INTRO TO ICTs PDF
INTRO TO ICTs PDF
INTRO TO ICTs PDF
com
INTRODUCTION TO
COMPUTERS
[email protected]
INTRODUCTION TO COMPUTERS
CONTENTS PAGE
HARDWARE ............................................................................................... 2
SOFTWARE............................................................................................. 84
[email protected] 1
INTRODUCTION TO COMPUTERS
HARDWARE
COMPUTER
An electronic machine that works under the control of stored programs to accept process
& output data/information for use by the operator.
A device that accepts data, processes the data in accordance with a stored program,
generates results, and usually consists of input, output, storage, and arithmetic, logic, and
control units.
A functional unit that can perform substantial computation, including numerous
arithmetic operations or logic operations, without human intervention during a run.
It is an electronic device/machine that accepts data (raw facts & figures) as input and
processes (works on it) to produce information (data converted to meaningful form) as
output.
*HARDWARE*
*SOFTWARE*
Refers to the intangible computer components, which are the programs or instructions of
the computer.
Is a set of instructions or programs instructing a computer to do specific tasks.
_Software is a generic term used to describe computer programs_
Scripts, applications, programs and a set of instructions are the terms often used to
describe software.
Everything that a computer does, it acts under instructions written out as computer
programs.
[email protected] 2
INTRODUCTION TO COMPUTERS
The hardware needs these instructions to function
*NB* _Software alone is useless, so is the hardware. The two are inseparable_
*FIRMWARE*
_Firmware was originally designed for high level software and could be changed without
having to exchange the hardware for a newer device. Firmware also retains the basic
instructions for hardware devices that make them operative. Without firmware, a
hardware device would be non-functional_
*PERIPHERAL DEVICES*
These are devices that are external (not part of the computer) but can be connected to a
computer.
They are not essential for the functioning of the computer but can be connected to the
computer for specific reasons.
Examples are: _scanners, modems, printers, speakers, digital cameras, etc._
*FUNCTIONS OF A COMPUTER*
*Input (Data)*
o The computer accepts data from outside for processing. Input is the raw
information entered into a computer from the input devices.
[email protected] 3
INTRODUCTION TO COMPUTERS
o Transferring of information into the system. This may be through a user
input device - i.e. keyboard, mouse, scanner etc.. Or though previously
loaded software/program, cd etc.
*Processing*
o The computer performs operations on the data that it holds internally.
o Processing is the operation of data as per given instruction.
o It is totally internal process of the computer system.
o This is where the computer actually does the 'work' - manipulating and
controlling data over the entire system.
*Output*
o The computer produces information for external use.
o Output is the processed data given by computer after data processing. Output is
also called as Result.
o Output is the exact opposite of input.
o Output is the function that allows a computer to display information, from
the system, for the user.
o This can be accomplished through the monitor (or other graphical
display), printer, speakers etc.
*Storage*
o The computer stores data before, during and after processing.
o We can save results of processing in the storage devices for the future use.
o Most computers are able to store data both temporarily (in order to
process), but also long-term (i.e., permanently).
o Storage takes place on hard-drives or external storage devices.
*Communication*
o The computer can send or receive data to or from other computers when it is
connected on a network
[email protected] 4
INTRODUCTION TO COMPUTERS
HARDWARE VS SOFTWARE
HARDWARE SOFTWARE
Hardware starts functioning once software To deliver its set of instructions, Software is
is loaded. installed on hardware.
[email protected] 5
INTRODUCTION TO COMPUTERS
HARDWARE SOFTWARE
Physical parts of the computer are A set of instructions given to the
called hardware. computer is called software.
You can touch, see and feel You cannot touch and feel
hardware. software.
Hardware is constructed using Software is developed by writing
physical materials or components. instructions in programming
Computer is hardware, which language.
operates under the control of a The operations of computer are
software. controlled through software.
If hardware is damaged, it is If software is damaged or
replaced with new one. corrupted, its backup copy can be
Hardware is not affected by reinstalled.
computer viruses. Software is affected by computer
Hardware cannot be transferred viruses.
from one place to another Software can be transferred from
electronically through network. one lace to another electronically
User cannot make new duplicate through network.
copies of the hardware. User can make many new
duplicate copies of the software.
[email protected] 6
INTRODUCTION TO COMPUTERS
[email protected] 7
INTRODUCTION TO COMPUTERS
*INPUT UNIT*
It accepts (or reads) the list of instructions and data from the outside world.
It converts these instructions and data in computer acceptable format.
It supplies the converted instructions and data to the computer system for further
processing.
*OUTPUT UNIT*
1. It accepts the results produced by the computer which are in coded form and hence
cannot be easily understood by us.
[email protected] 8
INTRODUCTION TO COMPUTERS
2. It converts these coded results to human acceptable (readable) form.
3. It supplied the converted results to the outside world.
*REGISTERS*.
*STORAGE UNIT*
1. All the data to be processed and the instruction required for processing (received from
input devices).
2. Intermediate results of processing.
3. Final results of processing before these results are released to an output device.
The CPU processes instructions it receives in the process of decoding data. In processing this
data, the CPU performs four basic steps:
1. Fetch Each instruction is stored in memory and has its own address. The processor takes
this address number from the program counter, which is responsible for tracking which
instructions the CPU should execute next.
2. Decode All programs to be executed are translated to into Assembly instructions.
Assembly code must be decoded into binary instructions, which are understandable to
your CPU. This step is called decoding.
3. Execute While executing instructions the CPU can do one of three things: Do
calculations with its ALU, move data from one memory location to another, or jump to a
different address.
4. Store The CPU must give feedback after executing an instruction and the output data is
written to the memory.
An arithmetic logic unit (ALU) is a major component of the central processing unit of a
computer system. It does all processes related to arithmetic and logic operations that need
to be done on instruction words. In some microprocessor architectures, the ALU is
divided into the arithmetic unit (AU) and the logic unit (LU).
[email protected] 9
INTRODUCTION TO COMPUTERS
*Logical Operations*: These include AND, OR, NOT, XOR, NOR, NAND, etc.
*Bit-Shifting Operations*: This pertains to shifting the positions of the bits by a
certain number of places to the right or left, which is considered a multiplication
operation.
*Arithmetic Operations*: This refers to bit addition and subtraction. Although
multiplication and division are sometimes used, these operations are more
expensive to make. Addition can be used to substitute for multiplication and
subtraction for division.
*CONTROL UNIT*
A control unit (CU) handles all processor control signals. It directs all input and output flow,
fetches code for instructions from microprograms and directs other units and models by providing
control and timing signals. A CU component is considered the processor brain because it issues
orders to just about everything and ensures correct instruction execution.
[email protected] 10
INTRODUCTION TO COMPUTERS
The memory devices used for primary The secondary memory devices are
memory are semiconductor memories magnetic and optical memories.
These memories are also called as internal These memories are also called as external
memory memory
[email protected] 11
INTRODUCTION TO COMPUTERS
CLASSIFICATION OF COMPUTERS
*According to data handling, computers are analog, digital or hybrid*
*Analog Computer*
An analog computer is a form of computer that uses continuous physical
phenomena such as electrical, mechanical, or hydraulic quantities to model the
problem being solved
*Digital Computer*
A computer that performs calculations and logical operations with quantities
represented as digits, usually in the binary number system
1. Supercomputer
2. Mainframe Computer
3. Minicomputer
4. Microcomputer
[email protected] 12
INTRODUCTION TO COMPUTERS
*SUPERCOMPUTER*
The most powerful computers in terms of performance and data processing are the
Supercomputers. These are specialized and task specific computers used by large
organizations. These computers are used for research and exploration purposes, like
NASA uses supercomputers for launching space shuttles, controlling them and for
space exploration purpose.
The supercomputers are very expensive and very large in size. It can be
accommodated in large air-conditioned rooms; some super computers can span an
entire building.
*Uses Of Supercomputers*
Space Exploration
Earthquake studies
Weather Forecasting
Nuclear weapons testing
*MAINFRAME COMPUTER*
Although Mainframes are not as powerful as supercomputers, but certainly they are
quite expensive nonetheless, and many large firms & government organizations uses
Mainframes to run their business operations.
The Mainframe computers can be accommodated in large air-conditioned rooms
because of its size.
Super-computers are the fastest computers with large data storage capacity,
Mainframes can also process & store large amount of data.
Banks educational institutions & insurance companies use mainframe computers to
store data about their customers, students & insurance policy holders.
*MINICOMPUTER*
*MICROCOMPUTER*
Desktop computers, laptops, personal digital assistant (PDA), tablets & smartphones
are all types of microcomputers.
[email protected] 13
INTRODUCTION TO COMPUTERS
The micro-computers are widely used & the fastest growing computers.
These computers are the cheapest among the other three types of computers.
The Micro-computers are specially designed for general usage like entertainment,
education and work purposes.
Well known manufacturers of Micro-computer are Dell, Apple, Samsung, Sony &
Toshiba.
Desktop computers, Gaming consoles, Sound & Navigation system of a car,
Netbooks, Notebooks, PDA’s, Tablet PC’s, Smartphones, Calculators are all type of
Microcomputers.
*The main differences among the above computer types are in*:
Processing speed,
Memory capacity
Number and capabilities or peripheral devices that can be attached to the
computer
Usage.
*COMPUTER APPLICATIONS*
a) Business- for administration, payroll and accounting.
b) Government- keeping database records.
c) Education- Record keeping, accounting and training in the classroom.
d) Health- Record keeping, life-support systems.
e) Sport- fitness monitoring.
f) Art and Design- desktop Publishing, technical graphics, Computer Aided Design.
g) Homes- PCs for home accounts, games, e-mail, online shopping, home education etc.
h) Banks- Record keeping and updating, on-line Automated Teller Machines (ATMs).
i) Supermarkets- Electronic point Of Sale Machines (EPOS) – tills.
1. *COST*; how much can I afford to pay for a computer? Prices of personal
computers range from a few hundred to thousands of dollars. Faster and more
feature-rich PCs are usually more expensive.
2. *AREA OF USE*; where will my new PC be used? If you will be using it only in
your home or office, a desktop computer will be suitable. However, if you will need
to take it with you, you should consider purchasing a laptop (notebook) computer.
[email protected] 14
INTRODUCTION TO COMPUTERS
example, will you use your PC to prepare letters and reports? Analyze numeric and
financial data? Prepare visual presentations? Access the Internet? Listen to music?
Create and work with graphics?
4. *DURATION*; How long will I keep this computer?Try to estimate the length of
time (years) you will use your computerbefore BUYING the next one. If you expect
use your PC for several years or if you think you may later want to add new
applications, CONSIDER one that is expandable, so you can add new components,
such as a modem, printer, or add-on boards. Make sure the PC has expansion slots so
you can connect these devices to your PC.
9. *MAIN MEMORY* (RAM). Main memory (RAM) is needed for the temporary
storage of programs and data while the data is being processed. Some application
software requires a considerable amount of RAM to function properly, and newer
software versions usually require more RAM than older versions. Typical PCs now
come with 2 gigabytes (GB), 5GB, or more of RAM. Make certain the PC has
sufficient RAM to run the software you will be using.
[email protected] 15
INTRODUCTION TO COMPUTERS
10. *SECONDARY STORAGE* (ROM). What type(s) and amounts of secondary
storage are you likely to need? Typical computers come with a floppy disk drive, cd
drive, USB port/ drive and a hard disk drive already installed. A hard disk drive
contains one or more rigid storage platters and provides for the permanent storage of
considerably more data. However, the disk itself cannot be removed from the drive.
11. *PORTS*. The number of ports (slots) available inside the system unit determines
the number of add-on boards that can be installed inside the system unit. For
example, you cannot connect a printer to your computer unless your computer is
equipped with an appropriate port (slot).
12. *INPUT DEVICES*. Typical input devices are a keyboard and a mouse, although
other kinds of input devices are available.
13. *OUTPUT DEVICES*. Output devices produce output in either soft copy or hard
copy form. Most PCs come with a monitor (for soft copy output), but you may have
to purchase a hard copy device, such as a printer, separately.
14. *MONITORS*.
Resolution refers to the clarity of the text and images being displayed. Before
making a purchase, carefully evaluate the monitor’s resolution.
Monitor size is another important consideration.
DATA PROCESSING
DATA
Data is raw information
a collection of facts from which conclusions may be drawn; "statistical data"
INFORMATION
Data that has been processed to add or create meaning and hopefully knowledge
for the person who receives it. Information is the output of information systems.
Organized data which is understood to have significance and meaning
DATA PROCESSING
Used specifically, data processing may refer to a discrete step in the information processing cycle
in which data is acquired, entered, validated, processed, stored, and output, either in response to
queries or in the form of routine reports; the processing is the step that organizes the information
in order to form the desired output. Used in a more general sense, data processing may also refer
to the act of recording or otherwise handling one or more sets of data, and is often performed with
the use of computers. The word data is commonly used to mean “information” and often suggests
[email protected] 16
INTRODUCTION TO COMPUTERS
large amounts of information in a standardized format. Data may consist of letters, numbers,
equations, dates, images, and other material, but does not usually include entire words.
Data is processed to get the required results. Different operations may be performed on
data. Therefore, data processing is defined as:
"A sequence of operations on data to convert it into useful information is called data
processing". The important operations that can be performed on data are:
In manual data processing, data is processed manually without using any machine or
tool to get required results. In manual data processing, all the calculations and logical
operations are performed manually on the data. Similarly, data is transferred manually
from one place to another. This method of data processing is very slow and errors may
occur in the output. Mostly, is processed manually in many small business firms as well
as government offices & institutions. In an educational institute, for example, marks
sheets, fee receipts, and other financial calculations (or transactions) are performed by
hand. This method is avoided as far as possible because of the very high probability of
error, labor intensive and very time consuming. This type of data processing forms the
very primitive stage when technology was not available or it was not affordable. With the
advancement in technology the dependency on manual methods has drastically
decreased.
In manual data processing, data is processed manually without using any machine or tool
to get required result. In manual data processing, all the calculations and logical
operations are manually performed on the data. Similarly, data is manually transferred
from one place to another. This method of data processing is very slow and errors may
occur in the output.
In Zimbabwe, data is still processed manually in many small business firms as well as
government offices & institutions.
[email protected] 17
INTRODUCTION TO COMPUTERS
All the calculations on data are performed manually. This is a slow method and errors
may occur. This is an old method. It was used before the invention of calculators. But
data is still processed manually in many small shops.
Example: A book seller (a small book shop) records his daily transactions manually. He
prepares bills by pen, paper and carbon paper (no doubt, brain is the main data processor
in this case). At the end of day he will use carbon copies made on a particular date to
know how many books he sold and how much income he got.
In mechanical data processing method, data is processed by using different devices like
typewriters, mechanical printers or other mechanical devices. This method of data
processing is faster and more accurate than manual data processing. These are faster than
the manual mode but still forms the early stages of data processing. With invention and
evolution of more complex machines with better computing power this type of processing
also started fading away. Examination boards and printing press use mechanical data
processing devices frequently.
In mechanical data processing, data is processed by using different tools like calculators
or other mechanical devices. This method of data processing is faster and more accurate
than manual data processing.
Mechanical data processing is more accurate than manual. Calculators, computer
programs and other devices are used on the data however someone still has to step in
between operations.
