Educatequick.com

Educate Quick provides you each kind of knowledge. e.g: Technical Tutorials , education news, education knowledge, general knowledge, worthy written content on all kinds of topics related to every field of life best for students to make assignments and presentations.

Monday, April 13, 2020

Fundamentals of Computer || Advantages And Disadvantages Of Computer



Fundamentals of Computer

Advantages And Disadvantages Of Computer


Computer has making human life faster because of its incredible speed, Accuracy and storage, with which human can save anything and search it out easily when needed. We can say computer a versatile machine because it is very flexible in performing their jobs. but Computers have several important advantages and disadvantages.

                                     
Fundamentals of Computer || Advantages And Disadvantages Of Computer

Advantages of computer

Multitasking

Multitasking is one of the major advantage of computer. Person can perform multiple task, multiple operation, calculate numerical problems within few seconds. Computer can perform trillion of instructions per second.

Speed

Now computer is not just a calculating device. Now a day’s computer has very important role in human life. One of the main advantages of computer is its incredible speed, which helps human to complete their task in few seconds. All the operations can be performed very fast just because of its speed elsewise it takes a long time to perform the task.

Cost/ Stores huge amount of data

It is a low cost solution. Person can save huge data within a low budget. Centralized database of storing information is the major advantage that can reduce cost.

Accuracy

One of the root advantage of computer is that can perform not only calculations but also with accuracy.

Data Security

Protecting digital data is known as data security. Computer provide security from destructive forces and from unwanted action from unauthorized users like cyberattack or access attack.

Disadvantage of Computer

As we know advantage comes with disadvantage.

Virus and hacking attacks

Virus is a worm and hacking is simply an unauthorized access over computer for some illicit purpose. Virus is being transferred from email attachment, viewing an infected website advertisement, through removable device like USB etc. once virus is transferred in host computer it can infect file, overwrite the file etc.
For example: Huge portion of 
internet was going down including Twitter, Netflix, Reedit and CNN in October 2016 because the largest DDoS attack was launched on service provider DYN using Iot Botnet.

Online Cyber Crimes

Online cyber-crime means computer and network may have used in order to commit crime. Cyberstalking and Identity theft are the points which comes under online cyber-crimes. For example: one may get the access of the access to your shopping account like amazon account now that person will be able to know your personal details like debit card or credit card number which can be than misused.

Reduction in employment opportunity

Mainly past generation was not used of the computer or they have the knowledge of computerthey faced a big problem when computer came in field. As we have seen in banking sector senior bank employees faced this problem when computer came to the banking sector.
Above were the main disadvantage of computer, no IQ, Dependency, No feeling, Break down are the basic disadvantages of computer.

Applications of Computer

1)-- Reasons in points what is the role of the computer in Business.

1. When anyone wants to start the business they use Computer

When you think and want to start or search business idea and facts then you start the computer, open the Internet browser and search innovative business ideas on Google. So, even before starting a business, million people daily search on Google new business ideas, website ideas, online business ideas, offline business or part-time business ideas, home based business idea, travel business ideas, blogging business ideas, computer business ideas, data analytics business ideas and cloud storage business idea etc. and thousands other type of quires related to business.
Why? Because of computer search and find the information and data quickly and accurately. It’s the fastest method to share, get data and information related to business and career. That’s why billion people running or starting a business by using Computers.

 

2. When business owners start executing the business idea and plan they use Computer

The role of the computer in business is very productive when anyone starts executing business ideas and plans. To create a business plan then business owners can use Microsoft Excel to perform the financial calculation, marketing budget planning, visualization of data for seminars and meetings and analysis of data analytics to create innovative and unique valuable products and services.
Even if they don’t know how to create a business plan, they can download the pre-defined and designed excel templates. They can also buy or purchased full business plan templates by using the internet. They can also consult regarding the execution of their business idea, planning and implementation.
For businesses, it’s very tough to get such details and insights of business development data and information without using Computer, Microsoft Excel and the Internet. That’s why it’s important to use a computer and related technologies in business.

3. When they want to Print marketing and Advertising Material they Use Computer

Marketing and advertising are like blood for business. Especially it’s very important for small business owners and home-based businesses to survive. They need marketing and advertising material on daily basis. But to create marketing and advertising materials they have to use popular computer applications such as Adobe Photoshop, Microsoft Office, Corel Draw, Adobe Illustrator and printer etc. with or on the computer.  Without a computer, it’s tough to create such marketing material (images, videos, slideshows, business cards, letterhead, brochure etc.) in quickly and accurately. And also using a computer to create online and offline marketing materials it’s really important to use a computer in Business.

4. When companies want to hire employees they use Computer

In general, it means using the Internet, but to use the Internet they have to use Computer/laptop to access and run websites. Yes, they can use Mobile, but mobile is also a small version of the computer. One more thing is that it’s not convincing so far to hire people using the mobile phone.
But using computer accessing freelancing website and online job portal to hire employees and remote workers are very convincing and time savings. Time is very important for higher level productivity. So, hiring remote workers on a fixed price, hourly and project-based methods it really cut down the cost of conducting the business online and offline.
That’s why using a computer with Internet connection is more beneficial than an empty computer and without the existence of productive business applications.

5. When organizations want to Advertise and Market their products and services they use Computer with internet connection

Online marketing is the fastest way that is utilized ever to advertise and market products and services around the world within few seconds. Every business ownerwants quick profit, more results, and targeted and customer oriented marketing. Without the computer and internet, it’s not possible. Google existed still today is not because you can search on free but they charge for advertisements. Google Ads is their biggest revenue generating machine. Similarly, Facebook also provides advertisement and marketing services to small and big business companies. Everything that you see on the Internet is connected directly or indirectly with advertisement and marketing.
Everyone can promote their business online faster by using and creating effective online marketing strategies. And behind this “computer and internet”. So the use of a computer with internet is more effective.

2)--  Applications computers in field of Pharmacy.

