Index
A
abacus, 2
absolute loader, 146
absolute referencing, 225
abstraction, 138
adapter card, 30
address bar, 100
address lines, 23
address resolution protocol (ARP), 277
Advanced Research Projects Agency Network (APRANET), 282
advanced technology extended (ATX) design, 29
AI. See artificial intelligence (AI)
properties of, 132
ALTER TABLE, 341
ALU. See arithmetic logic unit (ALU)
AM. See amplitude modulation (AM)
America Online (AOL), 288
American Standard Code for
Information Interchange (ASCII), 39
amplitude modulation (AM), 261
analog computer, 9
analytical engine, 3
antivirus, 308
AOL. See America Online (AOL)
application software, 153, 154
application-level gateway, 315–316
APRANET. See Advanced Research Projects
Agency Network (APRANET)
arithmetic logic unit (ALU), 13, 19, 21
arithmetic unit (AU), 19
ARP. See address resolution protocol (ARP)
artificial intelligence (AI), 8
aspect ratio, 80
advantages and disadvantages of, 143–144
asymmetric key cryptography, 310, 383
asynchronous transmission, 264
Atansoft Berry Computer (ABC), 4
attribute, 321
AU. See arithmetic unit (AU)
automated tape library, 63
B
B2A. See business-to-administration (B2A)
B2B. See business-to-business (B2B)
B2C. See business-to-consumer (B2C)
bar code reader, 71
batch-processing OS, 86
BBSs. See Bulletin Board Systems (BBSs)
BCD. See binary coding system
BD. See blu-ray disk (BD)
binary coding system, 390
binary-coded decimal (BCD), 39–40
disadvantages of, 40
black-hat hackers, 305
blu-ray disk (BD), 60
boot sector virus, 306
booting, 87
BPO. See business process outsourcing (BPO)
bridge, 279
broadband, 289
buffer, 93
Bulletin Board Systems (BBSs), 308
advantages of, 272
disadvantages of, 272
business process outsourcing (BPO), 117
business-to-administration (B2A), 372
business-to-business (B2B), 372
business-to-consumer (B2C), 372
C
C2C. See consumer-to-consumer (C2C)
cable modem, 288
calculator, 104
candidate key, 332
catalog management software, 378
cathode ray tube (CRT), 80
CBT. See computer-based training (CBT)
CD. See compact disk (CD)
CD-R. See compact disk-recordable (CD-R)
CD-ROM jukebox, 63
CD-ROM. See compact disk-read only memory (CD-ROM)
CD-RW. See compact disk-rewritable (CD-RW)
cell range, 211
naming of, 211
central processing unit (CPU), 12–13, 19–21
charts, 122
chat programs, 293
chip, 7
circuit switching, 264–265, 266
circuit-level gateway, 316
CISC. See complex instruction set computer (CISC)
cladding, 257
client/server network, 266–267
Clip Gallery, 187
cluster, 57
CMOS chip, 29
coaxial cable, 257
COM. See computer output microfilm (COM)
command line interface, 94
commercial software, 160
compact disk (CD), 60
compact disk-read only memory (CD-ROM), 61
compact disk-recordable (CD-R), 61
compact disk-rewritable (CD-RW), 61
compiler, 144
complex instruction set computer (CISC), 27
computer
banking and, 16
buses of, 23
classification according to functionality, 10–11
classification according to purpose, 9
classification according to type of data-handling techniques, 9–10
defence and, 16
general-purpose computers, 9
limitations of, 17
working of, 14
computer network, 266
criteria for, 266
disadvantages of, 271
need of, 266
computer output microfilm (COM), 78–79
aspects responsible for, 304
computer terminal, 83
computer-based training (CBT), 113
consumer issuing bank, 375
consumer-to-consumer (C2C), 372
content streaming, 302
control bus, 23
control lines, 23
CPU. See central processing unit (CPU)
CREATE TABLE, 340
credit card, 375
credit card association, 375–376
CRT. See cathode ray tube (CRT)
hash functions, 311
public-key cryptography, 310–311
secret-key cryptography, 310
techniques of, 310
CU. See control unit (CU)
creating and changes to be made in, 217–218
cybervandalism, 381
D
data, 319
data bus, 23
data communication, 254
components of, 254
data compression, 124
data definition language (DDL), 327