[email protected] 18
INTRODUCTION TO COMPUTERS
In mechanical data processing data is processed with the help of devices or machines.
These machines that help the people in data processing may be calculators and type
writers etc. Obviously, this method is faster easier and more accurate than manual data
processing.
Example: Book seller can use a calculator to speed up his data processing system. There
will be a less chance of errors in calculations. Bill calculations will be much more faster
with a calculator and easier too.
It is the modern technique to process data. The data is processed through computer. Data
and set of instructions are given to the computer as input and the computer automatically
processes the data according to the given set of instructions.
The computer is also known as electronic data processing machine. This method of
processing data is very fast and accurate. Now-a-days, the data is processed and analyzed
through computers. For example, the results of students are prepared through computer;
in banks accounts of customers are processed through computers etc.
It is the latest and fastest method of data processing. Data is processed with the help of
computer. First of all, data and set of instructions are given to the computer. Computer
gives output results after processing the data according to instructions. This method of
data processing is very fast and accurate. Electronic data processing is used in banks and
business firms, Government offices, colleges, schools, universities, businesses and other
institutes. Electronic data processing is being used in almost every field of life. Example:
Suppose there are 800 students in a college. There is a manual library system in this
college. If we want to know which students have not returned books since one year? We
will have to search registers for 800 students’ record. But computer can do this job within
seconds.
[email protected] 19
INTRODUCTION TO COMPUTERS
Electronic data processing or EDP is the modern technique to process data. The data is
processed through computer; Data and set of instructions are given to the computer as
input and the computer automatically processes the data according to the given set of
instructions. The computer is also known as electronic data processing machine.
This method of processing data is very fast and accurate. For example, in a computerized
education environment results of students are prepared through computer; in banks,
accounts of customers are maintained (or processed) through computers etc.
A. Batch Processing
Batch Processing is a method where the information to be organized is sorted into groups
to allow for efficient and sequential processing. Online Processing is a method that
utilizes Internet connections and equipment directly attached to a computer. It is used
mainly for information recording and research. Real-Time Processing is a technique that
has the ability to respond almost immediately to various signals in order to acquire and
process information. Distributed Processing is commonly utilized by remote workstations
connected to one big central workstation or server. ATMs are good examples of this data
processing method.
B. Online Processing
This is a method that utilizes Internet connections and equipment directly attached to a
computer. This allows for the data stored in one place and being used at altogether
different place. Cloud computing can be considered as a example which uses this type of
processing. It is used mainly for information recording and research.
[email protected] 20
INTRODUCTION TO COMPUTERS
C. Real-Time Processing
This technique has the ability to respond almost immediately to various signals in order
to acquire and process information. These involve high maintainance andupfront cost
attributed to very advanced technology and computing power. Time saved is maximum in
this case as the output is seen in real time. For example in banking transactions
Advantages
Disadvantages
D. Distributed Processing
This method is commonly utilized by remote workstations connected to one big central
workstation or server. ATMs are good examples of this data processing method. All the
end machines run on a fixed software located at a particular place and makes use of
exactly same information and sets of instruction.
[email protected] 21
INTRODUCTION TO COMPUTERS
Data collection
This is the first event in the cycle. This stage involves collection of data from the outside or also
from within the system. One can break this stage into three more stages, namely acquisition, data
entry and validation. Involves getting the data/facts needed for processing from the point of its
origin to the computer
.
Input
after the data has been acquired from the source, it is entered into the current system, upon which
the data is validated, so that correct results are given at the end of the cycle. The input devices are
many. The commonly used input devices are computer keyboard, bar code readers, scanners,
output from another system, etc. Data Input- the collected data is converted into machine-
readable form by an input device, and send into the machine
Processing
In this stage the computer processes the minutest details entered. This processing makes the data
entered usable. If the computer was not to process the data, it would not be of any use and it
[email protected] 22
INTRODUCTION TO COMPUTERS
would also be a big mess of data. For example, if the spreadsheet was not to process the data, then
the data in the spreadsheet would only be a mess of numbers. The spreadsheet is a program which
gives the data out back to the user in the usable form. The system used for processing, along with
the data entered will decide the kind of output, which the user will get. Processing is the
transformation of the input data to a more meaningful form (information) in the CPU
Output
If you have to look at the diagram of data/ information processing cycle, the step after processing
is the output stage. The processed information is now transmitted to the user. This stage can also
be further divided. After processing the data, there can be further interactive queries asked or
routine reports can be given. There are different forms in which the output can be given to the
user. There can be print report, which may be given to the user. The output can also be given in
the form of audio, video as well. In some cases, the results may only be displayed on the
computer monitor. Output is the production of the required information, which may be input in
future
Storage
After the data has been processed, along with the output to the user, the data is also stored.
Different computer storage devices can be used for the same. Some of the commonly used data
storage methods are disk storage, tertiary storage, etc. Storing the data also serves another
purpose. You will not have to repeat the entire cycle again. Often the storage is done in both
digital as well as hard copy format. At the same time, backup of the digital format is also
maintained, which can be retrieved in case of system crash.
The most important advantage of this cycle is that the information is processed quickly. At the
same time retrieving the data is an easy task as well. The processed information can further be
passed unto the next stage directly in case the need be. The necessary data is stored, which helps
in avoiding duplication of data as well as time.
Quality Commentary
Required
Relevant The information obtained and used should be needed for decision-making. it
doesn't matter how interesting it is. Businesses are often criticised for producing
too much information simply because their information systems can "do it". A
good way of ensuring relevance is to closely define the objectives of any
information reports. Another way to improve relevance is to produce information
that focuses on "exceptions" - e.g. problems, high or low values, where limits have
been exceeded.
Up-to-date Information needs to be timely if it is to be actioned. For example, the manager of
a large retail business needs daily information on how stores are performing,
which products are selling well (or not) so that immediate action can be taken. To
improve the speed with which information is produced, businesses usually need to
look at upgrading or replacing their information systems.
[email protected] 23
INTRODUCTION TO COMPUTERS
Accurate As far as possible, information should be free from errors (e.g. the figures add up;
data is allocated to the correct categories). The users of information should be
informed whenever assumptions or estimates have been used. Accruate
information is usually a function of accurate data collection. If information needs
to be extremely accurate, then more time needs to be allocated for it to be checked.
However, businesses need to guard against trying to produce "perfect" information
- it is often more important for the information to be up-to-date than perfect.
Meet the Users of information have different needs. The managing director doesn't have
needs of the time to trawl through thick printouts of each week's production or sales listings -
User he or she wants a summary of the key facts. The quality control supervisor will
want detailed information about quality testing results rather than a brief one-line
summary of how things are going. It is a good idea to encourage users to help
develop the style and format of information reporting that they require.
Easy to use Information should be clearly presented (e.g. use summaries, charts) and not too
and long. It also needs to be communicated using an appropriate medium (e.g. email,
understand printed report, presentation. Businesses should also consider developing
"templates" which are used consistently throughout the organisation - so that users
get used to seeing information in a similar style.
Worth the Often forgotten. Information costs money. Data is costly to collect, analyse and
cost report. Information takes time to read and assimilate. All users should question
whether the information they recieve/have requested is worthwhile
Reliable Information should come from authoritative sources. It is good practice to quote
the source used - whether it be internal or external sources. If estimates or
assumptions have been applied, these should be clearly stated and explained.
1) Valid
2) Fit for use
3) Accessible
4) Cost effective
5) Understandable
6) Time
COMPUTER EQUIPMENT
INPUT DEVICES:
Graphics Tablets
Cameras
Video Capture Hardware
Trackballs
Barcode reader
Digital camera
Gamepad
Joystick
Keyboard
Microphone
MIDI keyboard
Mouse (pointing device)
Scanner
[email protected] 24
INTRODUCTION TO COMPUTERS
Webcam
Touchpads
Pen Input
Microphone
Electronic Whiteboard
OMR
OCR
u) Punch card reader
v)MICR (Magnetic Ink character reader)
w) Magnetic Tape Drive
OUTPUT DEVICES:
Monitor (LED, LCD, CRT etc)
Printers (all types)
Plotters
Projector
LCD Projection Panels
Computer Output Microfilm (COM)
Speaker(s)
Head Phone
Visual Display Unit
Film Recorder
Microfiche
[email protected] 25
INTRODUCTION TO COMPUTERS
INPUT DEVICES
These are some devices that feed data into the computer for processing. Some examples
include:-
1. KEYBOARD
2. MOUSE
3. TRACKBALL
4. LIGHT PEN
5. TOUCH SCREEN
6. MODEM
7. SCANNER
8. MICROPHONE
9. BAR CODE READER
10. DIGITAL CAMERA
11. VIDEO DIGITISER
12. MAGNETIC INK CHARACTER RECOGNITION (MICR)
13. MAGNETC STRIPS OR STRIPES READER
14. KEY TO DISK
15. GRAPHICS TABLET
16. OCR
17. OMR
18. VOICE RECOGNITION SYSTEM
Following are few of the important input devices which are used in a computer:
KEYBOARD
Keyboard is the most common and very popular input device which helps in inputting
data to the computer. The layout of the keyboard is like that of traditional typewriter,
although there are some additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or
108 keys are also available for Windows and Internet.
[email protected] 26
INTRODUCTION TO COMPUTERS
Sr.No Keys Description
These keys include the letter keys (A-Z) and digit keys (0-9) which
1 Typing Keys
generally give same layout as that of typewriters.
It is used to enter numeric data or cursor movement. Generally, it
2 Numeric Keypad consists of a set of 17 keys that are laid out in the same configuration
used by most adding machines and calculators.
The twelve function keys are present on the keyboard which are
3 Function Keys arranged in a row at the top of the keyboard. Each function key has
unique meaning and is used for some specific purpose.
These keys provide cursor and screen control. It includes four
directional arrow keys. Control keys also include Home, End, Insert,
4 Control keys
Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt),
Escape(Esc).
Keyboard also contains some special purpose keys such as Enter,
5 Special Purpose Keys
Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen.
MOUSE
Mouse is most popular pointing device. It is a very famous cursor-control device having a
small palm size box with a round ball at its base which senses the movement of mouse
and sends corresponding signals to CPU when the mouse buttons are pressed.
Generally it has two buttons called left and right button and a wheel is present between
the buttons. Mouse can be used to control the position of cursor on screen, but it cannot
be used to enter text into the computer.
Advantages
Easy to use
Not very expensive
Moves the cursor faster than the arrow keys of keyboard.
[email protected] 27
INTRODUCTION TO COMPUTERS
JOYSTICK
Joystick is also a pointing device which is used to move cursor position on a monitor
screen. It is a stick having a spherical ball at its both lower and upper ends. The lower
spherical ball moves in a socket. The joystick can be moved in all four directions.
LIGHT PEN
Light pen is a pointing device which is similar to a pen. It is used to select a displayed
menu item or draw pictures on the monitor screen. It consists of a photocell and an
optical system placed in a small tube. When the tip of a light pen is moved over the
monitor screen and pen button is pressed, its photocell sensing element detects the screen
location and sends the corresponding signal to the CPU.
[email protected] 28
INTRODUCTION TO COMPUTERS
TRACK BALL
Track ball is an input device that is mostly used in notebook or laptop computer, instead
of a mouse. This is a ball which is half inserted and by moving fingers on ball, pointer
can be moved. Since the whole device is not moved, a track ball requires less space than
a mouse. A track ball comes in various shapes like a ball, a button and a square.
SCANNER
Scanner is an input device which works more like a photocopy machine. It is used when
some information is available on a paper and it is to be transferred to the hard disc of the
computer for further manipulation. Scanner captures images from the source which are
then converted into the digital form that can be stored on the disc. These images can be
edited before they are printed.
DIGITIZER
[email protected] 29
INTRODUCTION TO COMPUTERS
Digitizer is an input device which converts analog information into digital form. Digitizer
can convert a signal from the television or camera into a series of numbers that could be
stored in a computer. They can be used by the computer to create a picture of whatever
the camera had been pointed at. Digitizer is also known as Tablet or Graphics Tablet
because it converts graphics and pictorial data into binary inputs. A graphic tablet as
digitizer is used for doing fine works of drawing and image manipulation applications.
MICROPHONE
Microphone is an input device to input sound that is then stored in digital form. The
microphone is used for various applications like adding sound to a multimedia
presentation or for mixing music.
MICR input device is generally used in banks because of a large number of cheques to be
processed every day. The bank's code number and cheque number are printed on the
cheques with a special type of ink that contains particles of magnetic material that are
machine readable. This reading process is called Magnetic Ink Character Recognition
(MICR). The main advantage of MICR is that it is fast and less error prone.
[email protected] 30
INTRODUCTION TO COMPUTERS
OCR is an input device used to read a printed text. OCR scans text optically character by
character, converts them into a machine readable code and stores the text on the system
memory.
Bar Code Reader is a device used for reading bar coded data (data in form of light and
dark lines). Bar coded data is generally used in labeling goods, numbering the books etc.
It may be a hand held scanner or may be embedded in a stationary scanner. Bar Code
Reader scans a bar code image, converts it into an alphanumeric value which is then fed
to the computer to which bar code reader is connected.
A barcode reader, also called a price scanner or point-of-sale ( POS ) scanner, is a hand-held or
stationary input device used to capture and read information contained in a bar code . A barcode
reader consists of a scanner , a decoder (either built-in or external), and a cable used to connect
the reader with a computer. Because a barcode reader merely captures and translates the barcode
into numbers and/or letters, the data must be sent to a computer so that a software application can
make sense of the data. Barcode scanners can be connected to a computer through a serial port ,
keyboard port , or an interface device called a wedge . A barcode reader works by directing a
beam of light across the bar code and measuring the amount of light that is reflected back. (The
dark bars on a barcode reflect less light than the white spaces between them.) The scanner
converts the light energy into electrical energy, which is then converted into data by the decoder
and forwarded to a computer.
[email protected] 31
INTRODUCTION TO COMPUTERS
OMR is a special type of optical scanner used to recognize the type of mark made by pen
or pencil. It is used where one out of a few alternatives is to be selected and marked. It is
specially used for checking the answer sheets of examinations having multiple choice
questions.
Short for Optical Mark Reading or Optical Mark Recognition, OMR is the process of
gathering information from human beings by recognizing marks on a document. OMR is
accomplished by using a hardware device (scanner) that detects a reflection or limited
light transmittance on or through piece of paper.
OMR allows for the processing of hundreds or thousands of physical documents per hour.
For example, students may recall taking tests or surveys where they filled in bubbles on
paper (shown right) with pencil. Once the form had been completed, a teacher or teacher's
assistant would feed the cards into a system that grades or gathers information from them.
[email protected] 32
INTRODUCTION TO COMPUTERS
STYLUS
In computing, a stylus is a pen-shaped instrument used with graphics tablets or
devices that utilize touchscreen input. It is used to write or draw on a screen,
similar to how you would on a sheet of paper. Unlike a pen, styluses have a
plastic or felt tip depending on its purpose and functionality. The picture example
shows the Palm Z22 Stylus.
Which devices use a stylus?
Originally, the stylus was not commonly found or used with devices other than
graphics tablets and PDAs. However, with the rising popularity of touch screens
on mobile devices, many individuals like to use a stylus as a replacement for their
finger. The reasoning varies, but it's usually for more accurate navigation or to
keep oils from their fingers off of their device's screen.