1. Computers in Clinical Pharmacy Presented by: Dr.Wajiha Ishtiyak (Pharm.D),(M.Phil. Clinical Pharmacy) Lecturer Lahore Pharmacy College of Lahore Medical & Dental College (Pakistan)
2. Computers and Pharmacy •Right now computers and pharmacy go hand in hand. •Drug and patient database management; order entry systems; drug information; billing; purchasing; automated dispensing units; and on and ON! •Today we can exchange health information and provide services across geographic, time and social boundaries.
3. Advantages • Pharmacy plays crucial role in patient care. • Requires huge management and manpower • Effective use of computer started in Pharmacy started in 1980. • Advantages like reduction in time, accuracy, reduction in man power, speed, multitasking, non-
4. Use of internet in Pharmacy • Internet is collection of huge data which is accessible with few clicks. • Availability of soft copies of books has made it more useful for pharmacists. • Access to huge amount of research journals published online has made very useful tool for literature survey.
5. Computer in Retail Pharmacy • Accounting functions • Managerial functions • Purchasing and Inventory control • Drug Information
6. Hospital and Clinical Pharmacy and Computer • Hospital pharmacy performs the function of receiving and allotment of drugs and other professional items. Dispensing and manufacturing are also integral parts. • Patient record maintenance • Purchase and inventory control • Therapeutic Drug monitoring
7. Computers in Pharmaceutical Analysis • Analytical instruments use computer designed software. • Data storage and processing • Building up libraries • HPLC, MS, GLC , spectrophotometers and all other instruments
8. Computer Aided Drug Design • Integral Part of Drug Discovery • Rational Drug design • Chemical modifications of molecules • Generation of lead molecules • Docking studies using 3-D models of proteins
9. Computers in Publications • Versatile and effortless writing • Ease of editing, reviewing and modifications • Microsoft word, WordPad, notepad for writing purposes • Microsoft Excel, Access for presentation of data • Endnote for referencing • Internet for publishing
10. Computers in Education • From “ Chalk to talk” to “Display and Deliver” • Computer aided learning “CAL” • Hypertext video chats, web based education, multimedia based education, digital libraries, simulation laboratories, tele- education • E-learning • Digital libraries
11. Simulations • Because medicine involves hands-on work, medical students need to practice procedures before they do the procedure for real on a patient. Use computer programs that simulate surgery and other procedures to meet this need.
12. Pharmacy informatics • Bio-medical and Pharmacy informatics • An integral part of pharmacy education • use and integration of data, information, knowledge, and technology involved with medication use processes • informatics have ranged from improving pharmaceutical care inoncology, to providing clinical decision support (CDS) for antimicrobial stewardship and pharmacokinetics, to containing costs in managed care
13. Drug Information Services • Pharmaceutical companies are responsible for providing updated, relevant information on the efficacy, safety and quality of drugs. • This system is incorporated into an on-line network system, and can be directly accessed by thousands of people all over the world. • Moreover, Drug and poison centers can work on the basis of same principal which may respond to queries regarding drugs. • DPIC, UVAS, Lahore.
14. Tele pharmacy • Provides pharmaceutical care at a distance to patients in rural and medically underserved areas • Licensed pharmacists at a central pharmacy site can supervise a registered pharmacy technician at a remote site via teleconferencing • The technician prepares the prescription for dispensing, while the pharmacist communicates face-to-face in real time with both the technician and the patient
15. Internet Pharmacies • Since about the year 2000, Internet pharmacies have been established worldwide • similar to community pharmacies • The primary difference is the method by which the medications are requested and received. • Internet pharmacies (also known as Online Pharmacies) are also recommended to some patients by their physicians if they are homebound.

3)-- Uses of computer in Banking


Modern banks use computers for storing financial information and processing transactions.Tellers and other employees also use them to log information. Customers often use computers for online banking.
Computers have revolutionized accounting and bookkeeping, and banks were some of the first to switch to computers. Processing transactions manually takes a considerable amount of time, and even expensive computers allowed banks to save money on labor costs. These systems are also great at avoiding mistakes.
Banking tellers also use computers to access customer data quickly. Instead of having to find a file for every customer who enters, tellers can simple type in the customer's name and bring up relevant data instantly. These systems can also process many transactions when the customer is present, so tellers can give customers receipts reflecting deposits and withdrawals.
Online banking has become more popular over the years, and people do not have to go to the bank as often as they once did. Some banks even operate exclusively online by providing online banking functionality and phone support when needed. These banks have lower operating costs, and many are able to provide lower fees for their customers. Credit card companies and other financial institutes have followed suit and allow customers to access information and process transactions online.


Question No: 1

(b)

Which type of OCR scanner is designed to read documents of varying sizes?



Optical character recognition

Optical character recognition or optical character reader, often abbreviated as OCR, is the mechanical or electronic conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image.
Widely used as a form of information entry from printed paper data records – whether passport documents, invoices, bank statements, computerized receipts, business cards, mail, printouts of static-data, or any suitable documentation – it is a common method of digitizing printed texts so that they can be electronically edited, searched, stored more compactly, displayed on-line, and used in machine processes such as cognitive computingmachine translation, (extracted) text-to-speech, key data and text mining. OCR is a field of research in pattern recognitionartificial intelligence and computer vision.
Early versions needed to be trained with images of each character, and worked on one font at a time. Advanced systems capable of producing a high degree of recognition accuracy for most fonts are now common, and with support for a variety of digital image file format inputs. Some systems are capable of reproducing formatted output that closely approximates the original page including images, columns, and other non-textual components.

Applications

OCR engines have been developed into many kinds of domain-specific OCR applications, such as receipt OCR, invoice OCR, check OCR, legal billing document OCR.
They can be used for:
·         Data entry for business documents, e.g. check, passport, invoice, bank statement and receipt
·         Automatic number plate recognition
·         In airports, for passport recognition and information extraction
·         Automatic insurance documents key information extraction
·         Extracting business card information into a contact list[9]
·         More quickly make textual versions of printed documents, e.g. book scanning for Project Gutenberg
·         Make electronic images of printed documents searchable, e.g. Google Books
·         Converting handwriting in real time to control a computer (pen computing)
·         Defeating CAPTCHA anti-bot systems, though these are specifically designed to prevent The purpose can also be to test the robustness of CAPTCHA anti-bot systems.
·         Assistive technology for blind and visually impaired users

 


Question No: 2

(a)

 

What is meant by speech recognition system? Explain four basic steps involved in speech recognition.


Speech recognition System

Speech recognition is the interdisciplinary subfield of computational linguistics that develops methodologies and technologies that enables the recognition and translation of spoken language into text by computers. It is also known as automatic speech recognition (ASR), computer speech recognition or speech to text (STT). It incorporates knowledge and research in the linguisticscomputer science, and electrical engineering fields.
Some speech recognition systems require "training" (also called "enrollment") where an individual speaker reads text or isolated vocabulary into the system. The system analyzes the person's specific voice and uses it to fine-tune the recognition of that person's speech, resulting in increased accuracy. Systems that do not use training are called "speaker independent systems. Systems that use training are called "speaker dependent".
Speech recognition applications include voice user interfaces such as voice dialing (e.g. "call home"), call routing (e.g. "I would like to make a collect call"), demotic appliance control, search (e.g. find a podcast where particular words were spoken), simple data entry (e.g., entering a credit card number), preparation of structured documents (e.g. a radiology report), determining speaker characteristics, speech-to-text processing (e.g., word processors or emails), and aircraft (usually termed direct voice input).
The term voice recognition or speaker identification refers to identifying the speaker, rather than what they are saying. Recognizing the speaker can simplify the task of translating speech in systems that have been trained on a specific person's voice or it can be used to authenticate or verify the identity of a speaker as part of a security process.
From the technology perspective, speech recognition has a long history with several waves of major innovations. Most recently, the field has benefited from advances in deep learning and big data. The advances are evidenced not only by the surge of academic papers published in the field, but more importantly by the worldwide industry adoption of a variety of deep learning methods in designing and deploying speech recognition systems.

Basic Steps involving speech recognition

 

1 ) Dynamic time warping (DTW)-based speech recognition

Dynamic time warping is an approach that was historically used for speech recognition but has now largely been displaced by the more successful HMM-based approach.
Dynamic time warping is an algorithm for measuring similarity between two sequences that may vary in time or speed. For instance, similarities in walking patterns would be detected, even if in one video the person was walking slowly and if in another he or she were walking more quickly, or even if there were accelerations and deceleration during the course of one observation. DTW has been applied to video, audio, and graphics – indeed, any data that can be turned into a linear representation can be analyzed with DTW.
A well-known application has been automatic speech recognition, to cope with different speaking speeds. In general, it is a method that allows a computer to find an optimal match between two given sequences (e.g., time series) with certain restrictions. That is, the sequences are "warped" non-linearly to match each other. This sequence alignment method is often used in the context of hidden Markov models.

