Saturday, May 26, 2012

Study about Computer Parts and their working


Parts of a computer

If you use a desktop computer, you might already know that there isn't any single part called the "computer." A computer is really a system of many parts working together. The physical parts, which you can see and touch, are collectively called hardware. (Software, on the other hand, refers to the instructions, or programs, that tell the hardware what to do.)
The illustration below shows the most common hardware in a desktop computer system. Your system may look a little different, but it probably has most of these parts. A laptop computer has similar parts but combines them into a single notebook-sized package.
Picture of a desktop computer systemDesktop computer system
Let's take a look at each of these parts.

System unit

The system unit is the core of a computer system. Usually it's a rectangular box placed on or underneath your desk. Inside this box are many electronic components that process information. The most important of these components is the central processing unit (CPU), or microprocessor, which acts as the "brain" of your computer. Another component israndom access memory (RAM), which temporarily stores information that the CPU uses while the computer is on. The information stored in RAM is erased when the computer is turned off.
Almost every other part of your computer connects to the system unit using cables. The cables plug into specific ports (openings), typically on the back of the system unit. Hardware that is not part of the system unit is sometimes called a peripheral device ordevice.
Picture of a system unitSystem unit

Storage

Your computer has one or more disk drives—devices that store information on a metal or plastic disk. The disk preserves the information even when your computer is turned off.

Hard disk drive

Your computer's hard disk drive stores information on a hard disk, a rigid platter or stack of platters with a magnetic surface. Because hard disks can hold massive amounts of information, they usually serve as your computer's primary means of storage, holding almost all of your programs and files. The hard disk drive is normally located inside the system unit.
Picture of a hard disk driveHard disk drive

CD and DVD drives

Nearly all computers today come equipped with a CD or DVD drive, usually located on the front of the system unit. CD drives use lasers to read (retrieve) data from a CD, and many CD drives can also write (record) data onto CDs. If you have a recordable disk drive, you can store copies of your files on blank CDs. You can also use a CD drive to play music CDs on your computer.
Picture of a CDCD
DVD drives can do everything that CD drives can, plus read DVDs. If you have a DVD drive, you can watch movies on your computer. Many DVD drives can record data onto blank DVDs.

Floppy disk drive
Floppy disk drives store information on floppy disks, also called floppies or diskettes. Compared to CDs and DVDs, floppy disks can store only a small amount of data. They also retrieve information more slowly and are more prone to damage. For these reasons, floppy disk drives are less popular than they used to be, although some computers still include them.
Picture of a floppy diskFloppy disk
Why are floppy disks "floppy"? Even though the outside is made of hard plastic, that's just the sleeve. The disk inside is made of a thin, flexible vinyl material.

Mouse

A mouse is a small device used to point to and select items on your computer screen. Although mice come in many shapes, the typical mouse does look a bit like an actual mouse. It's small, oblong, and connected to the system unit by a long wire that resembles a tail. Some newer mice are wireless.
Picture of a computer mouseMouse
A mouse usually has two buttons: a primary button (usually the left button) and a secondary button. Many mice also have a wheel between the two buttons, which allows you to scroll smoothly through screens of information.
Picture of mouse pointers
When you move the mouse with your hand, a pointer on your screen moves in the same direction. (The pointer's appearance might change depending on where it's positioned on your screen.) When you want to select an item, you point to the item and then click (press and release) the primary button. Pointing and clicking with your mouse is the main way to interact with your computer. 

Keyboard

A keyboard is used mainly for typing text into your computer. Like the keyboard on a typewriter, it has keys for letters and numbers, but it also has special keys:
  • The function keys, found on the top row, perform different functions depending on where they are used.
  • The numeric keypad, located on the right side of most keyboards, allows you to enter numbers quickly.
  • The navigation keys, such as the arrow keys, allow you to move your position within a document or webpage.
Picture of a keyboardKeyboard
You can also use your keyboard to perform many of the same tasks you can perform with a mouse.