PUNCH CARD
Early method of data storage used with early computers. Punch cards also known
as Hollerith cards and IBM cards are paper cards containing several punched
holes that were punched by hand or machine to represent data. These cards
allowed companies to store and access information by entering the card into the
computer. The picture is an example of a punch card.
Punch cards are known to be used as early as 1725 for controlling textile looms.
The cards were later used to store and search for information in 1832 by Semen
Korsakov. Later in 1890, Herman Hollerith developed a method for machines to
record and store information on punch cards to be used for the US census. He
later formed the company we know as IBM.
Punch cards were the primary method of storing and retrieving data in the early
1900s, and began being replaced by other methods in the 1960s and today are
rarely used.
[email protected] 33
INTRODUCTION TO COMPUTERS
TOUCHSCREEN
A touchscreen is a monitor or other flat surface with a sensitive panel directly on
the screen that registers the touch of a finger as an input. Instead of being touch-
sensitive, some touchscreens use beams across the screen to create a grid that
senses the presence of a finger.
A touchscreen allows the user to interact with a device without a mouse or
keyboard and is used with smartphones, tablets, computer screens, and
information kiosks.
How do you use the touchscreen?
Note: Not all touchscreens act the same, and any of the below actions may react
differently on your device.
Tap - A gentle touch or tap of the screen with a finger once to open an app or
select an object.
Double-tap - Depending on where you are a double-tap can have different
functions. For example, in a browser double-tapping the screen zooms into where
you double-tapped. Double-tapping text in a text editor selects a word or section
of words.
Touch and hold - Gently touching and holding your finger over an object selects
or highlights the object. For example, you could touch and hold an icon and then
drag it somewhere else on the screen or highlight text.
Drag - After you have touched and held anything on the screen while keeping the
your finger on the screen drag that object or highlight in any direction and then
lift your finger off of the screen to drop it in place or stop highlighting.
Swipe - Swiping your finger across the screen scrolls the screen in that direction.
For example, pressing the finger at the bottom of the screen and quickly moving it
up (swiping) scrolls the screen down.
Pinch - Placing two fingers on the screen and then pinching them together zooms
out and pinching your fingers together and then moving them away from each
other zooms into where you started.
[email protected] 34
INTRODUCTION TO COMPUTERS
WEBCAM
DIGITAL CAMERA
A digital camera is a camera that stores the pictures and video it takes in
electronic format instead of to film. The picture is of a Casio QV-R62, a 6.0 Mega
Pixel digital camera and example of a typical digital camera.
Note: A camera that is always connected to your computer with no storage could
also be referred to as a digital camera. However, it is more appropriate to refer to
this camera as a webcam.
Digital camera advantages
Below are key advantages that make digital cameras a popular choice when
compared to film cameras.
LCD screen
The LCD screen can show photos and videos after they have been taken, which
allows you to delete the photo if you do not like the results or show other people.
Storage
A digital camera can store hundreds of pictures instead of only up to 36 pictures.
Picture development
Digital camera pictures can be developed, but you can pick and choose what
pictures to develop instead of having to develop a full role of film with pictures
you don't want.
Size
Because a digital camera does not need a place for film a digital camera (not an
SLR) is much smaller and can easily be carried in your pocket or purse.
[email protected] 35
INTRODUCTION TO COMPUTERS
BIOMETRICS
When referring to computers and security, biometrics is the identification of a
person by the measurement of their biological features. For example, a user
identifying themselves to a computer or building by their finger print or voice is
considered a biometrics identification. When compared to a password, this type of
system is much more difficult to fake since it is unique to the person. Below is a
listing of all known biometric devices.
Other common methods of a biometrics scan are a person's face, hand, iris, and
retina.
Types of biometric devices
Face scanner - Biometric face scanners identify a person by taking measurements
of a person face. For example, the distance between the persons chin, eyes, nose,
and mouth. These types of scanners can be very secure assuming they are smart
enough to distinguish between a picture of a person and a real person.
Hand scanner - Like your finger print, the palm of your hand is also unique to
you. A biometric hand scanner will identify the person by the palm of their hand.
Finger scanner - Like the picture shown on this page a biometric finger scanner
identifies the person by their finger print. These can be a secure method of
identifying a person, however, cheap and less sophisticated finger print scanners
can be duped a number of ways. For example, in the show Myth Busters they
were able to fake a finger print using a Gummy Bear candy treat.
Retina or iris scanner - A biometric retina or iris scanner identifies a person by
scanning the iris or retina of their eyes. These scanners are more secure biometric
authentication schemes when compared to the other devices because there is no
known way to duplicate the retina or iris.
Voice scanner - Finally, a voice analysis scanner will mathematically break down
a person's voice to identify them. These scanners can help improve security but
with some less sophisticated scanners can be bypassed using a tape recording.
[email protected] 36
INTRODUCTION TO COMPUTERS
PADDLE
o More commonly known as a game paddle or gamepad, a paddle is an
input device commonly used with games that may contain various buttons
used to steer and utilize different options in a game. All console game
systems utilize a paddle or gamepad for control. The picture shows an
example of a game paddle used with the Atari 2600.
o The term paddle may also be used to describe various handheld devices
that are capable of controlling a function on a computer or electronic
device.
TOUCHPAD
Alternatively referred to as a glide pad, glide point, pressure sensitive tablet, or
trackpad, a touchpad is an inputdevice on laptops and some keyboards to move
a cursor with your finger. It can be used in place of an external mouse.
A touchpad is operated by using your finger and dragging it across the flat surface
of the touchpad. As you move your finger on the surface, the mouse cursor moves
in that same direction. Like most computer mice, the touchpad also has two
buttons below the touch surface that allows you to left-click or right-click.
[email protected] 37
INTRODUCTION TO COMPUTERS
MICR
Short for Magnetic-Ink Character Recognition, MICR is a font capable of
recognition using magnetically charged ink. Computers equipped with the right
hardware and software can print or read the character printed in such ink.
MICR font is commonly used to print checks, deposit slips, mortgage coupons,
etc. There are several MICR fonts, the MICR E-13B font is used in the Canada,
Panama, Puerto Rico, UK, and the United States. The MICR CRC-7 was created
according to the ISO standards and is a font used in France, Mexico, Spain, and
most other Spanish speaking countries.
LIGHT GUN
A light gun is a pointing input device that detects light using a photodiode in the
gun barrel. When the player of the game pulls the trigger on the gun, the screen is
blanked out for a fraction of a second, which allows the photodiode to determine
where the gun is pointed. Light guns were most widely used with early console
gaming systems such as the NES Zapper light gun, as shown in the picture. Using
this gun the player could play games where they were required to point the gun at
the screen and shoot targets, such as ducks in the popular Duck Hunt game.
[email protected] 38
INTRODUCTION TO COMPUTERS
GRAPHICS TABLET
Alternatively referred to as a drawing tablet and pen tablet, a graphics tablet is
a hardware input device that enables an artist to draw or sketch digitally using a
pen or stylus. They are helpful because they provide a more natural and precise
feel than a standard computer mouse. The picture to the right shows an example
of a Pen Graphics Tablet from Wacom.
Similar to an artist drawing with a pencil and paper, a user draws on the graphics
tablet with a stylus. The computer will convert the drawing strokes into digital
form, displaying them on the computer screen.
The graphics tablet can also be used to capture users' signatures. This use is
similar to the signature pads found at many retail stores, where you would write
your signature after using a credit card to make a purchase.
[email protected] 39
INTRODUCTION TO COMPUTERS
OUTPUT DEVICES
3D Printer
Braille embosser
Braille reader
Flat panel
GPS
Headphones
Computer Output Microfilm (COM)
Monitor
Plotter
Printer (Dot matrix printer, Inkjet printer, and Laser printer)
Projector
Sound card
Speakers
Speech-generating device (SGD)
TV
Video card
Buzzers
Motors
Switched outputs
Lights
Mechanical devices, eg a robot arm
Keep in mind that drives such as a CD-ROM, DVD, Floppy diskette drive, and USB
Flash drive may be capable of receiving information from the computer, but they are not
output devices. These are considered storage devices.
1. 3D PRINTER
Created by Charles Hull in 1984, the 3D printer is a printing device that creates a
physical object from a digital model using materials such as metal alloys,
polymers, or plastics.
An object's design typically begins in a computer aided design (CAD) software
system, where its blueprint is created. The blueprint is then sent from the CAD
system to the printer in a file format known as a Stereo lithography (STL), which
is typically used in CAD systems to design 3D objects. The printer then reads the
blueprint in cross-sections and begin the process of recreating the object just as it
appears in the computer aided design. In the picture below is an example of a 3D
printer called the FlashForge.
[email protected] 40
INTRODUCTION TO COMPUTERS
Application of 3D printers
3D printers are used in many disciplines--aerospace engineering, dentistry, archaeology,
biotechnology, and information systems are a few examples of industries that utilize
them. As an example, a 3D printer might be used in the field of archaeology to physically
reconstruct ancient artifacts that have been damaged over time, thus eliminating the
2. SPEAKER
Allows a user to hear sounds and music from the computer provided the system has
installed a sound card.
3. MODEM
An Input/ Output electronic device with circuits which changes data to be transmitted
from its machine form (digital form) into a form suitable for transmission over the
telephone line (analogue form). At the receiving end it converts data vice-versa. It is
only necessary when one needs to communicate information over a long distance and
when connected to the internet.
4. HEADPHONES
Headphones give sound output from the computer. They are similar to speakers,
except they are worn on the ears so only one person can hear the output at a time
5. SOUND CARD
[email protected] 41
INTRODUCTION TO COMPUTERS
The picture is an example of a sound card audio ports or audio jacks on the back of
your computer, associated colors, and the connector symbols.
Digital Out (White or Yellow; words: "Digital" or "Digital Out") - Used with
surround sound or loudspeakers.
Sound in or line in (Blue; Arrow pointing into waves) - Connection for external
audio sources, e.g. tape recorder, record player, or CD player.
Microphone or Mic (Pink; Microphone) - The connection for a microphone or
headphones.
Sound out or line out (Green; Arrow pointing out of waves) - The primary sound
connection for your speakers or headphones. This sound card also has a second
(black) and third (orange) sound out connector.
Firewire (Not pictured) - Used with some high-quality sound cards for digital
video cameras and other devices.
MIDI or joystick (15 pin yellow connector) - Used with earlier sound cards to
connect MIDI keyboard or joystick.
Tip: Usually the cables connecting to the devices are also color-coded and will match or
be close to the colors the cables connect into. For example, the end of the speakers cable
may have a green line or be completely green.
Games
Audio CDs and listening to music
Watch movies
Audio conferencing
Creating and playing Midi
Educational software
Business presentations
Record dictations
Voice recognition
[email protected] 42
INTRODUCTION TO COMPUTERS
6. PLOTTERS
A plotter is a computer hardware device much like a printer that is used for
printing vector graphics. Instead of toner, plotters use a pen, pencil, marker, or
another writing tool to draw multiple, continuous lines onto paper rather than
a series of dots like a traditional printer. Though once widely used for
computer-aided design, these devices have more or less been phased out by
wide-format printers. Plotters are used to produce a hard copy of schematics
and other similar applications.
A plotter can be used to produce high quality, accurate, A3 size or bigger drawings.
They are usually used for Computer Aided Design (CAD) and Computer Aided
Manufacture (CAM) applications such as printing out plans for houses or car parts.
Plotters:
How it works: A drum plotter prints by moving a pen sideways
over the surface of a sheet of paper.
One high precision motor moves the pen from side
to side.
Another high precision motor moves the paper
backwards and forwards.
An electromagnet lifts and drops different coloured
ink pens onto the paper to draw lines.
A flat-bed plotter uses two high precision motors, one to move the
pen in the X direction and one to move it in the Y direction.
The paper does not move.
Suitable uses: Plotters are restricted to line drawing and can only create a solid
region of colour by drawing a number of close, regular lines.
Plotters are often used in science and engineering applications for
drawing building plans, printed circuit boards and machine parts.
Advantages: They are accurate and can produce far larger printouts than
standard printers.
[email protected] 43
INTRODUCTION TO COMPUTERS
Disadvantages: Slow and relatively expensive compared to printers.
They cannot print raster (photographic) images.
They can only fill solid blocks of colour using closely hatched lines.
7. SPEAKER
A speaker gives you sound output from your computer. Some speakers are built
into the computer and some are separate
8. BRAILLE READER
A braille reader, also called a braille display, is an electronic device that allows
a blind person to read the text displayed on a computer monitor. The computer
sends the text to the output device, where it is converted to Braille and
"displayed" by raising rounded pins through a flat surface on the machine.
Braille readers come in various forms, including large units (about the size of a
computer keyboard) and smaller units, designed to work with laptops and tablet
computers. There are also Braille reader apps for smartphones and tablets that
work in conjunction with a Bluetooth-connected Braille output device.
9. VIDEO CARD
Alternatively known as a display adapter, graphics card, video adapter, video board,
or video controller, a video card is an IC or internal board that creates a picture on a
display.
[email protected] 44
INTRODUCTION TO COMPUTERS
Video card ports
The picture above is an example of a video card with three connections, or video ports,
on the back.
VGA connector
S-Video connector
DVI connector
In the past, VGA or SVGA was the most popular connection used with computer
monitors. Today, most flat panel displays use the DVI connector or HDMI connector (not
pictured above).
Video card expansion slots
In the picture above, the video card is inserted into the AGP expansion slot on the
computer motherboard. Over the development of computers, there have been
several types of expansion slots used for video cards. Today, the most common
expansion slot for video cards is PCIe, which replaced AGP, which replaced PCI,
which replaced ISA.
10. GPS
Short for Global Positioning System, GPS is a network of satellites that
helps users determine a location on Earth. The thought of GPS was conceived
after the launch of Sputnik in 1957. In 1964, the TRANSIT system became
operational on U.S. Polaris submarines and allowed for accurate positioning
updates. Later this became available for commercial use in 1967. The picture
shows an example of the GARMIN nuvi 350, a GPS used to find locations
while driving.
On September 1, 1983 Soviet jets shot down a civilian Korean Air Lines
Flight 007 flying from New York to Seoul and kill all 269 passengers and
crew. As a result of this mistake, President Ronald Regan orders the U.S.
military to make Global Positioning System (GPS) available for civilian use.
Today, with the right equipment or software, anyone can establish a
connection to these satellites to establish his or her location within 50 to 100
feet.
[email protected] 45
INTRODUCTION TO COMPUTERS
11. PROJECTOR
A projector is an output device that can take images generated by a computer and
reproduce them on a large, flat (usually lightly colored) surface. For example,
projectors are used in meetings to help ensure that all participants can view the
information being presented. The picture is that of a ViewSonic projector.
The VDU is output device. It displays images and text in colour or black and white as it.
It displays results of processing. It is also called a monitor.
The VDU serves as a graphical interface between the user and the computer. it
allows the user to see what he or she is doing in a comprehensive manner.
Flat-panel display
13. PRINTERS
It produces output on paper i.e. hard copy or on other print-key media. The 2 types of
printers are impact and non-impact.
Impact printers
The printing device being a series of pins have a direct impact on the paper. The pins form
characters on the paper by pressing a printing element and an inked ribbon against paper. An
[email protected] 46
INTRODUCTION TO COMPUTERS
example of such a printer is the Dot Matrix. The printers are reasonably fast, inexpensive and can
produce both text and graphics. They also accommodate various paper sizes but are however
noisy.
