You are on page 1of 80

US02FICT02 : Information and Communication Technology (ICT)

UNIT : 1 FYBSc (Sem II)

Unit 1 :
Learning Essential Computer Softwares
Microsoft Office Tools
Word : Creating, Formatting, Saving Documents in different types and destinations, identifying
andconverting file types like .doc, .pdf, .rtf etc.
Power Point : Preparation of Powerpoint slides, editing and formatting slides and making PPT
presentation.
Excel : Preparing Excel Workbooks and learning its various functions.

MS Word
A word processor (more formally known as document preparation system) is a computer application
used for the production (including composition, editing, formatting, and possibly printing) of any sort of
printable material.
Word processors are descended from early text formatting tools (sometimes called text justification
tools, from their only real capability). Word processing was one of the earliest applications for the
personal computer in office productivity.
Although early word processors used tag-based markup for document formatting, most modern word
processors take advantage of a graphical user interface. Most are powerful systems consisting of one or
more programs that can produce any arbitrary combination of images, graphics and text, the latter handled
with type-setting capability.

Characteristics
Word processing typically refers to text manipulation functions such as automatic generation of:
batch mailings using a form letter template and an address database (also called mail merging);
indices of keywords and their page numbers;
tables of contents with section titles and their page numbers;
tables of figures with caption titles and their page numbers;
cross-referencing with section or page numbers;
footnote numbering;

Other word processing functions include "spell checking" (actually checks against wordlists),
"grammar checking" (checks for what seem to be simple grammar errors), and a "thesaurus"
function (finds words with similar or opposite meanings). In most languages grammar is very
complex, so grammar checkers tend to be unreliable and also require a large amount of RAM.
Other common features include collaborative editing, comments and annotations, support for
images and diagrams and internal cross-referencing.
Almost all word processors enable users to employ styles, which are used to automate consistent
formatting of text body, titles, subtitles, highlighted text, and so on.
Styles are the key to managing the formatting of large documents, since changing a style
automatically changes all text that the style has been applied to. Even in shorter documents styles
can save a lot of time while formatting.

Page 1 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)

Typical usage of word


Word processors have a variety of uses and applications within the business world, home, and education.

1) Business
Within the business world, word processors are extremely useful tools. Typical uses include:
memos
letters and letterhead
legal copies
reference documents
Businesses tend to have their own format and style for any of these. Thus, versatile word processors
with layout editing and similar capabilities find widespread use in most businesses.

2) Education
Many schools have begun to teach typing and word processing to their students, starting as early as
elementary school. Typically these skills are developed throughout secondary school in preparation
for the business world. Undergraduate students typically spend many hours writing essays. Graduate
and doctoral students continue this trend, as well as creating works for research and publication.

3) Home
While many homes have word processors on their computers, word processing in the home tends to be
educational or business related, dealing with assignments or work being completed at home. Some use
word processors for letter writing, rsum creation, and card creation.

Creating a New Document


You can create new documents by using the menu option or the toolbar option. The menu option gives
you more options for choosing your new document. However, the toolbar is the faster and easier way of
getting a blank document on your screen.
Creating a New Document: Menu Option
1. From the File menu, select New...
The New Document task pane appears.
2. From the New section, click BLANK DOCUMENT
A new document appears.
Creating a New Document: Toolbar Option
1. On the Standard toolbar, click NEW BLANK DOCUMENT
A new document appears.

Saving a Document
The Save and Save As commands are located within the File menu. If you are saving a document for the
first time, either selection will take you to the Save As dialog box.
Saving a Document: First Time
Use this option if you are saving your document for the first time or if you are saving an already
saved file under a new name.

Page 2 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
1. From the File menu, select Save As...
The Save As dialog box appears.

2. From the Save in pull-down list, make the appropriate selection:


To save to your H: drive or another network drive, select (H:) or another network drive
To save to a floppy disk, select 3 Floppy (A:)
To save to the hard drive, select (C:)
.
3. In the File name text box, type a filename
HINTS:
To help you locate the file in the future, use a descriptive filename.
Do not include a file extension. Word automatically adds a .doc extension.
4. Click SAVE
The document is saved.

Save a file to another format (Save As command)


1. click Save As on the File menu., Keyboard shortcut To open the Save As dialog box, press ALT,
F, A.
2. In the File name box, enter a new name for the file.
3. In the Save as type list, click the file format that you want to save the file in. For example, click
Rich Text Format (.rtf), Web Page (.htm or .html), Portable Document Format( .PDF) or Comma
Delimited (.csv).
4. Click Save.

Page 3 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
Saving a Document: Subsequent Times
Use the Save command to save a document that has already been named and saved. If you select the
Save command and you have not saved the document before, you will need to use the Save As option.
Use the Save command to frequently save changes to your document.
1. From the File menu, select Save
OR
On the Standard toolbar, click SAVE
The document is saved under the current filename.
Opening a Document
Follow these instructions to open already existing documents.
1. From the File menu, select Open...
OR
On the Standard toolbar, click OPEN
OR
Press [Ctrl]+[O]
The Open dialog box appears.
2. From the Look in pull-down list, make the appropriate selection
HINTS:
Only Word files with a .doc extension are displayed.
If the desired file is not listed, it may have another file extension. From the Files of type pull down
list, select All Files.
3. Select the desired file
4. To open the file, click OPEN
The document is opened.

How to Format Text in Microsoft Word

Text formatting allows you to add a professional look to your documents but be careful and don't overuse
the effects as this will make your document look anything but professional.

It is always best to use the one Font Type throughout the whole document, as this gives the document a
look of conformity. The use of different colors and funky fonts detract from a document and makes them
look completely amateurish.

You can format text in Microsoft Word by changing font types, font size, and font style (bold, italics,
underline and color, etc.).

Select the text you want to format by highlighting


Go to the Format menu and select Font. The Font window opens.
Select the Font tab, if it is not already selected.
Select the Font, Font Style, and Font Size you want to use
Go to the Underline drop-down menu and select the type of underline you want, if any
Go to the Color drop-down menu and select the font color you want; black is the default color
Select the Effects you want in the Effects box by clicking on the checkbox for each effect you
want the text to have
Preview your changes in the Preview box at the bottom of the window

Page 4 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
Click OK
To only change the font type, highlight the text, go to the Font menu in the Formatting toolbar,
and select the font you want to use

PARAGRAPH FORMATING

When you are formatting a paragraph, you do not need to highlight the entire paragraph. Placing the
cursor anywhere in the paragraph enables you to format it. After you set a paragraph format, subsequent
paragraphs will have the same format unless you change their format.

You will need text to work with to perform the exercises for this lesson, so type the following exactly as
shown. End paragraphs where you see the end-of-paragraph marker (). Press Enter once to end the
paragraph, but do not leave spaces between paragraphs. You will set the space between paragraphs
during the exercise. Do not press Enter to move to a new line -- Microsoft Word automatically wraps at
the end of a line.

Sample Paragraphs
We will use this paragraph to illustrate several Microsoft Word features. It will be used to illustrate
Space Before, Space After, and Line Spacing. Space Before tells Microsoft Word how much space
to leave before the paragraph. Space After tells Microsoft Word how much space to leave after the
paragraph. Line Spacing sets the space between lines within a paragraph.
We will use this paragraph to illustrate some additional Microsoft Word features. It will be used to
illustrate first-line indent. With first-line indent, you can indent the first line of your paragraph. We
will also look at indentation. Indentation enables you to indent from the left or right margin of your
document.

Space Before and Space After

Space Before sets the amount of space before the paragraph. Space After sets the amount of space
after the paragraph. Following are the sample paragraphs with Space After set to 12 pt. The exercises
that follow give you a chance to see how Space Before and Space After work.

Example -- Space After


Sample Paragraphs

We will use this paragraph to illustrate several Microsoft Word features. It will be used to illustrate
Space Before, Space After, and line spacing. Space Before tells Microsoft Word how much space to
leave before the paragraph. Space After tells Microsoft Word how much space to leave after the
paragraph. Line Spacing sets the space between lines within a paragraph.

We will use this paragraph to illustrate some additional Word features. It will be used to illustrate
first-line indent. With first-line indent, you can indent the first line of your paragraph. We will also
look at Indentation. Indentation enables you to indent from the left and/or right margins of your
document.

Page 5 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)

Exercise 1
Space Before
Highlight the title of the sample text: "Sample Paragraphs."

1. Choose Format > Paragraph from the menu.


2. Choose the Indents and Spacing tab.
3. Enter 18 pt in the Before field.
4. Click OK. You now have 18 points before "Sample Paragraph."

Space After
1. Highlight all of the text you typed (the title and both paragraphs):
2. Choose Format > Paragraph from the menu.
3. Choose the Indents and Spacing tab.
4. Enter 12 pt in the After field.
5. Click OK. You now have 12 points after each paragraph.

Line Spacing

Line Spacing sets the amount of space between lines within a paragraph. Single spacing is the default.
The spacing for each line is set to accommodate the largest font on that line. If there are smaller fonts
on the line, there will appear to be extra space between lines where the smaller fonts are located. At
1.5 lines, the Line Spacing is set to one-and-a-half times the single-space amount. For double-spaced
lines, the line spacing is set to two times the single-space amount.

Exercise 2
1. Highlight the first paragraph you typed, starting with "We will use" and ending with "within a
paragraph."
2. Choose Format > Paragraph from the menu.
3. Choose the Indents and Spacing tab.
4. Click to open the drop-down menu on the Line Spacing field.
5. Click 1.5 Lines.
6. Click OK. Your line spacing for the paragraph is now 1.5.

First-Line Indent

This exercise demonstrates how you can indent the left side of the first line of your paragraph, as in
the following example.

Example -- First-line Indent


The first-line indent feature indents the first line of the paragraph. The amount of the indent is
specified in the By field. The remainder of the paragraph is indented by the amount specified in the
Indentation field.

Page 6 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)

Exercise 3
1. Highlight the second paragraph you typed, beginning with "We will use" and ending with "of your
document."
2. Choose Format > Paragraph from the menu.
3. Choose the Indents and Spacing tab.
4. Click to open the drop-down menu on the Special field.
5. Click First Line.
6. Enter 0.25" in the By field.
7. Click OK.

The first line of your paragraph is now indented .25 inches.

Special Note: To remove the first line indent:

1. Place the cursor anywhere in the paragraph.


2. Choose Format > Paragraph from the menu.
3. Choose the Indents and Spacing tab.
4. Click in the Special pull-down menu; then Click None.
5. Click OK.

Indentation

Indentation allows you to indent your paragraph from the left or right margin. The following examples
show different types of indentation.

Example -- Indentation
We will use this paragraph to illustrate several Word features. We will illustrate Space Before, Space
After, and Line Spacing. Space Before tells Word how much space to leave before the paragraph.
Space After tells Word how much space to leave after the paragraph. Line Spacing sets the space
between lines within a paragraph.

We will use this paragraph to illustrate some additional Word features. We will illustrate first-line
indent. With first-line indent, you can indent the first line of your paragraph. We will also look at
Indentation. Indentation enables you to indent from the left or right margins of your document.

Exercise 4
1. Highlight the second paragraph, beginning with "We will use" and ending with " of your
document "
2. Choose Format > Paragraph from the menu.
3. Type 1" in the Left field.
4. Type 1" in the Right field.
5. Click OK. Your paragraph is now indented one inch from both the left and right margins, as in the
example.

Page 7 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
Alignment

Microsoft Word gives you a choice of several types of alignment. Left-justified text is aligned on the
left side. It is the default setting.

Example -- Left-Justified
Sample Paragraph

This is a sample paragraph. It is used to illustrate alignment. Left-justified text is aligned on the left.
Right-justified text is aligned on the right. Centered text is centered between the left and right
margins. You can use Center to center your titles. Justified text is flush on both sides.

Right-justified text is aligned on the right side.

Example -- Right-Justified
Sample Paragraph

This is a sample paragraph. It is used to illustrate alignment. Left-justified text is aligned on the left.
Right-justified text is aligned with on the right. Centered text is centered between the left and right
margins. You can use Center to center your titles. Justified text is flush on both sides.

Centered text is centered between the left and right margins.

Example -- Centered

Sample Paragraph

This is a sample paragraph. It is used to illustrate alignment. Left-justified text is aligned on the left.
Right-justified text is aligned with on the right. Centered text is centered between the left and right
margins. You can use Center to center your titles. Justified text is flush on both sides.

Justified text is flush on both sides.

Example -- Justified
Sample Paragraph

This is a sample paragraph. It is used to illustrate alignment. Left-justified text is aligned on the
left. Right-justified text is aligned with on the right. Centered text is centered between the left and
right margins. You can use Center to center your titles. Justified text is flush on both sides.

The following exercises demonstrate how to justify text.

Page 8 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)

Exercise 5
Right-Justify
1. Return to the first paragraph you typed, beginning with "We will use" and ending with "within a
paragraph." Highlight the paragraph.
2. Choose Format > Paragraph from the menu.
3. Choose the Indents and Spacing tab.
4. Click to open the Alignment pull-down menu.
5. Click Right.
6. Click OK. The paragraph is now right-aligned.

Left-Justify
1. Highlight the first paragraph you typed, beginning with "We will use" and ending with "within a
paragraph."
2. Choose Format > Paragraph from the menu.
3. Choose the Indents and Spacing tab.
4. Click to open the Alignment pull-down menu.
5. Click Left.
6. Click OK. The paragraph is now left-aligned.

