Generation Languages: A Generation Language May Refer To Any of The Following
Generation Languages: A Generation Language May Refer To Any of The Following
Generation Languages: A Generation Language May Refer To Any of The Following
1GL or first-generation language was (and still is) machine language or the
level of instructions and data that the processor is actually given to work on
(which in conventional computers is a string of 0s and 1s).
ADD 12,8
switch (evt.id) {
case Event.ACTION_EVENT: {
The numbers that are made in Binary Number System are made up of 0 or 1.
2. Decimal Number System
The number system that we follow is called as Decimal Number System where the base
is 10.The base 10 indicates that there are 10 different symbols that we use.
The ten symbols are:
We represent the numbers in this manner because we are using different digits and
each digit has a different place value depending on its position.
1. Rational Number: These are the numbers which can be represented in the form of
a/b, where a and b are integers and b is not equal to 0. Rational numbers are either
terminating or recurring in nature.
2. Irrational Number: These are the numbers which cannot be expressed as a/b and
where b is not equal 0. Irrational numbers are neither non-terminating or non-recurring
in nature.
Terminating Numbers: Terminating numbers are those numbers which stop after the
decimal point.
Non- Terminating Numbers: Non- terminating numbers are the numbers which
don’t stop after the decimal numbers.
Recurring Numbers: The part of the number which keeps on recurring again-again is
termed as a recurring number. Generally, non-terminating numbers are classified as
recurring numbers.
Non-recurring Numbers: Non-recurring numbers are those numbers which don’t keep
on recurring again and again.
Types of Numbers –
3. Integers: Integers is the set of all whole numbers along with negative numbers.
Composite Numbers: Composite numbers are those numbers which have other
factors besides 1 and itself i.e. it has more than 2 factors. Numbers which are not prime
are called as composite numbers.
Note: Except 1 any natural number can be classified as a prime or composite number.
Fractions:
A fraction denotes a part or parts of a unit. It is majorly classified into following types-
1. Proper Fractions: In a proper fraction the numerator is always less than the
denominator. Proper Fractions are always less than 1.
3. Mixed Fraction: A mixed fraction consists of two parts i.e. The fractions which
consist of two parts i.e. the integer part and a fractional part. All mixed fractions are
improper fractions.
2. Binary System
In decimal system the base (or radix) is 10, since any position can contain one of
ten digits, refer (3) above. The system therefore has a carrying factor of 10 and
each digit indicates a value which depends on the position it occupies, for example;
In 6421 the digit 6 signifies 6 x 1000
The decimal system uses ten digits to record the number. The ten digits are 0, 1, 2,
3, 4, 5, 6, 7, 8 and 9 and any number (used) is based upon power of 10.
Whereas decimal system uses ten digits to record the number, the binary system
uses only two digits (for recording the number) that is 0 and 1, and its base is 2
(whereas that of decimal system is 10). Although in everyday life, people generally
use the decimal number system for counting, it is more convenient to use the
binary number system in a computer because electronic components are usually in
one of two states, which can be used to represent 0 and 1, the two digits used in the
binary system.
To elaborate it further:
The computer does not have a large number of symbols for representing data. It
has only two, 0 and 1 (called binary digits or bits). These correspond to the two
electronic or magnetic states used in computer circuits and storage.
For example if a punched paper tape is used in the computer, a hole in a tape may
allow electrical contact to be made (ON) and the absence of a hole in the tape does
not allow electrical contact to be made (OFF). Therefore a hole can represent 1 and
no hole can represent 0. Binary system is more compact than the decimal system of
coding as the latter will need large size of the storage medium and relative
complexity of the reading device.
ADVERTISEMENTS:
The octal system (base 8) and hexadecimal system (base 16) are of importance
because they can be used as a shorthand for binary numbers. This is because three
binary digits can be represented by the numbers 0 to 7 i.e., the octal range, while
four binary digits can be represented by the numbers 0 to 9 and A to F.
The formatting toolbar is a toolbar that contains icons on it as shown below. Each of
the icons has a specific purpose that can change the outlook of your document text
when you apply to it.