Non-impact printers
These are quieter printers and examples include LaserJet and inkjet printers. The Laser printers
are a more popular choice for business use. They use a printing technique similar to that used in a
photocopying machine. A laser beam is used to form an image onto the paper using toner. The
print quality is high. Lasers are fast, and quiet. They print graphics but are more expensive.
The ink-jet printers are mainly colour printers which mix ink depending on the image colour and
spray it onto the paper. The toner has the 4 basic colours. They are slow, expensive and have a
high print quality.
[email protected] 47
INTRODUCTION TO COMPUTERS
They are reliable because they have less moving parts
See above [non impact section]
NON-IMPACT PRINTERS
1 - LASER PRINTERS:
How it works: These print individual pages and work in a
similar way to photocopiers.
A drum is charged to match the image and
powdered ink (toner) sticks to the
surface. The toner is then transferred to the
paper and fixed by heat and pressure.
A school or business printer would have a
typical speed of 10 to 20 pages per minute
(ppm).
Suitable uses: Common wherever fast, high quality printing is required.
Disadvantages: Non-colour laser printers are more expensive than ink-jet printers
(but the difference is narrowing).
Colour laser printers are considerably more expensive. (but their speed
and high quality output means they are becoming more popular).
Advantages: They are quiet and fast and produce high quality printouts.
Running cost are low because although toner cartridges are expensive
to replace, they last a long time.
A type of printer that utilizes a laser beam to produce an image on a drum. The light of the laser
alters the electrical charge on the drum wherever it hits. The drum is then rolled through a
reservoir of toner, which is picked up by the charged portions of the drum. Finally, the toner is
transferred to the paper through a combination of heat and pressure
[email protected] 48
INTRODUCTION TO COMPUTERS
2 - INK-JET PRINTERS:
How it works: The print head contains tiny nozzles
through which different coloured inks can
be sprayed onto the paper to form the
characters or the graphic images.
The ink is forced out by heat or by tiny
piezoelectric crystals which change shape
when an electric current is applied across
them.
Suitable uses: A popular choice for home use where small amounts of printing are
done and photographic quality colour printing is needed.
Disadvantages: The ink cartridges can be expensive so running costs can be high.
The printing speed is slow compared to a laser printer.
Advantages: These printers are relatively inexpensive and produce high quality
black and white or photographic quality borderless colour printing.
A type of printer that works by spraying ionized ink at a sheet of paper. Magnetized plates in the
ink's path direct the ink onto the paper in the desired shapes. Ink-jet printersare capable of
producing high quality print approaching that produced by laser printers
3. Thermal transfer printers- A type of printer that applies heat to a ribbon and the
image or barcode is then transferred to labels or tags. This technology produces a higher quality,
longer lasting image on the tag or label.
Advantages
-1 to 2 years media shelf life
-Media is not heat sensitive
-Medium to high image quality
-Wide range of available types
-Recommended for industrial use
Disadvantages
-Special ribbons required
-Average operational cost
-Cannot print on multiple-copy paper
-Single-pass ribbons only
4. Direct thermal printers - A type of printer that applies heat directly to specially
treated paper, labels or tags to form the image or barcode.
Advantages
-No ribbon required
-Low operational cost
Disadvantages
-Short media shelf life
-Very heat sensitive media
-Limited image quality
-Limited number of available types
[email protected] 49
INTRODUCTION TO COMPUTERS
-Not recommended for use in industrial, outdoor, or harsh environments
-Cannot print on multiple-copy paper
IMPACT PRINTERS
Suitable uses: Limited to situations where duplicate copies are needed and the quality
is not too important.
Typical uses might be in warehouses where duplicate copies of orders
need to produced quickly and cheaply.
Disadvantages The printing quality is low - these printers produce low to medium
: quality black and white printing and can only print low resolution
graphics.
Because of the impact of the pins against the paper, these printers can be
quite noisy.
Advantages: The purchase cost is low and the running costs are very low.
They can print fairly quickly, particularly if you remember that
multiple copies are being printed in one print run.
They are robust and can operate in harsh environments.
If several sheets of self-carbonating paper are placed into the printer
then the impact will produce duplicate copies.
A type of printer that produces characters and illustrations by striking pins against an ink ribbon
to print closely spaced dots in the appropriate shape.
[email protected] 50
INTRODUCTION TO COMPUTERS
Advantages
-Can print to multi-page forms-
-Moderately priced
-Multi-pass ribbons (saves money)
Disadvantages
-Noisy operation
-Low-quality output
-Slow print speed
-Multi-pass ribbons (decrease in quality with each pass)
Advantages
More reliable than DMP
Better quality
The fonts of character can be easily changed
Disadvantages
Slower than DMP
Noisy
More expensive than DMP
[email protected] 51
INTRODUCTION TO COMPUTERS
3. LINE PRINTERS
Line printers are the printers which print one line at a time.
4. DRUM PRINTER
This printer is like a drum in shape so it is called drum printer. The surface of drum is
divided into number of tracks. Total tracks are equal to size of paper i.e. for a paper width
of 132 characters, drum will have 132 tracks. A character set is embossed on track. The
different character sets available in the market are 48 character set, 64 and 96 characters
set. One rotation of drum prints one line. Drum printers are fast in speed and can print
300 to 2000 lines per minute.
Advantages
Very high speed
Disadvantages
Very expensive
Characters fonts cannot be changed
5. CHAIN PRINTER
In this printer, chain of character sets are used so it is called Chain Printer. A standard
character set may have 48, 64, or 96 characters.
Advantages
Character fonts can easily be changed.
Different languages can be used with the same printer.
Disadvantages
Noisy
[email protected] 52
INTRODUCTION TO COMPUTERS
1. Print quality, for example the print from dot matrix printers varies with the number
of pins and even the best are inferior to laser printers.
2. Character formation, whether made from dots as in matrix printer, or full characters
as with daisywheel or laser printer
3. Multi-part, i.e. whether several copies can be printed at once, as with an impact
printer.
4. Fonts or type style; early computer users were satisfied with any quality whatsoever,
but the advances into areas such as word processing and desk top publishing have
stimulated a demand for varying typefaces or fonts within the same document
5. Letter quality, whether the quality is equivalent or superior to that of a good
typewriter and so acceptable for the word processing of mail. Some printers have a
choice of two print modes, draft quality and letter quality.
6. Speed, in terms of characters per second.
7. Graphics capabilities.
8. Flexibility, for example is it suitable for one task only, such as good letter quality but
not graphics, as with daisywheel printers, or good graphics but slow speed and
indifferent letter quality, as with some dot matrix printers.
9. Sheet feeding, in terms of single sheets, friction feed or sprocket feed.
10. Capital cost or what it costs to buy.
11. Running cost or what it costs in ribbons, print toner, special stationery &
maintenance.
12. Compatibility with standard packages; many programs support a range of printers by
generating the correct control characters for fonts, features like italics and underline,
and for graphics.
13. Robustness; some very cheap printers are ideal at home but would not last very long
in an office.
14. Reputation of the manufacturer as a supplier of printers.
You have been delegated the task of selecting a new printer from a range of different
options currently on the market. The machine has to serve a small network of
microcomputers in your office. Software used includes a word processing package,
database, spreadsheet, and presentation packages. Assuming that cost is not a major
constraint, list 10 features of the printers, which you would investigate in your evaluation.
[email protected] 53
INTRODUCTION TO COMPUTERS
STORAGE DEVICES
Alternatively referred to as digital storage, storage, storage media, or storage medium,
a storage device is any hardware capable of holding information either temporarily or
permanently.
There are two types of storage devices used with computers: a primary storage device,
such as RAM, and a secondary storage device, like a hard drive. Secondary storage can
be removable, internal, or external storage.
Without a storage device, your computer would not be able to save any settings or
information and would be considered a dumb terminal.
[email protected] 54
INTRODUCTION TO COMPUTERS
Examples of computer storage
Floppy diskette
Hard drive
SuperDisk
Tape cassette
Zip diskette
Blu-Ray disc
CD-ROM disc
CD-R and CD-RW disc
DVD-R, DVD+R, DVD-RW, and DVD+RW disc
[email protected] 55
INTRODUCTION TO COMPUTERS
Flash memory has started to replace magnetic media as it becomes cheaper as it is the
more efficient and reliable solution.
Network storage
Google drive
SkyDrive now OneDrive
iCloud
email storage
mediafire.com
[email protected] 56
INTRODUCTION TO COMPUTERS
PAPER STORAGE
Early computers had no method of using any of the above technologies for storing
information and had to rely on paper. Today, these forms of storage are rarely used or
found.
OMR
Punch card
When saving anything on a computer, it may ask you for a storage location, which is the
area in which you would like to save the information. By default, most information is
saved to your computer hard drive. If you want to move the information to another
computer, save it to a removable storage device such as a flash drive.
These are devices that store information permanently. They are also known as Auxiliary
storage devices or Secondary storage devices. They include:-
b) FLOPPY DISKETTE
An external form of storage used for back up. Information can be deleted and rewritten
and re-saved. The storage device is common for microcomputers. The disks are either
High density or double density disks because data is stored more densely/ compactly than
on regular density disks. Common size of disk is 31/2inches.
[email protected] 57
INTRODUCTION TO COMPUTERS
1. They are prone to viruses
2. They are difficult to handle
3. They can easily be corrupted
4. They have a relatively short life span
5. They hold relatively small amounts of data
6. They are not always 100% reliable
c) CATRIDGE TAPE
Data is recorded in the form of magnetized spots on an iron oxide coating of a plastic
tape. Gaps are used to separate individual data records. The tape is similar to audiotapes.
Access of information from the tape is in sequential form and thus slow.
g) ZIP DISKS
These are high capacity removable diskettes. They have gained favor for back-up
purposes. Some zip disks use magnetic technology and others use laser. They have a
capacity of about 100MB.
Storage devices differ in terms of capacity, cost and access methods. For any device to be
used there is a need for the device drive on the computer e.g. A floppy disk drive.
[email protected] 58
INTRODUCTION TO COMPUTERS
Flash memory is increasingly being used in a wide range of devices. Some examples include:
Small, lightweight USB memory sticks, available for many Gigabytes.
Memory cards for digital cameras.
Main internal storage for tablet computers (SSD)
Digital audio players.
Mobile phones.
Video game hardware.
Flash memory offers very fast access to data and programs. However, retrieving data from an
external flash memory device such as a USB stick would be slower than an internal hard disk
because the speed of access is restricted by the USB link or connection.
With the development of tablet computers, flash memory is used as the main form of internal
storage because there is no room for a traditional hard disk. These disks are called SSD (solid
state storage). In this case, access to the data stored in flash memory would be much faster
than from a hard disk because there are no moving parts involved.
Currently, the down side to using flash memory as the main storage method is that it has a
limited number of read/write cycles which limits its useful life span.
Flash memory, when packaged in a "memory card", is very resilient to damage, unlike many
other storage devices. It can withstand extremes of temperature, being immersed in water or
being accidentally dropped.
DISK CARE
[email protected] 59
INTRODUCTION TO COMPUTERS
3) Keep them away from magnetic fields i.e. Phones, tops of some monitors, magnetized
items etc..
4) Do not touch the actual tape.
5) Keep them away from dust.
6) Do not place heavy objects on them.
7) Write on a floppy disk label only with a felt-tip pen, or write before sticking the label
8) Avoid using rubber bands, paper clips and erasers on floppy disks
HARDWARE CARE
1) Make sure there is enough space for the machines to breathe. (Fresh air is necessary
to make the fan keep the electronics cool).
2) Do not block air vents with books.
3) Keep the computer dry.
4) House the machine in a dust free environment e.g. 1ST floor carpeted-room (Carpets
suck dust) and, use a vacuum cleaner to clean the carpet. (Dust is the biggest killer of
hard drives).
5) Do not expose the machine to extreme temperatures.
6) Properly shut down the machine before turn-off.
7) Pull the plug out of socket when there is thunder and lightning.
8) Do not move the system when the computer is on. The hard drive can be damaged.
9) Use of UPS- Uninterruptible Power Supply in case of power failures,
10) Use of Surge Protectors against too high voltages.
TYPES OF MEMORY
COMPUTER – MEMORY
A memory is just like a human brain. It is used to store data and instructions. Computer memory
is the storage space in computer where data is to be processed and instructions required for
processing are stored. The memory is divided into large number of small parts called cells. Each
location or cell has a unique address which varies from zero to memory size minus one. For
example if computer has 64k words, then this memory unit has 64 * 1024=65536 memory
locations. The address of these locations varies from 0 to 65535.
Cache Memory
Primary Memory/Main Memory
Secondary Memory
CACHE MEMORY
Cache memory is a very high speed semiconductor memory which can speed up CPU. It acts as a
buffer between the CPU and main memory. It is used to hold those parts of data and program
which are most frequently used by CPU. The parts of data and programs are transferred from disk
to cache memory by operating system, from where CPU can access them.
Advantages
[email protected] 60
INTRODUCTION TO COMPUTERS
Disadvantages
Primary memory holds only those data and instructions on which computer is currently working.
It has limited capacity and data is lost when power is switched off. It is generally made up of
semiconductor device. These memories are not as fast as registers. The data and instruction
required to be processed reside in main memory. It is divided into two subcategories RAM and
ROM.
[email protected] 61
INTRODUCTION TO COMPUTERS
A computer cannot run without primary memory.
SECONDARY MEMORY
This type of memory is also known as external memory or non-volatile. It is slower than main
memory. These are used for storing data/Information permanently. CPU directly does not access
these memories instead they are accessed via input-output routines. Contents of secondary
memories are first transferred to main memory, and then CPU can access it. For example : disk,
CD-ROM, DVD etc.
Characteristic of Secondary Memory
These are magnetic and optical memories
It is known as backup memory.
It is non-volatile memory.
Data is permanently stored even if power is switched off.
It is used for storage of data in a computer.
Computer may run without secondary memory.
Slower than primary memories.
RAM(Random Access Memory) is the internal memory of the CPU for storing data, program and
program result. It is read/write memory which stores data until the machine is working. As soon
as the machine is switched off, data is erased.
Access time in RAM is independent of the address that is, each storage location inside the
memory is as easy to reach as other locations and takes the same amount of time. Data in the
RAM can be accessed randomly but it is very expensive.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if there is a
power failure. Hence a backup uninterruptible power system(UPS) is often used with computers.
RAM is small, both in terms of its physical size and in the amount of data it can hold.
[email protected] 62
INTRODUCTION TO COMPUTERS
The word static indicates that the memory retains its contents as long as power is being supplied.
However, data is lost when the power gets down due to volatile nature. SRAM chips use a matrix
of 6-transistors and no capacitors. Transistors do not require power to prevent leakage, so SRAM
need not have to be refreshed on a regular basis.
Because of the extra space in the matrix, SRAM uses more chips than DRAM for the same
amount of storage space, thus making the manufacturing costs higher. So SRAM is used as cache
memory and has very fast access.
DRAM, unlike SRAM, must be continually refreshed in order to maintain the data. This is done
by placing the memory on a refresh circuit that rewrites the data several hundred times per
second. DRAM is used for most system memory because it is cheap and small. All DRAMs are
made up of memory cells which are composed of one capacitor and one transistor.