data dictionary, 328
data encryption standard (DES), 310
data glove, 127
data inconsistency, 324
data lines, 23
data manipulation language (DML), 327
data mining, 335
data recovery, 156
data type, 321
data warehouse, 334
data warehousing, 335
database, 320
ACID properties of a transaction in, 333–334
database management system (DBMS), 157, 325–334
advantages over file-processing system, 325–326
applications of, 333
disadvantages of, 326
languages involved in, 327
database model, 330
hierarchical database model, 330–331
network database model, 331
relational database model, 331–332
database schema, 328
DDL. See data definition language (DDL)
DDoS. See distributed DOS (DDoS) deadlock, 90
deadlock avoidance, 91
deadlock prevention, 91
decision table, 135
preference over flowcharts, 135
DELETE, 342
DES. See data encryption standard (DES)
desktop, 96
icons appearing by default, 97–98
desktop computer, 11
desktop publishing (DTP), 15
software related to, 158
destination computer, 285
device drivers, 155
device management, 87
digital certificate, 376, 383–384
digital computer, 9
block diagram of, 12
digital light processing, 82
digital signal, 256
process involved, 312
properties of and requirements for, 313
Digital Subscriber Line (DSL), 289
direct files, 323
disk arm assembly, 57
disk defragmenter, 102
disk management, 156
display adapter, 30
distributed database system, 336
distributed DOS (DDoS), 382
DLP projector, 82
DML. See data manipulation language (DML)
DNS. See domain name service (DNS)
domain name service (DNS), 277
double-sided disks, 57
download, 288
DROP TABLE, 341
drum plotter, 78
DSL. See Digital Subscriber Line (DSL)
DTP. See desktop publishing (DTP)
dumb terminal, 83
dynamic RAM (DRAM), 51
differences with SRAM, 51
E
e-banking, 386
EBCDIC. See extended binary decimal interchange code (EBCDIC)
e-books, 114
e-business, 387
e-cash, 375
e-cheque, 375
advantages and disadvantages of, 385–386
comparison with traditional commerce, 373–374
expected worldwide market of, 374
implementation of security in, 382–384
process involved in, 373
requirements of system, 375–376
security threats associated with, 380–382
steps to prevent fraud in, 385
technology infrastructure components of, 376–379
types of payment systems, 375
EDI. See electronic data interchange (EDI)
EEPROM. See electrically erasable programmable ROM (EEPROM)
EFT. See electronic funds transfer (EFT)
advantages and disadvantages of, 387–388
electrically erasable programmable ROM (EEPROM), 53
electronic data interchange (EDI), 294, 388–389
advantages of, 390
Electronic Delay Storage Automatic Calculator (EDSAC), 5
Electronic Discrete Variable Automatic Computer (EDVAC), 5
electronic funds transfer (EFT), 294
electronic learning, 113
address structure of, 295
advantages and disadvantages of, 299
steps for creation of, 295–297
Electronic Numerical Integrator and Calculator (ENIAC), 4–5
embedded OS, 86
encapsulation, 138
end user license agreement (EULA), 158
entity, 321
entity-relationship model (E-R) model, 321
e-placement, 387
erasable programmable ROM (EPROM), 52
e-reservation, 387
e-shopping, 387
EULA. See end user license agreement (EULA) excess-3 code, 41
execute cycle, 26
expansion card, 30
extended binary decimal interchange code (EBCDIC), 39
F
FCFS. See first-come first-served (FCFS)
FDD. See floppy disk drive (FDD)
FDM. See frequency division multiplexing (FDM)
field, 320
file, 97
file server, 269
file transfer protocol (FTP), 277, 286, 292
file-inflecting virus, 306
file-oriented approach, 324
file-processing system, 324
limitations of, 317
protection provided by, 314
use of, 314
first generation (1940-56): vacuum tubes, 5–6
first-come first-served (FCFS), 89–90
fixed disk. See hard drive
flash ROM, 53
flatbed plotter, 78
flatbed scanner, 72
flash drive. See pen drive
floppy disk, 58
advantages and disadvantages of, 58
floppy disk drive (FDD), 58