Alternate Method -- Right-Justify by Using Keys


1. Highlight the text.
2. Press Ctrl-r. The paragraph is now right-aligned.

Alternate Method -- Left-Justify by Using Keys


1. Highlight the text.
2. Press Ctrl-l. The paragraph is now left-aligned.

Alternate Method -- Right-Justify by Using the Icon


1. Highlight the text.
2. Click the Align Right icon . The paragraph is now right-aligned.

Alternate Method -- Left-Justify by Using the Icon


1. Highlight the text.
2. Click the Align Left icon . The paragraph is now left-aligned.

Center - Using the Menu


1. Highlight the first paragraph you typed, beginning with "We will use" and ending with "within a
paragraph."
2. Choose Format > Paragraph from the menu.
3. Choose the Indents and Spacing tab.
4. Click to open the Alignment pull-down menu.

Page 9 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
5. Click Centered.
6. Click OK. The paragraph is now centered.

Justify - Using the Menu


1. Highlight the first paragraph you typed, beginning with "We will use" and ending with "within a
paragraph."
2. Choose Format > Paragraph from the menu.
3. Choose the Indents and Spacing tab.
4. Click to open the Alignment pull-down menu.
5. Click Justified.
6. Click OK. The paragraph is now justified.

Alternate Method -- Justify and Center by Using Keys


1. Highlight the text.
2. Press Ctrl-e. The text is now centered.
3. Press Ctrl-j. The text is now justified.

Alternate Method -- Justify and Center by Using the Icon


1. Highlight the text.
2. Click the Center icon . The text is now centered.

3. Click the Justify icon . The text is now justified.

Hanging Indent

The hanging indent feature indents each line except the first line by the amount specified in the By
field, as shown in the example.

Example: Hanging Indent


Hanging Indent: The hanging indent feature indents the first line of the
paragraph from the margin by the amount specified in the
Left field. The amount in the Left field plus the amount
specified in the By field indent all subsequent lines.

Exercise 6
When you begin typing the following paragraph, you might find that your paragraph is indented one
inch on both sides. When you start a new paragraph in Microsoft Word, the setting from the previous
paragraph carries over. If you wish, you can reset the indentation. If you choose not to reset the
indentation, it will not affect your ability to perform the exercise.

1. Type the following:


Hanging Indent: The hanging indent feature indents the first line by the amount specified in
the Left field. Subsequent lines are indented by the amount specified in the Left field plus the
amount specified in the By field.
Highlight the paragraph you just typed.

Page 10 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
2. Choose Format > Paragraph from the menu.
3. Choose the Indents and Spacing tab.
4. In the Special field, click to open the pull-down menu.
5. Click Hanging.
6. In the By box, type 2.0".
7. Click OK.
8. Place the cursor after the colon following "Hanging Indent."
9. Press the Tab key.
10. Notice how the indentation changes.

POWER POINT
Microsoft PowerPoint is a proprietary presentation program developed by Microsoft. It is part of
the Microsoft Office system, and runs on Microsoft Windows and the Mac OS computer operating
systems.

PowerPoint is widely used by business people, educators, students, and trainers and is among the
most prevalent forms of persuasive technology.

The PowerPoint software program allows you to create slide presentations that can be viewed on
any computer. While some graphic artists specialize in developing compelling presentations,
anyone can develop a PowerPoint slide presentation that is attractive and readable.

VIEW OF POWER POINT :

Microsoft PowerPoint has three main views: normal view, slide sorter view, and slide show view.
You can select a view, based on these main views, to be your default view in PowerPoint.

Normal view :-
Normal view is the main editing view, which you use to write and design your presentation. The
view has three working areas: on the left, tabs that alternate between an outline of your slide text
(Outline tab) and your slides displayed as thumbnails (Slides tab); on the right, the slide pane,
which displays a large view of the current slide; and on the bottom, the notes pane.

Page 11 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
Outline tab
Showing your slide text in outline form, this area is a great place to start writing your content to
capture your ideas, plan how you want to present them, and move slides and text around.

Slides tab
Switch to this tab to see the slides in your presentation as thumbnail-sized images while you edit.
The thumbnails make it easy for you to navigate through your presentation and to see the effects
of your design changes. You can also rearrange, add, or delete slides.

Slide pane
With the current slide shown in this large view, you can add text, insert pictures, tables, charts,
drawing objects, text boxes, movies, sounds, hyperlinks, and animations.

Notes pane
Add notes that relate to each slide's content, and use them in printed form to refer to as you give
your presentation, or create notes that you want your audience to see either in printed form or on a
Web page.
The Outline and Slides tabs change to display an icon when the pane becomes narrow, and if you
only want to see the current slide in the window as you edit, you can close the tabs with a Close
box in the right corner.

Drag the splitter bar to narrow the pane; the tab names turn into icons.
You can adjust the size of the different panes in normal view by dragging the pane borders.

Slide sorter view :-


Slide sorter view is an exclusive view of your slides in thumbnail form.

When you are finished creating and editing your presentation, slide sorter gives you an overall
picture of it making it easy to reorder, add, or delete slides and preview your transition and
animation effects.

Slide show view :-

Slide show view takes up the full computer screen, like an actual slide show presentation. In this
full-screen view, you see your presentation the way your audience will. You can see how your
graphics, timings, movies, animated elements, and transition effects will look in the actual show.

Page 12 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
How To Create Power point Presentation:-

1) Open your PowerPoint program. When the dialog box opens, click on the "Blank
Presentation" option.
2) Choosen an "AutoLayout" format. Begin with the title slide layout, which is the first one
on the left. Click "OK," and you will have a title slide to work with.
3) Add text to your slide by clicking in the title text box and typing a title. Do the same thing
in the subtitle box.
4) Create another slide by clicking the "New Slide" button on the Common Tasks toolbar.
When the AutoLayout dialog box appears, choose a layout for this slide. Keep adding new
slides until your presentation is complete.
5) Move from slide to slide by clicking the button on the lower-right corner of the PowerPoint
window. Clicking the button with the upward-pointing arrows will take you to the previous
slide, and clicking the button with the downward-pointing arrows will take you to the next
slide.
6) Save your presentation. Click the "File" menu and then click "Save As." A dialog box will
appear, and you'll be able to type in a name for your presentation. The presentation will be
saved to your hard drive.

How to edit in power point :

1) Open the PowerPoint file with your PowerPoint Software. Click the "New Slide" button at
the top of the screen if you want to add a new slide to the presentation file.
2)

Slide Thumbnails

Click the slide thumbnails along the left side of the screen to move to a specific slide you
want to edit.

3) Click the "Slide Sort View" button in the bottom left of the corner to view all your slides as
thumbnails. Then, click and drag to rearrange the slide order. Click the "Slide Themes"
button at the top of the screen if you want to change the color theme for the entire
presentation to something new.
4)

Selected Object

Page 13 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
Click slide objects to select them. Press delete if you want to remove a selected object. Use
the formatting palette to change settings for a selected object.

5) Click on a slide object and drag when the cursor is a cross-hairs to move the object to a
new position. Click and drag on object outline handles to resize.

Insert New Object Buttons

Use the "Insert" buttons on the toolbar at the top of the screen to add new objects (text,
pictures, movies, charts, tables or shapes) to a slide. Multiple objects can be added to the
same slide with these buttons or the Insert menu.

How to format Power point Presentation :


Changing a Slide's Appearance
1) Choose a type of slide layout, either by clicking new slide or by choosing "Format" and "Slide
Layout." After choosing a slide layout, fill the slide with content, either text, media or both.
2) Choose a design theme from PowerPoint's available themes. In the task bar at the top of
PowerPoint, there is a button for "Slide Design." Click that button and a variety of themes will
appear. Choose the theme that is best for your presentation. Many themes will come with default
font styles and sizes.
3) Highlight the font on each slide. In the task bar at the top of PowerPoint, there should be font
formatting tools, including font style, size and color. Play around with different fonts and sizes
and choose the one that is most appropriate for your presentation. Be aware that using all caps
fonts is distracting.

Adding Transitions
1) Click on the slide show button in PowerPoint's menu bar. The click on the "Slide Transitions"
button.
2) Peruse the different transitions available in PowerPoint. Choose one that is best for your
presentation style. Choose to apply it to just one slide or all slides. You can also set a time limit on
each slide, or select it to play when the mouse is clicked.
3) Practice your presentation with the transitions and the formatted designs. This will allow you to be
aware of the look and feel of the presentation, and make any formatting changes before it's time to
present.

Page 14 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)

EXCEL SPREADSHEET
What is Excel ?
Microsoft Excel is a spreadsheet program which allows one to enter numerical values or data into the
rows or columns of a spreadsheet, and to use these numerical entries for such things as calculations,
graphs, and statistical analysis.

So let's get started digging into what makes a spreadsheet work. Spreadsheets are made up of
columns
rows
and their intersections are called cells
In each cell there may be the following types of data
text (labels)
number data (constants)
formulas (mathematical equations that do all the work)

In a spreadsheet the COLUMN is defined as the vertical space that is going up and down the window.
Letters are used to designate each COLUMN'S location.

In the above diagram the COLUMN labeled C is highlighted.


In a spreadsheet the ROW is defined as the horizontal space that is going across the window.
Numbers are used to designate each ROW'S location.

In the above diagram the ROW labeled 4 is highlighted.


In a spreadsheet the CELL is defined as the space where a specified row and column intersect. Each
CELL is assigned a name according to its COLUMN letter and ROW number.

Page 15 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)

In the above diagram the CELL labeled B6 is highlighted. When referencing a cell, you should
put the column first and the row second.

A Simple Spreadsheet:

Title Bar Displays the name of the current program and workbook.
Menu Bar Displays the names of the Excel menus.
Standard Toolbar Displays the buttons of the most frequently used functions.
Name Box Displays the coordinates of the active cell.
Formula Bar Displays the contents of the active cell.
Status Bar Displays information about a selected command as well as the
status of certain keys, such as CapsLock and NumLock
Scroll Bars Used to move through the worksheet. You can move up, down,
left, and right.
Select All Button Selects every cell in a worksheet.
Sheet Tabs Displays the names of the worksheets within a workbook.

Page 16 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
Tab Scrolling Button Used to scroll through the worksheets in a workbook.
Worksheet A single page in a workbook, divided into rows and columns.
Columns and rows intersect to form cells.
Active Cell The cell surrounded by a border where you enter or edit data.
Minimize button Minimizes the window to a button on the Windows taskbar.
Maximize/Restore button Toggles (switches back and forth) between displaying a window
in its maximum size and restoring a window to its previous size.
Close Window Button Closes the current window.
Close Button Closes the current program.

Sample Sheet :

This is what a basic spreadsheet may look like, keeping track of the grades for five students. As
you'll notice, numbers automatically align to the right, while text automatically aligns to the left.
Room has been allowed at the top and the left for column and row headings, which have been
placed in bold.

Simple Formulas:

"92.67" was not entered as the contents for cell "E2." The "formula bar" has the following entered
into it: =(B2+C2+D2)/3
By following the normal order of operations, the contents of the three cells in parenthesis (B2, C2,
and D2) are all added to each other, and then divided by 3. This gives an average of the three
grades, which is then shown in the cell "E2" (where the formula was entered).
If you wanted to do the same for students 2 through 5, you would enter in similar formulas for
each cell from "E3" to "E6" replacing the column and row numbers where appropriate. An easy
method to replicate formulas is to select the cell which contains the original formula ("E2" in this
case), click the bottom right corner of the selection box, and drag down several rows (to "E6" in
this example). The formula will be copied down in each cell, and will change itself to reflect each
new row.

Page 17 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
Insert Rows & Columns:
You may find that you need to insert a new, blank row where there isn't a blank row any more. To
insert a new blank row, place your cursor directly below where you would like a new row. Select
Insert >> Rows. To insert a new column, place the cursor in a cell directly to the right of where
you would like the column. Select Insert >> Columns.

Cell Formatting:
You may notice that, by default, Excel will leave as many decimal points as possible within the
cells width restraints; as you increase the cells width, the number of decimal points increases.
Select Cells from the Format menu. A new window will appear with a wide

variety of ways in which to customize your spreadsheets.

Page 18 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
For example, if we wanted to set the percentages fixed to only two decimal points, you can make
this selection under the Number category within the Number tab. You can also set the
formatting for things such as the date, time, currency, etc. The Font tab will also allow you to
change the default font used on the spreadsheet. The other tabs provide even more ways to
customize your spreadsheet and its appearance; experiment with the settings to see what works best
for you.

EXCEL FUNCTIONS

1) AVERAGE : Returns the average (arithmetic mean) of the arguments.

Syntax : AVERAGE(number1,number2,...)

Number1, number2, ... are 1 to 30 numeric arguments for which you want the average.

Remarks
The arguments must either be numbers or be names, arrays, or references that contain numbers.
If an array or reference argument contains text, logical values, or empty cells, those values are
ignored; however, cells with the value zero are included.
EXAMPLE :

A
Data
10
7
9
27
2
Formula Description (Result)
=AVERAGE(A2:A6) Average of the numbers above (11)
=AVERAGE(A2:A6, 5) Average of the numbers above and 5 (10)

2) COUNT : Counts the number of cells that contain numbers and also numbers within the list of
arguments. Use COUNT to get the number of entries in a number field that's in a range or
array of numbers.