[email protected] 63
INTRODUCTION TO COMPUTERS
Less power consumption
ROM stands for Read Only Memory. The memory from which we can only read but cannot write
on it. This type of memory is non-volatile. The information is stored permanently in such
memories during manufacture. A ROM, stores such instructions that are required to start a
computer. This operation is referred to as bootstrap. ROM chips are not only used in the computer
but also in other electronic items like washing machine and microwave oven.
[email protected] 64
INTRODUCTION TO COMPUTERS
PROM is read-only memory that can be modified only once by a user. The user buys a blank
PROM and enters the desired contents using a PROM program. Inside the PROM chip there are
small fuses which are burnt open during programming. It can be programmed only once and is
not erasable.
Advantages of ROM
[email protected] 65
INTRODUCTION TO COMPUTERS
Few higher storage units are following………..
Differentiate between Random Access Memory (RAM) and Read Only Memory
(ROM)
RAM ROM
Stands for Random-Access Memory Stands for Read-Only Memory
Normally ROM is read only memory and it cannot be
RAM is a read and write memory
overwritten. However, EPROMs can be reprogrammed
RAM is faster ROM is relatively slower than RAM
RAM is a volatile memory. It means
ROM is permanent memory. Data in ROM will stay as it
that the data in RAM will be lost if
is even if we remove the power-supply
power supply is cut-off
There are mainly two types of RAM; There are several types of ROM; Erasable ROM,
static RAM and Dynamic RAM Programmable ROM, EPROM etc.
RAM stores all the applications and
ROM usually stores instructions that are required for
data when the computer is up and
starting (booting) the computer
running
Price of RAM is comparatively high ROM chips are comparatively cheaper
RAM chips are bigger in size ROM chips are smaller in size
Content of ROM are usually first transferred to RAM and
Processor can directly access the
then accessed by processor. This is done in order to be
content of RAM
able to access ROM content at a faster speed.
RAM is often installed with large Storage capacity of ROM installed in a computer is much
storage. lesser than RAM
BENEFITS OF COMPUTERS
With the advent of new technology, various processes have been very dependent with
automation. As the years go by, more and more inventions are introduced in the market
and in the society all for one purpose - convenience. Let us tackle for instance two of the
most influential aspects of this modern world; the societal and the entrepreneurial feature.
These two have been greatly influenced by the advancements that are continuously taking
place. With that said, a number of essential advantages are becoming more evident in
these two facets. To further draw a clearer picture on the benefits of computers on each of
the mentioned aspect, here are brief descriptions of each.
[email protected] 66
INTRODUCTION TO COMPUTERS
ADVANTAGES OF COMPUTERS
1. Data Storage: Many small businesses keep and store important business documents
on their computers. Since these computers have big storage hard-drives, they can be in
position to store millions of files and the discovery or retrieval of these files is very easy.
Data can be stored in specific folders to make it easy to access, and some data can be
made private by use of password protected folders. For medium size growing companies,
they invest in a centralized powerful computers which store all business data, this data
can be accessed via an internal or external network with in the company. This all process
creates efficiency within a business and it also helps in the transfer of data and
information from one department to another.
2. Education: Many companies use computers as a training tool at work. Due the
increased advancement in technology and business trends, it is very important for a
business to train their employees new skills. So for a business to save money in this
process of training employees, computers can be used to educate and update their
employees. However, to save time, business owners or human resource managers can use
virtual technologies to communicate and train their staff; this means that employees will
stay in their departments and on their desks as they attend a lesson. Virtual
communication software like SKYPEcan be used to train employees virtually, all you
have to do is to create a GROUP and add all your employees in that group, so you will
talk to them at once and they can also ask you questions via their computers.
4. Accounting: Since accounts deals with facts and figures, it is very essential to use a
computer during the accounting process, this reduces on human errors and it also helps
business owners keep track of their businesses without any need of learning accounting
basics. Computers make accounting look too simple, so any one can use programs like
QuickBooks to balance and track inventory. Mobile computers like tablets and notebooks
can be used to access accounting data remotely. Online QuickBooks software from
companies like intuit.com can automate the invoicing process, billing and reporting
which creates efficiency in a business.
[email protected] 67
INTRODUCTION TO COMPUTERS
5. Marketing: A business can use a computer to create a business website. Today, it is
very easy to create a website, if your budget is limited and you can’t afford a website
designer, all you have to do is to pay for cheap hosting of around $4 per month, register
your companies domain name for only $10 per year, then install WordPress on your
domain. To create a beautiful company website, go to Themeforest.com and buy a
business WordPress theme for only $45 then install that theme on your default
WordPress site, then start editing the theme to fit your company goals, the all process is
simple and cheap. You can use your website to market your services and products, reach
more customers by integrating your website content with social media sites like facebook
and twitter.
6. Creating and Editing of Business documents: One of the most popular business
applications you can use to create and edit documents is ”Microsoft Word” with this
word processing application, you can create any type of business document, Microsoft
Word can check spelling errors , correct grammar mistakes, include graphics in the
document. You can also use Microsoft Excel spread sheet to organize data inform of
figures. Spread sheets can help business owners manipulate decision variables and
determine their impacts on outcomes like profits and sales. Using a spread sheet, a
business owner can have an accurate answer to a given question in minutes and can often
glance at the whole financial image of the company on a single page. You can also use
spread sheets to set a price for a proposed product.
9. Office and Supply Management: On a daily basis, businesses deal with buying and
selling of goods and services, a computer can be used to manage supplies and inventory
efficiently. Companies like Intacct.com will provide you with a cloud based inventory
management software which will enable you gain control and visibility into inventory
[email protected] 68
INTRODUCTION TO COMPUTERS
from anywhere using a computer. This all process will help you maximize cost savings
and also improve on capital efficiencies. You can as well use a computer to manage and
track basic supplies in a business, these supplies can include papers, printer-ink, and other
small supplies used on a daily basis in a business.
10. Human Resources Management: Computers can be used to manage, hire and
interview new employees, today, many small businesses and human resource managers
use the internet to find talented individuals. Human resource managers can use a
computer to train new employees on how a business operates and also allocate tasks to
each new employee. Business managers can use computers to monitor the performance of
each individual at work, this process ensures that no employee misuses company
facilities and time.
DISADVANTAGES OF COMPUTERS:
1. Requires Training: In most cases, small business owners don’t know how to use a
computer for business purposes, so they have to hire experts to teach them and their
employees on how to use computers to accomplish specific business tasks. To some
extent, this process is costly and it takes time. For example, if a small business owner
wants to use Quickbooks to manage their accounts , they have to take off time and learn
how Quickbooks works, or they will have to pay an extra fee to hire a Quickbooks expert
to teach them. Even though the end result is good, time and money will be spent during
this process.
2. Computer Crime: Computers are used to provide efficient ways for employees to
share information, but at the same time employees with malicious intentions can use this
opportunity to hack into the system to access private business information for their
personal gains. In most cases this information can be sold to business rivals, which is
harmful to a business. Computer crime is on the rise and many small businesses have
been victims of data loss. Some times employees or outsiders can modify computer
programs to create false information or illegal transactions or install viruses to corrupt
stored information.
[email protected] 69
INTRODUCTION TO COMPUTERS
sensors can be used to control and report room temperature in the baking room, in this
case, the bakery will need only one person to monitor results on the computer from the
baking room, if the temperature drops or rises, notifications will be sent to the computer
and the controller will respond immediately. This is a good technology for a business,
because it will guarantee efficiency and quality, but it will also cut off so many people.
6. Wastage of time and energy. Many people use computers without positive purpose. They
play games and chat for a long period of time. It causes wastage of time and energy. Young
generation is now spending more time on the social media websites like Facebook, Twitter
etc or texting their friends all night through smartphones which is bad for both studies and
their health. And it also has adverse effects on the social life.
7. Data Security. The data stored on a computer can be accessed by unauthorized persons
through networks. It has created serious problems for the data security.
8. Computer Crimes. People use the computer for negative activities. They hack the credit card
numbers of the people and misuse them or they can steal important data from big
organizations.
9. Privacy violation. The computers are used to store personal data of the people. The privacy
of a person can be violated if the personal and confidential records are not protected properly.
10. Health risks. The improper and prolonged use of computer can results in injuries or disorders
of hands, wrists, elbows, eyes, necks and back. The users can avoid health risks by using the
computer in proper position. They must also take regular breaks while using the computer for
longer period of time. It is recommended to take a couple of minutes break after 30 minutes
of computer usage.
11. Impact on Environment. The computer manufacturing processes and computer waste are
polluting the environment. The wasted parts of computer can release dangerous toxic
materials. Green computer is a method to reduce the electricity consumed and environmental
waste generated when using a computer. It includes recycling and regulating manufacturing
processes. The used computers must be donated or disposed off properly.
USES OF COMPUTERS
Home Budget
Computer can be used to manage Home Budget. You can easily calculate your
expenses and income. You can list all expenses in one column and income in
another column. Then you can apply any calculation on these columns to plan
your home budget. There are also specialize software that can manage your
income and expenses and generate some cool reports.
Computer Games
An important use of computers at home is playing games. Different types of
games are available. These games are a source of entertainment and recreation.
[email protected] 70
INTRODUCTION TO COMPUTERS
Many games are available that are specially developed to improve your mental
capability and thinking power.
Working from Home
People can manage the office work at home. The owner of a company can check
the work of the employees from home. He can control his office while sitting at
home.
Entertainment
People can find entertainment on the internet. They can watch movies, listen to
songs, and watch videos download different stuff. They can also watch live
matches on the internet.
Information
People can find any type of information on the internet. Educational and
informative websites are available to download books, tutorials etc. to improve
their knowledge and learn new things.
Chatting & Social Media
People can chat with friends and family on the internet using different software
like Skype etc. One can interact with friends over social media websites like
Facebook, Twitter & Google Plus. They can also share photos and videos with
friends.
CBT are different programs that are supplied on CD-ROM. These programs include text,
graphics and sound. Audio and Video lectures are recorded on the CDs. CBT is a low
cost solution for educating people. You can train a large number of people easily.
Benefits of CBT
Some benefits of CBT are as follows:
1. The students can learn new skills at their own pace. They can easily acquire
knowledge in any available time of their own choice.
2. Training time can be reduced.
3. Training materials are interactive and easy to learn. It encourages students to learn
the topic.
4. Planning and timing problems are reduced or eliminated.
5. The skills can be taught at any time and at any place.
6. It is very cost effective way to train a large number of students.
7. Training videos and audios are available at affordable prices.
[email protected] 71
INTRODUCTION TO COMPUTERS
Distance Learning
Distance learning is a new learning methodology. Computer plays the key role in
this kind of learning. Many institutes are providing distance learning programs.
The student does not need to come to the institute. The institute provides the
reading material and the student attends virtual classroom. In virtual classroom,
the teacher delivers lecture at his own workplace. The student can attend the
lecture at home by connecting to a network. The student can also ask questions to
the teacher.
Online Examination
The use of computer technology in business provides many facilities. Businessmen are
using computers to interact with their customers anywhere in the world. Many business
tasks are performed more quickly and efficiently. Computers also help them to reduce the
overall cost of their business. Computer can be used in business in the following ways.
Marketing
Stock Exchange
Stock Exchange is the most important place for businessmen. Many stock
exchanges use computers to conduct bids. The stockbrokers perform all trading
activities electronically. They connect with the computer where brokers match the
buyers with sellers. It reduces cost as no paper or special building is required to
conduct these activities.
[email protected] 72
INTRODUCTION TO COMPUTERS
Specialized hospital management softwares are used to automate the day to day
procedures and operations at hospitals. These tasks may be Online appointments,
payroll admittance and discharge records etc.
Patient History
Hospital management systems can store data about patients. Computers are used
to store data about patients, their diseases & symptoms, the medicines that are
prescribed.
Patients Monitoring
Monitoring systems are installed in medical wards and Intensive care units to
monitoring patients continuously. These systems can monitor pulse, blood
pressure and body temperature and can alert medical staff about any serious
situations.
Specialized devices are used to help impaired patients like hearing aids.
Diagnosis Purpose
[email protected] 73
INTRODUCTION TO COMPUTERS
1. COMPUTER PROGRAMMER
Computer programmers write, test, and maintain the programs that computers follow
when performing specific functions. While job titles and descriptions vary by company,
the main task of computer programmers is problem solving and development of systems
solutions using the appropriate methodologies and techniques.
Programmers often work on projects as a team, each team member assigned according to
strength and ability. A programmer uses programming languages, such as C++, PHP, or
Java to communicate with computer to perform a set of instructions. By typing code in
2nd and 3rd level programming languages (which are languages become more like words
as the generation goes up and more like machine code as the generation goes down , eg
assembler) helps computer programmers easier to code with. Once finished coding they
compile the program into machine language so the computer can follow the set of
instructions.
[email protected] 74
INTRODUCTION TO COMPUTERS
2. SYSTEM ANALYST AND DESIGNERS
Job Titles
Network Designer
Systems Analyst
Solutions Architect
Senior Systems Engineer
Senior Solutions Architect
Systems Architect
Principal Solutions Architect
Duties The role of system analysts and designers is critical in contemporary system
development. The systems analyst is a key partner with project managers and system
developers.
Systems analysts define software requirements and specifications and guide program
design and development. A systems analyst may supervise a software development or
maintenance team of analyst / programmers and programmers.
Depending on the level of responsibility and the particular job role involved, duties may
also include:
3. DATABASE ADMINISTRATOR
Job Description:
Also called Database Co-ordinator, Database Programmer Closely related jobs Database
Analyst, Database Modeller, Programmer Analyst, Systems Manager
In summary
[email protected] 75
INTRODUCTION TO COMPUTERS
4. NETWORK ADMINISTRATOR
Job Description:
In summary
[email protected] 76
INTRODUCTION TO COMPUTERS
A network administrator may
Install, configure and maintain pcs, networking equipment and network operating systems
Monitor and configure networks to optimize performance and resolve faults
Undertake recovery action in the event of a system failure
Establish and control system access and security levels
Provide training and support for system software
Implement and co-ordinate housekeeping procedures, including system back-ups, setting up user
accounts, monitoring file access etc.
Plan and implement maintenance and upgrades for system software and hardware
Maintain peripheral devices connected to the printer such as printers and scanners
Fully support, configure, maintain and upgrade corporate customer’s networks and in house servers
Install and integrate new server hardware and applications
Keep an eye out for needed updates
Support and administer third-party applications
Ensure network security and connectivity
Monitor network performance (availability, utilization, throughput, good put, and latency) and test for
weaknesses
Set up user accounts, permissions and passwords
Resolve problems reported by end user
5. SYSTEMS ADMINISTRATOR
[email protected] 77
INTRODUCTION TO COMPUTERS
Act on privacy breaches and malware threats
Serve as a security expert and conduct trainings when needed
Draft policies and guidelines
7. COMPUTER SCIENTISTS
Transfer data from paper formats into computer files or database systems using
keyboards, data recorders or optical scanners
Type in data provided directly from customers
Create spreadsheets with large numbers of figures without mistakes
Verify data by comparing it to source documents
Update existing data
Retrieve data from the database or electronic files as requested
Perform regular backups to ensure data preservation
Sort and organize paperwork after entering data to ensure it is not lost
[email protected] 78
INTRODUCTION TO COMPUTERS
COMPUTER PERFORMANCE
Computer performance is characterized by the amount of useful work accomplished by
a computer system or computer network compared to the time and resources used.
