Monday, 7 May 2018

Fundamental of computer Capsule


COMPUTER essay Language definition:-
The word ‘computer’ is an old word that has changed its meaning several times in the last few centuries. Originating from the Latin, by the mid-17th century it meant ‘someone who computes’. The American Heritage Dictionary (1980) gives its first computer definition as “a person who computes.” The computer remained associated with human activity until about the middle of the 20th century when it became applied to “a programmable electronic device that can store, retrieve, and process data.

Functions of Computer
A computer has four functions:
a. Accepts data - Input
b. Processes data - Processing
c. Produces output - Output
d. Stores results - Storage
Input (Data):
Input is the raw information entered into a computer from the input devices. It is the collection of letters, numbers, images etc.
Process:
Process is the operation of data as per given instruction. It is totally internal process of the computer system.
Output:
Output is the processed data given by computer after data processing. Output is also called as Result. We can save these results in the storage devices for the future use.
Computer System
All of the components of a computer system can be summarized with the simple equations.

COMPUTER SYSTEM = HARDWARE + SOFTWARE+ USER

• Hardware = Internal Devices + Peripheral Devices

All physical parts of the computer (or everything that we can touch) are known as Hardware.
• Software = Programs
Software gives "intelligence" to the computer.
• USER = Person, who operates computer.

Input Devices:

 Those devices which help to enter data into computer system. Eg. Keyboard,
Mouse, Touch screen, Barcode Reader, Scanner, MICR, OMR etc.

Output Devices:

 Those devices which help to display the processed information. Eg. Monitor,
Printer, Plotter, Projector

CENTRAL PROCESSING UNIT (CPU)

The main component to make a computer operate is the computer chip or microprocessor. This
is referred to as the Central Processing Unit (CPU) and is housed in the computer case. Together,
they are also called the CPU. It performs arithmetic and logic operations. The CPU (Central
Processing Unit) is the device that interprets and executes instructions.

RAJESH BHARTI JAVA CLASSESS

GENERATION OF COMPUTER

First Generation (1940-56):

The first generation computers used vacuum tubes & machine language was used for giving the instructions. These computers were large in size & their programming was difficult task. The electricity consumption was very high. Some computers of this generation are ENIAC, EDVAC, EDSAC & UNIVAC-1.

Second Generation (1956-63):

In 2nd generation computers, vacuum tubes were replaced by transistors. They required only 1/10 of power required by tubes. This generation computer generated less heat & were reliable. The first operating system developed in this generation.

The Third Generation (1964-71):

The 3rd generation computers replaced transistors with Integrated circuit known as chip. From Small scale integrated circuits which had 10 transistors per chip, technology developed to MSI circuits with 100 transistors per chip. These computers were smaller, faster & more reliable.
High level languages invented in this generation.

1.2.2Generations of Computers:-

The fourth Generation (1972- present):

LSI & VLSI were used in this generation. As a result, microprocessors came into existence. The computers using this technology known to be Micro Computers. High capacity hard disk were invented. There is great development in data communication.

The Fifth Generation (Present & Beyond):-

Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. Quantum computation and molecular and nanotechnology will radically change the face of computers in years to come.

Input Devices:

Those devices which help to enter data into computer system. Eg. Keyboard,
Mouse, Touch screen, Barcode Reader, Scanner, MICR, OMR etc.

Output Devices:- 
Those devices which help to display the processed information. Eg. Monitor,
Printer, Plotter, Projector.

CENTRAL PROCESSING UNIT (CPU):-

The main component to make a computer operate is the computer chip or microprocessor. This
is referred to as the Central Processing Unit (CPU) and is housed in the computer case. Together,
they are also called the CPU. It performs arithmetic and logic operations. The CPU (Central
Processing Unit) is the device that interprets and executes instructions.


DESKTOP;-

The main components of Windows when you start your computer are the Desktop, My Computer, Recycle Bin, Start Button, Taskbar, and shortcuts to applications.
After opening an application, you will also have a window with an active application which will appear in your desktop and taskbar.

Desktop:-

The Desktop is the very first screen you see after Windows starts. There you find the folders: My Documents, My Computer, the Recycle Bin and any Shortcuts for applications and files that you have created.

My Computer

When you double-click on the My Computer icon on the desktop, it will open a window similar to the one shown below, where you can navigate between the computer's drives and Control Panel tools.

Recycle Bin:-

When you delete a file from your computer's hard drive, it is removed to the folder called Recycle Bin. Files deleted from your hard drive are still available for restoring if needed, unless you empty your Recycle Bin.
To restore the files, open the Recycle Bin folder by double-clicking the icon on your desktop, select the file and then select Restore.

To clear the Recycle Bin, select Empty Recycle Bin and the files will be permanently removed from your computer.

Minimize/Maximize/Close Buttons

In the top-right corner of your document are the Minimize/Maximize/Close buttons.
The first one when clicked minimize your screen, sending it to the taskbar. The second one maximize your screen, filling all desktop with the document you are working with.The last button is used to close your document. It is best practice to work with your document window maximized.

Start Menu:-


By clicking the Start button, in the very bottom-left corner of the screen, a vertical window will come up with the Start Menu. The list of submenus in the pop-up window let you navigate and select the application you want to run.

Taskbar


The Taskbar is the row at the bottom of the Windows screen where all currently open applications or files are listed.
The taskbar is used to select a file or application that is already opened or to put an application in the foreground.
To put an application in the foreground, just click on the icon of the application in the taskbar. Another way to put an application in the foreground when more than one is in use is to hold the ALT button and then click TAB on your keyboard to see all the open applications; you will need to hold the ALT button and continue pressing TAB to go through each application until you come to the one you want to use.