Monitor

monitor displays information in visual form, using text and graphics. The portion of the monitor that displays the information is called the screen. Like a television screen, a computer screen can show still or moving pictures.
There are two basic types of monitors: CRT (cathode ray tube) monitors and LCD (liquid crystal display) monitors. Both types produce sharp images, but LCD monitors have the advantage of being much thinner and lighter. CRT monitors, however, are generally more affordable.
Picture of an LCD monitor and a CRT monitorLCD monitor (left); CRT monitor (right)

Printer

A printer transfers data from a computer onto paper. You don't need a printer to use your computer, but having one allows you to print e‑mail, cards, invitations, announcements, and other materials. Many people also like being able to print their own photos at home.
The two main types of printers are inkjet printers and laser printers. Inkjet printers are the most popular printers for the home. They can print in black and white or in full color and can produce high-quality photographs when used with special paper. Laser printers are faster and generally better able to handle heavy use.
Picture of an inkjet printer and a laser printerInkjet printer (left); laser printer (right)

Speakers

Speakers are used to play sound. They may be built into the system unit or connected with cables. Speakers allow you to listen to music and hear sound effects from your computer.
Picture of computer speakersComputer speakers

Modem

To connect your computer to the Internet, you need a modem. A modem is a device that sends and receives computer information over a telephone line or high-speed cable. Modems are sometimes built into the system unit, but higher-speed modems are usually separate components.
Picture of a cable modemCable modem

Wednesday, May 16, 2012

About MBA in IT Programme


Introduction


With the expanded use of information technology in all facets of business, including outsourcing, and e-commerce, the IT and ITESS Sectors in India have seen tremendous growth in the past decade. Indian Engineers and IT Professionals employed by India's best and biggest IT Companies, today work across the world, servicing Fortune 500 clients at the cutting edge of Information Technology.
Program Objective

This MBA in Information Technology Management is designed to help you develop the skills you need to enhance business competitiveness and interact effectively with executive management as a strategic business partner. People who choose this specialization are often employed in entry to mid level positions in IT / Technical / Managerial functions in the IT/ITESS Sector.
Duration

Two years - Four Semesters




Curriculum

SEMESTER -I
Course CodeCourse TitleCredits
MBIT-201Principles of Management5
MBIT-202Economics for Managers5
MBIT-203Accounting for Managers5
MBIT-204Financial Management5
MBIT-205Marketing Management5
MBIT-206Management of People Assets5
 Total Semester Credits30

SEMESTER -II
Course CodeCourse TitleCredits
MBIT-207Behaviourial Science5
MBIT-208Managing Operations5
MBIT-209Innovation Management5
MBIT-210Strategy in Business5
MBIT-211Leadership & Team Effectiveness5
MBIT-212Entrepreneurship Management5
 Total Semester Credits30

SEMESTER -III
Course CodeCourse TitleCredits
MBIT-213International Business5
MBIT-214Enterprises Resource Planning5
MBIT-215Ecommerce5
MBIT-216Technology Strategy5
MBIT-217Sales Management5
MBIT-218Customer Relationship Management5
 Total Semester Credits30

SEMESTER -IV
Course CodeCourse TitleCredits
MBIT-219Service Management5
MBIT-220Internet Marketing5
MBIT-221Software Project Management5
MBIT-222Cyber Law5
MBIT-223IT in Change Management5
MBIT-224eGovernance5
 Project Report6
 Project Viva Voce2
 Total Semester Credits38

Wednesday, May 9, 2012

Computer Maintenance


Computer cleaning

Computer cleaning is the practice of physically cleaning the interior, and exterior, of a computer including the removal of dust and debris from cooling fans, power supplies, and hardware components.

Backup

Important data stored on computers may be copied and archived securely so that, in the event of failure, the data and systems may be reconstructed. When major maintenance such as patching is performed, a backup is recommended as the first step in case the update fails and reversion is required.
In information technology, a backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event. The verb form is back up in two words, whereas the noun is backup.
Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users. A 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups popularly represent a simple form ofdisaster recovery, and should be part of a disaster recovery plan, by themselves, backups should not alone be considered disaster recovery. Not all backup systems or backup applications are able to reconstitute a computer system, or in turn other complex configurations such as a computer cluster, active directory servers, or a database server, by restoring only data from a backup.
Since a backup system contains at least one copy of all data worth saving, the data storage requirements are considerable. Organizing this storage space and managing the backup process is a complicated undertaking. A data repository model can be used to provide structure to the storage. In the modern era of computing there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.
Before data is sent to its storage location, it is selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Many organizations and individuals try to have confidence that the process is working as expected and work to define measurements and validation techniques. It is also important to recognize the limitations and human factors involved in any backup scheme.

