving information from a database and consist of questions presented to the database in
a predefined format.
Schema : A database schema is a collection of metadata that describes the relations in a database.
Queue : An alternate pipe form of operating system, which handles data in the form of messages
rather than bytes.
Stack : A memory in which the information stored last is on top and is retrieved first.
Data Processing : A series of operations that convert rawfacts (data) into useful information.
Data Processing System : A system that accomplishes data processing.
Data Processor : A digital device that processes data.
Data Transfer Rate : The speed at which data is transfered from the main memory to another
medium on which data are recorded.
File : A collection of related records.
7/21/2015
File Management System (FMS) : A software package that allows users to define data items, place
these items into specified records combine these records into designated files and then manipulate
and retrieve stored data. An FMS can access records from only one file at a time.
File Organization : The technique used to represent and store the records on a file is called the File
Organisation.
The file organization techniques are three types :
Sequential File Organization : The most basic way to organize the collection of records
method for managing how a computer accesses records and files stored on a hard disk.
While storing data sequentially, ISAM provides direct access to records through an index.
This combination results in quick data access regardless of whether records are being
accessed sequentially or randomly.
Back-up Copy : It is the reference of original file (or) duplicate version of original file.
Buffer : A storage area where data are temporarily stored.
Block : A group of records
De-Block : An individual record.
DBMS : (Database Management System) : The software used for the management, maintenance and retrieval of data stored in a database.
DBMS is sub-divided into three types
DDL (Data Definition Language)
DML (Data Manipulation Language)
DCL (Data Control Language)
the database are established in such away that one data item is present as the subordinate
of another one.
Network DBMS : In Network DMBS, the relationships among data in the database are of
type many-to-many.
Relational DBMS : The software that manages data in more than one file at a time. In
RDBMS, the database relationships are treated in the form of a table. the table represents
the data with rows and columns rather than as lists of records.
Data Automation : Making data entry and validation as automatic as possible is known as
"Data Automation".
Data Recovery : A program which attempts to recover deleted or damaged data is known as
"Data Recovery".
Data Compression : A program which force data into less space on the storage medium.
Data Integrity
Data Validation.
7/21/2015
E - COMMERCE
E - Commerce (Electronic Commerce) : E-Commerce is the buying and selling of goods and services on the internet. The visitor to the site can sell or buy any product or service online. The transactions are enable through credit cards, Debit cards etc.
E-Business (Electronic Business) : E-Business is the administration of conducting business via
the Internet. This would include the buying and selling of goods and services, along with providing
technical or customer support through the Internet. E-Business is used in conjunction with E-Commerce, but includes services in addition to the sale of goods.
E-Administration : The use of ICTs (Information and Communication technologies) to modernize the
state, the creation of data repositories for MIS (Management Information Systems), computerisation
of records.
E-Services : the emphasis here is to bring the state closer to the citizens. Examples include provision of online services. E-Services and E-Administration together constitute what is generally termed
e-governance.
E-Governance : The use of IT to improve the ability of government to address the needs of society.
It includes the publishing of policy and programme related information to transact with citizens. It
extends beyond provision of on-line services and use of IT for strategic planning and reaching development goals of the government.
E-Democracy : The use of IT to facilitate the ability of all sections of society to participate in the
governance of the state. The remit is much broader here with a stated emphasis on transparency',
accountability and participation. Examples are online disclosure policies, online grievance redress
forums and e-referendums.
Electronic Funds Transfer (EFT) : A cashless approach used to pay for goods and services.
Electronic signals between computers are used to adjust the accounts of the parties involved in a
transaction. Electronic Funds transfer (EFT) is also known as "Electronic Banking (E-Banking)". EBanking is the use of electronic means to transfer funds directly from one account to another, rather
than by cheque or cash.
Internet Banking or Online Banking : internet Banking allows customers to conduct financial transactions on a secure website operated by their retail or virtual bank, credit union or building soeicty.
E-Marketing : E-Marketing is also known as Internet Marketing, Digital Marketing, Web Marketing,
Online Marketing, Search Marketing, I-Marketing (Internet Marketing) is the Marketing of products or
services over the Internet.
Types of E-Marketplace:
1.
Horizontal Marketing : A horizontal Market is a market which meets a given need of a wide
variety of industries, ratrher than a specific one.
2.
Vertical Marketing : A vertical Marketing used to define a comany's approach towards targeting
that focuses on specific industries.
E-Procurement (Supplier exchange) : E-Procurement is more than just a system for making purchases online. A properly implemented system can connect companies and their business processes
directly with suppliers while managing all interactions between them. Examples are bids, management correspondence, questions and answers, previous pricing and multiple emails sent to multiple
participants.
7/21/2015
Types of E-Commerce :
1.
Business to Customer (B2C) : The basic concept of this model is to sell the product online to
the customers. It provides direct selling through online. B2C is the indirect trade between the
company and consumers. Directly interact with the customers is the main difference with other
business model.
2. Business to Business (B2B) : It is similar to manufacturer issuing goods to the retailer or wholesaler. This model defines that Buyer and seller are two different entities. It consists of longest form of
E-Commerce. It is one of the cost effective way to sell out product through out the world.
3. Customer to Customer (C2C) : It helps the online dealing of goods or services among people.
though there is no major parties needed but the parties will not fulfill the transactions without the
program which is supplied by the online market dealer such as eBay.
4. Peer to Peer (P2P) : It is a discipline that deal itself, which assists people to instantly shares
related computer files and computer sources without having to interact with central webserver.
5. M-Commerce : This model deals with conducting the transactions with the help of mobile. The
mobile consumers can interact each other and can lead the business. M-Commerce (Mobile Commerce) involves the change of ownership or rights to utilize goods and related services.
7/21/2015
DATA COMMUNICATION
Data Communication : Data Communication refers to the transmission of the digital signals over a
communication channel between the transmitter and receiver computers.
(or)
Data Communication refers to the sharing of information between two interconnected systems in
a network.
The Five Elements of Data Communications :
1.
Computer
2.
Source (Sender)
3.
destination (Receiver)
4.
communication Device
5.
transmission Medium
COMMUNICATION DEVICES :
1.
Wire Pairs : Wire pairs are used in local telephone communication and for short distance digital
data communication. They are usually made up of copper and the pair of wires is twisted to
gether.
2.