Shortcut

A shortcut creates a button or icon which typically stays on the desktop and when clicked, quickly allows you to start a program or open a file without having to go to its permanent location on your computer.
To create a shortcut, open the Windows Explorer or go to the Start menu, select the file or program you want to create a shortcut for, place the cursor on the icon for the file, then right-click and select Create Shortcut from the menu that pops up. The shortcut file will be created. After that, you drag the shortcut file to the desktop and whenever you click on it, it will open the application or document related to the shortcut

Right and Left Click:-


To use the mouse, usually you click the left button. However, you can also right-click to display a hidden menu related to the object you are in when clicking. This menu can vary depending on which application you are using.
With right-clicking, you can operate different functions such as:
 Copy/cut or paste a text, file, or folder.
 Rename or delete a file or folder.

Multitasking


The term multitasking means to be running or working in two or more applications at the same time. You can be more productive by multitasking. For instance, you can download files from the Internet while managing your files or word processing.
In order to switch between the applications you can use the Taskbar, clicking on the icon of the application you want to have in the foreground.

Highlight:-

Put your cursor at the beginning of a word or sentence you want to highlight, then click and drag your mouse to the end of the selection.

Copy/Cut and Paste Text


COPY:-
Copy is used when you want to have an area of text from a document twice at the same document or in another document. You first select the area of the text by highlighting it and then press CTRL+C, or go to Edit menu and select Copy.



CUT:-
Cut is used to delete an area of text from a document. You first select the area of the text by highlighting it and then press CTRL+X, or go to Edit menu and select Cut.

Standard and Formatting Toolbars

Toolbars are rows of buttons and boxes. When you click on a button or box, an application opens or a task is performed. Toolbars normally appear at the top of an application's window. The Standard Toolbar shown in the image below is from Windows Explorer; the standard toolbars in other applications may have buttons that allow you to open a new document, save, print, and spell check.
The Formatting Toolbar is used to format a text using alignments, font type, font size, bold, italic, and lists. It is provided in most applications. The image below shows the Formatting Toolbar from Netscape Composer.

Save and/or Save As

Save is used when:
 It is the first time you are saving a file.
 You want to keep saving an existing file in different moments that you are working on it.
 It is the end of a working period

Note that clicking Save will replace whatever file you were working on.
Go to File menu and select Save or use the combination keys CTRL+S.

Save As is used when you want to save a file with a different name to create backups of a file in the creation process. In that way, you can have different versions of the same document and can return to a previous stage.
Go to File menu and select Save As or use the combination keys CTRL+SHIFT+S.

Rename/Delete a Folder or File

Using Windows Explorer, you can rename or delete a file or folder.
To Rename a file or folder:


1. Navigate and select the file or folder you want to rename from the proper drive (c:, a:).
2. Go to the File menu and select Rename.
3. The file name will be highlighted and blinking in the right corner waiting for you to type the new file name

To Delete a file or folder:
1. Navigate and select the file or folder you want to delete.
2. Go to the File menu and select Delete.

Another way of renaming or deleting a file or folder is using the right-click button of your mouse. After highlighting the file or folder, you right-click and a menu will appear where you can select Rename or Delete.

Types of Computers

1. PC
The personal computer (PC) defines a computer designed for general use by a single person. While a Mac is a PC, most people relate the term with systems that run the Windows operating system. PCs were first known as microcomputers because they were a complete computer but built on a smaller scale than the huge systems in use by most businesses.

2. Desktop
A PC that is not designed for portability is a desktop computer. The expectation with desktop systems are that you will set the computer up in a permanent location. Most desktops offer more power, storage and versatility for less cost than their portable brethren.

3. Laptop
Also called notebooks, laptops are portable computers that integrate the display, keyboard, a pointing device or trackball, processor, memory and hard drive all in a battery-operated package slightly larger than an average hardcover book.

4. Netbook
Netbooks are ultra-portable computers that are even smaller than traditional laptops. The extreme cost-effectiveness of netbooks (roughly $300 to $500) means they're cheaper than almost any brand-new laptop you'll find at retail outlets. However, netbooks' internal components are less powerful than those in regular laptops.

5. PDA
Personal Digital Assistants (PDAs) are tightly integrated computers that often use flash memory instead of a hard drive for storage. These computers usually do not have keyboards but rely on touch screen technology for user input. PDAs are typically smaller than a paperback novel, very lightweight with a reasonable battery life. A slightly larger and heavier version of the PDA is the handheld computer.

6. Workstation
Another type of computer is a workstation. A workstation is simply a desktop computer that has a more powerful processor, additional memory and enhanced capabilities for performing a special group of task, such as 3D Graphics or game development.

7. Server
A computer that has been optimized to provide services to other computers over a network. Servers usually have powerful processors, lots of memory and large hard drives. The next type of computer can fill an entire room.

8. Mainframe
 In the early days of computing, mainframes were huge computers that could fill an entire room or even a whole floor! As the size of computers has diminished while the power has increased, the term mainframe has fallen out of use in favor of enterprise server. You'll still hear the term used, particularly in large companies to describe the huge machines processing millions of transactions every day.

9. Super Computer
This type of computer usually costs hundreds of thousands or even millions of dollars. Although some supercomputers are single computer systems, most are composed of multiple high performance computers working in parallel as a single system. The best known supercomputers are built by Cray Supercomputers.

10. Wearable Computer
The latest trend in computing is wearable computers. Essentially, common computer applications (e-mail, database, multimedia, calendar/scheduler) are integrated into watches, cell phones, visors and even clothing. For more information see these articles on computer clothing, smart watches and fabric PCs.

Computer Hardware and Software

Computer hardware includes all the electrical, mechanical, and the electronic parts of a computer. Any part that we can see or touch is the hard ware.

Computer hardware includes
 1. System Unit 
2. Peripheral devices 
3. Input devices
 keyboard, mouse etc.
 4. Output devices i.e. 
Display Unit, printer etc.
 5. Storage devices like hard disk, floppy disks etc.