2 ) Neural network

Neural networks emerged as an attractive acoustic modeling approach in ASR in the late 1980s. Since then, neural networks have been used in many aspects of speech recognition such as phoneme classification isolated word recognition, audiovisual speech recognition, audiovisual speaker recognition and speaker adaptation.
neural networks make fewer explicit assumptions about feature statistical properties than HMMs and have several qualities making them attractive recognition models for speech recognition. When used to estimate the probabilities of a speech feature segment, neural networks allow discriminative training in a natural and efficient manner. However, in spite of their effectiveness in classifying short-time units such as individual phonemes and isolated words, early neural networks were rarely successful for continuous recognition tasks because of their limited ability to model temporal dependencies.
One approach to this limitation was to use neural networks as a pre-processing, feature transformation or dimensionality reduction, step prior to HMM based recognition. However, more recently, LSTM and related recurrent neural networks (RNNs) and Time Delay Neural Networks(TDNN's) have demonstrated improved performance in this area.

End-to-end automatic speech recognition

Since 2014, there has been much research interest in "end-to-end" ASR. Traditional phonetic-based (i.e., all HMM-based model) approaches required separate components and training for the pronunciation, acoustic and language model. End-to-end models jointly learn all the components of the speech recognizer. This is valuable since it simplifies the training process and deployment process. For example, a n-gram language model is required for all HMM-based systems, and a typical n-gram language model often takes several gigabytes in memory making them impractical to deploy on mobile devices. Consequently, modern commercial ASR systems from Google and Apple (as of 2017) are deployed on the cloud and require a network connection as opposed to the device locally.
The first attempt of end-to-end ASR was with Connectionist Temporal Classification (CTC) based systems introduced by Alex Graves of Google DeepMind and Navdeep Jaitly of the University of Toronto in 2014. The model consisted of recurrent neural networks and a CTC layer. Jointly, the RNN-CTC model learns the pronunciation and acoustic model together, however it is incapable of learning the language due to conditional independence assumptions similar to a HMM. Consequently, CTC models can directly learn to map speech acoustics to English characters, but the models make many common spelling mistakes and must rely on a separate language model to clean up the transcripts. Later, Baiduexpanded on the work with extremely large datasets and demonstrated some commercial success in Chinese Mandarin and English. In 2016, University of Oxford presented Lip Net, the first end-to-end sentence-level lip reading model, using spatiotemporal convolutions coupled with an RNN-CTC architecture, surpassing human-level performance in a restricted grammar dataset. A large-scale CNN-RNN-CTC architecture was presented in 2018 by Google DeepMind achieving 6 times better performance than human experts.
An alternative approach to CTC-based models are attention-based models. Attention-based ASR models were introduced simultaneously by Chan et al. of Carnegie Mellon University and Google Brain and Bahdanau et al. of the University of Montreal in 2016. The model named "Listen, Attend and Spell" (LAS), literally "listens" to the acoustic signal, pays "attention" to different parts of the signal and "spells" out the transcript one character at a time. Unlike CTC-based models, attention-based models do not have conditional-independence assumptions and can learn all the components of a speech recognizer including the pronunciation, acoustic and language model directly. This means, during deployment, there is no need to carry around a language model making it very practical for deployment onto applications with limited memory. By the end of 2016, the attention-based models have seen considerable success including outperforming the CTC models (with or without an external language model). Various extensions have been proposed since the original LAS model. Latent Sequence Decompositions (LSD) was proposed by Carnegie Mellon UniversityMIT and Google Brain to directly emit sub-word units which are more natural than English characters; University of Oxford and Google DeepMind extended LAS to "Watch, Listen, Attend and Spell" (WLAS) to handle lip reading surpassing human-level performance.


Question No: 2

(b)

What is spreadsheet? Elaborate the purposes served by this? Also write down the process for creating different types of graphs in spreadsheet.

 

`Spreadsheet

A spreadsheet is an interactive computer application for organization, analysis and storage of data in tabular form. Spreadsheets developed as computerized analogs of paper accounting worksheets. The program operates on data entered in cells of a table. Each cell may contain either numeric or text data, or the results of formulas that automatically calculate and display a value based on the contents of other cells. A spreadsheet may also refer to one such electronic document.
Spreadsheet users can adjust any stored value and observe the effects on calculated values. This makes the spreadsheet useful for "what-if" analysis since many cases can be rapidly investigated without manual recalculation. Modern spreadsheet software can have multiple interacting sheets, and can display data either as text and numerals, or in graphical form.
Besides performing basic arithmetic and mathematical functions, modern spreadsheets provide built-in functions for common financial and statistical operations. Such calculations as net present value or standard deviation can be applied to tabular data with a pre-programmed function in a formula. Spreadsheet programs also provide conditional expressions, functions to convert between text and numbers, and functions that operate on strings of text.
Spreadsheets have replaced paper-based systems throughout the business world. Although they were first developed for accounting or bookkeeping tasks, they now are used extensively in any context where tabular lists are built, sorted, and shared.
LANPAR, available in 1969, was the first electronic spreadsheet on mainframe and time sharing computers. LANPAR was an acronym: Language for Programming Arrays at Random. VisiCalc was the first electronic spreadsheet on a microcomputer, and it helped turn the Apple II computer into a popular and widely used system. Lotus 1-2-3 was the leading spreadsheet when DOS was the dominant operating system. Excel now has the largest market share on the Windows and Macintosh platforms. A spreadsheet program is a standard feature of an office productivity suite; since the advent of web apps, office suites now also exist in web app form. Web based spreadsheets are a relatively new category.

Types of Spreadsheets

Although most spreadsheets have the same format, when you consider functionality, many different types of spreadsheets are commonly used. They are commonplace in business settings, but there are both personal and professional uses for most of the types of spreadsheets. While most spreadsheet variety comes from the different uses, there are also different spreadsheet types in terms of format. Considering both of these gives you a full picture of the variety of spreadsheets you may encounter

1- Financial Tracking
as Microsoft Excel, Lotus 1-2-3 and Google Sheets are well-suited for this type of work. For example, they allow the clear presentation of expenditures and incomes related to different departments and can be set One of the most common business uses of spreadsheets is to track financial data. Programs such up to display negative numbers in red. Templates for budget spreadsheets are included with spreadsheet programs to reduce the amount of setup work required.

 

2-Data Analysis and Statistics
Calculations or other analyses on a set Researchers and data analysts often use spreadsheet programs to perform statistical of data. The functions on spreadsheets make it easy to perform many calculations quickly. For example, applying a formula to hundreds of data points would be a tedious, time-consuming process without some form of automation, and programs like Microsoft Excel offer just this capability. Many programs also have simple statistical calculations built-in. You can find the standard deviation of a set of data using one function, rather than working it out using the formula, for example. This type of spreadsheet primarily shows numbers, like most spreadsheets, but many cells contain formulas that determine the outputs.

3- Graphing and Presenting Data
Spreadsheet programs are valuable tools when you're looking to present data in the form of graphs or tables. The spreadsheet itself contains the data to be included on the graph, and spreadsheet programs have many types of graphs built in. These types of spreadsheets are similar to those for data analysis and statistics, but in many cases, people use a separate sheet for data they want to turn into graphs. There also may be special formatting requirements to produce a specific type of graph, so the spreadsheet itself needs to be created with this in mind.

4- Different Spreadsheet Formats
Distinct types of spreadsheets are defined by their format. For example, Microsoft Excel has three options for spreadsheet format: simple tables, Excel tables and pivot tables. Simple spreadsheets are the most commonly used type, and you have to make most changes manually. For example, if you set up a simple table and want to refer to the table as a whole in a formula or instruction, you need to define border columns and rows and make sure any additional data is added between those cells. From Excel 2007 onward, the Excel table takes away this need by updating the size of your table automatically when you add new data.