Coaxial Cables : Coaxial cable is groups of specially wrapped and insulted wires that are able to
transfer data at higher rate. They consist of a central copper wire surrounded by an insulation
over which copper mesh is placed. Coaxial cables are used for long distance telephone lines and
LAN for their noise immunity and faster data transfer.
3.
Microwave : Microwave system uses very high frequency radio signals to transist data through
space. the transimitter and receiver of a microwave system should in line-or-sight because the
radio signal cannot bend.
With microwave very long distance transmission is not possible to overcome this problem of line
of sight and power amplification of weak signal, repeaters are used at regular intervals between
the transmitting and receiving end.
4.
The main advantage of satellite communication is that it is a single microwave relay station visible
from any point of a very large area.
Data Transmission Modes : There are three ways for transmitting data from one system to another
system.
1.
Simplex : In simplex, the communication can take place in one direction (source to Destination)
The flow of information is Uni-directional. The receiver receives the signal from the transmitting
device. Ex: Pazer.
7/21/2015
2.
Half - Duplex : In half-duplex, communication channel is used in both directions but only in one
direction at a time. Thus, a half-duplex line can alternately send and receive data.
Ex: Walky-Talky
3.
Full - Duplex : In full - duplex, the communication channel is used in both directions at the same
time.
Ex : Telephone call conversation.
Flow Control : Flow control is needed when the sender transmits faster than the receiver or intermediate network equipment can process the transmissions.
Routing : When systems are not directly connected, intermediary systems along the route to the
intended receivers need to forward messages on behalf of the sender. On the Internet, the networks
are connected using routers.
Types of Data Transmission :
Digital and Analog transmission : Data is transmitted from one point to another point by means
of electrical signals that may be in digital and analog form. In analog signal, the transmission
power varies over a continuous range with respect to sound, light and radio waves. A digital signal
may assume only discrete set of values within a given range. Analog signal is measured in volts
and its frequency in Hertz (HZ).
Serial and Parallel Transmission : Serial data transmission implies transfer data transfer
bit-by-bit on the single (serial) communication line. In serial transmission, data is sent in a serial
form i.e., bit by bit on a single line. The cost of communication hardware is consider able reduced
since only a single wire or channel is require for the serial bit transmission. Serial data transmis
sion is slow as compared to parallel transmission.
Parallel data transmission is less common but faster than serial data transmission. Most data are
organized into 8 bit bytes.In some computers, data are further organized into multiple bits called
half words, full words.
Asynchronous and Synchronous Transmission : In asynchronous transmission data is trans
mitted character by character. It is cheaper to implement, as you donot have to save the data
before sending.
In synchronous mode, the saved data is transmitted block by block. Each block can contain many
characters. Synchronous transmission is well suited for remote communication between a com
puter and related devices like printers and card readers.
Protocol : A set of rules and regulations for transmitting the data from one system to another system
in a network is known as "Protocol". The procedure of data transformation in the form of software is
known as "Protocol".
7/21/2015
Ex : of Protocols :
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Internet Protocol (IP)
Post Office Protocol (POP3)
Hyper Text Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Internet Control Message Protocol (ICMP)
Internet Message Access Protocol (IMAP)
Functions of Protocol : Protocol performs the following functions for the efficient and error free
transmission of data.
Data Sequencing : A long message to be transmitted is broken into smaller packets of fixed size
for error free data transmission
Flow Control : All machines are not equally efficient in terms of speed. The flow control regulates
the process of sending data between fast sender and slow receiver.
Data Routing : It is the process of finding the most efficient route between source and destination
before sending the data.
Error Control : Error detecting and recovering is the one of the main function of protocol. It
ensures that data are transmitted without any error.
Bandwidth : The capacity at which a given communication channel, such as ordinary copper
telephone line, can transfer information. Increasing bandwidth increases the speed at which data
transfer takes place.
7/21/2015
NETWORKING
Network : An interconnection of computer system and/or peripherals with carriers and data communications devices for the purpose of exchanging data and information. the users share hardware or
software over the network.
Network Types: Networks can be categorized in several different ways. Common examples of area
network types are :
LAN : Local Area Network
WLAN : Wireless Local Area Network.
CAN : Campus Area Network (or) Controller Area Network (or) Cluster Area Network.
PAN : Personal Area Network
DAN : Desk Area Network
SAN : Storage Area Network (or) System Area Network (or) Small Area Network
(or) Server Area Network
MAN : Metropolitan Area Network
GAN : Global area Network
WAN : Wide Area Network
Categories of Networks: Based on the architecture networks can be broadly classified as :
1. Peer-to-peer architecture
2. Client/server architecture
1.
Peer-to-peer architecture : P2P is a type of network in which each computer has equal capa
bilities and responsibilities.
2.
Protocol : A set of rules and regulations for transmitting the data from one system to another system
in a network.
Client : The system request for the data for further processing.
Server : A system that shares resources with one or more workstations on a network.
Client-Server Computing : A memory computing computer applications in which required functions
are grouped at service requestors and service providers. Client request services and servers provide
them, this method particularly is suited for applications implemented on distributed computers.
Node : Each device connected to a network is known as "Node". An end point, of a branch in a
network or a common junction of two or more network branches.
Network Topology : the structure of interconnecting of nodes of a computer network is known as
"Network Topology". A Network topology represents its layout or structure from the point of view of
data flow. Network topologies are categorized into the following basic types:
1.
Bus Topology
2.
Ring Topology
7/21/2015
3.
Star Topology
4.
Tree Topology
5.
Mesh Topology
1.
Bus Topology : All devices are connected to a central cable, called the bus or backbone. All
information transmitted a cross the bus can be received by any system in the network.
2.
Ring Topology : all devices are connected to one another in the shape of a closed loop. So that
every device has exactly two neighbors for communication purposes. All messages travel through
a ring in the same direction (either "clockwise" or "Anticlockwise"). A failure in any cable or device
breaks the loop and can take down the entire network.
3.
Star Topology : All devices are connected to a central hub. Nodes communicate a cross the
network by passing data through the web.
4.
Tree Topology : A hybrid topology. One "root" node connects to other nodes, which in turn con
nect to other nodes, forming a tree structure. Information from the root node may have to pass
through other nodes to reach the end nodes.
5.