formatting of, 59
flowchart, 122, 133–134 disadvantages of, 134–135
standard symbols used in, 133–134
FM. See frequency modulation (FM)
folders, 97
footprint, 257
foreign key, 332
Format Painter, 177
4GL, 141
fourth generation (early 1970s till date): microprocessors, 7–8
freeware, 161
frequency division multiplexing (FDM), 262–263
frequency modulation (FM), 262
FTP. See file transfer protocol (FTP)
full-duplex transmission mode, 255
G
gateway, 280
graphical browsers, 284
graphical user interface (GUI), 77, 94
graphs, 122
gray codes, 40
conversion of binary numbers into, 41
greater-than condition, 20
GUI. See graphical user interface (GUI) guided media, 256–257
shielded twisted pair (STP), 257
unshielded twisted pair (UTP), 257
H
hacking, 381
half-duplex transmission mode, 255
handheld computer, 12
handheld scanner, 72
hard disk loading, 159
hard drive, 59
role in computers, 59
hardware, 153
hash functions, 310
hash value, 311
headers, 179
head-mounted display (HMD), 127
headphone, 83
headset, 83
hexadecimal number system, 32–33
hierarchical database model, 330–331
HMD. See head-mounted display (HMD)
Hollerith's tabulator, 4
Home page, 284
host computer, 287
HTML. See hypertext markup language (HTML)
HTTP. See hypertext transfer protocol (HTTP) hub, 279
hybrid computer, 10
HYDRA printer, 77
hypertext, 287
hypertext markup language (HTML), 120
hypertext transfer protocol (HTTP), 277, 286, 290–291
I
IC. See integrated circuits (IC)
icon, 97
IGMP. See Internet control message protocol (IGMP)
image editor, 157
impact printer, 73
inbound translation, 389
indexed sequential files, 323–324
Indexing software, 299
information security analyst, 117
pre-requisites, 107
need of, 108
information technology, 109
applications in e-commerce, 114–115
applications in education, 113–114
applications in publications, 114
career opportunities in, 115–117
components of, 109
role in weathering weather forecasting, 115
infra red wave transmission, 258
inheritance, 139
input device, 65
role of, 65
input unit, 13
instant messenger, 293
instructional format, 24
integrated circuits (IC), 7
Integrated Services Digital Network (ISDN), 288
intelligent terminal, 83
internal processor memory, 49
applications of, 291
commerce through, 294
difference from local area network (LAN), 283
requirements for connection of, 290
steps involved in chatting using, 300–301
uses of, 283
working of, 285
Internet control message protocol (IGMP), 277
Internet downloading, 159
Internet protocol (IP), 277
Internet relay chat (IRC), 293
Internet service provider (ISP), 288–289
factors for selection of, 289
Internet telephony, 293
interpreter, 145
Intranet, 291
IP. See Internet protocol (IP)
IRC. See Internet relay chat (IRC)
ISDN. See Integrated Services Digital Network (ISDN)
ISP. See Internet service provider (ISP)
J
jacket, 257
joystick, 68
K
knowledge, 319
L
L2 cache, 22
L3 cache, 23
LAN. See local area network (LAN)
types of, 155
large scale integration (LSI), 7
laser printer, 76
LCD projector, 82
LCD. See liquid crystal display (LCD)
leased line, 289
LI cache, 22
date and time functions, 220
logical functions, 219
math and trig functions, 218–219
statistical functions, 219
text functions, 220
light pen, 68
lightweight process, 88
linker, 146
liquid crystal display (LCD), 80
listserver. See mailing list liveware, 160
loader, 146
absolute loader, 146
relocating loader, 146
local area network (LAN), 269
lossless compression technique, 124
lossy compression technique, 124
LSI. See large scale integration (LSI) LU. See logic unit (LU)
M
MAC. See media access control (MAC)
recording and executing of, 199–202
utility, 199
steps involved in accessing data from, 57–58
magnetic ink character recognition (MICR), 71
malicious software, 306
MAR. See memory address register (MAR)
MARK-I computer, 4
masked ROM, 52
math and trig functions, 218–219
MBR. See memory buffer register (MBR)