 

Question No: 2

(c)

Define relationship between a field, a record and the structure of a database.

 

Database Structure


A database is an organized collection of data. Instead of having all the data in a list with a randomorder, a database provides a structure to organize the data. One of the most common data structures is a database table. A database table consists of rows and columns. A database table is also called a two-dimensional array. An array is like a list of values, and each value is identified by a specific index. A two-dimensional array uses two indices, which correspond to the rows and columns of a table.
In database terminology, each row is called a record. A record is also called an object or an entity. In other words, a database table is a collection of records. The records in a table are the objects you are interested in, such as the books in a library catalog or the customers in a sales database. A field corresponds to a column in the table and represents a single value for each record. A field is also called an attribute. In other words, a record is a collection of related attributes that make up a single database entry.
The example shows a simple database table of customers. Each customer has a unique identifier (Customer ID), a name, and a telephone number. These are the fields. The first row is called the header row and indicates the name of each field. Following the header row, each record is a unique customer.
Notice a few things about the table. First, all the data values in a single field or column are of the same kind - they are the same data type. Second, the data values in a single record or row can consist of different types, such as numbers and text. Third, there are no empty rows or columns. Individual data values can be missing, but there are no blank records or fields. These properties make a database table quite different from a table in a word processing or spreadsheet application.
The database structure imposes certain constraints on the data values, which makes it more reliable. For example, for the phone number, you cannot enter text, since that wouldn't make sense.
While this example is quite simple, you can easily imagine what else could be stored in such a database. For example, you could store the customer's mailing address, billing information, history of past purchases, etc. For an organization with many thousands of customers, this quickly becomes a large database. To use a large database effectively, you can use a database management system (DBMS). A DBMS is specialized software to input, store, retrieve and manage all the data.

Record

In computer science, a record (also called a structure, strut, or compound data) is a basic data structure. Records in a database or spreadsheet are usually called "rows".
A record is a collection of fields, possibly of different data types, typically in fixed number and sequence. The fields of a record may also be called members, particularly in object-oriented programming; fields may also be called elements, though these risk confusion with the elements of a collection.
For example, a date could be stored as a record containing a numeric year field, a month field represented as a string, and a numeric day-of-month field. A personnel record might contain a name, a salary, and a rank. A Circle record might contain a center and a radius—in this instance, the center itself might be represented as a point record containing x and coordinates.
Records are distinguished from arrays by the fact that their number of fields is typically fixed, each field has a name, and that each field may have a different type.
A record type is a data type that describes such values and variables. Most modern computer languages allow the programmer to define new record types. The definition includes specifying the data type of each field and an identifier (name or label) by which it can be accessed. In type theoryproduct types (with no field names) are generally preferred due to their simplicity, but proper record types are studied in languages such as System F-sub. Since type-theoretical records may contain first-class function-typed fields in addition to data, they can express many features of object-oriented programming.
Records can exist in any storage medium, including main memory and mass storage devices such as magnetic tapes or hard disks. Records are a fundamental component of most data structures, especially linked data structures. Many computer files are organized as arrays of logical records, often grouped into larger physical records or blocks for efficiency.
The parameters of a function or procedure can often be viewed as the fields of a record variable; and the arguments passed to that function can be viewed as a record value that gets assigned to that variable at the time of the call. Also, in the call stack that is often used to implement procedure calls, each entry is an activation record or call frame, containing the procedure parameters and local variables, the return address, and other internal fields.
An object in object-oriented language is essentially a record that contains procedures specialized to handle that record; and object types are an elaboration of record types. Indeed, in most object-oriented languages, records are just special cases of objects, and are known as plain old data structures (PODSs), to contrast with objects that use OO features.
A record can be viewed as the computer analog of a mathematical tuple, although a tuple may or may not be considered a record, and vice versa, depending on conventions and the specific programming language. In the same vein, a record type can be viewed as the computer language analog of the Cartesian product of two or more mathematical sets, or the implementation of an abstract product type in a specific language.

Field

In computer science, data that has several parts, known as a record, can be divided into fields. Relational databases arrange data as sets of database records, also called rows. Each record consists of several fields; the fields of all records form the columns. Examples of fields: name, gender, hair color.
In object-oriented programming, field (also called data member or member variable) is the data encapsulated within a class or object. In the case of a regular field (also called instance variable), for each instance of the object there is an instance variable: for example, an Employee class has a Name field and there is one distinct name per employee. A static field (also called class variable) is one variable, which is shared by all instances.[1] Fields are abstracted by properties, which allow them to be read and written as if they were fields, but these can be translated to getter and setter method calls.

Fixed length

Fields that contain a fixed number of bits are known as fixed length fields. A four byte field for example may contain a 31 bit binary integer plus a sign bit (32 bits in all). A 30 byte name field may contain a person's name typically padded with blanks at the end. The disadvantage of using fixed length fields is that some part of the field may be wasted but space is still required for the maximum length case. Also, where fields are omitted, padding for the missing fields is still required to maintain fixed start positions within a record for instance.


Question No: 3

(a)


Discuss the conditional formatting and advance filtering features in MS-Excel with suitable examples.

Excel Advance Features

Excel Advanced Filter

Excel Advanced Filter – as the name suggests – is the advanced version of the regular filter. You can use this when you need to use more complex criteria to filter your data set.
Here are some differences between the regular filter and Advanced filter:
While the regular data filter will filter the existing dataset, you can use Excel advanced filter to extract the data set to some other location as well.
Excel Advanced Filter allows you to use complex criteria. For example, if you have sales data, you can filter data on a criterion where the sales rep is Bob and the region is either North or South (we will see how to do this in examples). Office support has some good explanation on this.

 

Criteria in Excel Advanced Filter

Getting unique records is one of the many things you can do with Excel advanced filter.
Its primary utility lies in its ability to allow using complex criteria for filtering data.
Here is what I mean by complex criteria. Suppose you have a dataset as shown below and you want to quickly get all the records where the sales are greater than 5000 and the region is the US.

Hide Errors

You can use Excel conditional formatting to check for errors, and change the font colour to match the cell color. In this example, if column A contains a zero, the #DIV/0! error is displayed in column C.
Select cells C2:C5
On the Ribbon's Home tab, click Conditional Formatting, then click New Rule
Click Use a Formula to Determine Which Cells to Format
NOTE: In Excel 2003, choose Format Conditional Formatting
Then, from the first dropdown, choose Formula Is
In the rule box, enter a formula that refers to the active cell in the selection. In this example, we selected C2:C5, and cell C2 is the active cell, so we'll check for an error in cell C2.
   =ISERROR(C2)
or, to hide only #N/A errors: =ISNA(C2)
Click the Format button.
Select a font colour to match the cell colour.
Click OK, click OK

Hide Duplicate Values

In a table, each row should have all data entered, to enable sorting and filtering. However, you can use Excel conditional formatting to hide the duplicate values, and make the list easier to read.
In this example, when the table is sorted by Region, the second (and subsequent) occurences of each region name will have white font colour.
You can see the text if you select the cells.
Follow these steps to hide the duplicates, and you can see the steps in the video above.
  1. Select range A2:A5
  2. On the Ribbon's Home tab, click Conditional Formatting, then click New Rule
  3. Click Use a Formula to Determine Which Cells to Format
    • NOTE: In Excel 2003, choose Format Conditional Formatting
    • Then, from the first dropdown, choose Formula Is
For the formula, enter
=A2=A1
  1. Click the Format button.
  2. Select a font colour to match the cell colour.
  3. Click OK, click OK

Highlight Cells With Formulas

Use Excel conditional formatting to highlight cells that contain a formula. In this example, there are values in cells A2:B8, and totals in cells C2:C8 and in A9:C9
  1. Select all the cells where you want the formatting -- range A2:C9
  2. On the Ribbon's Home tab, click Conditional Formatting, then click New Rule
  3. Click Use a Formula to Determine Which Cells to Format
  4. For the formula, enter: =ISFORMULA(A2)
  5. Click the Format button.
  6. Select a font colour for highlighting.
  7. Click OK, click OK

 

 


Question No: 3

(b)

 

Describe the features of application, document and dialog windows with the help of suitable examples.