Mesh Topology : Mesh topology involve the concept of routes. Nodes are connected with many
redundant interconnections between network nodes. Messages sent on a Mesh Topology can
take any of several possible paths from source to destination.
Networking Cables : Cable is the measuring through which information usually moves from one
network device to another.
Some types of the network cables are :
1.
Coaxial Cable
2.
3.
4.
1.
Coaxial Cable : Coaxial lines confine the electromagnetic wave to the area inside the cable be
tween the center conductor and the shield. The most common use for coaxial cables is for televi
sion.
2.
Fiber Optic Cable : An optical Fiber cable containing one or more optical fibers. The optical
elements are typically individually coated with plastic layers and contained in a protective tube
suitable for the environment where the cable will be deployed.
3. Shielded Twisted Pair (STP) Cable : Shielded Twisted Pair cables are an attempt to prevent
electromagnetic interference. Because the shielding is made of metal. This type of cabling offers the
best protection from interference from external sources, and also eliminates alien crosstalk.
4. Unshielded Twisted Pair (UTP) : Unshielded Twisted Pair Cable is the most common cable
used in computer networking Unshielded Twisted Pair cable is used in data networks for short and
medium length connections because of its relatively lower costs compared to optical fiber and coaxial
cable. UTP is used in video applications, security cameras.
MODEM (MODULATOR - DE MODULATOR) : Devices used to convert digital signals to its analog
form (modulation) at the sending end and back to digital signals from analog form (demodulation) at
the receiving end.
7/21/2015
Bandwidth : Bandwidth refers to the data rate supported by a network connection or interface. Bandwidth is the primary measure of computer network speed. Example of low bandwidth connection is
dial-up connection. Example of high bandwidth connection is Broadband.
ISO/OSI (International Standard Organization for open Systems Interconnection) : ISO/OSI
standard clearly defines the functions of communication softwares in a generalized and structured
manner which helps to carryout the network product development activities. ISO/OSI model indicates
about how the data transmit from one system to another system in a network. ISO/OSI model consists of 7 layers.
Source
Destination
APPLICATION
APPLICATION
PRESENTATION
PRESENTATION
SESSION
SESSION
TRANSPORT
TRANSPORT
NETWORK
NETWORK
DATALINK
DATALINK
PHYSICAL
PHYSICAL
Physical Medium
Fig : ISO/OSI Model
1. Physical Layer : Physical layer transmits the data between the systems by 'Bit-by-Bit" level. It
uses "Category-5" wires for data transmission. It connects the two systems through physical medium
such as coaxial cables, Fiber optics, vaccum etc.
2. Datalink Layer : Datalink layer transmits the data between the systems by "frames (or) Segment" levels. It communicates the data between adjacent nodes or systems or work stations. This
layer uses HUB and PPP (Process to Process Protocol) for data transmission.
3. Network Layer : Network Layer transmits the data between the systems by "packet" level. This
layer was IP (Internet Protocol), ICMP (Internet Control Message Protocol) and TCP (Transmission
Control Protocol).
4. Transport Layer : Transport Layer indicates about the type of communication. It uses TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
Data Transmission is divided into two types :
Connection - Oriented Transmission :
It is reliable transmission
It is non-reliable Transmission
7/21/2015
10
Example : Speech
5. Session Layer : Session Layer provides the encryption (coding) on the sender side (source) and
decrytion (decoding) on the receiver side (destination). Encryption and Decryption applied for providing security to the message. Session Layer uses the RPC (Remote Procedure Call).
6. Presentation Layer : Presentation Layer indicates the syntax errors and also re-arranges the
message. Presentation Layer uses the SMTP (Simple Mail Transfer Protocol) and HTTP (Hypertext
Transfer Protocol).
7. Application Layer : Application Layer is also known as "User Application Layer (or) User Friendly
Layer" It uses FTP (File transfer Protocol), DNS (Domain Name System), SIME (Simple Internet Mail
Extension) and MIME (Multipurpose Internet Mail Extension).
7/21/2015
11
INTERNET
7/21/2015
12
4. Digital Subscriber Line (DSL) : DSL Provides a connection to the Internet through the telephone network. DSL can operate using a single phone link without preventing normal use of the telephone line for phone calls.
5. T-Line : Here Internet access data is carried over fiber optic lines or copper lines. They are quick
but highly regulated and generally intended for business use.
6. Broadband : It provides a high data rate access to the Internet and also provides a continuous
connection. Broadband is the fastest internet connection.
7. Wi-Fi (Wireless Fidelity) : It is the standard method to connect a high speed local area network
via wireless transmission/receiver. Wi-Fi is convenient for mobile internet users and can bring services to areas where wiring would be costly.
Web Browser : A web browser is a software that helps the user to navigate the WWW. It is a client
software that allows the user to display and interact with a hypertext document.
Examples : Mosaic, Netscape Navigator, Internet Explorer (IE), Opera, Safari, Mozilla Firefox, Google
Chrome etc.
MOSAIC : Mosaic is the first web browser and was developped by the "National Center for
Supercomputing Applications (NCSA)" in 1993.
Netscape Navigator : Netscape Navigator was released in 1994 and is one of the fastest web
browsers currently available in the market. It is available for UNIX, Windows and Machinatosh platforms and has built in e-mail and Newsgroup facilities.
Microsoft Internet Explorer : IE is based on NCSA's MOSAIC and is distributed under a licensing agreement with spyglass Inc. This is a shareware software and it is available in various versions
for various windows products. IE is the default webbrowser for windows operating systems.
Web Server : A web server is a computer program that accepts HTTP requests from web clients and
provides them with HTTP responses. Web server is a place where pages reside. It is also use to
refers to the computer that runs the server programs.
Examples :
Search Engine : Search Engines are websites that allows the users to search on keywords or
combination of keywords to provide the information to the user.
Examples : Google, yahoo, Altavista, All myfaves etc.
Cyberspace : This term is used to refer to the computer networks connected to each other and their
communication. It is often used to refer to the Internet.
Internet chat: Internet chat is a real time synchronous conferencing that is used for group communication as well as one-to-one communication over the Internet. Internet chat software is an interactive
software that allows the user to type comments in one window and receives replies in another window.
Web Page : Web pages are created in the HTML format and provide the web users with navigational
abilities through hyperlinks to other webpages on the web. Webpages are resources of information.