Disk maintenance

Disk storage, such as your hard drive, fills up with unwanted files over time. Disk cleanup may be performed as regular maintenance to remove these. Files may become fragmented and so slow the performance of the computer. Disk defragmentation may be performed to combine these fragments and so improve performance.

1.Disk Cleanup:-Disk Cleanup (cleanmgr.exe) is a computer maintenance utility included inMicrosoft Windows designed to free up disk space on a computer's hard drive. The utility first searches and analyzes the hard drive for files that are no longer of any use, and then removes the unnecessary files. There are a number of different file categories that Disk Cleanup targets when performing the initial disk analysis:
  • Compression of old files
  • Temporary Internet files
  • Temporary Windows file
  • Downloaded program files
  • Recycle Bin
  • Removal of unused applications or optional Windows components
  • Setup log files
  • Off-line files
The above list, however, is not exhaustive. For instance, 'Temporary Remote Desktop files' and 'Temporary Sync Files' may appear only under certain computer configurations, differences such as Windows Operating System and use of additional programs such as Remote Desktop. The option of removing hibernation data may not be ideal for some users as this may remove the hibernate option.
Aside from removing unnecessary files, users also have the option of compressing files that have not been accessed over a set period of time. This option provides a systematic compression scheme. Infrequently accessed files are compressed to free up disk space while leaving the frequently used files uncompressed for faster read/write access times. If after file compression, a user wishes to access a compressed file, the access times may be increased and vary from system to system. In addition to the categories that appear on the Disk Cleanup tab, the More Options tab offers additional options for freeing up hard drive space through removal of optional Windows components, installed programs, and all but the most recent System Restore point or Shadow Copy data in some versions of Microsoft Windows.
Dust and other cruft may accumulate as a result of air cooling. If filters are used to prevent this then they will need regular service and changes. If the cooling system is not filtered then regular Computer cleaning may be required to prevent short circuits and overheating.

2.Disk Defragement:-In the maintenance of file systems, defragmentation is a process that reduces the amount of fragmentation. It does this by physically organizing the contents of the mass storagedevice used to store files into the smallest number of contiguous regions (fragments). It also attempts to create larger regions of free space using compaction to impede the return of fragmentation. Some defragmentation utilities try to keep smaller files within a single directory together, as they are often accessed in sequence.
Defragmentation is advantageous and relevant to file systems on electromechanical disk drives. The movement of the hard drive's read/write heads over different areas of the disk when accessing fragmented files is slower, compared to accessing the entire contents of a non-fragmented file sequentially without moving the read/write heads to seek other fragments.

Law

Computer maintenance activities are specifically exempt from the Digital Millennium Copyright Act and so copies of copyright files may be made in the course of maintenance provided that they are destroyed afterwards.

Registry

Operating systems files such as the Windows registry may require maintenance. A utility such as a registry cleaner may be used for this.
The Windows Registry is a hierarchical database that stores configuration settings and options on Microsoft Windows operating systems. It contains settings for low-level operating system components as well as the applications running on the platform: the kernel,device drivers, services, SAM, user interface and third party applications all make use of the registry. The registry also provides a means to access counters for profiling system performance.
When first introduced with Windows 3.1, the Windows registry's primary purpose was to store configuration information for COM-based components. With the introduction of Windows 95 and Windows NT, its use was extended to tidy up the profusion of per-program INI files that had previously been used to store configuration settings for Windows programs. Portable applications usually do not write configuration data in the Windows Registry, but instead keep the configuration data within files inside a single directory where the application is run.

Service intervals

Depending on your environment computers should be serviced at least once per quarter, though monthly service is optimal. This will ensure your computers run at their peak performance.

Software updates

Software packages and operating systems may require regular updates to correct software bugs and address security weaknesses. An automated or semi-automated program such as Windows update may be used for this.