6 Computer Hardware and Software

Software: -
The functioning of the computer is not dependent on hardware alone. So, what else is required? It requires a set of instructions that tells the computer what is to be done with the input data. In computer terminology, this set of instructions is called a program and one or more programs is termed as software. Let us understand hardware and software with an example. An audio cassette when played gives you some sound. Here, the tape recorder and the audio cassette can be compared to hardware. The sound which comes from the tape recorder can be compared to software. Software used for computers may be of different types. Some of which are:  Application Software  System Software

 Application Software  System Software

Application Software
 Software specially suited for specific applications for example, railway and airline reservation, billing, accounting or software which enables creation and storage of documents are termed as application software

System software
 In the above airline reservation ex System software ample, the clerk types your name and other details through the keyboard. But how does this go to the system unit? This activity is done by a set of instructions called the Operating Systems. The Operating System manages the various 1/0 devices of the computer and enables the user to interact with the machine. The computer understands only machine language i.e. 0’s and 1’s. In the above example how do you think it understands the reservation clerk’s query in English? There has to be a software which translates the user language into machine language. The software which does this translation is known as the support software. Examples of support software are compilers and interpreters


1.Business: -

Businesses use computers for communications across a number of types of people, such as between employees, between the business and its customers, and between a business and its suppliers. One major advantage of computer communication is that it is often asynchronous, which means that communication can happen even if one person is not available by telephone

2.E-Commerce: 
E-commerce (electronic commerce) describes the buying, selling, and exchanging of products, services, and information via computer network. The term e-commerce as describe transactions, conducted between business partners. There are many applications of e-commerce, such as home banking, shopping in electronic malls, buying stocks, finding a job, conducting an auction, collaborating electronically with business partners around the globe, marketing and providing customer service.

3.Education: -
The computer technology has a deep impact on education. Computer education forms a part of the school and college curriculum, as it is important for every individual today, to have the basic knowledge of computers. The advantages of computers in education include an efficient storage and performance of information, quick information processing and very importantly the saving of paper. Know more about the importance of computer education. Computer teaching plays a key role in the modern systems of education.

4.Medical: 
Computers play an indispensable role in the medical field, and without them, proficiency and productivity would decline markedly. Computers assist with organizational, administrative duties, patient records, and a number of medical technologies that are an absolute necessity in today’s world. Every hospital now incorporates computers into the framework of its everyday responsibilities and duties, and this technology has become an invaluable asset in virtually every medical facility. Generally speaking, many medical screening methods hinge largely on computer technology, including x-rays. Furthermore, various surgical procedures require computers as well, including heart surgeries. Computers can streamline the efficiency of many medically related duties.4.Medical: Computers play an indispensable role in the medical field, and without them, proficiency and productivity would decline markedly. Computers assist with organizational, administrative duties, patient records, and a number of medical technologies that are an absolute necessity in today’s world. Every hospital now incorporates computers into the framework of its everyday responsibilities and duties, and this technology has become an invaluable asset in virtually every medical facility. Generally speaking, many medical screening methods hinge largely on computer technology, including x-rays. Furthermore, various surgical procedures require computers as well, including heart surgeries. Computers can streamline the efficiency of many medically related duties.


5.Science:
As much as computers have become a part of our daily lives, they have also become an integral part of modern science. They are essential in helping scientists to understand the world around us. Computers have changed the face of science so that scientists are no longer constrained to doing just experiment-based or theoretical research. Now scientists can enter results and data into a computer and the computer, utilizing mathematics and abiding by the physical laws, can recreate a virtual physical world right on the computer screen.

6.Communication: 
Computers are critical for communication and are the center piece of  information technology. The early 1990s saw the emergence of household Internet use, which eventually spurred common use of email, websites, blogs, social networking, video chat and Voice-Over-Internet Protocol. Today, many traditional communication modes including postal mail and landline phones seem obsolete.

Microsoft Word and its working


In basic terms, MS word can be explained as a word processor. Microsoft Word is a full-featured word processing program for writing and editing text documents. Word includes tools that let multiple users share information and collaboratively edit documents. Word is included in every edition of Microsoft Office2007.

The aim of the MS-Word is to permit the users to type as well as save documents. Comparable to other word processors, Word has useful tools to prepare documents.

could be purchased with a bundled mouse, though none was required. Following the precedents of Lisa Write and Mac-write, Word for Macintosh attempted to add closer WYSIWYG features into its package. Word for Mac was released in 1985. Word for Mac was the first graphical version of Microsoft Word.


The basic window to understand various essential parts which we get when we start word application is given below:

File Tab -

The File tab substitutes the Office button from Word. By clicking it to check the Backstage view, which is the place to come when we need to save or open files, print a document, create new documents, and do other file-related operations.

Quick Access Toolbar -

You will find it just above the File tab and its objective is to give a suitable resting place for the utmost repeatedly used commands of Words. We can modify this toolbar as per our comfort.
Ribbon holds commands organized in the following three components:

1. Tabs:

 They appear through the top of the Ribbon and comprise a group of related commands like Insert, Home, Page Layout and so on.

2. Groups:
They organize related commands and each group name appears below the group on the Ribbon, such as group of commands related to group of commands or fonts, and commands related to alignment, and so on.
3. Commands:
They appear within each group such as group of commands or fonts as mentioned above.


Title bar:
 Title bar lies in the middle and at the top of the window. It shows the document and program titles.

Rulers:
 Ms-Word has two rulers as follows:
1. The horizontal ruler: 
It appears just beneath the Ribbon and is used to tab stops and set margins.
2. The vertical ruler: 
It appears on the left edge of the Word window and is used to gauge the vertical position of elements on the page.

Help:
 The Help Icon can be used to get word related any help anytime we like.
Zoom Control: It let us zoom in for a closer look at the text. It consists of a slider that we can slide right or left to zoom out or in and we can click - and + buttons to decrease or increase the zoom factor.