Depending on the context, high computer performance may involve one or more of the
following:
The speed of the CPU is also known as the clock speed of the CPU. The clock speed of
the CPU is the frequency of which the processor executes instructions or the frequency
by which data is processed by the CPU. It is measured in millions of cycles per second or
megahertz (MHz). If the Clock speed of the CPU is fast then definitely the performance
of the computer will be affected positively, in other words the computer will carry out
processing functions at a faster pace.
The CPU
High performance, compatibility and upgradability are features that are important. The
higher the generation, the better. For example, because of high performance new features,
Pentium 75 (fifth generation with the clock rate 75 MHz) will outperform 80486DX100
(which is the fourth generation CPU with the clock rate 100MHz).
Another important feature is word size measured in bits. 80386 and 80486 processors are
[email protected] 79
INTRODUCTION TO COMPUTERS
32 bit whereas Pentiums are 64 bit processors, thus Pentiums can transfer twice as much
data at a time compared to third and fourth generation CPUs.
RAM.
It does not make much sense to have a fast processor if you dont have fast RAM. But
note: faster RAM is more expensive.
The amount of RAM is also important. Today, advanced operating systems require at
least 4 megabytes of memory just to boot up a computer. Using more than one
application at a time requires at least 8 megabytes, and reasonable performance today
calls for 16 megabytes or more. The benefits of adding more RAM include letting you
open more applications at the same time, and working with large files or documents.
More memory may also make your machine run much faster.
The quality of DRAM chips used in a memory module is the most important component
in determining the overall quality and reliability of RAM. So which chips to consider?
Enhanced Data Output (EDO) DRAM provides faster data throughput. Systems using
EDO DRAM will be faster than similar systems using regular DRAM. EDO DRAM
provides even higher performance benefit when used with an L2 cache.
Enhanced DRAM (EDRAM) can be thought of as RAM that carries its own cache on
each module. In an EDRAM-based system, essentially the entire system memory bank is
the cache. This can provide dramatic performance improvements. However, at this time,
EDRAM is scarce, very expensive and has not been adopted by many system vendors.
[email protected] 80
INTRODUCTION TO COMPUTERS
Hard disk capacity and seek time.
High-performance hard drives have at least 1.2 G of capacity, provide an average seek
time of 12 milliseconds, a 128 to 256 K hard disk buffer cache with both write-caching
and read-caching capabilities, and spin about 4,500 rotations per minute. (You may be
familiar with using a disk cache, such as Microsoft SmartDrive, which uses a small RAM
buffer to speed up access to a large hard disk.)
7) DEFRAGMENTING FILES
Files that are broken or it takes long to read them will mean that the computer will have
to defragment them first. This will slow down the performance of the computer.
The data bus is the highway that carries information between the processor and the
memory subsystem. The wider the data bus, the more information it can transfer. Because
of its external 64-bit data bus, the Pentium processor can transfer data to and from
memory at rates up to 528 Mbytes/second (five times faster than the transfer rate of the
Intel486 (TM) DX2-66MHz microprocessor).
The PCI local bus greatly improves I/O performance. It can transfer data between the
processor and the peripherals at up to 132 MB/second, far faster than the ISA bus rate of
5 MB/second
Since any step of processing can happen only on the "tick" of the clock (called clock
cycle), the faster the rate the quicker the CPU works. The Intel486(TM) processor, for
example, is able to execute many of its instructions in one clock cycle, while previous
generations of Intel microprocessors require multiple clock cycles to execute a single
instruction. The Pentium processors have the ability to execute multiple instructions per
[email protected] 81
INTRODUCTION TO COMPUTERS
clock cycle due to the fact that the Pentium processor's two pipelines can execute two
instructions simultaneously. If other modules of the system require more than one clock
pulse, the CPU has to wait for them to keep up. This is called a wait state.
The bigger the on-chip cache size, the better since more instructions and data can be
stored on the chip, reducing the number of times the processor has to access slower, off-
chip memory areas to get data. For example, Intel has doubled on-chip cache size to 32K
on the Intel Pentium processor with MMX technology.
L2 Cache.
System memories composed of dynamic RAM (DRAM) alone have not been able to keep
up with the dramatic increases in CPU speeds over the years. In order to optimize the
memory performance in these systems, designers are implementing architectures using
cache memory, resulting in speed increases up to 45%. Expanding secondary cache (e.g.
from 128K to 512K) can greatly improve the performance of some applications.
In a recent industry magazine test of notebook computers, a 486 machine with L2 cache
outperformed a Pentium 90 machine without L2 cache by 30%.
At the time of writing of these notes the slowest CD-ROM drive available on the market
is quad speed. It may be enough, if you are not running applications from CD-ROM, but
only installing them. Otherwise look at octal or ten-speed technologies.
[email protected] 82
INTRODUCTION TO COMPUTERS
HARDWARE SUMMARY
Hardware represents the physical and tangible components of a computer i.e. the
components that can be seen and touched.
Hardware and software are mutually dependent. Both of them must work together
to make a computer produce a useful output.
Software cannot be utilized without supporting hardware.
Hardware without set of programs to operate upon cannot be utilized and is
useless.
To get a particular job done on the computer, relevant software should be loaded
into the hardware.
Software acts as an interface between the user and the hardware.
Hardware is the body and software is the soul.
Hardware does all the work as like our body. But it’s the software which instructs
(Set of instructions are passed to the processor for each process to be done) the
hardware what to do.
For example when you switch on the computer it is the BIOS which first checks
the hardware and booting order and then instructs the hardware to load(boot) the
OS from the hard-disc or pen-drive or external drive or the cd/dvd drive. once the
instruction is passed the hardware starts to function according to the instruction
received.
[email protected] 83
INTRODUCTION TO COMPUTERS
SOFTWARE
The intangible computer components, which are the programs or instructions of the computer.
Everything that a computer does, it acts under instructions written out as computer programs. The
hardware needs these instructions to function.
Computer software refers to the various programs or instructions that are stored in the
computer (stored program concept) and used to either manage or control the operation of
a computer system or to direct the computer in solving specific problems. Software is
divided into two major types.
SOFTWARE HIERARCHY
[email protected] 84
INTRODUCTION TO COMPUTERS
1. SYSTEM SOFTWARE
The system software is collection of programs designed to operate, control, and extend
the processing capabilities of the computer itself. System software are generally prepared
by computer manufactures. These software products comprise of programs written in
low-level languages which interact with the hardware at a very basic level. System
software serves as the interface between hardware and the end users.
System software is computer software designed to operate the computer hardware and to
provide a platform for running application software.
The computer BIOS and device firmware, which provide basic functionality to
operate and control the hardware connected to or built into the computer.
The operating system (prominent examples being Microsoft Windows, Mac OS X
and Linux), which allows the parts of a computer to work together by performing
tasks like transferring data between memory and disks or rendering output onto a
display device. It also provides a platform to run high-level system software and
application software.
Utility software, which helps to analyze, configure, optimize and maintain the
computer.
In some publications, the term system software is also used to designate software
development tools (like a compiler, linker or debugger).
System software helps use the operating system and computer system. It includes
diagnostic tools, compilers, servers, windowing systems, utilities, language translator,
data communication programs, database systems and more. The purpose of system
software is to insulate the applications programmer as much as possible from the
complexity and specific details of the particular computer being used, especially memory
and other hardware features, and such accessory devices as communications, printers,
readers, displays, keyboards, etc.
[email protected] 85
INTRODUCTION TO COMPUTERS
Desktop environment / Graphical user interface
Shells
BIOS
Hypervisors
Boot loaders
Database Management Systems(SQL, NoSQL)
Major development programs are language translators, programming tools and CASE
[computer-aided software engineering] packages
Close to system
Fast in speed
Difficult to design
Difficult to understand
Less interactive
Smaller in size
Difficult to manipulate
Generally written in low-level language
[email protected] 86
INTRODUCTION TO COMPUTERS
1. APPLICATION SOFTWARE
o Applications software comprises programs designed for an end user, such as word
processors, database systems, and spreadsheet programs.
o Programs that specify the information processing activities required for the
completion of specific tasks of computer users. E.g. Electronic Spreadsheet and
word processing programs or inventory or payroll programs.
Software that is designed and written for a specific personal, organizational, or
processing task, such as graphics software.
These programs accomplish the specialized tasks of the user, while operating
system software allows the computer to work. A computer-aided dispatch system
is application software, as is each word processing program.
Close to user
Easy to design
More interactive
Slow in speed
Generally written in high-level language
Easy to understand
Easy to manipulate and use
Bigger in size and requires large storage space
FREEWARE
Public domain software that is freely available in magazines and on the
internet at no charge to users though manuals may be offered at a cost.
Freeware may or may not have copyrights and may or may not have
distribution restrictions.
SHAREWARE
Refers to software that is widely distributed in much the same way as
freeware BUT is always copyrighted and includes a software license that
requires its users to pay for the privilege of using the software beyond a
certain trial period. If you decide to use it, you are expected to pay for the
license. There is usually a disabling system in the program after a certain
period of time i.e. a month.
[email protected] 87
INTRODUCTION TO COMPUTERS
OPERATING SYSTEM
It is a program with following features:
Examples include
AmigaOS
Android
HP-UX
iOS
IRIX
Linux
MAC OS 8
MAC OS 9
MAC OS 10
MAC OS X
MS-DOS
Unix
Vector Linux
Windows 2000
Windows 2003
Windows 3.X
Windows 7
Windows 8
Windows 95
Windows 98
Windows 10
Windows CE
Windows ME
Windows NT
Windows Vista
Windows XP
Xenix
Windows 10
[email protected] 88
INTRODUCTION TO COMPUTERS
TYPES OF OPERATING SYSTEMS / OPERATING SYSTEM TYPES
As computers have progressed and developed, so have the operating systems. Below is a
basic list of the types of operating systems and a few examples of operating systems that
fall into each of the types. Many computer operating systems will fall into more than one
of the below types.
1. GUI
Short for Graphical User Interface, a GUI operating system contains graphics and icons
and is commonly navigated by using a computer mouse. Examples of GUI operating
systems are:
System 7.x
Windows 98
Windows CE
2. MULTI-USER
A multi-user operating system allows for multiple users to use the same computer at the
same time and different times. Examples of operating systems that would fall into this
category are:
Linux
Unix
Windows 2000
3. MULTIPROCESSING
An operating system capable of supporting and utilizing more than one computer
processor. Examples of operating systems that would fall into this category are:
Linux
Unix
Windows XP
4. MULTITASKING
An operating system that is capable of allowing multiple software processes to run at the
same time. Examples of operating systems that would fall into this category are:
Linux
Unix
Windows 8
[email protected] 89
INTRODUCTION TO COMPUTERS
preemptive multitasking. Cooperative multitasking is achieved by relying on each
process to provide time to the other processes in a defined manner. 16-bit versions of
Microsoft Windows used cooperative multi-tasking. 32-bit versions of both Windows
NT and Win9x, used preemptive multi-tasking.
5. MULTITHREADING
Operating systems that allow different parts of a software program to run concurrently.
Examples of operating systems that would fall into this category are:
Linux
Unix
Windows XP
6. Single-task
A single-tasking system can only run one program at a time, while a multi-tasking
operating system allows more than one program to be running in concurrency. This is
achieved by time-sharing, dividing the available processor time between multiple
processes that are each interrupted repeatedly in time slices by a task-scheduling
subsystem of the operating system.
7. Single-user
Single-user operating systems have no facilities to distinguish users, but may allow
multiple programs to run in tandem.
8. Time-sharing
Time-sharing operating systems schedule tasks for efficient use of the system and
may also include accounting software for cost allocation of processor time, mass
storage, printing, and other resources to multiple users.
9. Distributed
10. Templated
[email protected] 90
INTRODUCTION TO COMPUTERS
multiple running virtual machines. The technique is used both in virtualization and
cloud computing management, and is common in large server warehouses.
11. Embedded
12. Real-time
13. Library
A library operating system is one in which the services that a typical operating system
provides, such as networking, are provided in the form of libraries. These libraries are
composed with the application and configuration code to construct unikernels –
which are specialized, single address space, machine images that can be deployed to
cloud or embedded environments.
1. Multi-user: Allows two or more users to run programs at the same time. Some
operating systems permit hundreds or even thousands of concurrent users.
2. Multiprocessing : Supports running a program on more than one CPU.
3. Multitasking : Allows more than one program to run concurrently.
4. Multithreading : Allows different parts of a single program to run concurrently.
5. Real time: Responds to input instantly. General-purpose operating systems, such as
DOS and UNIX, are not real-time.
Computers can operate in many different ways requiring different and complex
operating systems.
[email protected] 91
INTRODUCTION TO COMPUTERS
Real time processing
When the computer has to react within a guaranteed time to an input, a real
time operating system is used. For example, the engine management system
within a car uses a real time operating system in order to react to all the things
going on within the engine. A real time operating system does not necessarily
have to be fast. It simply has to be quick enough to respond to inputs in a
predictable way. Embedded computers often contain an RTOS as many are
used to control something.
Computers operating in real time are often dedicated to the control of systems
such as industrial processes, planes and space flights. Another example of real
time processing is computer games. For example, when an action is selected
in a game, the data is fed back to the computer and the systems updated.
Multi-programming
Multi-programming is a method of operating such that several programs
appear to be running at once.
The jobs are usually given priorities. The operating system switches jobs in
and out of processor time according to priority. For example, while one job is
being allocated printer time, another will be being processed in memory. The
processor is so fast that it seems that many jobs are being processed at the
same time.
Multi-tasking
This isn't just about running more than one application at the same time.
Multi-tasking allows multiple tasks to run concurrently, taking turns using
the resources of the computer.
This can mean running a couple of applications, sending a document to the
printer and downloading a web page.
However, operating systems are not truly multi-tasking - in order to do this,
you would need parallel processors, which are now appearing on personal
computers.
Multiprocessing
An operating system technique which can manage multiple instruction processors,
assigning each to operate upon a different instruction stream (program or job)
concurrently.
Multiprocessing is the use of two or more central processing units (CPUs) within
a single computer system. The term also refers to the ability of a system to
support more than one processor and/or the ability to allocate tasks between
them.There are many variations on this basic theme, and the definition of
multiprocessing can vary with context, mostly as a function of how CPUs are
defined (multiple cores on one die, multiple chips in one package, multiple
packages in one system unit, etc.).
Multiprocessing sometimes refers to the execution of multiple concurrent
software processes in a system as opposed to a single process at any one instant.
However, the terms multitasking or multiprogramming are more appropriate to
describe this concept, which is implemented mostly in software, whereas
multiprocessing is more appropriate to describe the use of multiple hardware
[email protected] 92
INTRODUCTION TO COMPUTERS
CPUs. A system can be both multiprocessing and multiprogramming, only one of
the two, or neither of the two.
Multi-access or multi-user
A multi-access (or multi-user) system is one where a number of users are able to
use the same system together.
Modern personal computers can allow multi user access i.e. more than one person
can make use of the computer resources at the same time via a LAN.
The central processor deals with users in turn; clearly the more users, the slower
the response time. Generally, however, the processor is so fast that the response
time at the most is a fraction of a second and the user feels they are being dealt
with immediately.
o Multi-user is a term that defines an operating system or application
software that allows concurrent access by multiple users of a computer.