Webpage is also referred as "Hyper Text Document". A webpage can contain text, ,pictures, audio and
visual etc.
Home page : Home page is the default page of any website. It is the main page of a website.
7/21/2015
13
Protocal Identifier and resource name are seperated by a colon and two forward slashes.
Any link from one document to another document is always implemented by using a URL. A URL
contains information about the location of the document. A URL may point to another HTML document
or an image.
URL is a web addressing scheme that spellsout the exact location of an Internet resources. When the
7/21/2015
14
user clicks on a link, the browser reads the link to the document. The information about the link is
provided to the browser by URL.
Components of URL :
FTP : To get or send a file to another system on the Internet.
TELNET : To view files in a directory in a system on another network.
HTTP : To get or send information to another system on the Internet.
e-mail : To communicate with a particular person on the Internet.
Newsgroup : To communicate with a group of people in a similar topic.
WWW : To read multimedia documents on the Internet.
Gopher : Search for everything about a specific topic on the Internet.
Internet Protocols : A set of rules and conventions that specify how devices on network exchange
information.
Some of the protocols are:
1.
2.
3.
4.
5.
6.
7.
8.
9.
7/21/2015
15
SGML defines a document structure using a special grammer called "Document type Definition (DTD).
Hyper Text Markup Language (HTML) : HTML is a scripting language.
HTML is use to create the hypertext documents (web pages).
HTML is the encoding scheme use to create hypertext document.
HTML language is use for describing the text based information on the webpage.
Hyper Text : A piece of text that works as a link.
Markup Language : A language of writing layout information with in documents.
HTML extension is ".html" or ".htm".
HTML is divided into two types.
1.
2.
Hypertext Preprocessor (PHP) : Hypertext Preprocessor (PHP), the coding language to create
interactive webpages and so forth.
CSS (Cascading Style Sheets) : While HTML dictates the content of page, CSS regulates the format, including headers, footers, navigation bars etc. While all of these elements can be created in
HTML, such a method would have to be repeated on every webpage. CSS on the other hand, is
applied to all pages of a websites.
Download : To transfer information from host computer to a personal computer often through modem.
Upload : To transfer information from personal computer to host computer often through modem.
Upgrade : It refers to the replacement of a new product with the same product.
Companies and Their Founders :
Microsoft
Bill gates
Yahoo
Mark Jukerberg
Apple
Steeve Jobbs
Oracle
Tim Nerveski
Wikipedia
Jimmy Wales
Bizz Stone
7/21/2015
16
gmail .com
User Name
"@" sign
Sent Items is use to store mail that has already been sent.
*.
CC (Carbon Copy) : To type the e-mail address of the other receipients in this box, each
address is seperated by a comma (,). When you complete the mail and click the "Send" button, then
the mail will automatically be sent to all the receipients. Here, all the receipients will know who the
other receipients are.
BCC ( Band Carbon Copy) or (Blind Curtesy Copy) : If you don't want them to know who else
have received copies, you can type the addresses in the BCC text box. In this case, only you (the
sender) will know the identity of all the receipients of mail.
Reply : You can send your reply using the same window. The subject box will have the same
subject, but with the words "Re:" before it.
Forward : You can send the forward message using the same window. The subject box will
have the same subject, but with the words "Fwd:" before it.
7/21/2015
17
COMPUTER SECURITY
Security : Security controls access to data in files and permits only authorized use of terminals
and other equipments. Control is usually through various levels of passwords assigned on the
basis of need to know.
Typical approaches to improving Computer security can include the following :
Physically limit access to computers to only those who will not compromise security.
Hardware Mechanisms that impose rules on computer programs, thus avoiding depending on
computer programs for computer security.
Operating system Mechanisms that impose rules on programs to avoid trusting Computer Programs.
Programming strategies to make computer programs dependable and resist subversion.
Security Tools :
Firewall : A firewall is a set of related programs, located at a network gateway server, that protects the
resources of a private network from users of other networks. Firewall can either be hardware devices
or software programs. They provide protection from Online intrusions. A firewall is designed to prevent unauthorized Internet users from accessing your computer. All messages entering your Computer from the Internet pass through the firewall which examines each message. The firewall blocks
any messge that was not specifically requested by your system.
Encryption : It can be used to protect the message from unauthorized users. It can be done in
several ways by switching the characters around, replacing characters with others, and even removing characters from the message.
Cryptographic Techniques : It can be used to defend data in transit between systems reducing the
probability that data exchanged between systems can be intercepted or modified. Secure
cryptoprocessors can be used to leverage physical security techniques into detecting the security of
the system. Strong authentication techniques can be used to ensure that communication end-points
are who they say they are.
Intrution - Detection - System : It can be scan a network for people that are on the network but who
should not be there oraredoing things that they shouldnotbedoing. For example trying a lot of passwords to gain access to the network.
Pinging : The Ping application can beusedby potential crackers to find if an IP address is reachable.
If a cracker finds a computer they can try a port scan to detect and attack services on that computer.
Anti-Virus Software : Anti-virus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software (Malware). The term "Antivirus"
isused because it is designed exclusively to combat computer viruses.
Antivirus software typically usestwo different approaches to accomplish this:
Examining (Scanning) files to look for known viruses matching definitious in a virus dictionary.
Identifying suspecious behaviour from any computer program which might indicateinfection : S
VIRUS (Vital Information Resource Under Siege) : VIRUS full form is "Vital Information Resource
Under Siege". A computer virus is a computer program that spreads by inserting copies of itself into
other executablecode or documents. Virus program that runs on your computer without your knowledge and can cause damage to your files. A common way to receive a virus is through an attachment
via e-mail.
7/21/2015
18
Worm : Worm is a self-replicating program. It replicates itself to new computers using the flaws and
then begins scanning and replicating again. The difference between a virus and worm is that a worm
does not create copies of itself on one system. It propagates through computer networks.
Trojan Horse : It is a program in which malicious or harmful code is contained inside apparently
harmless programming or data in such a way that it can get control and do its chosen form of damage. Trojan Horses cannot replicate automatically. A Trojan horse can be used to setup a back door in
a computer system so that the intruder can return later and gain access.
Malware (Malicious Software) : It is a software designed specifically to damage or disrupt a system
such as a virus or Trojan horse.