Window Features

Version 1507

Windows 10, codenamed "Threshold 1", is the first release of Windows 10. It carries the build number 10.0.10240. While the build itself doesn't contain the version number, Microsoft retroactively named this version 1507, standing for July 2015 and matching the versioning scheme for later updates. "Threshold 1" was announced on an event on September 30, 2014 with a first preview following the day after. The final release was made available to Windows Insiders on July 15, 2015, followed by a public release on July 29, 2015 as a free upgrade to Windows 7 and Windows 8.1.
The Threshold 1 release of Windows 10 is only supported for users of the Long Term Servicing Branch (LTSB).
New feature indicated for this release are only those added since Windows 8.1 Update 1, released in April 2014.

Bundled apps

The Mail app adds user-configurable swipe gesture controls and POP3 email support. Google Calendar support is added to the Calendar app.] The Settings app is expanded to have similar functionality as the Control Panel, albeit with a Metro-style user interface. The Map app can download maps for offline use
Microsoft Edge is the new browser for Windows 10 and is the successor to Internet Explorer, although Internet Explorer will remain for compatibility and legacy purposes. Cortana has been integrated into Edge, accessible by the option "Ask Cortana" in the right click menu, as well as a Reading View and the ability to write notes directly on web pages and save to OneNote. A Reading List feature has also been added, where users can save articles or other content to be accessed and read later. Microsoft Edge also includes a Share button on its toolbar where tapping or clicking on it will bring up the system Share panel, where users will be able to share a webpage to installed applications such as Reading List or third-party apps such as Facebook and Twitter. Since its release, Microsoft Edge has scored 402 out of 555 points on HTML5test.

Development platform

Windows 10 introduced Universal Windows Platform (UWP), an extension of the Windows Runtime platform which was originally introduced with Windows 8. UWP emphasizes a core set of APIs common to all variations of the operating system, enabling the ability to code a single application with adaptations (such as user interface differences) for different device families and states, including desktops and laptops, tablets, smartphones (via Windows 10 Mobile), Xbox One, and other new device classes such as Surface Hub and HoloLens. An application may also react to the available displays and input on a device; when connected to a monitor or a suitable docking station, a UWP app on a smartphone can take on the appearance of the app on a PC. Information can also be synchronized between versions of an app for different devices, such as notifications and licensing.

Windows Documents

.
My Documents is the commonly recognized name of a special folder in Microsoft Windows (even though starting with Windows Vista, it is called Documents only, and the actual name of the folder might be different when the language of the installed copy of Windows is not English.) This folder is supposed to be a personal area where users store their personal non-shared documents. However, many software developers have ignored this convention and as a result, this folder has become a dumping ground for the application data such as files containing settings and saved games. Users cannot delete, move or organize these files without causing unwanted behavior in their software.
Until Windows XP, it contained other subfolders such as "My Pictures", "My Music" and "My Videos". Starting with Windows Vista, these subfolders were moved out of My Documents and were made its siblings.

Dialog of Windows

A dialog box is a secondary window that allows users to perform a command, asks users a question, or provides users with information or progress feedback.
A typical dialog box.
Dialog boxes consist of a title bar (to identify the command, feature, or program where a dialog box came from), an optional main instruction (to explain the user's objective with the dialog box), various controls in the content area (to present options), and commit buttons (to indicate how the user wants to commit to the task).
Dialog boxes have two fundamental types:
Modal dialog boxes require users to complete and close before continuing with the owner window. These dialog boxes are best used for critical or infrequent, one-off tasks that require completion before continuing.
Modeless dialog boxes allow users to switch between the dialog box and the owner window as desired. These dialog boxes are best used for frequent, repetitive, on-going tasks.
A task dialog is a dialog box implemented using the task dialog application programming interface (API). They consist of the following parts, which can be assembled in a variety of combinations:
title bar to identify the application or system feature where the dialog box came from.
main instruction, with an optional icon, to identify the user's objective with the dialog.
content area for descriptive information and controls.
command area for commit buttons, including a Cancel button, and optional More options and Don't show this again controls.
footnote area for optional additional explanations and help, typically targeted at less experienced users.


Question No: 3

(c)

 

Explain basic methods of taking data backup. Also explain the process of virus spreading in computer.

 

 

 

Data Backup


1. USB stick

Small, cheap and convenient, USB sticks are everywhere, and their portability means that they’re easy to store safely, but also pretty easy to lose. There are questions about the number of read/write cycles they can take, so should be considered alongside other backup methods.
Pros:
+ Extremely portable
+ Very cheap
+ Can easily transfer data to other sources
Cons:
– Portability means they’re small and easy to lose
– Questions over read/write cycle longevity
2. External hard drive

External hard drives are just what they sound like – hard drives that live outside your computer, meaning they can be plugged in to other sources. If using them for backup, it’s best not to use them as an ‘extra every day hard drive’.
Pros:
+ Relatively cheap
+ Plenty of storage space for larger files
Cons:
– Potentially open to problems which lost files in the first place (a power surge or malware)

3. Time Machine



31K9Lw38KvLFor the Mac users out there, Time Machine is an option that backs up to external hard drives automatically. Apple sells  its own brand of dedicated wireless Time Capsules, but you can use any hard disk for it. Using this method, you’ll automatically keep backups hourly for the last 24 hours, daily for the last month and then weekly backups until the machine is full.
Pros:
+ Automated, meaning you shouldn’t forget to stay up to date
+ Frequency of backups means you should never be too out of date
+ Backs up whole drive, not just the key files
Cons:
– Dedicated wireless machine is expensive
– Mac only

4. Network Attached Storage

wdfMyCloud-2
Businesses tend to backup their files to network attached storage, but with more and more homes having multiple computers, the idea has a certain appeal, especially for those looking to save files from more than one source. With prices coming down, a dedicated wireless storage solution is a convenient option which requires less thought.
Pros:
+ Automatic backups mean you don’t risk forgetting
+ Wireless solutions also work with phones and tablets
Cons:
– Can be expensive
– Can be awkward to set up and maintain

How Do Computer Viruses Spread

Computer viruses usually spread in one of three ways: from removable media; from downloads off the Internet; and from e-mail attachments.
Although the Internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software. Still, scan everything you download, and update your antivirus software regularly.
E-mail is not the virus breeding ground it's made out to be, either. In fact, it's nearly impossible for a virus to be transmitted by plain-text e-mail. Most viruses can only spread via attachments — either rich-text e-mail or attached applications. Using antivirus software, scan attachments from people you know, and never open attachments from people you don't. If you're a Microsoft Outlook user, you can also select security preferences that keep e-mail-borne viruses from exploiting the close relationship between Outlook and the Windows operating system.
For information on specific types of computer viruses, check out Understanding Computer Viruses.
These precautions will minimize the risk of infecting your computer as well as keep you from spreading viruses onto others. If you find that your computer is infected, make sure to read Responding to and Recovering from a Virus for tips on recovery.