The formatting toolbar is designed to apply many effects of text. Here is the list of
icons and it function:
Icon Function
Allows you to define a group of paragraph and character formats as a style,
Style Menu
and then the styles in a style sheet.
Click the arrowhead to the right of the font name box to view the list of fonts
Font Menu
available. Scroll down to the font you want and click once to select it.
Click on the white part of the font size box to enter a value for the font size or
click the arrowhead to the right of the box to view a list of font sizes
Font Size
available. Select a size by clicking on it once. A font size of 10 or 12 is best
for paragraphs of text.
Font Style Use these buttons to bold, italic and underline the selected text.
Text can be aligned to the left, center, or right side of the page or it can be
Alignment
justified and distributed across the page.
Line Spacing Allows you to set the amount of space between one line to another line.
Numbering and It is used to set-off and emphasize sections of text and are presented by dots
Bullets or numbers.
Increase/Decrease
Change the indentation of a paragraph in relation to the side of the page.
Indent
Outside Border Add a border around selected text.
Use this option to change the color behind a selected text. The color shown
Highlight on the button is the last color used. To select a different color, click the
arrowhead next to the button.
This option changes the color of the text. The color shown on the button is
Font Color the last color chosen. Click the arrowhead next to the button to select another
color.
Editing Tools
The editing toolbar is displayed where content can be added or edited in course sites, and
provides access to commonly used functions such as:
Format text.
Insert/edit an image.
Insert/edit a link.
Paste content.
Insert an emoticon.
View and edit HTML.
Page preview.
Techopedia explains Mail Merge
Mail merge primarily enables automating the process of sending bulk mail to customers,
subscribers or general individuals. Mail merge works when a data file is stored that includes the
information of the recipients to whom the letter is to be sent. This file can be a spreadsheet or
database file containing separate fields for each different type of information to be merged within
the letter.
The second file is the word document or the letter template. The recipients' information on the
letter template is kept empty. When the mail merge process is initiated, the recipients' data from
spreadsheet or database is fetched and placed within the empty field in the letter, one by one,
until all letters are created.
Watermarks are normally used to prevent counterfeiting. Documents shared over the
internet have the tendency to be counterfeited and altered as it gets downloaded over
the internet. However, what watermarking does is to prevent or make it difficult for
people to use these documents as their own. Watermarking cannot be removed except
by the original owner and this is why it has proven to be effective against counterfeiting.
It is important to note that Microsoft® Word has some in-built watermarks that can be
chosen. For instance, the in-built watermarks options include draft, confidential and
other functionalities. Understanding what is watermark in MS Word is the first step to
knowing how to insert it in Word. It is easy to insert watermarks as it takes some few
steps.
It is important to note that watermarks can be inserted in all pages of a word document
all at once. The following steps shows how watermark can be inserted in Word
documents.
Microsoft Word comes with a very useful tool to aid you in referencing various publications correctly.
Here is a brief tutorial to help to understand the basics.
The reference tool is found under the reference tab at the top of the screen (A)
First, we need to input the details of the publications you wish to reference. To do this, you need to
press the manage sources button (B). This will bring up the source manager screen. By hitting the NEW
button, you can add the details of whichever type of publication you wish.
The following example shows a fictional journal article (the drop down box allows you to pick the type of
publication);
Once you have input all of your references, you need to hit the COPY button to make them active in your
current document. You can then enter a citation into the body of your essay by using the ‘Insert Citation’
Button (C) which will then allow you to pick your source. E.g. (Writer, 2011)
At the end of your essay, you can easily insert a full bibliography of all of your cited texts with the
‘Bibliography’ button (D). Click on the bibliography, and it will be printed like so;
Bibliography Writer, A. (2011). Referencing in Microsoft Word. Hull University Disability Services, 1.
The referencing tool has more features besides, so experiment and see if there is anything else you
would find useful!
Data Types
Six logical operators are available in Excel. The following table explains what each of them does and
illustrates the theory with formula examples.
Formula
Condition Operator Description
Example
Greater than or The formula returns TRUE if a value in cell A1 is greater than
>= =A1>=B1
equal to or equal to the values in cell B1; FALSE otherwise.