Syntax : COUNT(value1,value2,...)

Value1, value2, ... are 1 to 30 arguments that can contain or refer to a variety of different types
of data, but only numbers are counted.

Page 19 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
Remarks

Arguments that are numbers, dates, or text representations of numbers are counted; arguments that
are error values or text that cannot be translated into numbers are ignored.

EXAMPLE
A
Data
Sales
12/8/2008

19
22.24
TRUE
#DIV/0!

Formula Description (Result)


=COUNT(A2:A8) Counts the number of cells that contain numbers in the list above (3)
=COUNT(A5:A8) Counts the number of cells that contain numbers in the last 4 rows of the list (2)
=COUNT(A2:A8,2) Counts the number of cells that contain numbers in the list, and the value 2 (4)

3) MAX : Returns the largest value in a set of values.

Syntax : MAX(number1,number2,...)

Number1, number2, ... are 1 to 30 numbers for which you want to find the maximum value.

Remarks

You can specify arguments that are numbers, empty cells, logical values, or text representations of
numbers. Arguments that are error values or text that cannot be translated into numbers cause
errors.
If an argument is an array or reference, only numbers in that array or reference are used. Empty
cells, logical values, or text in the array or reference are ignored. If logical values and text must
not be ignored, use MAXA instead.
If the arguments contain no numbers, MAX returns 0 (zero).

Page 20 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
EXAMPLE

A
Data
10
7
9
27
2
Formula Description (Result)
=MAX(A2:A6) Largest of the numbers above (27)
=MAX(A2:A6, 30) Largest of the numbers above and 30 (30)

4) MIN : Returns the smallest number in a set of values.

Syntax : MIN(number1,number2,...)

Number1, number2, ... are 1 to 30 numbers for which you want to find the minimum value.

Remarks
You can specify arguments that are numbers, empty cells, logical values, or text representations of
numbers. Arguments that are error values or text that cannot be translated into numbers cause
errors.
If an argument is an array or reference, only numbers in that array or reference are used. Empty
cells, logical values, or text in the array or reference are ignored. If logical values and text should
not be ignored, use MINA instead.
If the arguments contain no numbers, MIN returns 0.

EXAMPLE :

A
Data
10
7
9
27
2
Formula Description (Result)
=MIN(A2:A6) Smallest of the numbers above (2)
=MIN(A2:A6,0) Smallest of the numbers above and 0 (0)

Page 21 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
5) SUM : Adds all the numbers in a range of cells.

Syntax : SUM(number1,number2, ...)

Number1, number2, ... are 1 to 30 arguments for which you want the total value or sum.

Remarks
Numbers, logical values, and text representations of numbers that you type directly into the list of
arguments are counted. See the first and second examples following.
If an argument is an array or reference, only numbers in that array or reference are counted. Empty
cells, logical values, text, or error values in the array or reference are ignored. See the third
example following.
Arguments that are error values or text that cannot be translated into numbers cause errors.

EXAMPLE :

A
Data
-5
15
30
'5
TRUE
Formula Description (Result)
=SUM(3, 2) Adds 3 and 2 (5)
Adds 5, 15 and 1, because the text values are translated into numbers, and
=SUM("5", 15, TRUE)
the logical value TRUE is translated into the number 1 (21)
=SUM(A2:A4) Adds the first three numbers in the column above (40)
=SUM(A2:A4, 15) Adds the first three numbers in the column above, and 15 (55)
Adds the values in the last two rows above, and 2. Because nonnumeric
=SUM(A5,A6, 2) values in references are not translated, the values in the column above are
ignored (2)

6) PRODUCT : Multiplies all the numbers given as arguments and returns the product.

Syntax : PRODUCT(number1,number2,...)

Number1, number2, ... are 1 to 30 numbers that you want to multiply.

Remarks
Arguments that are numbers, logical values, or text representations of numbers are counted;
arguments that are error values or text that cannot be translated into numbers cause errors.

Page 22 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
If an argument is an array or reference, only numbers in the array or reference are counted. Empty
cells, logical values, text, or error values in the array or reference are ignored.

EXAMPLE :

A
Data
5
15
30
Formula Description (Result)
=PRODUCT(A2:A4) Multiplies the numbers above (2250)
=PRODUCT(A2:A4, 2) Multiplies the numbers above and 2 (4500)

7) POWER : Returns the result of a number raised to a power.

Syntax : POWER(number,power)

Number is the base number. It can be any real number.


Power is the exponent to which the base number is raised.

Remark

The "^" operator can be used instead of POWER to indicate to what power the base number is to
be raised, such as in 5^2.

EXAMPLE

A B
Formula Description (Result)
=POWER(5,2) 5 squared (25)
=POWER(98.6,3.2) 98.6 raised to the power of 3.2 (2401077)
=POWER(4,5/4) 4 raised to the power of 5/4 (5.656854)

Page 23 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
STRING FUNCTION

1) LEN :- LEN returns the number of characters in a text string.

Syntax : LEN(text)

Example (LEN)
The example may be easier to understand if you copy it to a blank worksheet.

A
Data
Phoenix,

One
Formula Description (Result)
=LEN(A2) Length of the first string (8)
=LEN(A3) Length of the second string (0)
=LEN(A4) Length of the third string, which includes 5 spaces (8)

2) UPPER :- Converts text to uppercase.

Syntax : UPPER(text)

Text is the text you want converted to uppercase. Text can be a reference or text string.

Example
The example may be easier to understand if you copy it to a blank worksheet.

A
Data
Total
Yield
Formula Description (Result)
=UPPER(A2) Upper case of first string (TOTAL)
=UPPER(A3) Upper case of second string (YIELD)

Page 24 of 25
US02FICT02 : Information and Communication Technology (ICT)
UNIT : 1 FYBSc (Sem II)
3) LOWER :- Converts all uppercase letters in a text string to lowercase.

Syntax : LOWER(text)

Text is the text you want to convert to lowercase. LOWER does not change characters in text
that are not letters.

Example
The example may be easier to understand if you copy it to a blank worksheet.

A
Data
E. E. Cummings
Apt. 2B
Formula Description (Result)
=LOWER(A2) Lower case of first string (e. e. cummings)
=LOWER(A3) Lower case of last string (apt. 2b)

4) MID :- MID returns a specific number of characters from a text string, starting at the position you
specify, based on the number of characters you specify.

Syntax : MID(text,start_num,num_chars)

Remarks
If start_num is greater than the length of text, MID returns "" (empty text).
If start_num is less than the length of text, but start_num plus num_chars exceeds the length of
text, MID returns the characters up to the end of text.
If start_num is less than 1, MID returns the #VALUE! error value.
If num_chars is negative, MID returns the #VALUE! error value.

Example (MID)
The example may be easier to understand if you copy it to a blank worksheet.
A
Data
Fluid Flow
Formula Description (Result)
=MID(A2,1,5) Five characters from the string above, starting at the first character (Fluid)
=MID(A2,7,20) Twenty characters from the string above, starting at the seventh (Flow)
Because the starting point is greater than the length of the string, empty text is
=MID(A2,20,5)
returned ()

Page 25 of 25
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)
Unit.2 Communication Technology
Email : Writing E-mails to single and multiple users. Attaching a file, Marking CC
and BCC, Creating exclusive communication group.
LCD Projector : Using LCD projector for making an audio-visual presentation.
Tele/Video Conferencing
Blogging and Chating
Fax and Mobiles

E-Mail (Electronic mail):


Definition:
Email, e-mail or electronic mail is the transmission of messages (emails or email messages)
over electronic networks like the internet.
OR
Electronic mail, commonly called email or e-mail, is a method of exchanging digital
messages across the Internet or other computer networks.

Advantages:
Freedom of movement
Easy to use
Free
Always available
You can send letters, notes, files, data, or reports
Disadvantages:
Limited storage space for messages.
No offline access to your email.

E-mail in Four Parts


The Address
The Attachment
The Subject Line
The Body

Page 1 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)

General format of E-mail:


An email address usually consists of 2 elements:
name@company.organization code.country code

Examples of email addresses for people in the United States:


abc@gmail.com
abc@palm.co.in
How to Attach a File to an Email:
Emails are a popular, effective, and fast way to communicate. Attaching a file to an email is
an easy way to send important documents and/or photos.

Page 2 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)
Sending an Email to Multiple Recipients - Cc: and Bcc:
CC (Carbon Copy) : Everyone in the To and CC are visible.
When you send a message to more than one address using the Cc: field, both the
original recipient and all the recipients of the carbon copies see the To: and Cc:
fields including all the addresses in them.
Bcc(Blind Carbon Copy): Its totally invisible so nobody can see it.
A BCC (blind carbon copy; also Bcc) is a copy of an email message sent to a
recipient whose email address does not appear in the message.

Creating Groups:

Step 1 : Click on the "Contacts" tab on your left panel.

This will open your Contacts page where most of your contacts will be located under "Other
Contacts".

Step 2 : Click on "New Group" to create an mailing list or a group of email contacts.

I am choosing Science Grp. as the name. Click OK

Step 3 : Once you have created the email group. Go to your "Other Contacts" tab and select the
people you want to add in your new mailing group.

Page 3 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)

Step 4 : After selecting people, click "Groups" from the menu list and select the group you want to
add those contacts to. (Science Grp in this case)
Done Now you can send email to group in Gmail. You can create different groups for different
reasons, ultimately it about sending one email to many people at once easily.

Page 4 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)
LCD (Liquid Crystal Display)Projector:

There are basically two types of projectors, namely LCD and DLP (Digital Light Processing)
designs.
An LCD projector is a type of video projector for displaying video, images or computer data on
a screen or other flat surface.
LCD Projection is by far the cheaper method of getting great home cinema.

Difference in LCD and DLP Projector:

Advantages:
1.Higher contrast and brightness capability. LCD is generally more 'light efficient' than the DLP.
For example, if you use a lamp of the same wattage in both an LCD and DLP, the LCD will
produce a brighter image.
2. Lower power consumption.
3. LCD produces a sharper image (more precisely focused).

Disadvantages:
1. Since an LCD chip is made up of a panel of individual pixels, if one pixel burns out it displays an
annoying black or white dot on the projected image. Individual pixels cannot be repaired, if one or
more pixels burn out, the entire chip has to be replaced.
2. They are more complex so they are not easy repairable and also they very expensive to repair.

Common Usage for Students:


1.Multimedia Presentations
2.Classroom Uses
3. Presentations

Page 5 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)
Teleconferencing :
A teleconference or tele-seminar is the live exchange of information among several persons
and machines remote from one another but linked by a telecommunications system.
Terms such as audio conferencing, telephone conferencing and phone conferencing are also
sometimes used to refer to teleconferencing.
Teleconferencing was first introduced in the 1960's in America.
By teleconference you can share audio, video, data etc.

Advantages:
1. Reduce the cost of meeting.
2. Reduce traveling cost and also traveling time.
3. Teleconference make whole staff involved where in the personal meeting it is
not possible.
4. Immediate, on-demand availability
5. Lengthy call time with the option of an extension.
6. Toll-free dial-in access.

Disadvantages:
1. One-to-one, social interaction not possible.
2. Due to Technical problem meeting may be canceled. Like Equipment not working
or problem in the connection
3. Lack of participant familiarity with the equipment, the medium itself, and meeting
skills.

Video Conferencing:
A videoconference or video conference (also known as a video teleconference) is a set of
interactive telecommunication technologies which allow two or more locations to interact
via two-way video and audio transmissions simultaneously.
It has also been called 'visual collaboration' and is a type of groupware.

Page 6 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)

Devices Need:
Video input : video camera or webcam
Video output: computer monitor , television or projector
Audio input: microphones, CD/DVD player, cassette player.
Audio output: usually loudspeakers associated with the display device or telephone
Data transfer: analog or digital telephone network, LAN or Internet.

BLOG:
A blog is personal information or collection of post that shared by a person on internet.
It is about what you like, dislike, who you are etc.
A blog is a frequently updated online personal journal or diary.
It is a place to express yourself to the world. A place to share your thoughts and your
passions.

Blog - a journal or diary that is on the Internet.


Blogger - a person who keeps a blog.
Blogging - the action of writing a blog.

Page 7 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)

1. Advertising - Many blogs have advertising banners on them. Most often the money
generated by advertising goes to the company providing the blog software, not the
individual blogger.
2. Title - The blog's title.
3. Date - The date of the most recent post. You will notice that previous posts have been
pushed down on the page to fit below the most recent one.
4. Post Title - The title of the most recent post.
5. Text - The actual text of the most recent post.
6. Posting Information - Information telling who wrote that particular post and when it was
posted to the blog.
7. Comments - An area for readers of the blog to add their comments. This is an option some
bloggers use and others avoid.
8. Previous Posts - A list of the most recent posts.
9. Archives - A link to view the archive section which contains older posts.

CHAT:
A chat is informal conversion between two or more people via internet.

OR
Online chat can refer to any kind of communication over the Internet between two or more
people.
There are two types of chat.

Page 8 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)
1. Moderated : Moderator enforces rules about what is acceptable to discuss in a given chat
space.
Some sites run software in place of human moderators - automatically removing chatters for
using inappropriate language or for violating the terms of service.
2. Un-Moderated .Where in this you can chat about anything you like.