Spyware : Spyware is a software that performs actions such as advertising, collecting personal data,
orchanging the configuration of your computer, usually without obtaining your consent. Spyware that
displays advertisements and tracks your personal information is known as "Adware".
Spam : E-mail spam also known as "Junk e-mail" or "Unsolicited Bulk e-mail (UBE), is a subset of
spam that involves nearly identical messages sent to numerous receipients by e-mail.
Phishing : Phishing is a fraudulent activity of acquiring the sensitive information by the use of a fake
identity during electronic communication.
Spoofing : It occurs when the sender of an e-mail message pretends to be someone else, they
falsely manipulate the "From" field in an e-mail. This is usually done to make you release sensitive
information.
Key loggers : Key logger is a software program designed to record (log) everykeystroke on the
machine on which it runs. Key logger is also known as "Key Stroke logger" or "System Monitor".
Packet Sniffer : A packet sniffer is an application that captures TCP/IP data packets, which can
maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network.
Root Kit : A root kit is a computer program that enable administrator - level access to a computer or
computer network. A cracker installs a root kit on a computer after first obtaining user-level access,
either by exploiting a known vulnerability or cracking a password. Once the root kit is installed, it allows
the hacker to mask intrusion and gain root or privileged access to the computer.
Cyber crime: It contains all criminal offences which are committed with the aid of communication
devices in a network. Example are :
Unauthorized access, malicious code, and denial-of-service attacks.
Theft of service and certain financial frauds.
Spamming and copyright crimes, particularly those facilitated through peer-to-peer networks.
Hacking, phishing, identify theft, child pronography, online gambling securities fraud.
Hacking : Hacking is the activity of programmatically gaining access to a computer application that is
otherwise in accessible. The act of gaining an unauthorised access to a computer is known as "Hacking".
Hacker : A Hacker is someone involved in computer security specializing in the discovery of exploits
in systems orin obtaining or preventing unauthorized access to systms through skills, tactics and
detailed knowledge.
Polymorphic Virus : A polymorphic virus modifies its program code each time it attaches itself to
another program or file.
7/21/2015
19
Select All
Ctrl+B
Bold
Ctrl+C
Copy
Ctrl+D
Ctrl+E
Center Allignment
Ctrl+F
Find(search)
Ctrl+G
Goto
Ctrl+H
Ctrl+I
Italic
Ctrl+J
Justify
Ctrl+K
Hyperlink
Ctrl+L
Left Alignment
Ctrl+M
Ctrl+N
New
Ctrl+O
Open
Ctrl+P
Ctrl+Q
Ctrl+R
Right Alignment
Ctrl+S
Save
Ctrl+T
Tab(Left Indent)
Ctrl+U
Underline
Ctrl+V
Paste
Ctrl+W
Close Window
Ctrl+X
Cut
Ctrl+Y
Ctrl+Z
Undo
Ctrl+Right Arrow
Ctrl+Left Arrow
Ctrl+Down arrow
Ctrl+Up arrow
Ctrl+Esc
7/21/2015
20
Ctrl+Tab
Ctrl+Shift+Tab
Ctrl+Shift+Esc
Ctrl+F5
Ctrl+F10
Print Preview
Ctrl+Alt+N
Normal View
Ctrl+Alt+O
Outline view
Ctrl+Alt+P
Ctrl+Home
Move to thefirstcharacter
Ctrl+End
Ctrl +F9
Ctrl+Enter
Page break.
Shift+Delete
Shift + F10
Shift+Tab
Tab
Enter
End
Home
Windows Logo
Windows Logo + D
Windows Logo + M
Windows Logo + E
Open My Computer
Windows Logo + F
Windows Logo + L
Windows Logo + R
Windows Logo + U
Windows Logo + F1
7/21/2015
21
Alt + F
Fle Menu
Alt + E
Edit Menu
Alt + V
View Menu
Alt + I
Insert Menu
Alt + O
Format Menu
Alt + T
Tools Menu
Alt + Space + X
Maximize
Alt + Space + N
Minimize
Alt + F4
Alt + F8
Macros
Alt + I + R
To insert Row
Alt + I + C
To Insert Column
Alt + Space + R
Restore
Alt + Space
Alt + Enter
Alt + Home
Alt + Delete
Alt + Tab
7/21/2015
22
ABBREVIATIONS
AC
ACK
Acknowledge Character
A/D
Analog to Digital
ADO
ADCCP
ADP
ADSL
ADT
AGP
AI
Artificial Intelligence
AJAX
ALGOL
Algorithmic Language
ALU
AM
AMD
ANSI
AP
Attached Processor
APDOS
API
APL
A programming Language
ARM
ARPANET
ASCII
ASK
ASP
ASR
AT
Access Time
ATDM
ATM
AU
Arthmetic Unit
AVI
B2B
Business - to - Business
7/21/2015
23
B2C
Business - to - Customer
BAL
BASIC
BCM
BDOS
BINAC
BIND
BIOS
BIS
BIT
Binary Digit
BOOTP
Bootstrap Protocol
BPI
BPS
BROM
BSAM
BSC
CAD
CAE
CAI
CAID
CAL
CAM
CAQ
CAR
CARD
CASE
CAT
CDE
CDAC
CDMA
CD-R
CD-Recordable
CD-ROM
CD Read-only Memory
CD-RW
CD-Rewritable
7/21/2015
24
CDSA
CERT
CGA
CGI
CICS
CIM
CISC
CLI
CLIP
CML
CMOS
CNC
COBOL
COM
CORAL
CORBA
CPS
CPU
CRC
CRM
CROM
CRT
CRUD
CSE
CSI
CT
Computerized Tomography.
CTC
Channel to Channel
CTCP
DAD
DAT
DASD
DBA
Database Administrator.
DBMS
DCE
7/21/2015
25
DCOM
DDE
DDP
DDR
DHTML
DLC
DLL
DMA
DMP
DND
DNA
DNS
DOS
DPI
DTP
Desktop Publishing
DPM
DPS
DRAM
DR-DOS
DSA
DSL
DTE
DTR
DVD
DVI
DVR
EBCDIC
ECOM
EDI
EDP
EDS
EDSAC
EDVAC
7/21/2015
26
EEPROM
EGA
EGP
EISA
ENIAC
EPROM
ERP
EXT
FAQ
FDD
FDMA
FIFO
FLOPS
FM
Frequency Modulation.