View Buttons:

 View buttons are the group of five buttons located near the bottom of the screen and left of the Zoom control, with the help of view buttons we can switch among many document views of Words. These five view buttons are as follows:

1. Print Layout View: 

This view displays pages exactly as they will appear when printed.

2. Full Screen Reading View: 

This view gives a full screen look of the document.

3. Web Layout View:

 This view displays how a document appears when viewed by an Internet browser, such as Google Chrome.

4. Outline View: 

This view used to work with outlines established using Word’s standard heading

styles.

5. Draft View: 

This view formats text as it appears on the printed page with little exceptions. For instance, headers and footers are not shown. Most of the individuals prefer this draft View mode.

Document Area: 

It is the space where you type something. In the document area there is a flashing vertical bar that is known as the insertion point. Insertion point signifies the location where text will appear when we type.

Status Bar:

 Status bar shows the insertion point location and document information. From left to right, this bar comprises the words in the document, total number of pages, language, and so on. We can manage the status bar by right-clicking anywhere on the document and by selecting or deselecting options from the given list.

Dialog Box Launcher: 

Dialog Box Launcher appears like a small arrow in the lower-right corner of several groups on the Ribbon. By clicking Dialog Box Launcher opens a task pane or dialog box that gives much more options about the group.

Microsoft Excel 2007 is a spreadsheet program used for tasks such as creating budgets, tracking data, and creating charts and graphs. With Excel, you create what Microsoft calls a Workbook, which can contain any number of individual worksheets. Users can copy or export the graphs and charts created in Excel to Word, PowerPoint, or Publisher or One Note. Excel is included in every edition of Microsoft Office 2007.

 MS excel originally competed with the dominant Lotus 1-2-3, and eventually outsold it. It is available for the Windows and OS X platforms. Microsoft released the first version of Excel for the Mac OS in 1985, and the first Windows version (numbered 2.05 to line up with the Mac and bundled with a standalone Windows run-time environment) in November 1987.

Now let us see how easy it is to enter text in an excel sheet. when you start a sheet, it displays a new sheet by default as shown below:


Microsoft Excel and its working

Microsoft Excel2007 is a spreadsheet program used for tasks such as creating budgets, tracking data, and creating charts and graphs. With Excel, you create what Microsoft calls a Workbook, which can contain any number of individual worksheets. Users can copy or export the graphs and charts created in Excel to Word, PowerPoint, or Publisher or OneNote. Excel is included in every edition of Microsoft Office2007. MS excel originally competed with the dominant Lotus 1-2-3, and eventually outsold it. It is available for the Windows and OS X platforms. Microsoft released the first version of Excel for the Mac OS in 1985, and the first Windows version (numbered 2.05 to line up with the Mac and bundled with a standalone Windows run-time environment) in November 1987.

Now let us see how easy it is to enter text in an excel sheet. when you start a sheet, it displays a new sheet by default as shown below:

Now let us see how easy it is to enter text in an excel sheet. when you start a sheet, it displays a new sheet by default as shown below:

Sheet area is the area where you can type your text. The flashing vertical bar is known as the insertion point and it indicates the location where text will appear when you type.
When we click on a box then box becomes highlighted. When we double click the box flashing vertical bar will appear and we can start entering data then.
The three points to remember which would help you while typing are as follows:
1. Press Tab to go to next column
2. Press Enter to go to next row
3. Press Alt + Enter to enter a new line in the same column
Movement Using Keyboard
Excel can be excellently used using a keyboard,here are some of the basics followed by important shortcuts.


Movement using Scroll Bars: moving vertically within the sheet.
Using the vertical scroll bar, we can:
1.Move downward by one line by clicking the downward-pointing scroll arrow.
2.Move upward by one line by clicking the upward-pointing scroll arrow.
3.Move one previous page, using previous page button.
4.Move one next page, using next page button.
5.Use Browse Object button to move through the sheet and going from one object to the next.
NOW let us finally finish by understanding a few tricks, these are sure to save a lot of time and even more energy.
First one is locating single cell, although seems like not a very useful thing to know, but is INCREDIBLY time saving when working on a big project
In Microsoft Excel, to locate a particular cell, you can use the Go to dialog box. This dialog box identifies cell names by applying the identical conventions used by Microsoft Excel. Under Edit from the main menu, you can get the Go to dialog box. Ctrl + G or F5 is the shortcuts to access the Go to dialog box.
The Replace dialog box permits you to identify a word or group of words and to change it with a new word or group of words. Both ‘Find and Replace’ dialog boxes are available from the main menu under Edit. Ctrl + H is the shortcut for the Replace dialog box ‘
Next, also the last step, spell checking.
The check spelling is done with the help of a spelling dialog box that will take us step by step to every word that is debateable. Moreover, the computer will point out certain suggested words that we can use in place of the one at fault. We can check out worksheet’s spelling after or during editing, though the latter is better. To Check Spelling in the document:
On the Ribbon, click Review;
go to the Proofing section, and then click the Spelling button


NOTE: Shortcut key for spelling check is F7.

Microsoft Access

Microsoft Access has the look and feel of other Microsoft Office products, including its layout and navigational aspects. That is where the similarity ends. Microsoft® Access is a database and, more specifically, a relational database.

The Microsoft Access Database is made up of 7 major components:
1. Table-The tables are the backbone and the storage container of the data entered into the database. If the tables are not set up correctly, with the correct relationships, then the database may be slow, give you the wrong results or not react the way you expect.
2. Relationships-Relationships are the bonds you build between the tables. They join tables that have associated elements. To do this there is a field in each table, which is linked to each other, and have the same values.
3. Queries-Are the means of manipulating the data to display in a form or a report. Queries can sort, calculate, group, filter, join tables, update data, delete data, etc. Their power is immense.
4. Forms-Forms are the primary interface through which the users of the database enter data. The person who enters the data will interact with forms regularly. The programmer can set the forms to show only the data required.
5. Reports-Reports are the results of the manipulation of the data you have entered into the database. Unlike forms, they cannot be edited. Reports are intended to be used to output data to another device or application, i.e. printer, fax, Microsoft® Word or Microsoft® Excel.
6. Macros-Macros are an automatic way for Access to carry out a series of actions for the database. Access gives you a selection of actions that are carried out in the order you enter.