Less than or The formula returns TRUE if a value in cell A1 is less than or
<= =A1<=B1
equal to equal to the values in cell B1; FALSE otherwise.
The screenshot below demonstrates the results returned by Equal to, Not equal to, Greater than and Less than
logical operators:
SUM
your Sum formula should include at least 1 number,
reference to a cell or a range of cells. For example:
=SUM(A2:A6) - adds up values in cells A2 through A6.
=SUM(A2, A6) - adds up values in cells A2 and A6.
- adds up values in cells A2 through A6, and then
=SUM(A2:A6)/5
divides the sum by 5.
In your Excel worksheets, the formulas may look something
similar to this:
AVERAGE
Sums values in cells A2 through A6, and then divides the
result by 5. And what do you call adding up a group of
numbers and then dividing the sum by the count of those
numbers? Yep, an average!
So, instead of typing =SUM(A2:A6)/5, you can simply
put =AVERAGE(A2:A6)
=MIN(A2:A6)
COUNT & COUNTA
COUNT function deals only with those cells that contain numbers, the Excel COUNTA function
counts all cells that are not blank, whether they contain numbers, dates, times, text, logical values
of TRUE and FALSE, errors or empty text strings (""):
IF
In simple terms, you use an IF formula to ask Excel to test a certain condition and return one value
or perform one calculation if the condition is met, and another value or calculation if the condition is
not met:
TRIM
It will eliminate all extra spaces in cells but a single space character between words
LEN
Whenever you want to know the number of characters in a
certain cell, LEN is the function to use:
AND & OR
These are the two most popular logical functions to check
multiple criteria. The difference is how they do this:
AND returns TRUE if all of the conditions are met, FALSE
otherwise.
OR returns TRUE if any of the conditions is met, FALSE
otherwise.
CONCATENATE
In case you want to take values from two or more cells and
combine them into one cell, use the concatenate operator (&)
or the CONCATENATE function:
Absolute references
There may be times when you do not want a cell reference to change when
filling cells. Unlike relative references, absolute references do not change
when copied or filled. You can use an absolute reference to keep a row and/or
column constant.
The hardware is nothing but the actual computer system which is used for keeping and
accessing database and DBMS hardware has the secondary storage devices like the hard
disks, database machines. These secondary storage devices are designed specifically to
support the database.
Software is the actual DBMS and between the actual stored data and the users of the
system there is a presence of a layer of software called DBMS. It can control the access
and can maintain the consistency of the information.
The most vital component of the DBMS environment is none other than the data from
the user point of view. It acts as a machine between the machine components and the
user components, database should contain all the data needed by the organization i.e.
user.
Well, user can access the data on demand by using the applications and interfaces
provided by the database management system
Hierarchical Model
Network Model
Entity-relationship Model
Relational Model
Hierarchical Model
This database model organises data into a tree-like-structure, with a single root, to
which all the other data is linked. The heirarchy starts from the Root data, and expands
like a tree, adding child nodes to the parent nodes.
In this model, a child node will only have a single parent node.
This model efficiently describes many real-world relationships like index of a book,
recipes etc.
In hierarchical model, data is organised into tree-like structure with one one-to-many
relationship between two different types of data, for example, one department can have
many courses, many professors and of-course many students.
Network Model
This is an extension of the Hierarchical model. In this model data is organised more like
a graph, and are allowed to have more than one parent node.
In this database model data is more related as more relationships are established in this
database model. Also, as the data is more related, hence accessing the data is also
easier and fast. This database model was used to map many-to-many data
relationships.
This was the most widely used database model, before Relational Model was
introduced.
Entity-relationship Model
In this database model, relationships are created by dividing object of interest into entity
and its characteristics into attributes.
E-R Models are defined to represent the relationships into pictorial form to make it
easier for different stakeholders to understand.
This model is good to design a database, which can then be turned into tables in
relational model(explained below).
Let's take an example, If we have to design a School Database, then Student will be
anentity with attributes name, age, address etc. As Address is generally complex, it
can be another entity with attributes street name, pincode, city etc, and there will be a
relationship between them.
Relationships can also be of different types. To learn about E-R Diagrams in details,
click on the link.