Mobile:
A mobile phone (also called mobile, cellular telephone, cell phone,) is an electronic
device used for two-way radio telecommunication over a cellular network
A cellular phone is a portable telephone that does not use a wired connection. It
connects to a wireless carrier network using radio waves.

Main Uses for Mobile Phones :


The most popular uses and applications for mobile phones are:
Voice calling Talking on the telephone.
Voice mail Callers can leave a message if your phone is busy or turned off.
E-mail Send and receive e-mails with other e-mail addresses.
Messaging Send and receive text, picture and instant (chat) messages with other mobile
phone users and e-mail addresses. See Text Messaging Acronyms and Abbreviations.
Mobile content Get news, weather, sports, financial and other information from mobile
service providers or from Internet Web sites.
Gaming Play games that are downloaded to your handset or played online on the Internet.
Personalize your phone to your own style by adding custom ringtones, ringback tones,
face-plates, themes, background images, icons, voice greetings and screen-savers.
Play music using an audio (MP3) player to play downloaded tracks or listen to radio.
Take photos or videos with a built-in camera. Then send the image files to others.
Download and view images with a photo (JPEG) viewer or video (MPEG) player.
Organize personal information using a calendar, clock, alarm, address book, task
manager or memo pad.
Shop Make retail purchases from Web-based stores (e-commerce).
Bank Manage your money using an e-wallet.
Location-based services Maps & directions. Retail store directory. Track persons, cars,
pets, etc.

Page 9 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)
Types of Mobile Phone Handsets
There are five types of mobile phone handsets and devices. The lines between the types are
blurring as each one adopts certain features of the others:

Standard cellular phone Also called a cell phone, mobile phone or wireless phone.
Provides basic mobile phone features. Some models provide advanced features such as
ringtones, camera and push-to-talk.

Smart phone Smart phones are cell phones with advanced digital media features such as
e-mail, messaging, web browsing, audio, video, personal information management and
text/data entry.
Apple offers the popular iPhone touch-screen handset.
The most common Smartphone operating system is the Symbian platform. Symbian PLC is
a software development consortium owned by Nokia, Ericsson, Sony Ericsson, Panasonic,
Siemens and Samsung.

PDA phone PDA phones are wireless Personal Digital Assistant devices that have
evolved into providing cell phone-like features.
Major manufacturers are Palm One, Hewlett-Packard and Dell. Popular operating systems
are Palm OS and Microsoft Mobile Pocket PC.

BlackBerry Made by Research In Motion Inc. is a portable device for e-mail and phone.
It has a small easy-to-use keyboard for simple e-mail, massaging , attachment viewing,
WML/HTML browsing and voice calling. Service is provided by partner wireless carriers
around the world.

Satellite phone Use a system of earth-orbiting satellites to connect a mobile phone to the
public telephone networks. Major handset manufacturers are . Motorola.
The main advantage of satellite phone service is total worldwide coverage. Disadvantages
are audio delay, signal interference and high costs.

Page 10 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)
FAX :( Facsimile)

A fax (short for facsimile) is a document sent over a telephone line.


OR
A facsimile or "fax" machine sends a document image over telephone lines to a distant
receiver.
OR
A facsimile machine, or fax machine, scans a document and transmits a copy of the
document over a telephone line or an Internet protocol (IP) network.

Fax machines are an integral part of businesses worldwide. Although the Internet is often
used for faxing purposes, the fax machine is still important in the workplace.
Fax machines have existed, in various forms, since the 19th century, though modern fax
machines became feasible only in the mid-1970s as the sophistication of technology
increased and cost of the three underlying technologies dropped.
Digital fax machines first became popular in Japan, where they had a clear advantage over
competing technologies like the teleprinter.
Data transmission rate
Several different telephone line modulation techniques are used by fax machines. They are
negotiated during the fax-modem handshake, and the fax devices will use the highest data rate that
both fax devices support, usually a minimum of 14.4 kbit/s for Group 3 fax.

ITU Standard Released Date Data Rates (bit/s)


V.27 1988 4800, 2400
V.29 1988 9600, 7200, 4800
V.17 1991 14400, 12000, 9600, 7200
V.34 1994 28800
V.34bis 1998 33600

Note that 'Super Group 3' faxes use V.34bis modulation that allows a data rate of up to 33.6 kbit/s.

Page 11 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)
MCQ
1.Abbreviation for E-mail is
(a)Embedded mail (b)Emergency mail (c)Electronic mail (d)Extra mail

2. E-mails are used for


(a)transmission of message over electronic network (b)playing games (c)developing software (d)
all of above

3. In e-mails, @ symbols specifies


(a)name or address of receiver (b)E-mail cost(c)E-mail time (d)none of these

4. Following is the proper example of e-mail address


(a)@yahoo.code (b)info1947@vpsci.org (c)vpsciencecollege.com@ (d)none of these

5. Abbreviation for CC for E-mail is


(a)common command (b)control category(c)current cursor(d)carbon copy

6. Abbreviation for BCC for E-mail is


(a) basic common command ( (b)basic common control (c)Blind carbon copy(d)all of these

7. LCD stands for


(a)Laboratory crystal display (b) Liquid crystal display (c) Luthanium crystal display (d)all of
above

8. By which communication technology we can see/watch and talk with person whom is
at another place
(a)Mobile (b)Pager (c)Fax (d)Tele/Video conferencing

9. Which devices are needed to enable teleconferencing?


(a)Video camera or webcam (b)Computer monitor or TV (c)Internet connection (d)All of
above

10. Personal information or collection of post that shared by a person on internet is called
(a)E-mail (b)Blog (c)Chat (d)none of these

11. An informal communication between two or more person on internet is called


(a)E-mail (b)Blog (c)Chat (d)none of these

12. It enforces rules about what is acceptable to discuss in a given chat space in
(a)Moderated Chatting (b)Un moderated Chatting (c)Both A & B (d)None of these

13. You can chat about anything you like is called


(a)Moderated Chatting (b)Un moderated Chatting (c)Both A & B (d)None of these

14. An electronic device used for two-way radio telecommunication over a cellular

Page 12 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)
network is
(a)Mobile phone (2)Bluetooth (c)Infrareds (d)None of these

15. Which device does not use wire for connection


(a)BSNL land line phone (2)Personal Computer(Desktop) (c)Mobile Phone(d)None of these

16. The most popular uses of mobile phone are


(a) Voice calling (b)Voice Mail (c) E-mail (d) all of above

17. PDA stands for


(a)Personal Digital Assistant(b)Primary device assistant(c)both a and b (d)none of
these

18. The original name of Fax is


(a)Facsimile (b)Fax missile (c)both a and b (d)none of these

19. Which device is used to send a document over a telephone line?


(a)Fax (b)Mobile (c)Pager (d)All of above

20. Through which communication technology we can send images, sound clips, videos
and documents?
(a)E-mail (b)Mobile Phone(c)Both a and b (d)None of these

21. By using which website we can send the E-mail ?


(a)www.yahoo.com (b)www.gmail.com (c)www.hotmail.com (d)all of above

22. By using which option we can send e-mail to the multiple user?
(a)CC (b)BCC (c)Both a and b (d)none of these

23. Which device is used to in meetings and conference to represent information in


Pictorial or video form?
(a)MP3 player (b)Computer (c)Mobile phone (d)LCD projector

24. We can share audio and video data by using


(a)Teleconferencing (b) Conferencing (c)Both a and b (d)All of above

25. We can not share audio and video data while using
(a)Chat (b)Teleconferencing (c)Both a and b (d)None of these

26. Blog is all about the


(a)Business contract (b)Companys Information (c)Both a and (d)Personal Information

27. Which are the multimedia function of Mobile Phone ?


(a) Gaming (b) Playing music (c) Taking photographs (d)all of above

28. Which is the basic function of Standard Cellular Phone?


(a) Calling (b) Gaming (c) Playing Music (d)all of above

Page 13 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)

29 By using which feature of mobile phone caller can leave a message if your phone is
busy or turned off?
(a) Voicemail(b) E-mail (c) Both a and b (d)all of above

30. Which is the copy of an e-mail message sent to a recipient whose e-mail address does
Not appear in the message
(a)BCC (b)CC (c)CCD(d)none of these

31. In which option of e-mail messages ate visible to all?


(a)BCC (b)CC (c)BCD (d) all of above

32. DLP is a type of


(a)Projector (b)Computer (c)Mobile Phones(d)All ofbove
Solution :
Q:1 (c) Q:11 (c) Q:21 (d) Q:31 (b)
Q:2 (a) Q:12 (a) Q:22 (c) Q:32 (a)
Q:3 (a) Q:13 (b) Q:23 (d)
Q:4 (b) Q:14 (a) Q:24 (a)
Q:5 (d) Q:15 (c) Q:25 (a)
Q:6 (c) Q:16 (d) Q:26 (d)
Q:7 (b) Q:17 (a) Q:27 (d)
Q:8 (d) Q:18 (a) Q:28 (a)
Q:9 (d) Q:19 (a) Q:29 (a)
Q:10 (b) Q:20 (a) Q:30 (a)

Page 14 of 15
Semester - 2
US02FICT02
(Information and Communication Technology (ICT)

Assignment

Q-1: What is word ? explain paragraph formatting in detail.


Q-2: What is powerpoint? Views of powerpoint and usage of powerpoint
Q-3: What is excel? Layout of excel. Explain the following function
1) Sum 2)Product 3) Mid 4) Upper 5) Lower 6) Average
Q-4: Explain E-mail in detail. CC and BCC and how to create a group.

Submission Date : 07-03-2015

Page 15 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

Introduction to Internet and Web Browser

The Internet is a global system of interconnected computer networks that use the
standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and
government networks, of local to global scope, that are linked by a broad array of electronic
and optical networking technologies. The Internet carries a vast range of information
resources and services, such as the inter-linked hypertext documents of the World Wide
Web (WWW) and the infrastructure to support electronic mail.

Most traditional communications media including telephone, music, film, and television are
being reshaped or redefined by the Internet. Newspaper, book and other print publishing
are having to adapt to Web sites and blogging.

The Internet has enabled or accelerated new forms of human interactions through instant
messaging, Internet forums, and social networking. Online shopping has boomed both for
major retail outlets and small artisans and traders. Business-to-business and financial
services on the Internet affect supply chains across entire industries.

The Internet has no centralized governance in either technological implementation or


policies for access and usage; each constituent network sets its own standards. Only the
overreaching definitions of the two principal name spaces in the Internet, the Internet
Protocol address space and the Domain Name System, are directed by a maintainer
organization, the Internet Corporation for Assigned Names and Numbers (ICANN).

Web Browsers

A web browser or Internet browser is a software application for retrieving, presenting,


and traversing information resources on the World Wide Web. An information resource is
identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or
other piece of content. Hyperlinks present in resources enable users to easily navigate their
browsers to related resources.

Although browsers are primarily intended to access the World Wide Web, they can also be
used to access information provided by Web servers in private networks or files in file
systems. Some browsers can also be used to save information resources to file systems.

Surfing the web is made possible by Web browsers. Browsers are basically software
programs that allow you to search for and view various kinds of information on the Web,
such as web sites, video, audio, etc. Short for Web browser, a software application used to
locate and display Web pages.

The Most Popular Web Browsers

Here are just a few of Web browsers available to you for a free download:

Page 1 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

Microsoft's Internet Explorer: Most Internet users are using Internet Explorer
because it's easy to use and most Web sites are written with Internet Explorer in mind,
meaning that they are compatible.
Opera: Opera is another popular browser that's easy to use; however, it can have some
compatibility issues with various websites.
Mozilla's Firefox: Firefox is rapidly gaining ground right behind Internet Explorer
because of its tabbed browsing, superior security features, and fast load.

Search Engines

A web search engine is designed to search for information on the World Wide Web and
FTP servers. The search results are generally presented in a list of results and are often
called hits. The information may consist of web pages, images, information and other types
of files.

A program that searches documents for specified keywords and returns a list of the
documents where the keywords were found. Although search engine is really a general
class of programs, the term is often used to specifically describe systems like Google, Alta
Vista that enable users to search for documents on the World Wide Web and USENET
newsgroups.

Typically, a search engine works by sending out a spider to fetch as many documents as
possible. Another program, called an indexer, then reads these documents and creates an
index based on the words contained in each document. Each search engine uses a
proprietary algorithm to create its indices such that, ideally, only meaningful results are
returned for each query

Popular Search Engines

Google Google - The world's most popular search engine.


Bing Bing Search: Microsoft's entry into the burgeoning search engine
market. Better late than never.
Altavista AltaVista: Launched in 1995, built by researchers at Digital Equipment
Corporation's Western Research Laboratory. From 1996 powered
Yahoo! Search, since 2003 - Yahoo technology powers AltaVista.
AOL Search search.aol: Now powered by Google. It is now official.
LYCOS Lycos: Initial focus was broadband entertainment content, still a top 5
Internet portal and the 13th largest online property according to Media
Metrix.
GIGA BLAST GigaBlast was developed by an ex-programmer from Infoseek. Gigablast
supports nested boolean search logic using parenthesis and infix
notation. A unique search engine, it indexes over 10 billion web pages.
ALexa Alexa Internet: A subsidiary of Amazon known more for providing
website traffic information. Search was provided by Google, then Live
Search, now in-house applicaitons run their own search.