mechanical mouse, 66
media access control (MAC), 278
mega chips, 8
memory address register (MAR), 23–24
memory buffer register (MBR), 25
memory management, 87
memory manager, 91
memory stick, 62
formats of, 62
merchant bank account, 375
advantages of, 275
disadvantages of, 275
MICR. See magnetic ink character recognition (MICR) microcomputers, 10
Microsoft Network (MSN), 288
Microsoft Office Access 2003, 349–370
advantages of, 349
creation of a new database in, 349
generation of reports using Report Wizard in, 366–370
steps for creating an SQL query in, 363–364
steps for sorting of query results in, 361–363
steps to create a form using Form Wizard, 364–366
steps to create table using Table Wizard in, 354–357
ways to create table in, 351–353
Microsoft Office Excel 2003, 208–231
AutoFill options in, 217
AutoFormat feature of, 215
Copy or move contents of one cell to another, 215
entry of formula in, 224
filters in, 229
formatting of cells in, 213–215
function as an argument to another function in, 223–224
library functions of, 218
select rows, cells and columns in, 212
step-by-step procedure for creating a chart in, 226–228
steps to insert a function in, 220–222
steps to insert and delete cells/ rows/columns in, 212–213
steps to sort a range of cells in, 228–229
use of AutoSum in, 222
use of chart in, 226
use of COUNTIF() function in, 222–223
Microsoft Office PowerPoint 2003, 233–253
animation effects in, 248
AutoContent wizard in, 235–237
Handout Master in, 242
Motes Master in, 241
setting of slides timing in, 244–245
slide master in, 241
slide sorter view in, 240
steps in slides in, 249
steps to create a chart in, 245–248
steps to remove slide from, 242
use of blank presentations in, 238
use of Clip Art in, 245
use of design templates in, 237–238
ways to add text to slides in, 243
Microsoft Office Word 2003, 163–206
advantages of, 165
change of case of characters from lowercase to uppercase, 176
Cut Paste and Copy Paste operations in, 177
differences between AutoCorrect and AutoText facilities available in, 190–191
File and Edit menu commands in, 167–168
Footnote and Endnote options in, 203
formatting features of, 170–176
insertion of pictures, 180
Mail Merge features of, 191–192
options available in Table and Borders toolbar, 184–185
role of Drawing toolbar in, 188
setting password in, 202
spelling checking operation in, 189–190
steps involved in creating, saving and closing, 168–170
steps to add Clip Art, 187–188
text alignments in, 176
use of Bullets and Numbering in, 180–181
use of Thesaurus, 191
microwave transmission, 257
mid-range computers, 10
minicomputers, 10
mixed referencing, 225
modem, 30
amplitude modulation (AM), 261
frequency modulation (FM), 262
phase modulation (PM), 262
mouse, 66
MS Windows, 104
accessories of, 104
MSN. See Microsoft Network (MSN) multimedia
advantages of animation in, 122
applications of, 119
file formats used for, 122–123
sound-editing operations used in, 122
multipartite virus, 307
multiplexing, 262
multiprocessor OS, 86
multiprogramming, 89a multitasking OS, 86
multithread programming, 88
N
Napier bones, 3
narrator, 101
National Science Foundation (NSF), 282
native language, 139
negative binary numbers using 2’s complement, 37
Netscape Corporation, 384
network database model, 331
network interface card (NIC), 30, 278
Network News Transfer Protocol (NNTP), 287
network topology, 271
advantages and disadvantages of, 271–275
star topology, 273
tree topology, 274
NIC. See network interface card (NIC)
NNTP. See Network News Transfer Protocol (NNTP) non-impact printers, 73
non-memory reference instructions, 26
non-positional number system, 31
non-preemptive scheduling, 89
notepad, 104
Notes pane, 235
NSF. See National Science Foundation (NSF)
O
object-oriented database system, 336–337
object-oriented programming (OOP), 137
OCR. See optical character recognition (OCR)