Question No: 4

(a)

 

What is control panel? Discuss the most important utilities provided by control panel for computer management and security.

Control Panel


The Control Panel is a component of Microsoft Windows that provides the ability to view and change system settings. It consists of a set of applets that include adding or removing hardware and software, controlling user accounts, changing accessibility options, and accessing networking settings. Additional applets are provided by third parties, such as audio and video drivers, VPN tools, input devices, and networking tools.
The Control Panel has been part of Microsoft Windows since Windows 2.0, with each successive version introducing new applets. Beginning with Windows 95, the Control Panel is implemented as a special folder, i.e. the folder does not physically exist, but only contains shortcuts to various applets such as Add or Remove Programs and Internet Options. Physically, these applets are stored as . cpl files. For example, the Add or Remove Programs applet is stored under the name appwiz.cpl in the SYSTEM32 folder.
In Windows XP, the Control Panel home screen was changed to present a categorized navigation structure reminiscent of navigating a web page. Users can switch between this Category View and the grid-based Classic View through an option that appears on either the left side or top of the window. In Windows Vista and Windows 7, additional layers of navigation were introduced, and the Control Panel window itself became the main interface for editing settings, as opposed to launching separate dialogs.
Many of the individual Control Panel applets can be accessed in other ways. For instance, Display Properties can be accessed by right-clicking on an empty area of the desktop and choosing Properties. The Control Panel can be accessed from a command prompt by typing control; optional parameters are available to open specific control panels.
On Windows 10, Control Panel is deprecated in favor of Settings app, which was originally introduced on Windows 8 as "PC settings" to provide a touchscreen-optimized settings area using its Metro-style app platform. Some functions, particularly the ability to add and remove user accounts, were moved exclusively to this app on Windows 8 and cannot be performed from Control Panel.
List of Control Panel applets
The applets listed below are components of the Microsoft Windows control panel, which allows users to define a range of settings for their computer, monitor the status of devices such as printers and modems, and set up new hardwareprograms and network connections. Each applet is stored individually as a separate file (usually a .cpl file), folder or DLL, the locations of which are stored in the registry under the following keys:
HKLM\SOFTWARE\Microsoft\Windows\Current Version\Control Panel\Cpls
This contains the string format locations of all .cpl files on the hard drive used within the control panel.
HKLM\SOFTWARE\Microsoft\Windows\Current Version\Explorer\Control Panel\Namespace
This contains the location of the 
CLSID variables for all the panels not included as cpl files. These are commonly folders or shell applets, though Windows Vista allows physical programs themselves to be registered as well. The CLSID then allows items such as the icon, info box and category to be set and gives the location of the file to be used.
The control panel then uses these lists to locate the applets and load them into the control panel program (control.exe) when started by the user. In addition to using the control panel, a user can also invoke the applets manually via the command processor. For instance, the syntax "Control.exe inetcpl.cpl" or "control.exe /name Microsoft.InternetOptions" will run the internet properties applet in Windows XP or Vista respectively. While both syntax examples are accepted on Windows Vista, only the former one is accepted on Windows XP.

Standard applets

Allows users to configure the accessibility of their PC. It comprises various settings primarily aimed at users with disabilities or hardware problems.
The behavior of the keyboard can be modified, this is aimed at people who have difficulty pressing key-combinations, or pressing a key just once. (StickyKeys


FilterKeys and ToggleKeys)
Behavior of sounds can be modified. (SoundSentry and ShowSounds)
High contrast mode can be activated.
The keyboard cursor can be customized.
The pointer can be controlled using the keyboard. (MouseKeys)
Note that in the next generation of Windows, the Ease of Access control panel superseded the simple access.cpl control panel in previous versions.
Add New Hardware (hdwwiz.cpl)
Launches a wizard which allows users to add new hardware devices to the system. This can be done by selecting from a list of devices or by specifying the location of the driver installation files.
Add or Remove Programs (appwiz.cpl)
(Renamed "Programs and Features" in Windows Vista and later)
The Add/Remove Programs dialog allows the user to manipulate software installed on the system in a number of ways;
Allows users to uninstall and change existing software packages, as well as indicating how much space individual programs take and how frequently they are used.
Allows users to manually install software from a CD-ROM or Floppy Disk, and install add-ons from Windows Update.
Allows users to change which Windows components are installed, via the Windows setup Wizard, which includes Internet ExplorerWindows Media Player and Windows Messenger
Finally, it allows users to specify the default applications for certain tasks, via the 'set program access and defaults' wizard, such as internet browsers, media players and email programs and whether access to these programs is available (since Windows 2000 Professional Service Pack 3 and Windows XP Service Pack 1)
Administrative Tools (control admintools)
Contains tools for system administration, including security, performance and service configuration. These are links to various configurations of the Microsoft Management Consolesuch as the local services list and the Event Viewer.
Automatic Updates (wuaucpl.cpl)
This is used to specify how the Automatic Updates client (wuauclt.exe) should download updates from the Microsoft Update Website, by default this is set to download and installdaily, however this can be changed to a more suitable frequency. This also allows the user to specify whether to ask permission before downloading and/or installing updates or to simply switch off Automatic Updates altogether. Removed in Windows 10
Date and Time (timedate.cpl)
Timedatecon.png
Allows user to change the date and time stored in the machine's BIOS, change the time zone and specify whether to synchronize the date and time with an Internet Time Server and which server to use.
Display (control desktop) (desk.cpl)
(Renamed "Personalization" in Windows Vista, 7 and 8.1)
XP Display Properties.png
Allows the user to change the display characteristics of their computer;
Allows users to change the desktop background (wallpaper) to a picture of their choice and specifies how it should be shown.
Allows the user to change or disable the screensaver, and specify how long it takes to activate and whether to ask for a password on resume
Allows the user to specify the color styles of all elements within the system, primarily whether to use the Windows XP / Vista styles (blue by default in XP) or to use the classic Windows 98 / Me styles, this also allows the user to change the My Computer and Recycle Bin icons.
Allows the user to change the screen resolution and colour quality, and provides trouble shooting advice for displays.