Page 2 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

Saving web pages

With Internet Explorer 6 in Windows XP, you can make a Web page available offline and
view it when your computer is not connected to the Internet.

To make the current Web page available offline

1. On the Favorites menu, click Add to Favorites.


2. Select the Make available offline check box.

3. To specify a schedule for updating that page, and how much content to download,
click Customize.
4. Follow the instructions on your screen.

To make an existing favorite item available offline

1. On the Favorites menu, click Organize Favorites.


2. Click the page you want to make available offline.
3. Select the Make available offline check box.
4. To specify a schedule for updating that page, and how much content to
download, click Properties.

To view Web pages without being connected to the Internet

After you mark your favorite pages for viewing offline, you can view them offline by
following these steps

1. Before you disconnect from the Internet, on the Tools menu, click
Synchronize.
2. When you're ready to work offline, on the File menu, click Work Offline.
Internet Explorer will always start in Offline mode until you click Work
Offline again to clear the check mark.
3. In your Favorites list, click the item you want to view.

You can also make Web pages available offline without adding them to your Favorites list,
by saving the pages on your computer.

Page 3 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

Follow these steps

1. On the File menu, click Save As.


2. Double-click the folder you want to save the page in.
3. In the File name box, type a name for the page.
4. In the Save as type box, select a file type.
5. Do one of the following:

To save all of the files needed to display this page, including graphics,
frames, and style sheets, click Web Page, complete. This option saves each
file in its original format.

To save all of the information needed to display this page in a single MIME-
encoded file, click Web Archive. This option saves a snapshot of the
current Web page. This option is available only if you have installed
Outlook Express 5 or later. When you choose Web Page, complete, only
the current page is saved. With Web Page, complete and Web Archive,
you can view all of the Web page offline, without adding the page to your
Favorites list and marking it for offline viewing.

To save just the current HTML page, click Web Page, HTML only. This
option saves the information on the Web page, but it does not save the
graphics, sounds, or other files.

To save just the text from the current Web page, click Text Only. This
option saves the information on the Web page in straight text format.

Downloading files and software

Downloading is the transmission of a file from one computer system to another, usually
smaller computer system. From the Internet user's point-of-view, to download a file is to
request it from another computer (or from a Web page on another computer) and to
receive it.

Uploading is transmission in the other direction: from one, usually smaller computer to
another computer. From an Internet user's point-of-view, uploading is sending a file to a
computer that is set up to receive it. People who share images with others on bulletin
board systems (BBS) upload files to the BBS.

The File Transfer Protocol (FTP) is the Internet protocol for downloading and uploading
files and a number of special applications can furnish FTP services for you.

Page 4 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

Portable Document Format files (.PDF)

Portable document format was designed to preserve a document's page layout, regardless
of the computer platform being used. To view or download these files you need Adobe
Acrobat Reader which can be downloaded for free from the Adobe site. Note that unless
you acquire special software, pdf documents cannot be modified even if you download
them.

Microsoft Word files (.doc)

Downloading MS Word files and opening them using MS Word. Word files can also be
viewed using special viewers such as Quick View Plus, but page layout and paragraph
numbering may differ from the original document.

Executable files (.exe)

Executable or .exe files perform an action when run locally on your computer once they
have been downloaded and saved on your hard disk. For example, an .exe file might
decompress itself to produce a number of documents, or it might install software when you
run it by double-clicking.

Zip files (.zip)

Zip is a compression format used to reduce downloading times. Zipped files can be
decompressed using software freely available from http://www.winzip.com/

Open learning sites- Wikipedia, Wikispaces, Wikieducator

Wikipedia is a free, web-based, collaborative, multilingual encyclopedia project supported


by the non-profit Wikimedia Foundation. Its 17 million articles (over 3.5 million in English)
have been written collaboratively by volunteers around the world, and almost all of its
articles can be edited by anyone with access to the site. Wikipedia was launched in 2001 by
Jimmy Wales and Larry Sanger and has become the largest and most popular general
reference work on the Internet, ranking eighth among all websites on Alexa and having 365
million readers.

Wikispaces is a hosting service (sometimes called a wiki farm) based in San Francisco,
California. Launched in March 2005, Wikispaces is owned by Tangient LLC and is among
the largest wiki hosts, competing with PBworks, Wetpaint, Wikia, and Google Sites.

Private wikis with advanced features for businesses, non-profits and educators are
available for an annual fee. As of March 2008, they had more than 920,000 registered
members and hosted more than 390,000 wikis. By March 2009, that number had increased
to over 2.2 million registered members and more than 900,000 wikis.

Page 5 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

WikiEducator is an international online community project for the collaborative


development of learning materials, which educators are free to reuse, adapt and share
without restriction. WikiEducator was launched in 2006 and is supported by the non-profit
Open Education Resource (OER) Foundation. A variety of learning resources are available
on WikiEducator: direct instructional resources such as lesson plans and full courses, as
well as learning-support resources, such as individual school portals and funding
proposals.

WikiEducator's stated goal is to build a thriving and sustainable global community


dedicated to the design, development and delivery of free content for learning in realisation
of a free version of the education curriculum by 2015.

Advanced Social Networking

A social network is a social structure made up of individuals (or organizations) called


"nodes", which are tied (connected) by one or more specific types of interdependency, such
as friendship, kinship, common interest, financial exchange, dislike, or relationships of
beliefs, knowledge or prestige.

Social network analysis views social relationships in terms of network theory consisting
of nodes and ties (also called edges, links, or connections). Nodes are the individual actors
within the networks, and ties are the relationships between the actors. The resulting graph-
based structures are often very complex. There can be many kinds of ties between the
nodes. Research in a number of academic fields has shown that social networks operate on
many levels, from families up to the level of nations, and play a critical role in determining
the way problems are solved, organizations are run, and the degree to which individuals
succeed in achieving their goals.

In its simplest form, a social network is a map of specified ties, such as friendship, between
the nodes being studied. The nodes to which an individual is thus connected are the social
contacts of that individual.

Social networking is the grouping of individuals into specific groups, like small rural
communities or a neighborhood subdivision, if you will. Although social networking is
possible in person, especially in the workplace, universities, and high schools, it is most
popular online. This is because unlike most high schools, colleges, or workplaces, the
internet is filled with millions of individuals who are looking to meet other people, to
gather and share first-hand information and experiences about cooking, golfing, gardening,
developing friendships or professional alliances, finding employment, business-to-
business marketing and even groups sharing information about the end of the Mayan
calendar and the Great Shift to arrive December 21-2012. The topics and interests are as
varied and rich as the story of our world.

When it comes to online social networking, websites are commonly used. These websites
are known as social sites. Social networking websites function like an online community of
internet users. Depending on the website in question, many of these online community

Page 6 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

members share common interests in hobbies, religion, or politics. Once you are granted
access to a social networking website you can begin to socialize. This socialization may
include reading the profile pages of other members and possibly even contacting them.

The friends that you can make are just one of the many benefits to social networking
online. Another one of those benefits includes diversity because the internet gives
individuals from all around the world access to social networking sites. This means that
although you are in the United States, you could develop an online friendship with someone
in Denmark or India. Not only will you make new friends, but you just might learn a thing
or two about new cultures or new languages and learning is always a good thing.

The following list is a very subjective view of the most important social networking
websites. They are the most important websites, particularly for people running self
improvement, business- or health-related sites.

Facebook.com: Was initially intended for college students -- it branched out, and now
allows everyone membership. 500 million members.

MySpace.com: 130 million members. This site is massive, boasting the largest membership
of any social networking site on the Internet.

Linkedin.com: 75 million members -- a powerful tool for business networking.

Orkut.com: Orkut is an Internet social networking service run by Google and named after
its creator. It claims to be designed to help users meet new friends and maintain existing
relationships. Now has a membership of 100 million.

Classmates.com: 50 million members. One of the oldest social networking sites around,
Classmates was kicked off in 1995, and has proven to be a great way for members to
connect with old friends and acquaintances from throughout their lives.

Twitter.com: A free social networking service that allows users to send "updates" (text-
based posts that are up to 140 characters long) via SMS, instant messaging, email, the
Twitter website, or an application such as Twitterrific. The site has become very popular in
only a few months -- a lot of people are watching it.

Friendster.com: 90 million members. Friendster was considered the top online social
networking service until around April 2004, when it was overtaken by MySpace.
Demographic studies indicate users are from 17 to 30 years old.

Page 7 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

Web page building with tailor-made website builders

(Google.com)

Google Sites is the easiest way to make information accessible to people who need quick,
up-to-date access. People can work together on a Site to add file attachments, information
from other Google applications (like Google Docs, Google Calendar, YouTube and Picasa),
and new free-form content. Creating a site together is as easy as editing a document, and
you always control who has access, whether it's just yourself, your team, or your whole
organization. You can even publish Sites to the world. The Google Sites web application is
accessible from any internet connected computer.

You can share it with your friends, family, coworkers, or make it public. Just choose Share
this site from the More actions drop-down menu.

Users set to "Can view" can:

View pages

Users set to "Can edit" can:

Create, edit, delete pages


Move pages
Add attachments
Add comments
Subscribe to site and page changes

Users set to "Is owner" can:

Do everything that users set to "Can edit" can do


Set other people as "Can view," "Can edit," and "Is owner"
Change site themes and layout
Change the site name
Delete the site

If you are a Google Apps user, you can also control sharing settings across the entire
domain. However, if your Google Apps domain is managed by an administrator, the
administrator can restrict your ability to share your site with people outside your domain.

Revision history

Page 8 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

While you and your collaborators are editing your site, you can keep track of changes (and
of the person who made them), and even revert to an older version by using 'Revision
history.' From your site, click More actions in the top right of any page and select Revision
history.

Once you've signed in to your Google Account, you can start creating your site. Here's how:

1. Click the Create site button.

2. Enter your site name and the URL where it will be located (for example,
sites.google.com/site/yoursite) as well as an optional description of the site. The
name and URL you choose can't be changed after you create your site, or used again
if the site is deleted.
3. Select the appropriate checkbox if your site contains mature material.
4. Select one of these sharing options: 'Everyone in the world can view this site' or
'Only people I specify can view this site.'
5. Pick a theme for your site.
6. Enter the wavy characters in the word verification section, and click the Create site
button.

Page 9 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

Now that you've created your site, you can create a new page by clicking the Create page
button.

Then, name the new page and select the type of page you want: webpage, dashboard,
announcement, file cabinet, or list. After you've selected where you want to locate the page,
click the Create Page button at the bottom of the page.

Editing your site

To edit your site, click the Edit Page button in the upper right hand corner of the screen.

The edit toolbar will provide you with the tools necessary to edit your site.

Here's what each option does:

Undo and redo changes

You can undo and redo changes by clicking the arrow buttons in the toolbar. You can also
use these keyboard shortcuts:

Undo (Ctrl-z)
Redo (Ctrl-y or Shift-Ctrl-z)

Change the font type and size

You can select the font type and size using the two drop-down menus.

Edit text

Add boldface type and italics, underline text, and change the color of your text or text
background:

Page 10 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

B adds boldface type


I allows you to italicize
U underlines text
A changes text color
The marker changes the text background color

Create a link

Highlight the text that you want to turn into a link, and click the Link button. A window
appears with these options for creating your link:

Existing page
Web address
Create a new page and link to it

Create a list

Click the Numbered list button or the Bulleted list button, depending on the type of list you
need to add to the site. Then type the first item, and press Enter. The next number or bullet
point appears.

The Tab key can help you indent your bullet points, while the Enter key will move back
your indentation.

Indent or move your list

Click the two buttons next to the bulleted list to indent or move back the starting point
when adding a bulleted or numbered list. Click twice to move each item two spaces, and so
forth.

Page 11 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

Align your text

Use these buttons for your page alignment. You have the option to align the text on your
page to the left, center, or right side of the page.

Remove formatting and edit HTML

You can remove the formatting from any part of your page by highlighting the relevant text
and clicking this icon.

Click the HTML button to edit the HTML on your site. Please keep in mind that we do limit
the amount of editing that can be done. Some advanced coding won't work.

Adding objects and apps

To start adding objects and apps to your site, just click Edit page, select Insert, and pick the
object or app you'd like to insert.

When the embedded app (a Google Docs Presentation, for example) is updated at its source
and published (in this example, within Google Docs), it gets updated automatically within
Sites. Make sure you set the app to automatically republish changes, so your site's
information is always updated.

Here are some of the objects you can insert:

Page 12 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

An image: Click Insert, select Image, and either browse for an image on your machine or
upload one from a specific web address. After you've uploaded and saved the image, you
can click it to view it in full screen.

A Google Docs Spreadsheet: Select Spreadsheet from the Insert drop-down menu, and a
window appears with a list of the spreadsheets that you own or can view or edit in Google
Docs. Click the spreadsheet you want to insert, or enter the URL in the box right below the
list of spreadsheets. Click Select and you'll see the properties of the spreadsheet. Select
your options and click Save.

A video: Click Insert, select Video, and upload a video from YouTube or Google Video. Paste
the URL, enter a title, and save.

Inserting gadgets

To easily embed rich media, retrieve feeds, or perform simple tasks like managing a to-do
list, you can insert gadgets into your site. Click Edit page, select Insert, and choose one of
the gadgets in the menu.