Monday, May 7, 2012

Languages supported by .NET Framework

The table below lists all the languages supported by the .NET Framework and describes those languages. The languages listed below are supported by the .NET Framework upto the year 2003. In future there may be other languages that the .NET Framework might support.
LanguageDescription/Usage
APLAPL is one of the most powerful, consistent and concise computer programming languages ever devised. It is a language for describing procedures in the processing of information. It can be used to describe mathematical procedures having nothing to do with computers or to describe the way a computer work.
C++C++ is a true OOP. It is one of the early Object-Oriented programming languages. C++ derives from the C language.
VC++
Visual C++ is the name of a C++ compiler with an integrated environment from Microsoft. This includes special tools that simplify the development of great applications, as well as specific libraries. Its use is known as visual programming.
C#C# called as C Sharp is a full fledged Object-Oriented programming language from Microsoft built into the .NET Framework. First created in the late 1990’s was part of Microsoft’s whole .NET strategy.
CobolCOBOL (Common Business Oriented Language) was the first widely-used high-level programming language for business applications. It is considered as a programming language to have more lines of code than any other language.
Component PascalComponent Pascal is a Pascal derived programming language that is specifically designed for programming software components.
CurriculumNo information.
EiffelEiffel is an Object-Oriented (OO) programming language which emphasizes the production of robust software. Eiffel is strongly statically typed mature Object-Oriented language with automatic memory management.
ForthForth is a programming language and programming environment. It features both interactive execution of commands (making it suitable as a shell for systems that lack a more formal operating system), as well as the ability to compile sequences of commands into threaded code for later execution.
FortranAcronym for Formula Translator, Fortran is one of the oldest high-level programming languages that is still widely used in scientific computing because of its compact notation for equations, ease in handling large arrays, and huge selection of library routines for solving mathematical problems efficiently.
HaskellHaskell is a computer programming language that is a polymorphicly typed, lazy, purely functional language, quite different from most other programming languages. It is a wide-spectrum language, suitable for a variety of applications. It is particularly suitable for programs which need to be highly modifiable and maintainable.
Java LanguageThe Java language is one of the most powerful
Object-Oriented programming languages developed till date. It's platform independence (not depending on a particular OS) feature makes it a very popular programming language.
Microsoft JScriptMicrosoft JScript is the Microsoft implementation of the ECMA 262 language specification. JScript is an interpreted, object-based scripting language. It has fewer capabilities than full-fledged Object-Oriented languages like C++ but is more than sufficiently powerful for its intended purposes.
MercuryMercury is a new logic/functional programming language, which combines the clarity and expressiveness of declarative programming with advanced static analysis and error detection features. Its highly optimized execution algorithm delivers efficiency far in excess of existing logic programming systems, and close to conventional programming systems. Mercury addresses the problems of large-scale program development, allowing modularity, separate compilation, and numerous optimization/time trade-offs.
MondrianMondrian is a simple functional scripting language for Internet applications. It is a functional language specifically designed to
inter-operate with other languages in an OO environment. Current versions of Mondrian run on .NET. Mondrian also supports ASP.NET, allowing you to embed functional language code in web pages along with C# code.
OberonOberon is a programming language very much like Modula-2 in syntax but with several interesting features. It's based on OOP concepts and provides a Windows-based graphical user interface.
OzOz is a high-level programming language that combines constraint inference with concurrency. Oz is dynamically typed and has first-class procedures, classes, objects, exceptions and sequential threads synchronizing over a constraint store. It supports finite domain and feature constraints and has powerful primitives for programming constraint inference engines at a high level.
PascalPrinciple objectives for Pascal were for the language to be efficent to implement and run, allow for the development of well structured and well organized programs, and to serve as a vehicle for the teaching of the important concepts of computer programming. The Prime area of application that Pascal entails is the learning environment. This language was not really developed to be used for anything other than teaching students the basics of programming as it was originally developed for this purpose.
PerlPractical Extraction and Report Language, Perl, is a language optimized for scanning arbitrary text files, extracting information from those text files, and printing reports based on that information. It's also a good language for many system management tasks.
PythonPython is an interpreted, interactive, Object-Oriented programming language. Python combines remarkable power with very clear syntax. It has modules, classes, exceptions, very high level dynamic data types, and dynamic typing.
RPGReport Program Generator, RPG, is used for generation of reports from data files, including matching record and sub-total reports. RPG is one of the few languages created for punch card machines that is still in common use today. RPG or RPG IV is a native programming language for IBM's iSeries minicomputer system.
SchemeScheme is a statically scoped programming language. It was designed to have an exceptionally clear and simple semantics and few different ways to form expressions. A wide variety of programming paradigms, including imperative, functional, and message passing styles, find convenient expression in Scheme.
Small TalkSmallTalk is an expressive language that uses a simple sub set of human languages, nouns and verbs. Smalltalk was the first, and remains one of the few, pure object systems, which simply means that everything in a Smalltalk program is an object. Smalltalk is generally recognized as the second Object Programming Language (OPL).
Standard MLStandard ML is a safe, modular, strict, functional, polymorphic programming language with compile-time type checking and type inference, garbage collection, exception handling, immutable data types and updatable references, abstract data types, and parametric modules. It has efficient implementations and a formal definition with a proof of soundness.
Microsoft Visual BasicVisual Basic is a "visual programming" environment for developing Windows applications. Visual Basic makes it possible to develop complicated applications very quickly. This site is all about Visual Basic.