Relational Model
In this model, data is organised in two-dimensional tables and the relationship is
maintained by storing a common field.
This model was introduced by E.F Codd in 1970, and since then it has been the most
widely used database model, infact, we can say the only database model used around
the world.
The basic structure of data in the relational model is tables. All the information related to
a particular type is stored in rows of that table.
In the coming tutorials we will learn how to design tables, normalize them to reduce data
redundancy and how to use Structured Query language to access data from tables.
Following are some of important functions of an operating System.
Memory Management
Memory management refers to management of Primary Memory or Main Memory.
Main memory is a large array of words or bytes where each word or byte has its own
address.
Main memory provides a fast storage that can be accessed directly by the CPU. For a
program to be executed, it must in the main memory. An Operating System does the
following activities for memory management −
Keeps tracks of primary memory, i.e., what part of it are in use by whom, what part are not in
use.
In multiprogramming, the OS decides which process will get memory when and how much.
De-allocates the memory when a process no longer needs it or has been terminated.
Processor Management
In multiprogramming environment, the OS decides which process gets the processor
when and for how much time. This function is called process scheduling. An
Operating System does the following activities for processor management −
Keeps tracks of processor and status of process. The program responsible for this task is
known as traffic controller.
Device Management
An Operating System manages device communication via their respective drivers. It
does the following activities for device management −
Keeps tracks of all devices. Program responsible for this task is known as the I/O
controller.
Decides which process gets the device when and for how much time.
De-allocates devices.
File Management
A file system is normally organized into directories for easy navigation and usage.
These directories may contain files and other directions.
An Operating System does the following activities for file management −
Keeps track of information, location, uses, status etc. The collective facilities are often
known as file system.
Control over system performance − Recording delays between request for a service and
response from the system.
Job accounting − Keeping track of time and resources used by various jobs and users.
Error detecting aids − Production of dumps, traces, error messages, and other debugging
and error detecting aids.
The user of a batch operating system never directly interacts with the computer. In
this type of OS, every user prepares his or her job on an offline device like a punch
card and submit it to the computer operator.
Real time OS
A real time operating system time interval to process and respond to inputs is very
small. Examples: Military Software Systems, Space Software Systems.
Distributed Operating System
Distributed systems use many processors located in different machines to provide
very fast computation to its users.
Mobile OS
Mobile operating systems are those OS which is especially that are designed to power
smartphones, tablets, and wearables devices.
Some most famous mobile operating systems are Android and iOS, but others include
BlackBerry, Web, and watchOS.
An IT network connects all your devices, plus other peripheral equipment such as
printers
To build a network you will need a range of equipment including the following:
Cables and connectors. These link together the computers, printers, servers and other
equipment on your network.
A router. This manages network traffic, ensuring devices can communicate with each other
via both wired and wireless connections, and provides internet connectivity.
A wireless access point (optional). This will extend your wireless network if the router is
incapable of offering coverage in certain parts of the building.
An internet connection. This could be a faster fibre connection or dedicated leased line.
A hardware firewall. This creates a secure barrier between your network and the internet,
blocking security threats. Networks sometimes include an on-site network server which runs
central applications, acts as an email server and provides file storage.
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbours for
each device.
1. A number of repeaters are used for Ring topology with large number of nodes,
because if someone wants to send some data to the last node in the ring
topology with 100 nodes, then the data will have to pass through 99 nodes to
reach the 100th node. Hence to prevent data loss repeaters are used in the
network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite
direction in them. Also, if one ring fails, the second ring can act as a backup, to
keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has
to pass through each node of the network, till the destination node.
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.
Features of Star Topology
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
1. Partial Mesh Topology : In this topology some of the systems are connected in
the same fashion as mesh topology but some devices are only connected to two
or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each
other.
1. Fully connected.
2. Robust.
3. Not flexible.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also
called hierarchical topology. It should at least have three levels to the hierarchy.
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For
example if in an office in one department ring topology is used and in another star
topology is used, connecting these topologies will result in Hybrid Topology (ring
topology and star topology).