FORTRAN
Formula Translation.
FTP
FXP
GAL
GDI
GIF
GIGO
GIS
GPRS
GPU
GSM
GUI
GUID
HAL
HDD
HDL
HTML
7/21/2015
27
HTTP
IBM
International BusinessMachines
IC
Integrated Circuit
ICMP
IDE
IEEE
IETF
IDP
IIS
IMMP
IP
IPS
ISDN
ISO
ISP
ITU
JAR
Java Archive
JIT
Just-In-Time
JPEG
JRE
JSP
JVM
KBPS
KRL
LAN
LAP
LCD
LED
LIFO
LISP
List Processing
LPI
7/21/2015
28
MAC
MAN
MAR
MBPS
MDA
MDI
MIB
MICR
MIDI
MIMD
MIMO
Multiple-Input Multiple-output
MIPS
MIS
MOBO
Mother Board
MODEM
Modulator-Demodulator
MOPS
MPEG
MS-DOS
MUMPS
NAC
NFS
NIC
NNTP
NOS
NSA
NTFS
NTP
NUMA
NVR
NVRAM
OASIS
OCR
OLTP
7/21/2015
29
OMR
OOPL
OOPS
OPS
OSDN
PABX
PAN
PBX
PC
PCB
PCI
PDA
PERL
PHP
Hypertext Preprocessor
PIM
PIN
PIO
Programmed Input/Output
PIOCS
PKCS
PLU
PMS
PNG
PnP
Plug-and-Play
POP
Point Of Presence
POP3
POS
Point-of-Sale
POST
PPI
PixelsPer Inch
PPP
Point-to-Point Protocol
PROLOG
Programming in Logic
PROM
PSS
QA
Quality Assurance
7/21/2015
30
RAD
RAID
RAIT
RAM
RAS
RDBMS
RDOS
RDS
RFI
RFID
RISC
ROM
RPM
RTOS
SAN
SBCS
SCSI
SDN
SDRAM
SFTP
SIM
SIMD
SIMULA
Simulation Language
SIP
SISD
SISO
SMIL
SMS
SMT
Simultaneous Multi-Threading
SMTP
SNA
SNOBL
SOAP
SQL
7/21/2015
31
SRAM
SRU
SSI
SVG
SVGA
SWT
TCL
TCP
TCU
TDMA
TPI
TRON
TSIOA
UART
UDDI
UML
UNIVAC
UPS
URI
URL
URN
USB
UTF
UUID
UVC
VAN
VAX
VBA
VDAC
VDI
VDSL
VDU
VESA
7/21/2015
32
VGA
VGC
VGM
VIRUS
VLAN
VLSI
VMS
VOIP
VOU
VPN
VPU
VRML
VSAM
VSAT
VTAM
VTOC
VTP
WAN
WAP
WATM
Wireless ATM
WATS
WBEM
Wi-Fi
Wireless Fidelity
WiMAX
WINS
WLAN
WORM
WPAN
WUSB
WWAN
WWW
WYSIWYG
XAML
7/21/2015
33
XHTML
XML
XMS
XMPP
XSL
ZISC
7/21/2015
34
MS - OFFICE
Microsoft Office is a non-free commercial office saite of different programs that allows you to
create documents, spread sheets, presentations, posters, send electronic mail. MS-Office services
for the Microsft Windows and Mac OS X operating systems, introduced by Microsoft in August 1,
1989.
The first version of MS-Office contained Microsoft Word, Microsoft Excel, and Microsoft Powerpoint.
Over the years, MS-Office applications have grown substantially closer with shared features such as
a common spell checker, OLE data integration and Microsoft Visual Basic for Applications Scripting
language.
The current versions are "MS-Office 2010" for Windows, (2013) released on June 15, 2010. It is
also known as "Version 14.0".
The current versions are "MS-Office 2011" for MAC OS X, released on October 26, 2010.
Components of MS-Office :
Word : Microsoft Word is a word Processor and was previously considered the main program in
office. It is available for the Windows and Mac platforms. The first version of Word, released in the
autumn of 1983, was for the MS-DOS operating. Word is used to create text documents like papers,
outlines, and bibliographics.
Excel : Microsoft Excel is a spreadsheet program that originally competed with the dominant Lotus 12-3, but eventually out sold it. It is available for the Windows and Mac platforms. Microsoft released the
first version of Excel for the Windows in November 1987. Excel is used to create spreadsheets,
charts, tables, and graphs.
Power Point : Microsoft Power Point is a pouplar presentation Program for Windows and Mac. It is
used to create slideshows, composed of text, graphics, video and audio with pretty backgrounds.
Access : Microsoft Office Access Previously known as Microsoft Access, is a relational database
management system from Microsoft that combines the relational Microsoft Jet Database Engine with
a graphical user interface and software development tools. MS-Access stores data in its own format
based on the Access Jet Database Engine. It can also import or link directly to data stored in other
applications and databases. MS-Access is used to create databases, manage large quantities of
information, and create reports.
Outlook: Microsoft-Outlook is a personal information manager and e-mail communication software.
It includes an e-mail client, calendar task manager and address book.
Publisher : Microsoft Publisher is used to create visual print materials such as posters, brochures
and newsletters.
Front Page (HTML Editor-Web design) : It is used to create websites.
7/21/2015
35
MS - OFFICE WORD
Word Processor is a software package that enables you to create, edit, print and save documents for future retrieval and reference. One of the main advantage of a word processor over a
conventional typewriter is that a word processor enables you to make changes to a document without
retyping the entire document. Editing a document involves correcting the spelling mistakes, if any,
deleting or moving words sentences or paragraphs.
Examples of Word Processing Packages are Softword, Word Star, Word perfect, Microsoft Word,
Text Maker, Wordpad, Google docs etc.
Features of Word Processor :
Text is typing into the computer, which allows alterations to be made easily
Text or paragraphs can be copied/moved throughout the document.
Words and sentences can be inserted or deleted.
Spelling can be checked and modified through the spell check facility.
Multiple files/documents can be merged.
Margins and page Length can be adjusted as desired.
Multiple copies of letters can be generated with different address through the mail-merge facility.
Important Components of MS-Word :
1.
Title Bar : The Title Bar displays the name of the currently addresses active document. It is also
displays the minimize, maximize and close buttons.
2.