7. Modules-Modules are the basis of the programming language that supports Microsoft® Access, The module window is where you can write and store Visual Basic for Applications (VBA).


Microsoft Outlook and One Note:-


Microsoft Outlook is a personal information manager from Microsoft, available as a part of the Microsoft Office suite. Although often used mainly as an email application, it also includes a calendar, task manager, contact manager, note taking, journal, and web browsing. Outlook is an E-mail software program by Microsoft that enables users to send and receive e-mail on their computer.

Microsoft Outlook may be used as a standalone application, but is also part of the Microsoft Office suite. Outlook’s current version is Microsoft Outlook 2010. Outlook is also available for the Apple Mac; its current version is Outlook 2011.
Microsoft OneNote

Microsoft OneNote is a computer program for free-form information gathering and multi-user collaboration. It gathers users' notes (handwritten or typed), drawings, screen clippings and audio
commentaries. Notes can be shared with otherOneNote users over the Internet or a network. In simpler words,organize all your class notes and ace that exam. OneNote is a digital notebook. Whether you’re at home, in school, or in the office, use OneNote to take notes wherever you go. And OneNote automatically saves and synchronizes your notes so you can focus on your thoughts and ideas.

Microsoft PowerPoint:-

PowerPoint is a complete presentation graphics package. It gives you everything you need to produce a professional-looking presentation. PowerPoint offers word processing, outlining, drawing, graphing, and presentation management tools- all designed to be easy to use and learn. The following gives you a quick overview of what you can do in PowerPoint:
 When you create a presentation using PowerPoint, the presentation is made up of a series of slides. The slides that you create using PowerPoint can also be presented as overhead transparencies or 35mm slides.
 In addition to slides, you can print audience handouts, outlines, and speaker's notes.
 You can format all the slides in a presentation using the powerful Slide Master which will be covered in the tutorial.
 You can keep your entire presentation in a single file- all your slides, speaker's notes, and audience handouts.

 You can import what you have created in other Microsoft products, such as Word and Excel into any of your slides

Taking about movement, three movements provided by Microsoft PowerPoint are as follows:

1. Entrance, emphasis, and exit of elements on a slide itself are controlled by what PowerPoint

defines Custom animations.
2.On the other hand, transitions are movements between slides. These can be animated in many ways.
3.Custom animation can be used to create small story boards by animating pictures to enter, exit or move.
Now let’s finish by learning a few small but extremely useful things:
First, how to create a power slide.
1. Choose a theme
When you open PowerPoint, you’ll see some built-in themes and templates. A theme is a slide design that contains matching colors, fonts, and special effects like shadows, reflections, and more.
1. Choose a theme.
2.

3. Click Create, or pick a color variation and then click Create.

2. Insert a new slide

On the Home tab, click New Slide, and pick a slide layout

3. Save your presentation
1. On the File tab, choose Save.
2. Pick or browse to a folder.
3. In the File name box, type a name for your presentation, and then choose Save.
NOTE: If you frequently save files to a certain folder, you can ‘pin’ the path so that it is always available (as shown below).
TIP: Save your work as you go. Hit Ctrl+S often.
Select a text placeholder, and begin typing.
4. Format your text
1. Select the text.
2. Under Drawing Tools, choose Format.



Do one of the following:
5. To change the color of your text, choose Text Fill, and then choose a color.
6. To change the outline color of your text, choose Text Outline, and then choose a color.
7. To apply a shadow, reflection, glow, bevel, 3-D rotation, a transform, choose Text Effects, and then choose the effect you want.
5. Add pictures
On the Insert tab, do one of the following:
To insert a picture that is saved on your local drive or an internal server, choose Pictures, browse for

the picture, and then choose Insert.
To insert a picture from the Web, choose Online Pictures, and use the search box to find a picture.
Choose a picture, and then click Insert.
6. Add speaker notes
Slides are best when you don’t cram in too much information. You can put helpful facts and notes in the speaker notes, and refer to them as you present.
1. To open the notes pane, at the bottom of the window, click Notes .
2. Click inside the Notes pane below the slide, and begin typing your notes!
Add speaker notes to your slides
Print slides with or without speaker notes
7. Give your presentation
On the Slide Show tab, do one of the following:
To start the presentation at the first slide, in the Start Slide Show group, click from Beginning.
If you’re not at the first slide and want to start from where you are, click from Current Slide.
If you need to present to people who are not where you are, click Present Online to set up a presentation on the web, and then choose one of the following options:
Present online using the Office Presentation Service
Start an online presentation in PowerPoint using Skype for Business
TIP: For information about viewing your notes as you give your presentation without the audience seeing them, see View your speaker notes as you deliver your slide show.
Secondly, steps for copying and pasting an existing slide:
Step 1: Open both the presentation — the presentation having the slide master that one wants to copy and the presentation that one will paste the slide master to.

Step 2: On the View tab, in the Master Views group, click Slide Master, in the presentation having the slide master that one wants to copy.

Step 3: Right-click the slide master that one wants to copy, and then click Copy in the slide thumbnail pane
Step 4: On the View tab, in the Window group, click Switch Windows, and then select the presentation that we want to paste the slide master to.
Step 5: In the presentation that we want to paste the slide master to, on the view tab, in the master views group, click slide master.

Step 6: In the slide thumbnail pane, to click the location where we want the slide master to reside, perform a right-click on the blank slide master, and then click paste.