For example, insert the Recent posts gadget to display the announcements posted to the
site, or the Recently updated files gadget, to show recent files. To view gadgets created by
third-party sites, click More gadgets... and a window appears.

Page 13 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 3 Internet Usage for E-learning FYBSc (SEM-II)

Select the type of gadget you want to insert by clicking the links on the left side, select a
gadget, and click OK to save. If you'd like to first check how the gadget looks in your site,
click Preview Gadget first.

Page 14 of 14
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

Software Copyright

Software copyright is the relatively recent extension of copyright law to machine-


readable software. It is used by proprietary software companies to prevent the
unauthorized copying of their software.

Software copyright, the relatively recent extension of copyright law to software,


allowed a market for proprietary software to flourish for some time. Some proponents of
free software use software copyrights in order to ensure that the software they write will
remain free, using licenses such as the GNU General Public License

software copyright Until the late 1990s the only way of obtaining legal protection
for software was by copyright. This was easy as no formal procedures were required since
the copyright existed as soon as the software was created. However, copyright is a weak
safeguard compared with a patent where ownership can be proved relatively easily and it
is possible to sue without having to prove that copying has taken place. Unfortunately,
getting a patent for software was a very difficult process. However, the late 1990s saw a
liberalization of American practice and a number of computer programs and business
processes have won patents.

HACKING

Hacking is unauthorized use of computer and network resources. (The term


"hacker" originally meant a very gifted programmer. In recent years though, with easier
access to multiple systems, it now has negative implications.)

Computer hacking is the practice of modifying computer hardware and software to


accomplish a goal outside of the creators original purpose. People who engage in computer
hacking activities are often called hackers. Since the word hack has long been used to
describe someone who is incompetent at his/her profession, some hackers claim this term
is offensive and fails to give appropriate recognition to their skills.

Computer hacking is most common among teenagers and young adults, although
there are many older hackers as well. Many hackers are true technology buffs who enjoy
learning more about how computers work and consider computer hacking an art form.
They often enjoy programming and have expert-level skills in one particular program. For
these individuals, computer hacking is a real life application of their problem-solving skills.
Its a chance to demonstrate their abilities, not an opportunity to harm others.

Hacking is a felony in the United States and most other countries. When it is done by
request and under a contract between an ethical hacker and an organization, it's OK. The
key difference is that the ethical hacker has authorization to probe the target.
We work with IBM Consulting and its customers to design and execute thorough
evaluations of their computer and network security. Depending on the evaluation they

Page 1 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

request (ranging from Web server probes to all-out attacks), we gather as much
information as we can about the target from publicly available sources. As we learn more
about the target, its subsidiaries and network connectivity, we begin to probe for
weaknesses.

Examples of weaknesses include poor configuration of Web servers, old or unpatched


software, disabled security controls, and poorly chosen or default passwords. As we find
and exploit vulnerabilities, we document if and how we gained access, as well as if anyone
at the organization noticed. (In nearly all the cases, the Information Syhstems department
is not informed of these planned attacks.) Then we work with the customer to address the
issues we've discovered.

The number of really gifted hackers in the world is very small, but there are lots of
wannabes.... When we do an ethical hack, we could be holding the keys to that company
once we gain access. It's too great a risk for our customers to be put in a compromising
position. With access to so many systems and so much information, the temptation for a
former hacker could be too great -- like a kid in an unattended candy store.

VIRUS

Computer viruses are programs written by "mean" people. These virus programs
are placed into a commonly used program so that program will run the attached virus
program as it boots, therefore, it is said that the virus "infects" the executable file or
program. Executable files include Macintosh "system files" [such as system extensions,
INITs and control panels] and application programs [such as word processing programs
and spreadsheet programs.] Viruses work the same ways in Windows or DOS machines by
infecting zip or exe files.

A virus is inactive until you execute an infected program or application OR start


your computer from a disk that has infected system files. Once a virus is active, it loads into
your computer's memory and may save itself to your hard drive or copies itself to
applications or system files on disks you use.

Some viruses are programmed specifically to damage the data on your computer by
corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do
nothing more than display a message or make sounds / verbal comments at a certain time
or a programming event after replicating themselves to be picked up by other users one
way or another. Other viruses make your computer's system behave erratically or crash
frequently. Sadly many people who have problems or frequent crashes using their
computers do not realize that they have a virus and live with the inconveniences.

Page 2 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

Definitions of computer virus

Virus: a software program capable of reproducing itself and usually capable of


causing great harm to files or other programs on the same computer; "a true virus cannot
spread to another computer without human assistance"

A computer virus is a computer program that can copy itself and infect a computer.
The term "virus" is also commonly but erroneously used to refer to other types of malware,
adware, and spyware programs that do not have the reproductive ability. ...: A program
which can be transmitted between computers via networks (especially the Internet) or
removable storage such as CDs, USB drives, floppy disks, etc., generally without the
knowledge or consent of the recipient.

What are computer viruses, and where can I find more information?

A computer virus is a piece of code that is secretly introduced into a system in order
to corrupt it or destroy data. Often viruses are hidden in other programs or documents and
when opened, the virus is let loose.Virus is a self-replicating computer program that
spreads by inserting copies of itself into other executable code or documents. A computer
virus behaves in a way similar to a biological virus, which spreads by inserting itself into
living cells.

A computer program with the characteristic feature of being able to generate copies
of itself, and thereby spreading. It is usually known as a dangerous program which is able
to perform some harmful tasks. Harmful software that can damage a computer, sometimes
beyond repair. Programming code created as a prank or as a malicious action that secretly
affects other programs and causes unwanted consequences.

A virus is a software program designed to infect, destroy or interfere with a computer or


software program.

Actions are that need to be taken to protect against and hacking and Virus

Load only software from original disks or CD's. Pirated or copied software is always
a risk for a virus.

Execute only programs of which you are familiar as to their origin. Programs sent by
email should always be suspicious.

Computer uploads and "system configuration" changes should always be performed


by the person who is responsible for the computer. Password protection should be
employed.

Page 3 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

Check all shareware and free programs downloaded from on-line services with a
virus checking program.

Purchase a virus program that runs as you boot or work your computer. Up-date it
frequently.

Virtual data still requires physical security. This could mean keeping your server in
a locked room, removing disk drives from workstations that don't need them, and installing
an alarm system in your office. All the security software in the world won't stop someone
from breaking into your office and carting off your computers.

Beware of bugs. Most computer viruses are just a nuisance, but it takes only one
malevolent virus to bring your network to its knees. Install reliable antivirus software, keep
it updated, and train your employees to use it. Think about other protective measures, such
as installing only shrink-wrapped commercial software on your computers.

Network security is a daily job. Stay on top of changes that could affect the security
of your LAN. Keep your operating system updated with the latest security patches and bug
fixes. Assign access to directories and other network resources on a need-to-have basis,
and remove a user's account immediately when they leave your company. Use network
logging and security tests to check your network for security holes and possible break-ins.

Pay attention to passwords. One bad password can compromise your entire
network. Avoid passwords that contain dictionary words or personal information, and
require users to change their passwords regularly. When an employee leaves the company,
disable their password immediately as part of the termination process.

You must know that whether or not your PC will be hacked will depend very much
on your actions as well. For example, downloading files from warez sites and poor habits of
opening up strange email attachments, is as good as inviting hackers to break your door. So
avoiding these type of activity can also prevent you from hacking and viruses

Stay alert for unusual activity on your accounts. If you have trouble logging into any
of your accounts and you sure the username and password is correct alert your ISP right
away and send the account name with logins.

DO NOT use duplicate passwords, i.e. use different passwords for your affiliate
accounts and server access. For your best defense against bruteforce password attacks, be
sure your passwords are comprised of numbers as well as uppercase and lowercase letters
and change your passwords regularly.

Last but not least, backup your sites data! Although they probably do, it is not
enough to count on your ISP to back up your site regularly. You can generate your own full
site backups manually from cPanel.

Page 4 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

A alternative that may be preferable however, is to install software that does


automated backups and has a quick and easy restore process such as Affiliate Backup. At
the time of the hacker attack,

Although there is no way to completely eliminate hacker attacks, there is plenty you
can do to prevent them from gaining access to your site. DO make the time and effort to
protect yourself, because doing so after the fact takes 100 times more time and effort.

Effect of ICT on Patterns of Employment

The personal computer (PC) was developed in the early 1980s. Before this date, computers
were huge, expensive machines that only a few, large businesses owned. Now PCs are
found on almost every desk in every office, all over the world.
Because companies now have access to so much cheap, reliable computing power, they
have changed the way they are organised and the way they operate. As a result, many
peoples jobs have changed...

Areas of Increased employment

IT Technicians

All of the computers in a business need


to be maintained: hardware fixed,
software installed, etc.
IT technicians do this work.
Computer Programmers

All of the software that is now used by


businesses has to be created by
computer programmers.
Hundreds of thousands of people are
now employed in the 'software
industry'

Page 5 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

Web Designers

Much of modern business is conducted


on-line, and company websites are
very important.

Company websites need to be


designed and built which is the role of
web designers.

Help-Desk Staff

People often need help using computers, and software applications.

Computer and software company have help-desks staffed by trained operators who can
give advice.

Areas of Increased Unemployment

Some jobs have been lost as a result of computers being used to do the same work that
people used to do.
Some examples of areas have suffered job losses

Manufacturing

Many factories now have fully


automated production lines. Instead
of using people to build things,
computer-controlled robots are
used.

Robots can run day and night, never


needing a break, and dont need to be
paid! (Although the robots cost a lot
to purchase, in the long-term the
factory saves money.)

Secretarial Work

Page 6 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

Offices used to employee many


secretaries to produce the
documents required for the business
to run.

Now people have personal computers,


they tend to type and print their own
documents.

Accounting Clerks

Companies once had large


departments full of people whose job it
was to do calculations (e.g. profit,
loss, billing, etc.)

A personal computer running a


spreadsheet can now do the same
work.

Newspaper Printing

It used to take a team of highly skilled


printers to typeset (layout) a
newspaper page and to then print
thousands of newspapers.

The same task can now be performed


far more quickly using computers
with DTP software and computer-
controlled printing presses.

The effects of microprocessor-controlled devices in the home

What is a Microprocessor?

A microprocessor is a small CPU built into a single 'chip' (see below).

Page 7 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

In a single chip, a microcontroller contains:

A CPU

Some RAM

Some ROM (Used for storing the devices software)

Examples of Microprocessor-Controlled Devices :

Many of the electronic devices that we use contain a microprocessor...

Some devices are used for entertainment:

Games consoles

DVD players

MP3 players

Some devices help to make our lives easier (labor-saving devices):

Programmable microwave ovens

Programmable washing machines

Home security systems

Mobile telephones

Page 8 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

The effects on leisure time - microprocessor controlled domestic appliances such as


washing machines, cookers, heating systems etc. do not need direct human control because
they have timers, operating programs and safety checks built in. This means the user can
leave them to complete their tasks so they have more leisure time.

The effects on the need to leave the home - computers linked to the Internet have greatly
reduced the need for people to leave the home.

Entertainment - music and games can be downloaded. Movies can be downloaded and
this, along with Interactive digital television, means there is no need to go to the cinema or
video rental shop.

Goods - these can be easily ordered from online stores and delivered to the home.

Food - takeaway food and groceries can be ordered online and delivered directly to the
door.

Services - banking, ordering insurance and many other services can be carried out over the
telephone or the Internet.

The effects on social interaction - from the comfort of the home people can communicate
in many more ways than the traditional telephone and postal service.

Email allows fast efficient communication with the ability to send files as attachments and
email many people at the same time.

Online messaging allows users to sent text, images and files in real time, as well as
communicate via voice and video.

Wireless phones and mobile phones allow interaction by telephone conversations from
any room or the garden.

SMS (Short Messaging Service) text messages, images and video clips to be sent between
mobile phones and computers.

Answer machines allow messages to be left for users who cannot answer the telephone.

Social interaction websites allow users to interact by leaving messages and adding
comments to blogs. Users can also upload and share image and video files.

Capabilities of IT

Repetitive Processing Computers can carry out the same or similar tasks (e.g. mailmerge,
payroll) over and over very quickly and with a high level of accuracy.

Page 9 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

Speed of Processing A computer system can process raw data very quickly to produce
information.

Data Storage Capacity Traditionally, a companys information would be stored on paper


in filing cabinets which takes up expensive storage space. A computer system can store the
same amount of data in a fraction of the space. Other advantages include the ability to
backup data easily and increase security by password protection or encryption.

Speed of Searching Another big advantage of a computerised data storage system over a
paper based system is that searches are virtually instantaneous.

Speed of Data Communications Data can be sent from one side of the world to the other in
a matter of seconds via the internet (e-mail) compared to days using traditional post (snail
mail).

The Ability to Produce Different Output Formats Information can be output from a
computer system, either on-screen or printed, in the form of graphs, charts, reports,
pictures, sound etc.

Limitation of IT

Input (GIGO) Even the most advanced data processing system will give inaccurate
information if the data input is not accurate.

Hardware The system must incorporate suitable hardware for the system to work
efficiently (e.g. a barcode scanner in a shop or library, a plotter in architects office or a
powerful processor and graphics card in a CAD/CAM system.