Websites for study "Basic Computer" & "Languages" online

Funny Computer Tricks


1. lets start with a funny one. just copy the below code and paste it to your web browser address bar and press enter..

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)
you will see that your browser is shaking. Shake it shake it baby ;) (Note: In some browser it may not work )

2. do you know how to make a folder without a name? is it possible? oh yea it is possible. just try it out..
# Click the folder, then right click on it, then click rename and delte the old name.
# Then pressing ALT button from your keyboard and type 0160 after that press enter.
Important think to notice - you have to type by holding the ALT button, don't stop pressing and while you will type 0160 it will not appear.You should continue typing and then press enter. Another important thing is that you have to type the code (0160) by your numpad. If you type the code from the upper number key it won't work. So, make sure your Numpad key is on.


3. Now I am gonna show you how to make your pc faster than before. I can make your pc about 200% faster. To make you PC faster than before please folow the steps
# Go to start then click run and then type regedit
# Select HKEY_CURRENT_USER and then select control panel folder and then select desktop folder. Do it correctly
# You will see registry setting at your right hand side, after that select menu show delay and then right click and select modify.
# you will find edit string option -----> default value data is 400 , you have to change the value Data to 000
# Restart your computer. You will notice that your computer has become much more faster.
(Note : This will help you to start your computer start quickly)

4. Check your antivirus: you can test your anti virus is it working or not. Just follow my instruction:
# open a wordpad or note pad and save this.
X50!P%@AP[4\PZX54(P^)7CC)7}EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
save it as eicar.com . while doing this your anti-virus should stop you. its not harmful either but if the anti virus is active it will warn you. if it does not then your anti virus is good for nothing .

5. Forbidden name trick: Do you know you it is not possible make a folder with the name "con" ? No matter how many times you try to make a folder with the name Con you won't be able to make it. I don't know the reason.

6. Strange font: Open your notepad and increase the font size to 72 , then change the the font to "Windings" . Now write your name in Capital later and look what you see there ? Surprised?

7. Super Desktop pranks: Take a screen shot of your desktop (by clickingSysRq buttonand then paste the image to paint and save it as Jpeg imageformat . Then open the image of your desktop and make it your desktop wallpaper. Now hide all the icons from your desktop (Right click > arrange icons by > Hide desktop icon) . Also unlock the taskbar. Now your desktop will look like exactly same like before but everyone will be fooled whenever they try to click any icon. You can do this trick on your friends computer and enjoy the fun show :)

8. Microsoft word tricks: Just open your microsoft word and then type=Rand(200,99) then press enter. Enjoy the magic
I am feeling very sleepy. I hope my hub was useful to you at some sense. Please post your feedback about the Hub and help me to improve it.

Vocational IT/ITES and Retail Board Paper and Sample Papers

                              Vocational Education Old Board Papers                                        IT/ITES 1. IT/ITES Level 1...