Menu Bar : The Menu Bar displays at the top of the screen. The main menu further displays a sub
menu. At any time, only highlighted options can be executed, faded options are not applicable.
3.
Tool Bar : Too Bar helps to perform a task faster and with great ease. The most commonly tool
bars are formatting tool bar and the standard tool bar. At any point of time, any tool bar can be
made ON or OFF through the tool bar option of view menu.
Standard Toolbar : The standard Toolbar has buttons for commonly performed tasks like save,
cut, copy, paste, print, sorting and adding a column of numbers etc.
Formatting Toolbar : The Formatting Toolbar has buttons for various formatting operations like
bold, italic, underline, left alignment, centre alignment, right alignment and changing text size or
style etc.
4.
Ruler Bar : The Ruler Bar allows you to format the vertical alignment of text in a document.
5.
Scroll Bar : The scroll Bar helps you scroll the content or body of document by click in on the
buttons with the arrow marked on them to move up and down and left and right of a page.
Status Bar : The Status Bar displays information about the currently active document like page
number, column number, line number of the cursor position.
7.
Workspace : The Workspace is the actual working area of the document. It is the area in the
document window were you enter/type the text of your document.
7/21/2015
36
Edit Menu
File Menu :
New (Ctrl+N)
Open
Undo (Ctrl+Z)
Redo
(Ctrl+Y)
Recent Documents
Repeat
(Ctrl+Shift+Y)
Close
Cut
(Ctrl+X)
(Ctrl+O)
Save
(Ctrl+S)
Copy
(Ctrl+C)
Save As
(Ctrl+Shift+S)
Paste
(Ctrl+V)
Save All
Reload
Select Text
(Ctrl+Shift+I)
Versions
Select All
(Ctrl+A)
Export
Exports as PDF
Auto Text
Send
Fields
Properties
Index Entry
Templates
Hyperlink
Page Preview
Object
(Shift+F3)
(Ctrl+K)
(Ctrl+P)
Printer Settings
Exit
(Ctrl+Q)
View Menu :
Insert :
Print Layout
Manual Break
Fields
Taskpane
Special character
Toolbars
Formatting Mark
Formula Bar
Section
Status Bar
Footnote/Endnote
Caption
Comments
Bookmark
Custom Views
Cross-Reference
Full Screen
Zoom
(Ctrl+Shift+J)
Note (Ctrl+Alt+N)
Script
Indexes and Tables
Envelope
7/21/2015
37
Frame
Table
(Ctrl+F12)
Horizontal Ruler
Picture
Object
FORMAT :
TABLE :
Default Formatting
Insert
Character
Delete
Paragraph
Select
Merge Cells
Page
Split Cells
Change Case
Protect Cells
Columns
Merge Table
Sections
Split Table
(F11)
Auto Format
Auto Correct
Autofit
Anchor
Wrap
Convert
Alignment
Sort
Arrange
Formula
Flip
Number Format
Group
Table Boundaries
Object
Table Properties
(F2)
Picture
TOOLS :
WINDOW :
New Window
Language
Word Count
Outline Numbering
Line Numbering
Footnotes/End notes
Gallery
Media Player
7/21/2015
38
Bibliography Database
Sort
What's This?
Calculate
HELP :
(Ctrl ++)
Update
Macros
Report a Problem
Extension Manager
Character Formatting : Bold, Italic, Underline, Drop Caps, subscripts and Superscripts
2.
3.
Alignment
Mail Merge : Mail Merge is the process of transferring selected information from one document to
another document. For example, sending a document or letter to many persons who reside at different locations. The letters may contain the address of each receipient, in addition to the standard
information contained in the letter. One way of doing this is to print the letters be
changing the address each time in the document after printing such a letter. But this would mean a lot
of effort and time and also results in bad organisation. Such problems are taken care of by the Mail
Merge facility.
Page Break : Page Break is also known as "automatic or soft page break". To insert and remove Hard
Page Break (User defined Page break), bring the cursor to the insertion point where you want the
page break. Choose "Break" from the "Insert" menu bar or press "Ctrl+Enter".
Types of Page Margins : 1. Left Margin
2. Right Margin
3. Top Margin
4. Bottom Margin
Default left margin in MS-Word document is "1.25".
Gutter Margin : A margin that is added to the binding side of page when printing is known as "Gutter
Margin".
"Winword.exe" file is used to start MS-Word.
7/21/2015
39
MS - OFFICE EXCEL
Spread Sheet : Spread Sheet consists a standard grid, which may be scrolled and zoomed. Text,
numeric or date values or formulas may be entered into the selected cell through the formula bar at
the top of the screen.
Features of Spread Sheet
1.
Cell Formatting
2.
Multiple Worksheets
3.
4.
Import/Export
5.
Functions
6.
Charts
2.
3.
4.
List Auto Fill : It automacally extends cell formatting when a new item is added to the end of a list.
5.
Wizard : It guides to work effectively while you work by displaying various helpful tips and tech
niques based on what you are doing.
6.
Charts : This feature helps in presenting a graphical representation of your data in the form of Pie,
Bar, Line charts.
7.
Auto Shapes Toolbar : This feature helps to draw a number of geometrical shapes, arrows,
flowchart elements, stars and more.
8.
Pivot Table : It flips and sums data in seconds and allows you to perform data analysis and
generating reports like periodic financial statements, statistical reports etc.
7/21/2015
40
when you are on the Fill Handle. For example, if you type sunday in the active cell and then drag the Fill
Handle over five cells, Excel automatically inserts monday, tuesday etc.
Page break : To set page break within the worksheet, select the row you want to appear just below
the page break by clicking the row's label.
Merged Cells : Combine two or more cells together and formatting one big cell is known as "Merging
of Cells"
Cell References : Each cell of the worksheet has a unique reference. For example, K7, refers to the
cell containing column number "K" and row number "7".
Wrapper Text : It gives you the ability to put a lot of information into one cell without "Spilling over" into
an adjacent cell.
Charts : Charts help you display data in more meaning full way. We can use the chart wizard to
create a chart and we can use the chart Type command to change an existing chart. The available
chart types are column charts, Bar Charts, Line Charts, Pie charts, XY charts, Stock charts, area
charts, grant charts, histograms etc.