Time-sharing systems are multi-user systems. Most batch processing
systems for mainframe computers may also be considered "multi-user", to
avoid leaving the CPU idle while it waits for I/O operations to complete.
However, the term "multitasking" is more common in this context.
o An example is a UNIX server where multiple remote users have access
(such as via Secure Shell) to the UNIX shell prompt at the same time.
Another example uses multiple X Window sessions spread across multiple
terminals powered by a single machine - this is an example of the use of
thin client.
o Management systems are implicitly designed to be used by multiple users,
typically one system administrator or more and an end-user community.
Single-user
Is most commonly used when talking about an operating system being usable only
by one person at a time, or in reference to a single-user software license
agreement.E.g. MSDOS.
Batch processing
A batch processing system is where programs or data are collected together in a
batch and processed in one go. Typically the processing of payrolls, electricity
bills, invoices and daily transactions are dealt with this way.
This method of operation lends itself to jobs with similar inputs, processing and
outputs where no human intervention is needed. Jobs are stored in a queue until
the computer is ready to deal with them. Often batch processed jobs are done
overnight.
[email protected] 93
INTRODUCTION TO COMPUTERS
To keep track of who is using which resource, granting resource requests,
according for resource using and mediating conflicting requests from different
programs and users
To provide efficient and fair sharing of resources among users and programs
[email protected] 94
INTRODUCTION TO COMPUTERS
same, does the corresponding action and informs the operation by a display
screen.
Error-detecting aids -- Production of dumps, traces, error messages and other
debugging and error-detecting methods.
Coordination between other software and users -- Coordination and
assignment of compilers, interpreters, assemblers and other software to the
various users of the computer systems.
Windows
Windows based operating system is more advanced than the MS-DOS based operating
system.
It features graphical user interfaces (GUIs) – User can feed commands into the computer
through the selection of relevant icons, bars, buttons, boxes or other forms of images
(mostly resembling the intended device or operation).
True multitasking – the operating system allows for numerous tasks to be done at the
same time.
Networking – the operating system is multi-usable – many users can use it at the same
time. It is capable of holding a number of computer systems networked together.
Multimedia Presentations- the operating system allows for the presentation of
information in a variety of media including text, graphic displays, voice and other audio,
photographs and video.
Virtual Memory – It allows for the use of storage devices as extension of the main
memory thus giving the appearance of a larger main memory than actually exists.
Deleted files go to the recycle bin
Makes use of easier input methods, e.g. mouse, joystick
Windows operating system has MS-DOS option
Examples of Windows Operating Systems packages, Windows NT (new technology) and
Windows 95.
In computer terms, a window is one section of a computer’s multiple section display
screen that can have a different display.
[email protected] 95
INTRODUCTION TO COMPUTERS
OS/2
It is called the Operating System /2
It is an operating system developed by IBM and was introduced in 1994 with the
OS/2 Warp version as the latest one.
It provides graphical user interfaces (GUIs), multitasking, virtual memory and
telecommunications.
UNIX
Originally developed by AT&T but now being offered by many other vendors.
It is a multitasking, multi-user and net-work managing operating system
Because of its portability, it can be used on mainframes, midrange computers and
microcomputers.
It is a popular choice for network servers.
OPERATING SYSTEM PROGRAMMING SINGLE USER MULTI USER SINGLE TASK MULTI TASK
1. MS DOS 16 bits X X
BOOTING (also known as "booting up") is a bootstrapping process that starts operating
systems when the user turns on a computer system. A boot sequence is the initial set of
operations that the computer performs when power is switched on. The bootloader
typically loads the main operating system for the computer.
[email protected] 96
INTRODUCTION TO COMPUTERS
The operating system is responsible for managing allocation of the processor between
the different programs using a scheduling algorithm. The type of scheduler is totally
dependent on the operating system, according to the desired objective.
The OS is responsible for managing the allocation of processor time to the different
programs that will be using the computer. The processor can only execute one
instruction at a time and in a multi-user system, conflicts are bound to arise when
several user programs request usage of the processor at the same time. The OS
therefore allocates processor time to all users either in a round robin fashion or using
a system of priorities.
The operating system is responsible for managing the memory space allocated to
each application and, where relevant, to each user. If there is insufficient physical
memory, the operating system can create a memory zone on the hard drive, known as
[email protected] 97
INTRODUCTION TO COMPUTERS
"virtual memory". The virtual memory lets you run applications requiring more
memory than there is available RAM on the system. However, this memory is a great
deal slower.
The OS is responsible for managing the memory space allocated to each application.
If there is insufficient physical memory the OS can create a memory zone on the hard
drive known as virtual memory which lets you run applications requiring more
memory than is available on the system.
The operating system is responsible for the following activities in connections with
memory management.
Keep track of which parts of memory are currently being used and by whom.
Decide which processes to load when memory space becomes available.
Allocate and deallocate memory space as needed
3. MANAGEMENT OF INPUT/OUTPUT:
5. MANAGEMENT OF AUTHORISATIONS:
6. FILE MANAGEMENT:
The operating system manages reading and writing in the file system and the user and
application file access authorizations.
The OS manages reading from and writing to files and also controls the creation,
manipulation and access to files.
The operating system is responsible for the following activities in connections with
file management:
File creation and deletion
Directory creation and deletion
Support of primitives for manipulating files and directories
Mapping files onto secondary storage
File backup on stable (nonvolatile) storage media
7. INFORMATION MANAGEMENT:
The operating system provides a certain number of indicators that can be used to
diagnose the correct operation of the machine.
8. ERROR DETECTION
[email protected] 98
INTRODUCTION TO COMPUTERS
The OS is responsible for detecting and any hardware or software malfunctioning and
reporting them to the user
9. USER/SYSTEM INTERFACE
The OS acts as an interface between the computer and the user, hiding all the
complexities of the computer from the user and making the computer more user
friendly
The OS compiles a report on the events that take place in a computer from the time a
user logs on to a computer, what he/she does up to the time he/she logs off
COMPUTER INTERFACE
Is part of the operating system that allows you to communicate with it or the
computer so that you can load programs, access files, and accomplish other tasks?
When a person interacts with a computer he uses a User Interface, which can be a
screen, keyboard, mouse, scanners or other input devices.
The interaction between the computer and the user or the control of the flow of
data between a computer and its peripherals.
[email protected] 99
INTRODUCTION TO COMPUTERS
Command driven- include operating systems and database languages
that provide users with flashes of text and in which users would
generally type in their command to perform an action.
Menu driven
GUI- point and click
WIMP interface
A command line interface allows the user to interact with the computer by typing
in commands. The computer displays a prompt, the user keys in the command
and presses enter or return.
A COMMAND-LINE INTERFACE (CLI) is a mechanism for interacting with
a computer operating system or software by typing commands to perform specific
tasks. This text-only interface contrasts with the use of a mouse pointer with a
graphical user interface (GUI) to click on options, or menus on a text user
interface (TUI) to select options.
In the early days of personal computers, all PCs used command-line interfaces.
Commands - usually abbreviated - must be typed correctly and in the right order
or the command will not work.
Experienced users who know the commands can work very quickly without
having to find their way around menus.
An advantage of command driven programs is that they do not need the memory
and processing power of the latest computer and will often run on lower spec
machines.
Command driven programs do not need to run in Windows.
A command line interface can run many programs, for example a batch file could
launch half a dozen programs to do its task.
An inexperienced user can sometimes find a command driven program difficult
to use because of the number of commands that have to be learnt.
[email protected] 100
INTRODUCTION TO COMPUTERS
2. Graphical user interfaces (WINDOWS BASED OPERATING SYSTEM)
When discussing user interfaces, it is important to note that Windows XP, OS/X and
Linux are all graphical user interfaces.
[email protected] 101
INTRODUCTION TO COMPUTERS
3. WIMP interface
Windows, Icons, Menus and Pointer - a method by which a user can interact with
a computer without having to learn lots of special words - it provides a much
more intuitive 'view' of the computer and its facilities than non-WIMP operating
systems provide
The user is offered a simple menu from which to choose an option. One menu often
leads to a further menu. Part of the screen may have an instruction followed by a
numbered list of options to choose from:
USER INTERFACE
A user interface is a point of interaction between a computer and humans; it includes any
number of modalities of interaction (such as graphics, sound, position, movement...)
where data is transferred between the user and the computer system.
[email protected] 102
INTRODUCTION TO COMPUTERS
MS DOS VS WINDOWS
Note: Although it appears that using the command line wins this comparison, it is beneficial for user know how both methods work as
they excel in different areas.
[email protected] 103
INTRODUCTION TO COMPUTERS
APPLICATION PACKAGES/SOFTWARE
Are programs that are or were developed to solve specific user problems?
Software application packages can be custom built or they can be bought off the
shelf.
Application software consists of programs designed to perform specific tasks for
users. Application software can be used as a productivity/business tool; to assist
with graphics and multimedia projects; to support home, personal, and
educational activities; and to facilitate communications. Specific application
software products, called software packages, are available from software
vendors. Although application software also is available as shareware, freeware,
and public-domain software, these usually have fewer capabilities than retail
software packages.
Word processors, for example, Microsoft Word or the free Open Office Writer
Spreadsheet software, for example, Microsoft Excel or Open Office Calc
Graphics software, for example, Microsoft Paint, Adobe Photoshop, Corel Paint shop
Pro
Web design software, for example, Adobe Dreamweaver
System software controls how the computer system works and it enables the user to
access the system hardware and application software. Applications software does not
control the system; instead it allows the user to perform everyday tasks such as creating a
document or webpage.
[email protected] 104
INTRODUCTION TO COMPUTERS
2 Spreadsheet A spreadsheet is used to manage, analyze and present numeric information. Ms Excel,
software Some common uses of spreadsheet software are financial reports, personal Quattro Pro,
finances and business finances. Spreadsheet programs can also create a Lotus 1-2-3
chart from the numeric data.
The working screen is laid out in rows and columns, much like a ledger.
The information is typed into a "cell." A cell is the intersection of a row and
a column. The cell can contain a number, a word or phrase (generally used
to identify what the number represents, such as a column or row heading),
or a math function or formula.
Spreadsheets allow you to use simple math expressions such as add,
subtract, multiply or divide, or advanced math such as the type of
calculations performed by architects, engineers, economists and scientists.
Spreadsheets also have a special group of built-in formulas, called functions
that let you perform calculations without having to type long, complex
formulas. Functions are grouped into categories, such as financial,
statistical, engineering, logical, math and trigonometry, database and list
management, date and time, and information.
3 Database Allows user to prepare reports based on data found in different records. Ms Access,
Management DBMS is an important managerial decision support tool for managers at all DbaseIV,
Software levels of the organization. A database is an organised store of information, Oracle
for example an address book, list of employees, list of students, customers
or items of assets. Database package is used to store records. Data can be
sorted or filtered for separate viewing. Also Calculations and comparisons
between data items can be done. Popular database packages are: Microsoft
Excel, lotus Approach, Paradox, dBase IV, Data Ease.
Use this software to store data such as address, membership and other text
information. A database can be used to easily sort and organize records
4 Payroll Payroll software is technology that aims to streamline and automate the Pay plus ,
process of paying a company's employees.A payroll system calculates the Pay well
amount you owe your employees based on factors such as the time they
worked, their hourly wages or salaries, and whether they took vacation or
holiday time during the pay period. The system adjusts gross pay by
calculating and subtracting taxes and other withholding amounts.
5 Accounting Accounting software describes a type of application software that records Pastel,
and processes accounting transactions within functional modules such as Tetra 2000
accounts payable, accounts receivable, payroll, and trial balance. It e.g. Pastel,
functions as an accounting information system. It may be developed in- TurboCash,
house by the organization using it, may be purchased from a third party, or QuickBooks
may be a combination of a third-party application software package with
local modifications. Accounting software may be on-line based, accessed
anywhere at anytime with any device which is Internet enabled, or may be
desktop based. It varies greatly in its complexity and cos
6 Presentation Lets users or managers prepare slides containing charts, text and images. Ms
graphics software Presentation graphics software usually provides libraries of clip art images PowerPoint,
that can be cut and pasted into a slide to make the slide more attractive and Lotus
informative. These are applications designed solely for designing graphs freelance
and text charts/posters and often used to produce slides for use on overhead graphs
projectors, or presentations on computer-projectors. They can also produce
various types of charts. Examples of graphics packages are: Microsoft
PowerPoint, Lotus Freelance, Harvard Graphics and Corel Draw,
HyperStudio, Flash, Director.
Use this software to create multimedia stacks of cards/screens that can
effectively present a lesson or a sales pitch. The user often clicks on buttons
to advance to the next screen in a sequence
[email protected] 105
INTRODUCTION TO COMPUTERS
7 Desktop Use this software to make signs, banners, greeting cards, illustrative Ms
Publishing worksheets, newsletters, etc publisher,
Desktop Publishing (DTP) applications give users powerful and versatile Aldus
page design capabilities. The user can incorporate text and graphics on very
exact page layouts. These applications produce magazines, catalogues,
invitation cards, business cards and other sophisticated documents. It links
up well with other applications as the user can import text and graphics
from the other applications. Examples of DTP packages are: Microsoft
Publisher, PageMaker, Ventura and Frame maker.
There can be huge numbers of applications available today and these applications are
classified into the following major types.
1. Productivity Softwares
2. Collaborative Softwares
3. Utility Softwares
4. Specialized Softwares
Productivity Softwares
These softwares are used to do special productive tasks for users such as writing
documents, managing personal information, giving presentations, storing data, and
[email protected] 106
INTRODUCTION TO COMPUTERS
sending e-mail. The following Table shows different kinds of productivity softwares,
their purposes and their examples.
Collaborative Softwares
Collaborative softwares help people communicate and work with one another, and it
helps computers share information. The following table lists the collaboration software
types, their purpose and examples.
[email protected] 107
INTRODUCTION TO COMPUTERS
Utility Software
Utility softwares are basically not in the Applications category because these don’t do
anything directly for the users using computers. Instead, utilities help keep the computer
running smoothly and help manage and distribute files. The following table shows
different types of utility softwares, their purposes and examples.
[email protected] 108
INTRODUCTION TO COMPUTERS
Table: Different Utility Softwares
Specialized Softwares
These applications are designed to do specific tasks for specific peoples. These can
include software for people in professions such as computer-aided design (CAD),
medicine, science, and finance, as well as games and entertainment applications. The
following Table shows different kinds of specialized softwares, their purposes and their
examples.
This was all about the application platforms and application types and their uses with
examples. I hope that you have enjoyed the reading.
[email protected] 109
INTRODUCTION TO COMPUTERS
[email protected] 110
INTRODUCTION TO COMPUTERS
2) Import files
3) Mail merge
4) WYSIWYG capability
5) Creation of templates
6) Automatic creation of index and table of contents
1. Cost. This includes the original cost of the package, technical support, and
upgrades.
2. Portability, can it be installed on one type of hardware or a variety
3. Relevance of the software to the task at hand.
4. Compatibility with existing hardware & software. Will the package run on
existing hardware? Can files be easily transferred from existing systems without
re-keying? Can files created in the package be exported to other systems in use in
the company?
5. It should be on a media compatible with your computer i.e. if you purchase
software on CD media your computer should have compact disk drive.