Data Confidentiality


Data Confidentiality is whether the information stored on a system is protected against unintended or unauthorized access. Since systems are sometimes used to manage sensitive information, Data Confidentiality is often a measure of the ability of the system to protect its data.

Confidentiality is roughly equivalent to privacy. Measures undertaken to ensure confidentiality are designed to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it: Access must be restricted to those authorized to view the data in question. It is common, as well, for data to be categorized according to the amount and type of damage that could be done should it fall into unintended hands. More or less stringent measures can then be implemented according to those categories. Sometimes safeguarding data confidentiality may involve special training for that privy to such documents. Such training would typically include security risks that could threaten this information. Training can help familiarize authorized people with risk factors and how to guard against them. Further aspects of training can include strong passwords and password-related best practices and information about social engineering methods, to prevent them from bending data-handling rules with good intentions and potentially disastrous results. A good example of methods used to ensure confidentiality is an account number or routing number when banking online. Data encryption is a common method of ensuring confidentiality. User IDs and passwords constitute a standard procedure; two-factorauthentication is becoming the norm. Other options include biometric verification andsecurity tokens, key fobs or soft tokens. In addition

users can take precautions to minimize the number of places where the information appears and the number of times it is actually transmitted to complete a required transaction. Extra measures might be taken in the case of extremely sensitive documents, precautions such as storing only on air gappedcomputers, disconnected storage devices or, for highly sensitive information, in hard copyform only.

Steps to protect Confidential Data


 Identify The Confidential Information. Before a business can protect its confidential information, or expect someone else not to disclose it, the business must be able to specifically identify what the information is that it considers to be confidential. The more specific a business is in identifying the confidential information, the better chance it has of protecting it.  Be Realistic inIdentifying the Confidential Information. Obviously not all information can be classified as confidential. Generally, confidential information is information that is known only within the business and is not publically available. Narrowly and specifically identifying the confidential information allows a business to support its determination that the information is confidential.  Make Sure All Employees Understand What Information Is Confidential. Once a business has identified what information it believes to be confidential, it is essential that its employees understand what information the business considers to be confidential. The precise nature of the confidential information does not need to be revealed to the employees, but they must be told enough so that they know that the particular information is confidential and not to disclose it to others. For example, employees may be told that the pricing formula for Product X is confidential, without telling them the pricing formula.  Include A Confidentiality Statement in Your Employee Handbook. An Employee Handbook sets forth, among other things, an employer's expectation of its employees. The Employee Handbook should also identify what a business considers to be confidential and inform


employees of his/her obligation not to disclose that information. It is hard for an employee to claim that he/she was unaware that certain information was confidential if language to that effect is in the Employee Handbook and the employee has acknowledged receipt of that handbook.  Use Confidentiality/Non-Disclosure Agreements with People Who Have Knowledge ofand Access to The Specifics ofthe Confidential Information. Certain people within a business, and consultants or others outside of a business will have access to confidential information. In such cases, a business should have those individuals and/or entities sign Confidentiality/Non-Disclosure Agreements to put them on specific notice that the business considers certain information to be confidential and to give the business certain remedies against them should they disclose the confidential information.  Protect Confidential Information. It almost goes without saying that a business should not leave confidential information in the open. There are different steps a business can take to prevent others from gaining access to the information. For a smaller company, these steps might involve keeping the information under lock and key, while for a larger company, it might mean keeping the information in a password protected database.  Limit Access to The Confidential Information to Those with A Need to Know. Depending on the size of a business and the nature of your confidential information, not everyone should be given access to the confidential information. Access to this confidential information should be on a need-to-know basis. For example, a nationwide sales company may want to allow only its sales people to access its customer lists for that sales person's territory, as opposed to allowing access to customer lists for all territories.  Protect Computerized Confidential Information with Advances in Technology. More and more confidential information is being stored on computers. At a minimum, access to confidential information on these computers should be password protected with the password being changed at regular intervals, i.e. every 3-6 months. In addition, you might consider a confidentiality "reminder" pop-up on the computer screen before the confidential information can be accessed reminding employees that the information is confidential.


Label The Information as Confidential. Consider placing labels on confidential information that clearly states that the information is "confidential." This label can appear on the information itself and or on the container in which it is kept. It is yet another reminder to employees and others that information is considered to be confidential.  Conduct Employee and Consultant Exit Interviews. Exit interviews are generally important to remind departing employees and consultants of their obligations to the company, and to make sure that the employee's departure or termination of a business relationship is smooth. An exit interview also presents an opportunity to reiterate to the employee and/or consultant his/her obligation to keep information confidential. The steps outlined above are all fairly easy to implement. The more of these steps that a business undertakes, the more likely its employees will understand that certain information is confidential, and the more likely a court will help a business protect the confidential information

Protecting confidential information assets throughout an enterprise is a journey rather than a one-time event. It fundamentally requires a systematic way to identify sensitive data; understand51
Housekeeping Attendant (Manual Cleaning)
Domestic Data Entry Operator
current business processes; craft appropriate access, usage and distribution policies; and monitor outgoing and internal communications. Ultimately, what is most important to understand are the potential costs and ramifications of not establishing a system to secure non-public information from the inside out.

Enhance Typing Skills

At the end of this unit, you will be able to:
1. Demonstrate and know the correct way and advantages of typing
2. Know the concept of touch typing.
3. Identify the shortcuts to increase your typing speed.
4. Consider errors as opportunities for improvement.
5. Know the correct posture to sit and practice!

Secrets to fast typing

The ability to type quickly, accurately and without seeing at the keyboard is a huge advantage beside the nature of your work at computer system.Having good typing skills is essential in today’s society where almost everything is computer based and hence requires typing on a keyboard to input texts and messages frequently. This is even more critical for Data Entry Operator role.