Key Board Shortcuts in Excel :
Ctrl + 0
Hide column
Ctrl + 1
Format Menu
Ctrl + 2
Bold
Ctrl + 3
Italics
Ctrl + 4
Underline
Ctrl +5
Strike through
Ctrl + 9
Hide Row
Ctrl + ; (Semicolon)=
Ctrl + : (Colon)
Copy the value from the cell above the current cell.
Ctrl + '(Apostrophe)=
Copy the formula from the cell above the current cell.
Ctrl + Shift + $
Currency Format
Ctrl + Shift + ~
Ctrl + Shift + !
Ctrl + Shift + %
Ctrl + Shift + )
Unhide Column
Ctrl + Shift + (
Unhide Row
Alt + Enter
Auto Sum
Shift + F3
Ctrl + Shift + [
To trace errors
By default MS-Excel consists of three (3) sheets. A worksheet is a set of cells aligned in rows and
7/21/2015
41
columns.
A MS-Word An Excel work sheet consists of 16,384 columns (A, B, C, .... XFD) and 10,48,576 rows.
The first cell in Excel worksheet is labeled as "A1".
To save and protect the workbook by
Write Reservation Password
Protection Password
Read-Only Recommended.
Legend : The box on the chart that contains the name of each individual record is called "Legend".
Formulas : In Excel worksheet, all formulas start with the "=" sign. To build a formula, first select the
cell in which you want the results to appear. After the = sign, type the cells you want to add or subtract
along with the mathematical operation you wish to perform.
For example, = C3+C4+C5, = B4-C4.
The easiest way to copy a formula is with the Fill Handle in the lower right corner of the cell.
Functions : A function is a predefined formula that operates on one or more values and returns one or
more values. All functions consist of a function name followed by a set of arguments in brackets. The
arguments specify the values or cells to be used by the function. The maximum number of arguments
allowed in a function is 30.
For example, SUM, MIN, MAX, AVERAGE, HYPERLINK, LOOKUP, COLUMN, HLOOKUP, ADDRESS,
AREAS, CHOOSE, ROMAN, RAND etc.
Examples of Commonly Used Formulas :
This
table
is
used
Type of Equation
with
the
sample
of cell 1/3
formula
= A2+B3
46
Addition of a Constant
= B1+25
53
= SUM (A1:A3)
28
= SUM (B2:C2)
105
= SUM (B1:C3)
237
= SUM (A1B3C2)
43
Subtraction of a Constant
= C110
85
Result
7/21/2015
below
42
Subtraction of a cell
= B2-B1
63
= B3*C3
20
Multiplication by a Constant
= A3 * 20
60
Multiplication by a%
= A1*40
10
Multiplication by a%
= B1*25%
Division by a cell
= A2/C2
Division by a Constant
= C1/5
19
Exponentiation(Squaring)
= B32
16
Exponentiation (Cubing)
= C33
125
Square Roots
= SQRT(A1)
Square Roots
= A10.5
Cube Roots
= B1(1/3)
3.036589
= A1+(A1*.04)
26
= A1*1.04
26
= A1+(A1*4%)
26
= A1-(A1*.08)
23
= A1*.92
23
= A1-(A1*8%)
23
= A3/$D$3
Average of a Column
= AVG (B1:B3)
41
Average of a Row
= AVG (A3:C3)
Average of a Range
= AVG (B1:C2)
57
= Sheet2.C4
The contents of
Cell C4 in Sheet 2
7/21/2015
43
MS-OFFICE POWERPOINT
Presentation Program : A Presentation program is a computer software package used to display
information, normally in the form of a slide show.
For example, Microsoft Powerpoint, Corel Presentations, Google docs, harward graphics etc.
MS-Powerpoint is a non-free commercial presentation program developed by Microsoft. MS-Power
Point presentations consist of a number of idnividual pages known as "Slides". The "Slide" analogy is
a reference to the slide projector. Slides may contain text, graphics, sound, movies, and other objects,
which may be arranged freely.
When you start Powerpoint, you can start with a blank presentation, or you can begin from a
template or use the "Auto Content Wizard".
Auto Content Wizard : The Auto Content Wizard is a series of step-by-step instructions designed to
assist you. The Template button accesses slide templates to help create a consistent, Professional
look for your slide presentation.
Slide Layout : The arrangement of elements such as title, subtitle text, pictures, tables etc. is called
"Layout". Slide Layouts define containers, positioning and formatting for all of the content that appears
on a slide. Slide Layouts are classified as two types.
1.
Standard Layouts : When you open a blank presentation in Powerpoint, the default layout called
Title Slide appears, but there are other standard layouts that you can apply and use.
2.
Custom Layout : You can create reusable custom layouts that specify the number, size and
location of placeholders, background content etc.
Template : A file which contains readymade styles that can be used for a presentation is called
"Template". After choosing a Pre-defined template, color scheme option has to be chosen to change
the background color. For example, "Ellipse Motion" is a Pre-defined animation scheme. The available
templates will appear in the Task Pane, and once you select one, Powerpoint will apply it to all the
slides.
Powerpoint Views :
1.
Normal View : It Provides a what-you-see-is-what-you-get mode for working with your slides. It
provides a comprehensive view for each slide with notes and outline.
2.
Outline View : In the outline view, the screen is predominantly occupied by a list of the slide titles
and bulleted items that are a part of those slides.
3.
Slide Show View : It is also called preview. It is used to run the whole presentation.
4.
Notes View : Each page corresponds to a slide in your presentation and includes a reduce image
of the slide. You can draw and type in Notes view the way you can in slide view.
Slide Sorter View : It presents thumbnail images of all of the slides in the presentation and
allows, through a simple dragging and dropping operation, a slide to be moved from one place in
the presentation to another.
Slide Master : The slide Master in a template is a slide that controls the formatting, text and objects
that appear on every slide in your presentation. For example, if you want a small picture to appear on
every slide, place that picture on the slide Master. Changes you make to the slide master also appear
on each slide in you presentation. The Slide Master has boxes already setup for the slide title and text.
They are called the "Master Title" and the "Master Body" object.
Slide Transition : A special effect used to introduce a slide in a slideshow is called "Slide Transition".
This features adds special effects to modify the appearance of the slides and the timing between
each slide. Transition effects help define how a presentation move from one slide to the next.
Animation defines how you want your listed information to come in and out of the presentation.
WEEW
7/21/2015
44
Computers
7/21/2015
45