Removed in 
Windows 10 and moved to Settings App.
Folder Options (control folders) (rundll32.exe shell32.dll, Options_RunDLL 0)
FolderOpt.png
This item allows for configuration of how folders and files are presented in Windows Explorer. More specifically it allows the user to specify general settings like whether folders open in a new window or the existing window and whether the common tasks pane is shown, as well as more advanced tasks such as whether windows should hide critical system files and whether to show file extensions. It is also used to modify file type associations in Windows; i.e., which program opens which type of file and other settings like actions for each file type and the file extension.
Fonts (control fonts)
Displays all fonts installed on the computer. Users can remove fonts, install new fonts or search for fonts using font characteristics. Note that "explorer \Windows\Fonts" has the same effect. This still exists on Windows 10, but there is a similar page in Settings starting from Windows 10 April Update.
Internet Options (inetcpl.cpl)
Inetcon.png
Allows the user to change the way the computer manages internet connections and browser settings for Internet Explorer, it has several tags specifying different attributes;
General – This specifies the homepage and color schemes and allows the user to delete internet usage history.
Security & Privacy – These specify whether the computer should allow websites to undertake certain processes and download cookies, this panel also gives access to the inbuilt pop-up blocker (Windows XP SP2 and later) and the phishing controls (Internet Explorer 7).
Content – Allows the parental controls and auto-complete to be configured and also specifies how to deal with certificates.
Connections, Programs and Advanced – These give access to other aspects of internet settings such as the default modem connection and email client, proxy settings and other advanced configurations.
Game controllers (joy.cpl) (control /name microsoft.gamecontrollers)
Gcontroller.png
Allows one to add, display, troubleshoot, and use advanced settings on joysticks and game controllers and connect to other type of game controllers.
Moved to Settings app on Windows 10 Anniversary Update.
Keyboard (control keyboard) (main.cpl)
Lets the user change and test keyboard settings, including cursor blink rate and key repeat rate.
Mail (mlcfg32.cpl) (mlcfg.cpl)
Mail allows for configuration of the mail client in Windows. Microsoft Outlook Express cannot be configured with this item; it is configured through its own interface. mlcfg.cpl is used for 64 bit office applications first available with the Office 2010 release.
Mouse (control mouse) (main.cpl)
Mousecon.png
Mouse allows the configuration of pointer options, such as the double click and scroll speed, and includes visibility options such as whether to use pointer trails and whether the pointer should disappear when typing. This also allows the user to specify the pointer appearance for each task, such as resize and busy.
Network Connections (control netconnections) (ncpa.cpl)
Networkconn.png
Displays and allows the user to edit or create network connections such as Local Area Networks (LAN) and internet connections. It also offers troubleshooting functions in case the computer has to be reconnected to the network.
Phone and Modem Options (telephon.cpl)
Manages telephone and modem connections.
Power Options (powercfg.cpl)
PowerCon.png
Includes options to manage energy consumption such as;
Specify how long it takes to switch off the display and hard drives and how long it takes for the system to enter standby, if at all.
To decide what to do when the computer's on/off button is pressed, such as whether to shut down or to enter standby.
Whether to allow Hibernation (some systems become unstable when restarting).
Allows the user to configure UPS (if available).
Since Windows Vista, additional hidden power options are available for fine tuning power features.
Printers and Faxes (control printers) (control /name microsoft.devicesandprinters)
Displays all the printers and faxes currently installed on the computer, and has two main uses;
Firstly, it shows all the jobs queued for each printer, the file size and status of each job and which user they belong to, it also allows each job to be paused, canceled or moved up or down the list.
Secondly, it allows the user to set the printing or faxing preferences, such as paper size and quality via the manufacturers own preferences pane and also specifies how to share the printer across a computer network, the device driversports etc.
Regional and Language Settings (intl.cpl) aka Regional and Language Options
Various regional settings can be altered, for instance:
The way numbers are displayed (e.g. decimal separator).
How Currency values are displayed, including the currency symbol.
Time and date notations, such as the date separator and whether the clock should be in 12 or 24 hours.
Cultural location of the user's computer (The time zone is set in Date and Time).
Language;
Input language.
Keyboard layout (mapping between key strokes and characters).
Display language for Menus and Dialog Boxes.
Whether files necessary for Asiatic language support must be installed.
Installed code pages.
Removed in Windows 10 April Update
Security Center or Action Center (Windows 7 & 8.x) (wscui.cpl)
Renamed "Security & Maintanance" in Windows 10
First added in Windows XP with Service Pack 2, Security Center gives the user access to the inbuilt Windows security components, as well as providing information about any existing antivirus software such as McAfee or Zone Alarm. It includes access to Windows Update, where users can specify whether the computer should check for updates regularly (also available through the Windows Update panel), and options for managing internet security settings. It also includes links to internet articles about PC security and current virus threats and notifies the user when the PC's security is compromised.
Sounds and Audio Devices (mmsys.cpl)
SoundAudiocon.png
This panel contains various audio-related functions;
Change the speaker volume and type and specify whether to show the volume icon in the notification area.
Change the sounds played for the system or specific programs when a certain event occurs, i.e. Windows Startup or Critical Stop.
Change default devices for music playback, recording, voice recognition, MIDI etc.
Change the Sound card settings and whether to use Hardware acceleration.
Display the audio devices installed on the computer, and allows them to be configured.
Speech (Sapi.cpl)
This applet has two main functions, the first is specify settings for Speech synthesis, allowing the user to select the voice the computer should use to narrate text and how fast it should read. The second is to specify settings for Speech recognition, allowing the user to set up different profiles detailing how the computer should deal with an individual's dialect, for instance;
The amount of grammatical errors in a person's voice (punctuality sensitivity).
The speed at which the person speaks, and the time delay between words.
This also allows the user to access the voice recognition training wizard, in which an individual 'teaches' the computer to recognize a person voice interactively using the microphone.
System (Sysdm.cpl)
This is used to view and change core system settings, a user can for instance:
Display general information on the user's machine such as the amount of RAMCPU speed and type, the version of Windows the system is using and the manufacturer.
Edit the computer name in a network workgroup.
Manage and Configure hardware devices, and view information such as the manufacturer, user access and driver version of any hardware device installed on the system via Device Manager.
Enable/Disable system features such as automatic updates and System restore monitoring.
Specify advanced features such as performance logs, virtual memory settings and roaming profiles.
Taskbar and Start Menu (rundll32.exe shell32.dll, Options_RunDLL 1)
Allows the user to change the behavior and appearance of the task bar and Start Menu;
Specifies whether to use Windows XP/Vista or Classic 9x/Me styles on the taskbar and start menu.
Whether the taskbar should Auto-Hide.
Whether to show the clock in the notification area.
Allows the user to manage the tray icons.
Advanced options such as whether to show Printers & Faxes in the start menu and whether to display My Documents as a menu or as a link to a new window.
Moved to Settings App on Windows 10, but the shortcut still exists. Clicking on it taks in Settings App.
User Accounts (nusrmgr.cpl)
This allows the user to configure their account and other accounts used in the system, should they have sufficient privileges. They can change their username and password, their picture (if enabled) and their .net passport. If the current user has an administrators account they can also add, delete and modify other user accounts as well as make changes to core system settings. This panel also specifies whether the guest account should be active and whether to use the Welcome screen while Windows loads.

Question No: 4

(b)

 

Write down the process for creating, saving, editing and deleting an MS Word document.

Office Word

Launching Word

The first time you launch Word after installation, the program asks you to confirm your name and initials. This isn’t Microsoft’s nefarious plan to pin you down: Word uses this information to identify documents that you create and modify. Word uses your initials to mark your edits when you review and add comments to Word documents that other people send to you (Section 16.3).
You have three primary ways to fire up Word, so use whichever method you find quickest:

Opening a Word document.

 Once you’ve created some Word documents, this method is fastest of all, since you don’t have to start Word as a separate step. Just open an existing Word document, and Word starts itself. Try going to Start → My Recent Documents, and then, from the list of files, choose a Word document. You can also double-click the document’s icon on the desktop or wherever it lives on your PC.

Creating a New Document

When you start Word without opening an existing document, the program gives you an empty one to work in. If you’re eager to put words to page, then type away. Sooner or later, though, you’ll want to start another new document. Word gives you three ways to do so:
When you start Word 2007 for the first time, it may look a little top-heavy. The ribbon takes up more real estate than the old menus and toolbars. This change may not matter if you have a nice big monitor. But if you want to reclaim some of that space, you can hide the ribbon by double-clicking the active tab. Later, when you need to see the ribbon commands, just click a tab.
 When you start Word 2007 for the first time, it may look a little top-heavy. The ribbon takes up more real estate than the old menus and toolbars. This change may not matter if you have a nice big monitor. But if you want to reclaim some of that space, you can hide the ribbon by double-clicking the active tab. Later, when you need to see the ribbon commands, just click a tab.