Suitability of the Operating System The right choice of operating system is vital for a
system to work efficiently (e.g. a real time control system for air traffic control, a real time
transaction for ticket sales or a batch processing system for payroll or billing)

Software There are a number of problems that may arise when selecting appropriate
software especially if the software is to be developed for a specific purpose:
Possible changes in circumstances during development
Time taken to implement the software
Compatibility of the new software with current hardware and data
Financial Costs
Insufficient testing resulting in bugs
Poor communications with the user the solution may not meet the users
requirements

Page 10 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

ISSUES RELATED TO INFORMATION ON INTERNET

The Internet and World Wide Web are a fantastic resource for finding and sharing
information. The Web contains literally billions of web pages containing information about
every topic imaginable.

However we need to take care when using the Internet to look for information, or to
send information...

Reliability of Information

The Internet and Web are not regulated - there is no organization that controls who can
create web pages or what those pages can contain. Anyone can create web pages and say
anything they want to.

In many ways this is a good thing. It means that corrupt organizations or governments,
who have always been able to hide details of their activities, are no longer able to do so.
When bad things happen, people write about it on the Web and the world gets to know, and
hopefully do something about it. But its also a bad thing. It means that people or
organizations can easily spread lies and hatred. There are thousands of websites
containing bigoted viewpoints, and thousands more that are full of information that is
biased, inaccurate, or just plain wrong.

So... how do you know which web pages to believe, which information to trust?

Check several sources of information (go to lots of different websites). If they all say them
same thing, it is likely to be true

Stick to websites that belong to trusted organisations. If the website address ends in
.gov.uk (the UK government site) it is more likely to be reliable than one like
www.tomiscool.net

Look at the spelling and grammar used. Reliable websites are usually checked for errors.
Too many spelling errors mean its probably not to be trusted.

Undesirable Information

Avoiding this type of material can be tricky. Many organisations such as schools,
some governments (e.g. for religious reasons), and also many parents, make use of web
page filtering software. This software attempts to prevent offensive and illegal material
being accessed.

Even if filtering software is not installed on a computer, you can still take steps to help you
avoid these types of sites:

Page 11 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

Use the 'safe search' feature on search engines such as Google.

Dont click the links that are shown in junk email (spam)

Think carefully about the keywords that you use to search with

Security of Data Transferred Using the Internet

As has been discussed already, you should always consider encrypting any
sensitive or personal data that is sent or accessed over a public network such as The
Internet.

Many websites, especially online shopping or online banking sites, require you to enter
personal information, such as credit card numbers, social security IDs, etc. To make sure
your data is safe, these websites use encryption - they are called secure websites.
You should always make sure that a website is secure before giving personal information
The website URL (address) should begin with https://... (normal, unsecure sites have
addresses that start with http://...)

Your web browser should show a closed padlock icon

Potential Health Problem Related to Constant Use Of ICT

If we use a computer for many hours (as people often do at work), there are some health
issues that might affect us...

Eye-Strain

Page 12 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

One health issue that can occur after using


computers for a long time is eye-strain
(tiredness of the eyes).

This is caused by looking at a monitor


which is a constant distance away. The
muscles that focus your eyes do not move,
and so get tired and painful. Eye-strain
can also cause headaches.

This problem can be solved:

Look away from the monitor at regular


intervals re-focus on distant or close
objects to exercise the muscles in the eye.

Take regular breaks.

Use an anti-glare filter in front of the


monitor to cut down on screen reflections
that can also tire the eyes.

Page 13 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

Back and Neck Ache

Many people suffer from back and neck


pain after working at a computer for a
long time. This is usually due to them
having a bad sitting posture.

This problem can be solved:

Use an adjustable, ergonomic chair,


and take the time to set it up properly.

The computer keyboard and monitor


should be at the correct height for the
seated person (keyboard lower than the
elbow, top of monitor at eye level). Bad Position

Take regular breaks: get up, walk


around, stretch your muscles

Good Position

Page 14 of 15
US02FICT02 : Information and Communication Technology (ICT)
Unit 4 : Effects of Using IT FYBSc (SEM-II)

Repetitive Strain Injury (RSI) in Wrists and Hands

Any repetitive movement (same


movement over and over again) can
result in a health problem called
repetitive strain injury (RSI).

In particular, typing and using a mouse


for long periods are common causes of
RSI in the wrist (it is often called carpal-
tunnel syndrome).

his problem can be solved:

Use a wrist-rest to support the wrists


while typing and when using the mouse.

Take regular breaks from typing or


using the mouse.

Page 15 of 15
US02FICT01 SEM-II MCQ ALL UNITS

UNIT - 1
1. A ____________________ more formally known as document preparation system.
a) Word Processor b)Power Point c) Excel d) All of Above
2. Extension of Word file is ________________.
a) ppt b) .xls c) .doc d) .ppts
3. An Extension of Power Point file is ___________________.
a) Ppt b) .xls c) .doc d) .ppts
4. An Extension of Excel file is ___________________.
a) .ppt b) .xls c) .doc d) .ppts
5. _______________________is a spreadsheet program which allows one to enter numerical values
or data into the rows or columns of a spreadsheet.
a) Microsoft Word b) Microsoft Excel
c) Microsoft Power Point d) All of Above.
6. To open an Existing Document shortcut ________________is used.
a) [Ctrl]+[N] b) [Ctrl]+[O] c) [Ctrl]+[A] d) [Ctrl]+[S]
7. To Save file shortcut ___________________ is used.
a) [Ctrl]+[D] b) [Ctrl]+[O] c) [Ctrl]+[A] d) [Ctrl]+[S]
8. To open New Document shortcut _________________ is used.
a) [Ctrl]+[N] b) [Ctrl]+[O] c) [Ctrl]+[A] d) [Ctrl]+[S]
9. To Format Text in Bold style shortcut _________________is used.
a) [Ctrl]+[B] b) [Ctrl]+[I] c) [Ctrl]+[U] d) [Ctrl]+[L]
10. To Format Text in Italic style shortcut _________________is used.
a) [Ctrl]+[B] b) [Ctrl]+[I] c) [Ctrl]+[U] d) [Ctrl]+[L]
11. To Underline Text shortcut _________________is used.
a) [Ctrl]+[B] b) [Ctrl]+[I] c) [Ctrl]+[U] d) [Ctrl]+[L]
12. Microsoft Word gives you a choice of _____________________ types of alignment.
a) Left-Justified b) Right-Justified c) Centered d) Justified e) All of Above
13. _____________ shortcut is used to make Right-Justified alignment.
a) [Ctrl] +[ R] b) [Ctrl] + [L] c) [Ctrl] +[ C] d) [Ctrl] + [J]
14. _____________ shortcut is used to make left-Justified alignment.
a) [Ctrl] +[ R] b) [Ctrl] + [L] c) [Ctrl] +[ C] d) [Ctrl] + [J]
15. _____________ shortcut is used to make centered-Justified alignment.
a) [Ctrl] +[ R] b) [Ctrl] + [E] c) [Ctrl] +[ C] d) [Ctrl] + [J]
16. _____________ shortcut is used to make Justified alignment.
a) [Ctrl] +[ R] b) [Ctrl] + [L] c) [Ctrl] +[ C] d) [Ctrl] + [J]

17. Select _____iconto make Right-Justified alignment.

a) b) c) d)

18. Select _ __icon to make Left-Justified alignment.

a) b) c) d)

19. Select _ _ icon to make Center alignment.

a) b) c) d)

20. To Copy Selected Text ______________________ shortcut is used.


a) [Ctrl] +[ C] b) [Ctrl] + [V] c) [Ctrl] +[ X] d) [Ctrl] + [J]

1
US02FICT01 SEM-II MCQ ALL UNITS

21. To Cut Selected Text ______________________ shortcut is used.


a) [Ctrl] +[ C] b) [Ctrl] + [V] c) [Ctrl] +[ X] d) [Ctrl] + [J]

22. In a spreadsheet the _________________ is defined as the space where a specified row and
column intersect.
a) CELL b) Name Box c) Column d) None of Above
23. _________________ returns the average (arithmetic mean) of the arguments.
a) AVERAGE() b) MID() c) AVG() d) None of Above
24. __________________ returns the largest value in a set of values.
a) MAXIMUM() b) MAX() c) All of Above d) None of Above
25. ____________________ returns the smallest number in a set of values.
a) MINIMUM() b) MIN() c) All of Above d) None of Above
26. ____________________ multiplies all the numbers given as arguments and returns the product.
a) MUL() b) PRODUCT() c) All of Above d) None of Above
27. ___________________ returns the result of a number raised to a power.
a) POWER() b) POW() c) All of Above d) None of Above
28. ___________________ returns the number of characters in a text string.
a) LEN() b) COUNT() c) All of Above d) None of Above
29. __________________displays the name of the current program and workbook.
a) Tiltle Bar b) Menu Bar c) Name Box d) All of Above.
30. __________________displays the names of the Excel menus.
a) Tiltle Bar b) Menu Bar c) Name Box d) All of Above.
31. __________________displays the buttons of the most frequently used functions.
a) Tiltle Bar b) Menu Bar c) Standard Toolbar d) All of Above.
32. __________________displays the coordinates of the active cell.
a) Tiltle Bar b) Menu Bar c) Name Box d) All of Above.
33. __________________displays the the contents of the active cell.
a) Formula Bar b) Status Bar c) Scroll Bars d) All of Above.
34. __________________displays information about a selected command as well as the status of
certain keys, such as CapsLock and NumLock.
a) Formula Bar b) Status Bar c) Scroll Bars d) All of Above.
35. __________________is used to move through the worksheet. You can move up, down, left, and
right..
a) Formula Bar b) Status Bar c) Scroll Bars d) All of Above.
36. __________________ is a single page in a workbook, divided into rows and columns. Columns and
rows intersect to form cells.
a) Worksheet b) Active Cell c) Sheet Tabs d) All of Above
Short Questions (Unit-1)
1. Write full form of RTF and PDF
2. What are the different short cut key used to Save a file and Save as file menu?
3. What is the meaning of formatting a text?.
4. What is the meaning of paragraph formatting?.
5. What do you mean by line spacing?
6. What is the meaning of indentation ? write the different types of indentation
available in word.
7. Write the short cut key used to left and center alignment.
8. What are the short cut key used to right and justify alignment.?
9. Write the name of views available in power point?
10. What do you mean by column and rows in MS- Excel?
11. Write the display characteristics of Title bar and Menu bar?
12. Write the display characteristics of name box and standard toolbar?
13. Write the display characteristics of Formula bar and Status bar ?
2
US02FICT01 SEM-II MCQ ALL UNITS

Long Questions (Unit-1)


Q 1 Explain typical usage of Microsoft word? [4]
Q 2 What is MS Word and characteristics of MS Word? [5]
Q 3 Explain creating and saving the file in MS Word. [5]
Q 4 What is formatting ? how to format text in MS Word [5]
Q 5 Explain by what are the different ways you can format the paragraph [6]
Q 6 What is presentation ? Explain th usage of Power point. [5]
Q 7 Explain the available views in power point. [5]
Q 8 How to create and edit slide in power point? [4]
Q 9 How to format power point presentation? [5]
Q 10What is Excel Spreadsheet? Explain the screen layout of excel [6]
Q 11Explain following Excel functions with example [ Each Carries 3 Marks]
i) Average ii) Count iii) Max iv) Min
v) Sum vi) Product vii) Power
Q 12Explain any two string functions with example [6]

UNIT 2
1. Abbreviation for E-mail is
(a)Embedded mail (b)Emergency mail (c)Electronic mail (d)Extra mail

2. E-mails are used for


(a)transmission of message over electronic network (b)playing games
(c)developing software (d) all of above

3. In e-mails, @ symbols specifies


(a)name or address of receiver (b)E-mail cost (c)E-mail time (d)none of these

4. Following is the proper example of e-mail address


(a)@yahoo.code (b)info1947@vpsci.org (c)vpsciencecollege.com@ (d)none of these

5. Abbreviation for CC for E-mail is


(a)common command (b)control category (c)current cursor (d)carbon copy

6. Abbreviation for BCC for E-mail is


(a) basic common command (b)basic common control
(c)Blind carbon copy (d)all of these

7. LCD stands for


(a)Laboratory crystal display (b) Liquid crystal display
(c) Luthanium crystal display (d)all of above

8. By which communication technology we can see/watch and talk with person whom is
at another place
(a)Mobile (b)Pager (c)Fax (d)Tele/Video conferencing

3
US02FICT01 SEM-II MCQ ALL UNITS

9. Which devices are needed to enable teleconferencing?


(a)Video camera or webcam (b)Computer monitor or TV
(c)Internet connection (d)All of above

10. Personal information or collection of post that shared by a person on internet is called
(a)E-mail (b)Blog (c)Chat (d)none of these

11. An informal communication between two or more person on internet is called


(a)E-mail (b)Blog (c)Chat (d)none of these

12. It enforces rules about what is acceptable to discuss in a given chat space in
(a)Moderated Chatting (b)Un moderated Chatting
(c)Both A & B (d)None of these

13. You can chat about anything you like is called


(a)Moderated Chatting (b)Un moderated Chatting
(c)Both A & B (d)None of these

14. An electronic device used for two-way radio telecommunication over a cellular
network is
(a)Mobile phone (b)Bluetooth (c)Infrareds (d)None of these