offline, 288
OMR. See optical mark recognition (OMR)
one-time programmable (OTP) device, 52
online, 288
stock trading, 387
OOP. See object-oriented programming (OOP)
opcode, 24
open source software, 160
open systems interconnection (OSI), 275–276
operand, 24
operating system (OS), 85
features of, 95
functions of, 87
types of, 86
optical character recognition (OCR), 70
optical disk, 60
advantages and disadvantages of, 60
types of, 60
optical fibre, 257
advantages and disadvantages of, 259
optical mark recognition (OMR), 70–71
optical mouse, 66
OSI. See open systems interconnection (OSI)
outbound translation, 389
output devices, 65
role of, 65
output unit, 13
P
packet assembler and disassembler (PAD), 265
packet switching exchange (PSE), 265
packet-filtering router, 314–315
PAD. See packet assembler and disassembler (PAD)
palmtop computer, 12
parallel port, 29
parallel processing, 8
Pascaline, 3
path name, 287
payment gateway, 376
PC card, 30
PDL. See program design language (PDL)
persistent of vision, 121
personal digital assistant (PDA), 12
phase modulation (PM), 262
phishing, 381
pipelining, 27
plasma display, 80
PM. See phase modulation (PM)
pointing device, 66
polymorphism, 139
positional number system, 31
preemptive scheduling, 89
presentation application, 157–158
presentation software, 233
printer, 73
classification of, 74
daisy wheel printer, 75
drum printer, 75
importance of, 74
usage of, 73
procedural programming, 136–137
process definition of, 87
management of, 87
stages of, 87
processor, 12
product configuration, 378
program design language (PDL), 135
program development cycle, 130–132
programmable ROM (ROM), 52
programming languages, 139–141
projectors, 82
types of, 82
proprietary software, 161
proxy server, 315
PS/2 port, 29
PSE. See packet switching exchange (PSE)
PSTN. See public switched telephone network (PSTN)
public switched telephone network (PSTN), 265
public-domain software, 160
public-key cryptography, 310–311, 312, 383
R
radix, 31
RAID. See redundant array of inexpensive disks (RAID)
RAM. See random access memory (RAM)
random access memory (RAM), 22–23, 50–51
RARP. See reverse address resolution protocol (RARP)
read only memory (ROM), 22–23, 50, 51–53
real-time OS, 86
recycle bin restoration of items, 100
use of, 100
reduced instruction set computer (RISC), 27, 28
redundant array of inexpensive disks (RAID), 63
registered domain name, 376
relational database model, 331–332
relationship, 322
relocating loader, 146
renting, 159
restore points, 102
reverse address resolution protocol (RARP), 277
advantages of, 273
disadvantages of, 273
RISC. See reduced instruction set computer (RISC)
ROM. See read only memory (ROM)
round robin (RR), 90
S
sand tables, 2
satellite transmission, 257
scanner, 72
types of, 72
scheduling algorithms, 89
SCMP. See stream control message protocol (SCMP)
screen reading software, 81
screen saver, 98
screen size, 80
screening router, 314
search engine, 299
components of, 299
mechanism of, 299
steps involved in working of, 299–300
second generation (1956-63): transistors, 6–7
secondary storage devices, 54–55
secret-key cryptography, 310, 311–312, 383
sectors, 57
secure electronic transaction (SET), 384
security management, 87
security threats, 305
serial port, 29
SET. See secure electronic transaction (SET)
shareware, 160
shielded twisted pair (STP), 257
shopping cart application, 376
shortcuts, 97
signed number, 36
representation using 2's complement, 38
Simple Mail Transfer Protocol (SMTP), 286
simple network management protocol (SNMP), 315
simplex transmission mode, 254–255
slide pane, 235
slide rule, 3
small computer system interface (SCSI) port, 29–30
smart terminal, 83
SMTP. See Simple Mail Transfer Protocol (SMTP)
sniffing, 382
SNMP. See simple network management protocol (SNMP)
soft loading, 159
software, 152
counterfeiting of, 159
language of, 152