Save Documents

The Many Ways to Save Documents

It’s the Microsoft Way to give you multiple ways to do most everything. Whether that’s because the company’s programmers believe in giving you lots of choices, or because they can’t make up their minds about the best way to do something is a question best left to the philosophers. But the point is, you do have a choice. You don’t have to memorize every keystroke, button, and command. Especially with saving, the important thing is to find a way you like and stick with it. Here’s a list of some ways you can save the document you’re working on:
Saving by keyboard shortcut
Ctrl+S. If you’re an old hand at Word, this keyboard shortcut may already be burned in your brain. It still works with Word and other Office programs. This command quickly saves the document and lets you get back to work.
Alt+F, S. This keyboard shortcut does the exact same thing as Ctrl+S. Unlike Ctrl+S, though, you get visual reminders of which keys to press when you press the Alt key. See the box above.
Saving by menu command
Office button → Save. If you don’t want to use keyboard shortcuts, you can mouse your way to the same place using menus. Like the options above, this command saves your file with its current name.
Office button → Save As. The Save As option lets you save your file with a new name (Figure 1-17). When you use this command, you create a new document with a new name that includes any changes you’ve made. (The individual steps are described in the next section.)
Use Office button → Save As to save your file with a new name or in a different file format. In this example, the Word file tale of two cities is being saved as an HTML type file—a format used for Web pages.
 Use Office button → Save As to save your file with a new name or in a different file format. In this example, the Word file tale of two cities is being saved as an HTML type file—a format used for Web pages.

Question No: 5

Discuss the importance of social media in our society. Give ideas for effective usage of social media for educational development, character building and business development.  

Social media

Social media are interactive computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks The variety of stand-alone and built-in social media services currently available introduces challenges of definition; however, there are some common features:
1.     Social media are interactive Web 2.0 Internet-based applications.
2.     User-generated content, such as text posts or comments, digital photos or videos, and data generated through all online interactions, is the lifeblood of social media.
3.     Users create service-specific profiles for the website or app that are designed and maintained by the social media organization.
4.     Social media facilitate the development of online social networks by connecting a user's profile with those of other individuals or groups.
Users usually access social media services via web-based technologies on desktops and laptops, or download services that offer social media functionality to their mobile devices (e.g., smartphones and tablets). As users engage with these electronic services, they create highly interactive platforms through which individuals, communities, and organizations can share, co-create, discuss, and modify user-generated content or pre-made content posted online.
Networks formed through social media change the way groups of people interact and communicate. They "introduce substantial and pervasive changes to communication between organizations, communities, and individuals." These changes are the focus of the emerging fields of techno self studies. Social media differ from paper-based media (e.g., magazines and newspapers) and traditional electronic media such as TV broadcasting in many ways, including quality, reachfrequency, interactivity, usability, immediacy, and performance. Social media outlets operate in a dialogic transmission system (many sources to many receivers). This is in contrast to traditional media which operates under a mono-logic transmission model (one source to many receivers), such as a newspaper which is delivered to many subscribers, or a radio station which broadcasts the same programs to an entire city. Some of the most popular social media websites, with over 100 million registered users, include Facebook (and its associated Facebook Messenger), YouTubeWeChatInstagramQQQZoneWeiboTwitterTumblrTelegramRedditBaidu TiebaLinkedInLINESnapchatPinterestViber, and VK.
Observers have noted a range of positive and negative impacts of social media use. Social media can help to improve an individual's sense of connectedness with real or online communities, and can be an effective communication (or marketing) tool for corporations, entrepreneurs, non-profit organizations, advocacy groups, political parties, and governments.

Effectiveness of Social Media in Education

I.                    INTRODUCTION

 Social media is the social interaction among people in which they create, share or exchange information and ideas in virtual communities and networks . Andreas Kaplan and Michael Heinlein define social media as "a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0 and that allow the creation and exchange of user-generated content.". Furthermore, social media depend on mobile and web-based technologies to create highly interactive platforms through which individuals and communities share, co-create, discuss, and modify user-generated content. They introduce substantial and pervasive changes to communication between organizations, communities, and individuals.

II.                  LITERATURE SURVEY

Pew Internet Project’s research  related to social networking of January 2014is shown in Table 1. TABLE 1: USERS OF SOCIAL MEDIA As per the Pew Internet Project’s research related to social networking of January 2014 , 74% of adults are using social networking sites.

Character development and social media

Social media plays an increasingly significant role in the lives of the British public, with more and more of our lives played out and conducted online. This trend is particularly significant among young people, who spend on average more than a day a week on social media. This has been accompanied by a proliferation of concerns of the risks of online life to young people as both protagonists and victims: from hate speech to trolling, online grooming to radicalisation.
Alongside these developments, education policy makers and practitioners have been placing increasing emphasis on the importance of educating for character. Character education is not a recent development: it dates back to antiquity and Aristotle, and has formed a part of educational practice since then. Yet attention to its importance and deliberate practice is rapidly spreading through the English school system. Through policy research and programme evaluation, Demos has taken a leading role in making the social and economic case for developing students’ characters, and setting out how best it can be incorporated and embedded into the UK’s education system.
So far, however, there is limited understanding of how the widespread use of social media is affecting the character development of young people. As a result, the education system dedicates minimal time to the discussion of the civic and moral questions thrown up by the proliferation of social media, or to the provision of the skills young people need to be informed citizens and ethical decision-makers in this new context.
In a new research project, supported by the Jubilee Centre for Character and Virtues at the University of Birmingham, Demos is exploring the interrelationship between adolescent character development and social media use. By drawing on innovative research methodologies, including a thematic analysis of trolling events conducted by Demos’ Centre for the Analysis of Social Media, the study will assess how young people can be best prepared for the ethical challenges of the online world.

Benefits of social media for brand building

1. Increase brand awareness
With nearly half of the world’s population using social media platforms, they’re a natural place to reach new and highly targeted potential customers.
Think people only connect with brands they already know on social media? Consider that 60 percent of Instagram users say they discover new products on the platform.
When Absolut Vodka ran an Instagram campaign to promote its limited edition Spark bottle, the company achieved a five-point lift in brand awareness.
2. Humanize your brand
UK study from Trinity Mirror Solutions found that more than half of adults do not trust a brand until they see “real-world proof” that the brand is keeping its promises.
To connect with customers—and potential customers—you’ve got to show the human side of your brand. How are you embracing your brand values? (Do you even have brand values?) How are you looking out for the best interests of your customers and employees? Does your product really work?
The ability to create real human connection is one of the key benefits of social media for business. We call these Meaningful Relationship Moments. Introduce your followers to the people who make up your company and showcase how existing customers are using and benefiting from your products.
social media advocacy program can be a great way to humanize your brand.

 

3. Establish your brand as a thought leader
No matter what industry your business is in, social media offers the opportunity to establish your brand as a thought leader—the go-to source for information on topics related to your niche.
Like brand advocacy, thought leadership is a great way to build consumer trust. In fact, LinkedIn research in partnership with Edelman shows that marketers underestimate just how much thought leadership can impact trust, especially for B2B marketers. About half of B2B marketers surveyed believed their thought leadership would build trust in their companies. However, more than 80 percent of buyers said thought leadership builds trust.
The 2018 Edelman Trust Barometer also found that 63 percent of people trust technical experts, compared to only 42 percent of people who trust businesses.
Hootsuite CEO Ryan Holmes has more than 1.5 million followers on LinkedIn, where he shares his insights about social media and entrepreneurship.



No comments:

Post a Comment