15. Which device does not use wire for connection


(a)BSNL land line phone (b)Personal Computer(Desktop)
(c)Mobile Phone (d)None of these

16. The most popular uses of mobile phone are


(a) Voice calling (b)Voice Mail (c) E-mail (d) all of above

17. PDA stands for


(a)Personal Digital Assistant (b)Primary device assistant
(c)both a and b (d)none of these

18. The original name of Fax is


(a)Facsimile (b)Fax missile (c)both a and b (d)none of these

19. Which device is used to send a document over a telephone line?


(a)Fax (b)Mobile (c)Pager (d)All of above

20. Through which communication technology we can send images, sound clips, videos
and documents?
(a)E-mail (b)Mobile Phone (c)Both a and b (d)None of these

21. By using which website we can send the E-mail ?


(a)www.yahoo.com (b)www.gmail.com (c)www.hotmail.com (d)all of above

22. By using which option we can send e-mail to the multiple user?
(a)CC (b)BCC (c)Both a and b (d)none of these

23. Which device is used to in meetings and conference to represent information in


Pictorial or video form?
(a)MP3 player (b)Computer (c)Mobile phone (d)LCD projector

4
US02FICT01 SEM-II MCQ ALL UNITS

24. We can share audio and video data by using


(a)Teleconferencing (b) Conferencing (c)Both a and b (d)All of above

25. We can not share audio and video data while using
(a)Chat (b)Teleconferencing (c)Both a and b (d)None of these

26. Blog is all about the


(a)Business contract (b)Companys Information (c)Both a and (d)Personal Information

27. Which are the multimedia function of Mobile Phone ?


(a) Gaming (b) Playing music (c) Taking photographs (d)all of above

28. Which is the basic function of Standard Cellular Phone?


(a) Calling (b) Gaming (c) Playing Music (d)all of above

29 By using which feature of mobile phone caller can leave a message if your phone is
busy or turned off?
(a) Voicemail (b) E-mail (c) Both a and b (d)all of above

30. Which is the copy of an e-mail message sent to a recipient whose e-mail address does
Not appear in the message
(a)BCC (b)CC (c)CCD (d)none of these

31. In which option of e-mail messages ate visible to all?


(a)BCC (b)CC (c)BCD (d) all of above

32. DLP is a type of


(a)Projector (b)Computer (c)Mobile Phones (d)All ofbove

Short Questions (Unit-2)


1) What is cell phone device?
2) What is E-mail?
3) What is Conferencing?
4) Explain Teleconferencing and Video Conferencing.
5) Difference between blog and chat
6) Explain LCD projector.
7) Explain CC and BCC in E-mail
8) Advantages and disadvantages of LCD
9) What is data transmission rate?
10) Features of Mobile Phone.
11) What is FAX machine?
12) Write advantages of facsimile machine
13) Difference between Smart phone and Satellite phone
14) How many types of Chat? Also list out types of chat
15) Explain in brief PDA phone

5
US02FICT01 SEM-II MCQ ALL UNITS

Long Questions (Unit-2)


1) Define E-mail. And also explain four different parts of E-mail.
2) Write steps to create e-mail and attach a document in it.
3) Explain CC and BCC in brief with example.
4) What is LCD? State its advantages and drawbacks.
5) What is Conferencing? Explain its types in detail.
6) What is Teleconferencing? State its advantages and limitations.
7) What is Videoconferencing? Which devices are required to enable Video
conferencing.
8) Explain Blog and its characteristic in detail.
9) What is Chat? And also explain is types.
10) What is Mobile Phone? Describe various uses of it.
11) What is Mobile Phone? Explain different types of Mobiel Phone.
12) Describe FAX. And also explain term Data Transmission Rate.

UNIT 3

1. The Internet is a _________ system.


a) Global b) Local c) External d) None of above

2. WWW stands for ________.


a) World Wide Web b) World Wide Net c) World Wide Wen d) None of above

3. TCP stands for


a) Transmission Control Protocol. b) Transmission Control Panel.
c) Transmission Console Protocol. d) None of above.

4. _______ is a software application for retrieving, presenting and traversing information resources on the
world wide web.
a) IP b) IPT c) Web Browser d) None of above

5. Following is the popular Web Browser.


a) Firefox b) Facebook c) Orkut d) None of above

6. FTP stands for


a) File Transfer Protocol b) File Receiving Protocol
c) File Pacing Protocol d) None of above

7. Google is a __________.
a) Web Browser b) Search Engine c) Security Server d) None of above

8. GIGA BLAST and Alexa are two _______.


a) Search Engines b) Web Browsers c) Web Engines d) None of above
9. The extension of Portable Document Format File is ____
a) .PDF b) .TXT c) .DOC d) .EXE

10. The extension of Executable File is ____


a) .PDF b) .TXT c) .DOC d) .EXE

6
US02FICT01 SEM-II MCQ ALL UNITS

11. The extension of ZIP File is _____


a) .ZIP b) .TXT c) .DOC d) .EXE

12. Wikipedia, Wikispaces and Wikieducator are


a) Open Learning Sites b) Charged Sites c) Shareware d) None of above

13. Facebook is a ______


a) Social Networking site b) Local Networking site
c) Neutral Networking site d) None of above

14. Following is the name of Social Networking site.


a) Linkedin.com b) Yahoo.com c) Rediff.com d) Google.com

15. An information resource is identified by


a) Uniform Resource Indentifier (URI) b) Uniform Relocator Indentifier (URI)
c) Uniform Realloted Indentifier (URI) d) Uniform Revised Indentifier (URI)

16. Surfing the web is made possible by


a) Search Engine b) Web Browser c) Search Protocol d) None of above

Short Questions (Unit-3)

1. What is Internet? Which protocol is used for internet?


2. What is Web Browser? How it is work? Give at least two name of web-browser.
3. Explain search engine with example.
4. Write the steps to make current web-page available offline.
5. What do you mean by downloading and uploading?
6. Explain when and how .PDF files useful. Which files are necessary to read .PDF files.
7. What is ZIP file? When it is useful?
8. Which open learning sites are available on internet? Explain any one in detail.
9. Write notes on Wikispaces and Wikiducator.
10. What do you mean by social networking? Which sites are used for Social Networking?
Explain any one in detail.

Long Questions (Unit-3)


1. Write short note on Web Browser.
2. What is Search Engine? Give at least three names of popular Search Engine. Explain
any one in brief.
3. What is Web Site? How current web page be available offline? Explain how we can
view web pages without connecting Internet.
4. What is Downloading and Uploading? Which type of files can be downloaded?
Explain the use of .PDF file.

7
US02FICT01 SEM-II MCQ ALL UNITS

5. Which open learning sites are available on internet? Explain any one in brief.
6. Define the term Social Networking. List important social networking website.
Explain any two of them with their use.
7. Write steps to create web page using Google.com. Also explain can edit and is
owner option in brief.

UNIT 4
MCQ
1. Software copyright is used by proprietary software companies to prevent the
a) Authority for copying software b) unauthorized copying of their software.
c) Both a and b d) None of these

2. Freeware Softwares are using


a) GNU General Public License b) software copyright
c) Both and a and b d) none of these

3. A ______ is inactive until you execute infected program or start your computer from infected hard disk
a) Virus b) Pen drive c) Antivirus d) Spam

4. Hacking is
a) Authority for viewing software b) Authority for copying software
c) unauthorized use of computer and network resources. d) None of these

5. Computer hacking is the practice of ______________to accomplish a goal outside of the creators
original purpose.
a) Adding computer software b) Adding computer hardware
c) modifying computer hardware and software d) Install software

6. The people who do computer hacking activities are often called


a) Master b) hackers. c) experts d) All of these

7. Hackers have____________ in one particular program.


a) expert-level skills b) Masters c) Low level skills d) Knowledge

8. Causes of hacking
a) old or unmatched software b) poorly chosen or default passwords.
c) disabled security controls d) All of the above

9. Virus is used to
a) To damage the data on your computer b) erasing your entire hard drive.
c) All of the above d) None of the above

10. Virus is
a) A software program capable of reproducing itself and usually capable of causing great
harm to files or other programs.
b) A hardware capable of reproducing itself and usually capable of causing great harm to files or
other programs
c) Both a and b
d) None of these

8
US02FICT01 SEM-II MCQ ALL UNITS

11. A computer virus is a computer program that can


a) pest itself and infect a computer b) cut itself and infect a computer
c) copy itself and infect a computer. d) undo itself and infect a computer

12. Actions that are need to be taken to protect against and hacking and Virus is
a) Load only software from original disks or CD's. Pirated or copied software is always a risk for a
virus
b) Execute only programs of which you are familiar as to their origin. Programs sent by email
should always be suspicious.
c) Computer uploads and "system configuration" changes should always be performed by the
person who is responsible for the computer. Password protection should be employed.
d) All of the above

13.Alternatives that may be preferable against virus


a) backups and restore process b) Format the software
c) A & B d) None of these

14. Following are the Leisure-Time microprocessor controlled devices using at home
a) Washing machine b) Microwave Owen c) Heating system d) All of above

15. All of the computers in a business need to be maintained by


a) hardware fixed b) software installed c) Both of these d) None of this

16.Computer programmers are the one


a) Who develop the program b) who design the software
c) Both of these d) None of these

17. Web designers are the one


a) Who design the company software b) Who design websites
c) Who installed software d) B & C

18. Computer and software company have _________ staffed by trained operators who can give
advice.
a) Secretarial Work b) Manufacturing c) help-desks d) None of these

19. Many factories have __________ to build things automatically


a) Computer b) Chip c) Men d) computer-controlled robots
20.____________ employee to produce the documents required for the business to run.
a)secretaries b) Accounting Clerks c) Manager d) Director

21. Companies once had large departments full of people whose job it was to do calculations
a) Secretaries b) Manager c) Accounting Clerks d) Director

22. Newspaper Printing used to take a team of _________to typeset (layout) a newspaper page and
to then print thousands of newspapers.
a) Dot Matrix Printer b) Inkjet printer c) Colored printer d) highly skilled printers

23. A microprocessor is a
a) RAM b) small CPU in a single chip c) ROM d) Electronic devices

24. Examples of Microprocessor-Controlled Devices


a) Games consoles b) DVD players c) MP3 players d) All of the above

9
US02FICT01 SEM-II MCQ ALL UNITS

25. SMS means


a) Short massage sending b) sending message service
c) Short Messaging Service d) sending message shortly

26. Mobile phones are used for


a) Email b) SMS c) Entertainment d) All of the these

27._________ allows fast efficient communication with the ability to send files as attachments.
a) Email b) SMS c) Entertainment d) All of the above

28. The telephone or the Internet provide the serves like


a) Online banking b) Online ordering insurance c) None of this d) Both of this

29. ______allow messages to be left for users who cannot answer the telephone.
a) Answer machines b) voice machines c) Email machines d) transport machines

30. Following are the characteristic or advantages of using computer


a)Accuracy b) Speed c) Data Storage d) All of above

31.Following are the drawbacks of IT


a) GIGO b) Failure of hardware c) lack of suitable software d) All of above

31. Which of the following is the issues related to information on internet


a) Speed processing b) Undesirable information
c) Data storage d) None of these

32. The information which is bad or not provided by any authorized organization found on internet
is called
a) Unreliable information b) Undesirable information
c) Both a amd b d) None of these

33. If the web site address ends with .gov.in , it belongs to


a) Indian government site b) Indian site
c) UK government site d) Indonesia government site

34. The information which user does not want or require while surfing on internet is called
a) Undesirable information b) Reliable information
b) Unreliable information d) Desirable information

35. To make the data secure following process is done


a) Decryption b) Encryption c) Filtering d) All of above

36. Which of the following health problem can be occurred due to constant use of IT
a) Eye strain b) Back and Neck Ache c) RSI d) All of these

37. The website begin with name https:\ is


a) Secure website b) Unsecure website c) Both a and b d) None of these

38. The website begin with name http:\ is


a) Secure website b) Unsecure website c) Both a and b d) None of these

10
US02FICT01 SEM-II MCQ ALL UNITS

Short Questions (Unit-4)


1) What is Software Copyright?
2) Define Hacking.
3) What is Virus?
4) Explain steps to protect against Virus.
5) How employment increases due to ICT
6) How unemployment increases due to ICT
7) What is Microprocessor controlled device?
8) Effect of using microprocessor
9) List out microprocessor controlled device using at home.
10) Explain capabilities of IT.
11) Explain Limitation of IT.
12) List out issues related to information on internet.
13) List out potential health problem related to constant use of IT
14) Explain RSI in brief.
15) Explain Eye-Strain and Back and Neck Ache in brief

Long Questions (Unit-4)


1) What is Software Copyright? Explain in detail.
2) What is Hacking? Explain in detail.
3) Define Virus. Which actions can be taken to protect against Virus.
4) Explain how employment increases due to ICT?
5) Explain effect of ICT on increased unemployment.
6) What is Microprocessor controlled device? And also explain its effects.
7) What is Microprocessor controlled device? Give some examples of it.
8) Explain Capabilities and limitations of IT.
9) Explain various issues related to information on internet.
10) Explain Reliability of information and Undesirable information in detail.
11) Which types of potential health problem can be occur due to constant use of ICT?
12) Explain RSI in detail.

11

You might also like