Below are a few perks of being able to type faster: 1. Fast touch typing can save a lot of time at school and colleges when taking notes, writing assignments and chatting with friends online. 2. In the workplace, people who type quickly have a natural edge to get more things done and win the acceptance. 3. If you like chatting and communicating in forums, typing fast will save you a lot of time and allow

you to say more. 4. For journalists, blogger and writers, skilled typing abilities will help you in your day to day job. 5.For secretaries and administrators, typing is a fundamental job requirement. This is also true for a range of other typing related jobs such as for data entry operators and LDC.

Touch Typing Basically, Touch typing is typing without looking at the keyboard. The idea is to teach your fingers the location of each key. Typing Speed is measured in Words Per Minute (WPM), commonly used in typing test examination and recruitment. For the purposes of WPM measurement a word is standardized to five characters or keystrokes. Therefore, “write” counts as one word, but “understand” counts as two words and blank space also count as one character


Tips to increase typing speed



To make things simpler will break down each tip as a subpart of the above topic. Lets dive Right Into It.
1.4.2.1 Correct Body Posture

All the above mentioned points make the basic of learning the typing skills. You have to sit straight with a comfortable height of the chair from where you can see to your monitor. Your end of the palm must be grounded to the end of the keyboard or surface where your keyboard is placed. Place your fingers correctly on the keyboard. Never try to type with your fingertips or nails.

Placement of fingers on Keyboard : The F and J keys have a raised bar or a dot allowing your finger to identify them. Once you have placed your two indexes on those keys, the other fingers are placed on the keys next to them. 'A' 'S' 'D' 'F' and 'J' 'K' 'L' ';' are the base positions for your fingers. Your fingers go from the base position to the key that you want to press and after pressing the key it backs at base position. In order to type fast you have to be careful about which finger to use to press a key. Take a look at the drawing below. 


Each color matches a finger. For example the right index is pink and has to type only the pink keys. Always try to type with both hands. Divide groups in the keyboard for both hands. Always use thumb of any hand for press the space bar.

:Memorize the position of Keys


To become a good typist you have to memorize the keyboard and create a mental map of the associated fingers. You have to be able to press any key without even thinking. For example if I say 'E' you have to think move the middle finger up and press 'E' instantly. You can only achieve this through practice. You have to build up the muscle memory of each finger.


You can type with much more speed without seeing to the keyboard. It is very easy if you practice daily for it. In initial few days let there be mistakes in typing but don't look towards keyboard, instead try to remember the keys

Use of Shortcut Keys :


Shortcut keys are very handy for computer users. Shortcuts keys help provide an easier and usually quicker method of navigating and using computer applications. While writing content you can easily format the text if you make use of shortcut keys, which will save your further time of formatting the document. Maximize use of keyboard shortcut's instead of using mouse because when you move your hand form keyboard to mouse and again set's to the right key position consumes much time

Practice makes man perfect : 

Without practice no one can be a good typist. Try to give an hour daily as practice session for Typing. You can use online websites IndiaTyping, typingtest.com for practice. They will show you real time accuracy, speed statics and it never allows you go further without type correct character for your typing speed improvement. The best way to enhance your typing speed is through good old practice. While practice is not certainly a shortcut and requires faithful effort, it really is the best way to see the results. Even if you practice your typing skills for 30 minutes every day at least for a month, you will see an improvement that can help you in getting your dream job.

Key Tips 1)
 Place your indexes on 'F' and 'J'.
 2) 

Use same finger all time to type each key. 
3) Don't look at the keyboard, your eyes should always look at the screen 
4) Practice more!

The Key Learning Outcomes

At the end of this module, you will be able to:

1. Explain various types of data entry services and job responsibilities of a data entry operator.
2. Obtain sufficient information from customer and check customer’s account details for accuracy.
3. Assist customer in providing right information and provide the customer with a reasonable estimated time.
4. Prioritize service requests according to organizational guidelines.
5. Analyse queries/complaints of customers in CRM, Register or MS Excel.
6. Identify first level complaints at front end and customer query resolution.
7. Know about escalation matrix to resolve customer issues.

8. Seek advice and guidance from line manager.

Job Responsibilities of a Data Entry Operator

At the end of this unit, you will be able to:
1. Understand the role of a Data Entry Operator
2. Success factors in the job role of Data Entry Operator

3. Identify the skills required for Data Entry Operator job role

Who is a Data Entry Operator?

Data entry operators take written information from forms, applications, or company files and enter the information into computer system databases, or applications for business use. Some positions deal mostly with typing, such as word processing or computerized customer files. People in these jobs handle letters, documents, and mailing lists. Other positions feature heavy emphasis on numerical data entry, such as accounting, banking, and mortgage, or loan information. Data entry operators work in marketing, accounting, human resources, or healthcare, and many work hours are spent seated at a computer.

Data entry operators need only a high school diploma or equivalent. Excellent keyboarding skills are beneficial and learned in a variety of contexts. Related work experience gives applicants an edge
when applying for jobs.

Brief Job Description
 Individuals are responsible to provide daily work reports and work
on daily hour bases. The individual is responsible for electronic entry of data from the
client side to the office site or vice‐versa. Individual tasks vary depending on the size and
structure of the organization.

Personal Attributes:
This job requires the individual to have thorough knowledge of
various technology trends and processes as well as have updated knowledge about
database management systems and IT initiatives. The individual should have fast and
accurate typing / data encoding. This job involves working in a personal computer, and
appropriate software to enter accurate data regarding different issues like retrieving
data from a computer or to a computer


Responsibilities of Data Entry Operator


The data entry operator is responsible for performing data entry work using a personal computer and appropriate software; entering, updating, researching, verifying and/or retrieving data into/from various systems; and ensuring the accuracy and confidentiality of information recorded.
Essential Functions Enters, updates and verifies data into various systems for use by all personnel.
1. Reviews and verifies data entered into database to ensure accuracy.