Features of Hybrid Topology
1. Complex in design.
2. Costly.
Classification of memory
ROM ( Read Only Memory):
The first classification of memory is ROM. The data in this memory can only be
read, no writing is allowed. It is used to store permanent programs. It is a
nonvolatile type of memory. The classification of ROM memory is as follows:
Masked ROM
PROM
EPROM
EEPROM
a) Masked ROM: the program or data are permanently installed at the time of
manufacturing as per requirement. The data can not be altered. The process of
permanent recording is expensive but economic for large quantities.
b) PROM (Programmable Read Only Memory): The basic function is same
as that of masked ROM. but in PROM, we have fuse links. Depending upon the
bit pattern, the fuse can be burnt or kept intact. This job is performed by PROM
programmer.
To do this, it uses high current pulse between two lines. Because of high
current, the fuse will get burnt; effectively making two lines open. Once a
PROM is programmed we cannot change connections, only a facility provided
over masked ROM is, the user can load his program in it. The disadvantage is a
chance of regrowing of the fuse and changes the programmed data because of
aging.
a) SRAM (Static RAM): SRAM consists of the flip-flop; using either transistor
or MOS. for each bit we require one flip-flop. Bit status will remain as it is;
unless and until you perform next write operation or power supply is switched
off.
Advantages of SRAM:
Fast memory (less access time)
Refreshing circuit is not required.
Disadvantages of SRAM:
Further, this act amended the Indian Penal Code 1860, the
Indian Evidence Act 1872, the Bankers’ Books Evidence Act 1891,
and the Reserve Bank of India Act 1934. The objectives of the Act are
as follows:
i. Grant legal recognition to all transactions done via electronic
exchange of data or other electronic means of communication or e-
commerce, in place of the earlier paper-based method of
communication.
ii. Give legal recognition to digital signatures for the authentication of
any information or matters requiring legal authentication
iii. Facilitate the electronic filing of documents with Government
agencies and also departments
iv. Facilitate the electronic storage of data
v. Give legal sanction and also facilitate the electronic transfer of funds
betweenbanks and financial institutions
vi. Grant legal recognition to bankers under the Evidence Act, 1891 and
theReserve Bank of India Act, 1934, for keeping the books of
accounts in electronic form.
Section 1 (2) along with Section 75, specifies that the Act is applicable
to any offence or contravention committed outside India as well. If the
conduct of person constituting the offence involves a computer or a
computerized system or network located in India, then irrespective of
his/her nationality, the person is punishable under the Act.
Lack of international cooperation is the only limitation of
this provision.
Non-Applicability
Whether you are using it to run applications that share photos to millions of mobile users or to
support business critical operations, a cloud services platform provides rapid access to flexible and
low cost IT resources. With cloud computing, you don’t need to make large upfront investments in
hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can
provision exactly the right type and size of computing resources you need to power your newest idea
or operate your IT department. You can access as many resources as you need, almost instantly,
and only pay for what you use.
Data Transformation − Involves converting the data from legacy format to warehouse
format.
Definition: In simple words, data mining is defined as a process used to extract usable data from a larger
set of any raw data. It implies analysing data patterns in large batches of data using one or more
software. Data mining has applications in multiple fields, like science and research. As an application of
data mining, businesses can learn more about their customers and develop more effective strategies
related to various business functions and in turn leverage resources in a more optimal and insightful
manner. This helps businesses be closer to their objective and make better decisions. Data mining
involves effective data collection and warehousing as well as computer processing. For segmenting the
data and evaluating the probability of future events, data mining uses sophisticated mathematical
algorithms. Data mining is also known as Knowledge Discovery in Data (KDD).
• Clustering based on finding and visually documented groups of facts not previously known.
The Data Mining Process: Technological Infrastructure Required: 1. Database Size: For creating a more
powerful system more data is required to processed and maintained. 2. Query complexity: For querying
or processing more complex queries and the greater the number of queries, the more powerful system
is required. Uses: 1. Data mining techniques are useful in many research projects, including
mathematics, cybernetics, genetics and marketing. 2. With data mining, a retailer could manage and use
point-of-sale records of customer purchases to send targeted promotions based on an individual’s
purchase history. The retailer could also develop products and promotions to appeal to specific
customer segments based on mining demographic data from comment or warranty cards.