types of, 152
upgradtion of, 158
software patch, 158
software update, 158
sound card, 30
speech recognition system, 69–70
Spider, 299
spoofing, 382
spooling, 94
features of, 208
spyware, 308
SQL. See structured query language (SQL)
star topology, 273
advantages of, 273
disadvantages of, 273
Start menu, 96
static RAM (SRAM), 51
differences with DRAM, 51
status bar, 100
stealth virus, 307
STP. See shielded twisted pair (STP)
stream control message protocol (SCMP), 277
structured programming, 136–137
modular programming, 137
procedural programming, 136–137
structured query language (SQL), 338–340
characteristics of, 338
purpose of UNION command in, 346
standards of, 339
guidelines for use of, 344–345
supercomputers, 11
supply reel, 55
switch, 279
switching, 265
message switching, 265
methods of, 264
packet switching, 265
symmetric-key cryptography, 310, 383
synchronous transmission, 264
system bus, 23f
system software, 153
system utility programs, 155–156
T
table, 321
take-up reel, 55
TCP. See transmission control protocol (TCP)
TCP/IP reference model, 276–277
TDM. See time division multiplexing (TDM)
technology, 108
advantages of, 109
text browsers, 285
themes, 99
Thesaurus, 191
thin-film electroluminescent display, 80
third generation (1964 to early 1970s): integrated circuits, 7
third generation programming languages (3GL), 141
thread, 88
three-dimensional (3D) graphics, 121–122
3GL. See third generation programming languages (3GL)
time division multiplexing (TDM), 262–263
time-sharing OS, 86
toolbar, 99
working of, 69
touch-based whiteboard, 82
track sector, 57
trackball, 67
trackpad, 68
tracks, 57
application to slides of, 243–244
transmission control protocol (TCP), 277, 286
tree topology, 274
advantages of, 274
disadvantages of, 274
tuples, 331
two-dimensional (2D)
graphics, 121
U
UDP. See user datagram protocol (UDP)
UGL. See universal graphics library (UGL)
ULSI. See ultra-large scale integration (ULSI)
ultra-large scale integration (ULSI), 7
infra red wave transmission, 258
microwave transmission, 257
satellite transmission, 257
Uniform Resource Locator (URL), 287
uni-programming, 89
Universal Automatic Computer (UNIVAC), 5
universal graphics library (UGL), 148
universal serial bus (USB) port, 30
unshielded twisted pair (UTP), 257
unsigned number, 36
unstructured programming, 136
unwanted programs, 381
UPDATE, 342
upload, 288
URL. See Uniform Resource Locator (URL)
usable recording, 56
user datagram protocol (UDP), 277
user interface, 87
UTP. See unshielded twisted pair (UTP)
V
VDT. See video display terminal (VDT)
very high-level languages, 141
advantages and disadvantages of, 142–143
very large scale integration (VLSI), 7
video card, 30
video display terminal (VDT), 83
view, 328
virtual memory, 93
virtual reality, 126
characteristics of, 126
devices used in, 126
virus protection, 156
Virus. See Vital Information Resources Under Seize (Virus)
visual display unit, 80
Vital Information Resources Under Seize (Virus), 306–307, 380
VLSI. See very large scale integration (VLSI)
Voice over Internet Protocol (VoIP), 293
VoIP. See Voice over Internet Protocol (VoIP)
W
WAN. See wide area network (WAN)
WBT. See Web-based training (WBT)
weathering forecasting, 115
features of, 285
graphical browsers, 284
text browsers, 285
Web camera, 293
web hosting package, 376
web mining, 335
Web page, 284
Web-based training (WBT), 113
webcam, 70
Website, 284
development tools of, 378
WHERE clause, 343
white-hat hackers, 305
wide area network (WAN), 269
Wi-Fi, 260
wii remote, IR pen-based whiteboard, 83
Window Explorer, 100
operations that can be performed, 100–101
window pane area, 99
Windows XP Home, 95
Windows XP Professional, 95
wireless links, 260
disadvantages of, 260
word processing, 163
features of, 164
workstations, 269
World Wide Web (WWW), 109, 284
write once read many (WORM), 61
WWW. See World Wide Web (WWW)
3.137.215.0