2. Tracks documents received and completion dates.
3. Assists and trains employees and new data entry operators on software programs.
4. Provides assistance to technical staff to resolve computer and software problems.
5. Runs and distributes reports.
6. Creates back up files for all data.


Responsibilities

 Insert customer and account data by inputting text based and numerical information from source documents within time limits
 Compile, verify accuracy and sort information according to priorities to prepare source data for computer entry
 Review data for deficiencies or errors, correct any incompatibilities if possible and check output
 Apply data program techniques and procedures
 Generate reports, store completed work in designated locations and perform backup operations
 Keep information confidential

Ensuring the Accuracy of the Data

As a data entry operator, you are responsible to make sure that the data entered in a system or software must be accurate and up to date. As a data entry operator, you have to enter various types of information in the system, and keeping the quality of the work is extremely important. Whether you are working as a freelance operator, or you are associated with an organization, it is your primary objective to enter the accurate information for the users. In this regard, you have to double check the information to avoid any kind of typing errors, and achieving the higher standards of the work.

Confidentiality of the Data

Another key responsibility is to keep the confidentiality of the data. In some cases the nature of the work assigned to you is extremely sensitive. Just like data entry operators working in a bank or working as a freelance for a bank. In that case, your duty is to keep the confidentiality of the data. Keeping the quality of the data may be the basic responsibility of a data entry operator, but often it is equally important to keep the data confidential


Communicating with the Other Staff

As a data entry operator, you have to communicate with other colleagues, and high ups on a daily basis to verify or update the information. As a punctual and accurate data entry operator, you have to know the art of communication so that you can easily ensure the quality of the work.


Concentration and Focus

Often you have to spend long hours on the computer in order to complete your tasks, and in this situation it becomes extremely hard to keep the same concentration level. As a professional, you have to make sure that your concentration level does not affect because of the late sitting. You have to work on tight time deadlines for long working hours with same concentration in order to become a professional data entry operator.

Ready to Make Corrections

As human beings we all make mistakes, and as a data entry operator, making errors is a normal thing. You have to be ready for the necessary corrections all the time. Whether it is a typo, or change in the information, you should never say “No” to any change.

Above are just a few roles and responsibilities of a data entry operator. There are various duties that you need to perform as a data entry operator on the daily basis.

Challenges Faced by Data Entry Operators

Owing to the low skill requirement for the job and the easily replaceable workforce, data entry experts are hired on a temporary basis. Very few companies take the pain of hiring full time data entry operators. This makes it all the more important for people to adhere to strict quality


parameters. Once you have the right connections and leads, you can easily get round the year work and easily finish it by working from your home. The versatility and freedom associated with this job makes it quite attractive for home based workers and people who hate the office work culture. By constantly improving your knowledge and upgrading your skills, you can evolve as a specialized professional, thereby increasing you chances of getting hired for high paying jobs.
Data entry operators are going to be in high demand over the next decade or so because of the need to updates regularly and the cheap labour that is very much required in research projects. With most aspects of health care going into the electronic format, data entry operators can easily find jobs in such fields.


Competencies


1. Communication Proficiency.
2. Ethical Conduct.
3. Organizational Skills.
4. Technical Capacity.
5. Time Management.
6. Thoroughness.


Steps to Become a Data Entry Operator

Step 1: Gain Data Entry Skills

Employers train data entry operators, but good typing and numeric key entry skills are a common prerequisite. Knowledge of database software, spreadsheets, and word processing is helpful. Good spelling, grammar, and punctuation skills are also necessary, as well as strong reading comprehension. Data entry operators must be familiar with basic office equipment like computers, scanners, copiers, and calculators. Training is available at the high school level, and there are online tutorials as well. Employment agencies, temporary agencies, public libraries, and community colleges also offer courses in keyboarding skills and data entry.
Success Tips


Obtain a data entry certificate. Many community colleges offer one to two semester certificate programs in basic office skills or clerical data entry preparing applicants for entry-level data entry positions. This certificate makes a high school graduate more competitive in this career field.
Practice data entry skills. Data entry operators must be fast and accurate. You should practice their new data entry skills to increase your speed and reduce errors. Some employers require applicants to pass a keyboard speed and accuracy test before hiring.

Gain Experience

Related entry-level positions, such as a word processor or typist, can help you to gain the experience required by most employers. In these positions, you'll learn how to check for spelling and punctuation, organize page reports, and sort data

Gain Employment for Advancement

High schools and colleges, as well as online job boards, have local job listings. Careful attention should be paid to the requirements of each job listing. Some jobs require typing skills of a certain amount of words per minute, and some positions require aptitude with specific software.
To become a data entry operator, you'll need to gain experience to improve your typing and office skills. You may consider some formal training to help you develop these skills


At the end of this module, you will be able to:
1What is the role of a Data Entry Operator?
……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………
2. What are skills required for a Data Entry Operator?
……………………………………………………………………………………….……………………………………………………………………
3. What are three critical responsibilities of a Data Entry Operator
……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….……………………………………………………………………………………….…………………………………………………………………………
……………………………………….……………………………………………………………………………………….……………………………………………………………………………………….…………………………………………………………………………………..
3. Open word document and type the following text:
The Indian BPM industry has grown leaps and bounds in the last decade. The value proposition of the industry has moved to value beyond cost and today the Industry is providing end to end, Business transformation and platform based solutions. The industry has adopted a truly global delivery model and has grown in strength to strength not only in Voice processes but also in Analytics based solution, Supply chain management and proving business transformation services. The BPM Industry has set a vision of delivering USD 50 Bn of revenue by 2020. Interestingly, the total IT exports from India in 2009 was USD 50 Bn and within a span of one decade, the BPM Industry has matured to assume a prominent role in the total growth of IT Industry in the country.


















No comments:

Post a Comment