[email protected] 111
INTRODUCTION TO COMPUTERS
6. Sophistication, simple programs are usually easy to learn, cost less and are
appropriate for those who use the software infrequently.
7. Should include enough documentation such as installation instructions, system
requirements e.g. Pentium 4, reference manual, registration information, supplier
details and user manual.
8. Standard software, which is well supported locally i.e. used by most people in
that area
9. Is the application upgradeable and does it support future upgrades.
10. Easiness of installation
11. Technical support. Is support available? Is it very costly? Often, technical
support contract can add 50% or more to the price of a package, but without it no
support at all will be given by the manufacturer.
12. Easy of learning. Are tutorials supplied? Are books on the software available in
bookshops? Are training courses available?
13. Easy of use and user- friendliness. Is it easy to use, for example using pull
down menus, icons, helpful error messages when you do something wrong?
14. Is the application from a reputable supplier e.g. Microsoft.
15. Do you have enough resourceson your PC to install it e.g. it may require
256MB RAM, 80GB HDD. Memory requirements; software packages vary in
the amount of memory they require. Will the system require expenditure on more
powerful hardware?
16. Does the version of the product that I am considering run on my
personalcomputer system? Is it compatible with my platform (PC, Macintosh,
Sun, and so on)? with the processor used in my computer (486, Pentium,
Motorola 6040, PowerPC, and so on)? and with the operating system that I am
running (DOS, Windows, NeXT Step, UNIX)?
17. Is the product compatible with other programs, such as extensions and device
drivers, that I have on my personalcomputer system?
18. Does the product do all that I want it to do? Is it simple enough to use
immediately but powerful enough to provide the capabilities that I will want as
my familiarity with the program increases?
19. Is the product an up-to-date, current version or release?
20. Does the product have a clear, step-by-step tutorial? Is the product easy to
learn?
21. Is the product accompanied by clear, easy-to-follow instructions, or
documentation?
22. Does the manufacturer provide technical assistance? Is a toll-free technical
assistance number included in the software documentation? Does the
manufacturer have a bulletin board or Internet address for technical assistance
questions? Does the manufacturer charge for technical assistance? for product
revisions or upgrades?
23. Can I find instruction, or training, in the use of the product?
24. Is the product from a respected, well known manufacturer?
25. Does the program have any known problems, or bugs, and will these affect my
use of the program?
[email protected] 112
INTRODUCTION TO COMPUTERS
26. Does the product come with a warranty, and what are the conditions of that
warranty?
27. Does the product cost more or less than comparable products on the market?
Utility programs - these can be part of an operating system, but are also
available for separate purchase. Examples include virus checkers, disk
defragmenters, back up utilities and disk checker software.
Generic - general purpose software that is not written for any particular type of
business. Examples of this include word processors and spreadsheets.
Integrated - a collection of software that has a common set of commands/icons.
Usually they include word processors, spreadsheets and graphics software, but
they can contain databases as well. They tend to be cheaper than purchasing each
application separately.
Specific - software written for a defined purpose. Accountancy software is a good
example of this, and can be bought by anyone.
Bespoke - also known as 'tailor made'. A company may need a particular piece of
software that it cannot purchase because it does not exist yet - or it does not like
what is available. The company can commission the software to be specially
written for them. This tends to be expensive.
1. Freeware
Freeware is the type of freely available software whose developer decides to distribute it for free.
In contrast to the open source software, the source code in this case is not available for
modifications and further development. Also, it should be noted that the distribution of the
software may also be restricted by its developer, often allowing users to download it from his site
only. Many free to download applications are available on the Internet. It is always wise to read
the license before downloading the software. Many people tend to unknowingly share such
applications with other people, without realizing that this may actually be illegal.
[email protected] 113
INTRODUCTION TO COMPUTERS
Shareware is very different from these other forms of free software and to some extent also a
misnomer. The authors of shareware maintain their full intellectual right over shareware. The only
difference between shareware and other commercially available software is that in this case the
software is available for freely for trial for a limited number of days, or a limited number of times.
After the expiry of the ‘free’ period, the users of shareware are required to pay for it. Source code
and collaboration communities which exist around open source projects do not exist in this case.
6. Outsourcing
This involves contracting out software development to a software house - better known as
outsourcing, especially where off-the-shelf packages are not available.
Advantages
o Software houses employ professionals and this may benefit the organisation
o Transfer of skills to the existing professionals in an organisation
o Organisation can get support from the contractor.
Disadvantages
o There could be breach of confidentiality.
o Contractor may go bankrupt and cease trading leaving the user with no support.
o Contractor might not have sufficient experience or understanding of the problem; thus the
solution might not be satisfactory.
o It takes time for the contractor to understand the user's business and operations, which
makes the approach expensive.
These increase the productivity & efficiency in the work place i.e.
o Word Processing packages
o Spreadsheet packages
[email protected] 114
INTRODUCTION TO COMPUTERS
o Database /Information retrieval Packages
o Graphics packages
o Data communications Software
Advantages
Disadvantages
o The package may not do exactly what you want it to do;
o It may not run on the firm’s existing hardware
o The organization might need to pay for the features that are not
required and never used.
o The package may be for general needs and therefore not ideal for the
user.
[email protected] 115
INTRODUCTION TO COMPUTERS
o The user has no direct control over the package,
Advantages
o Internal professionals understand operations better and therefore can
produce an accurate solution.
o The Software usually meets user requirements.
o Management are in total control of the development process
o More flexibility - there is more flexibility in making modifications.
o Problem specificity - in-house developed software can give an
organisation software programmes that are easily tailored to a unique
problem or task.
Disadvantages
Time and costs of developing the program may be greater than other
options
In-house staff may lack the expertise needed for the project
Reliability of the resultant software is highly questionable.
In some cases the developers may attempt to gain fraudulently from the
system
Disadvantages
1. Being customized, the non-standard software may not be used by any other
organization.
2. It has huge support costs after implementation.
3. Dependency syndrome with the supplier. There is heavy reliance on the
developers of the software for its continued existence & maintenance
[email protected] 116
INTRODUCTION TO COMPUTERS
4. Future support may be difficult if the supplying company goes under, shuts down,
or liquidate or if its development staff leaves.
5. May not be upgradeable and may not run if moved to a new hardware platform.
6. You are tied to a supplier of which you may not be willing to have a maintenance
contract with.
7. Written or Custom-built software performs a defined function and is expensive
to build.
8. Custom built is expensive to maintain
9. Custom built software has reduced lifespan due to high speed of technological
advancement in the field of computers.
UTILITY SOFTWARE
Utility software (also known as service program, service routine, tool, or utility routine)
is computer software designed to help manage and tune the computer hardware, operating
system or application software by performing a single task or a small range of tasks.
Some utility software has been integrated into most major operating systems.
Examples
Disk storage utilities
o Disk defragmenters can detect computer files whose contents are broken
across several locations on the hard disk, and move the fragments to one
location to increase efficiency.
o Disk checkers can scan the contents of a hard disk to find files or areas
that are corrupted in some way, or were not correctly saved, and eliminate
them for a more efficiently operating hard drive.
o Disk cleaners can find files that are unnecessary to computer operation, or
take up considerable amounts of space. Disk cleaner helps the user to
decide what to delete when their hard disk is full.
o Disk space analyzers for the visualization of disk space usage by getting
the size for each folder (including subfolders) & files in folder or drive.
showing the distribution of the used space.
o Disk partitioners can divide an individual drive into multiple logical
drives, each with its own filesystem which can be mounted by the
operating system and treated as an individual drive.
o Backup utilities can make a copy of all information stored on a disk, and
restore either the entire disk (e.g. in an event of disk failure) or selected
files (e.g. in an event of accidental deletion).
o Disk compression utilities can transparently compress/uncompress the
contents of a disk, increasing the capacity of the disk.
o File managers provide a convenient method of performing routine data
management tasks, such as deleting, renaming, cataloging, uncataloging,
moving, copying, merging, generating and modifying data sets.
o Archive utilities output a stream or a single file when provided with a
directory or a set of files. Archive utilities, unlike archive suites, usually
do not include compression or encryption capabilities. Some archive
[email protected] 117
INTRODUCTION TO COMPUTERS
utilities may even have a separate un-archive utility for the reverse
operation.
System profilers provide detailed information about the software installed and
hardware attached to the computer.
Anti-virus utilities scan for computer viruses.
Text and Hex Editors directly modify the text or data of a file. These files could
be data or an actual program.
Data compression utilities output a shorter stream or a smaller file when
provided with a stream or file.
Cryptographic utilities encrypt and decrypt streams and files.
Launcher applications provide a convenient access point for application
software.
Registry cleaners clean and optimize the Windows registry by removing old
registry keys that are no longer in use.
Network managers check the computer's network, log events and check data
transfer.
Command line interface (CLI) and Graphical user interface (GUI) Allows the
user to contact and make changes to the operating system.
INTEGRATED SOFTWARE
Integrated software is software for personal computers that combines the most
commonly used functions of many productivity software programs into one
application.
The integrated software genre has been largely overshadowed by fully functional
office suites, most notably Microsoft Office, but at one time was considered the
"killer application" type responsible for the rise and dominance of the IBM PC in
the desktop business computing world.
In the early days of the PC before GUIs became common, user interfaces were
text-only and were operated mostly by function key and modifier key sequences.
Every program used a different set of keystrokes, making it difficult for a user to
master more than one or two programs. Programs were loaded from floppy disk,
making it very slow and inconvenient to switch between programs and difficult or
impossible to exchange data between them (to transfer the results from a
spreadsheet to a word processor document for example). In response to these
limitations, vendors created multifunction "integrated" packages, eliminating the
need to switch between programs and presenting the user with a more consistent
interface.
The potential for greater ease-of-use made integrated software attractive to home
markets as well as business, and packages such as the original AppleWorks for
the Apple II and Jane for the Commodore 128 were developed in the 1980s to run
on most popular home computers of the day.
Context MBA was an early example of the genre, and featured spreadsheet,
database, chart-making, word processing and terminal emulation functions.
[email protected] 118
INTRODUCTION TO COMPUTERS
However, because it was written in Pascal for portability, it ran slowly on the
relatively underpowered systems of the day. Lotus 1-2-3, which followed it, had
fewer functions but was written in assembler, providing it with a speed advantage
that allowed it to become the predominant business application for personal
computers.[2]
The integrated software market of today is exemplified by entry-level programs
such as Microsoft Works which are often bundled with personal computers as
"starter" productivity suites.
[email protected] 119
INTRODUCTION TO COMPUTERS
integrated software
A group of applications designed to work together and share data easily.
Software that combines the features of several different applications in a single
program (e.g. word processing, database, spreadsheet, graphics, and
communications)..
Disadvantages
Limited portability. The same applications must exist on every computer that you
wish to open the document.
Offer fewer features and less versatility than stand alone versions or software.
Functional limitation. Its rigid you cannot change it to suit your specific needs.
[email protected] 120
INTRODUCTION TO COMPUTERS
Microsoft Office 97
Microsoft Works
Claris Works
Lotus SmartSuite 97
Microsoft Office 2003,2007,2010 & 2013
Open source is a type of software which is freely available and its source code is
available for further development, modification. Generally all open source
software have a community of developers who provide support, documentation
and even binary versions of the software to people who may be interested in it.
These additional services, though, may not be free monetarily.
There are several ongoing open source software projects. The open source nature
of these projects means that there will be several people working on modifying
and improving the software from around the world. Some such examples include
the Web browser Mozilla Firefox, content management software like Drupal,
Joomla etc.
SOFTWARE COPYRIGHT
Copyright is a legal concept, giving the creator of an original work exclusive rights to
control its distribution for a certain time period.
Copying computer software is therefore a breach of copyright and a criminal offence. The
Act covers stealing software, using illegally copied software and manuals, and running
purchased software on more machines than the license allows.
The legal penalties for breaking the copyright law include unlimited fines and up to two
years in prison.
All the software that you use should be fully licensed. When you purchase software you
usually are licensed to use it on just one computer. It is illegal to make copies of the
software to use on other computers, even if they are your own.
[email protected] 121
INTRODUCTION TO COMPUTERS
Software protection
Software companies try to prevent illegal copying of their disks using the following
methods:
Copy protection - the disk (or CD-Rom) may be formatted in a special way so it
cannot easily be copied.
Restricting the number of installations - each installation is recorded on an
installation disk and only a certain number are allowed.
A registration key - a unique series of letters and numbers that is asked for when
running the program. The software will not run if the registration key is not typed
in correctly and online multiplayer games will not to run if another user is online
who has used the same key.
A phone or Internet activation code - this requires the user to call a number or
go online to register the product. They then receive a unique computer-specific
serial number.
Encryption - data can be scrambled up and cannot be read without the correct
software.
A Dongle - a piece of hardware that must be plugged into the computer to run the
software. Each one contains a unique electronic serial number and as they are
expensive to produce they are mostly used to protect high-end software packages.
Details of the user are built into the software - when the software is run it
displays the original users name. This does not prevent the copying but it makes is
obvious that the copy is illegal.
A Keyfile - a small file with a unique code that is placed in the same directory as
the program. If the code is not valid then the software will not run.
SOFTWARE PIRACY
Unauthorized copying of software.
Unauthorized use or reproduction of copyrighted patented material.
unauthorized copying of software
The production of illegal copies of software.
By far, the biggest legal problem affecting the computer industry today is
software piracy, which is the illegal copying or use of programs. Piracy is a huge
problem mainly because it is so easy to do. In most cases, it is no more difficult
to steal a program than it is to tape a music CD that you have borrowed from a
friend. Software pirates give up the right to receive upgrades and technical
support, but they gain the use of the program without paying for it.
Implications of Software piracy
Loss of business to software companies.
Lack of technical support, no connection with supplier upgrades.
Software incompatibility, may require a key, which you might not have, as a
result you can’t install it.
Virus Spread
Lawsuits for copyright, which may be very costly in terms of reputation and
money.
[email protected] 122
INTRODUCTION TO COMPUTERS
Piracy harms all software publishers, Regardless of their size. Software
publishers spend years developing software for the public to use. A portion
of every dollar spent in purchasing original software is channeled back into
research and development so that better, more advanced software products
can be produced. When you purchase pirated software, your money goes
directly into the pockets of software pirates instead.
Software piracy also harms the local and national economies. Fewer
legitimate software sales result in lost tax revenue and decreased
employment. Software piracy greatly hinders the development of local
software communities. If software publishers cannot sell their products in
the legitimate market, they have no incentive to continue developing
programs. Many software publishers simply won’t enter markets where the
piracy rates are too high, because they will not be able to recover their
development costs.
Software piracy harms everyone in the software community including
you, the end user. How?
1) Piracy results in higher prices for duly licensed users,
2) Piracy reduces levels of support, and
3) Delays in the funding and development of new products, causing the
overall selection and quality of software to suffer.
[email protected] 123
INTRODUCTION TO COMPUTERS
over bulletin boards or online services, which may or may not be licensed for use
solely with licensed Microsoft products. You should check the EULA accompanying
the product to determine how it can be used.
License Misuse. This form of piracy occurs when copyrighted software is distributed
outside the restricted legitimate channels it was designed for or the product is used in
ways not allowed in the license agreement. Examples of license misuse include:
(1) Academic product misuse
This form of license misuse occurs when a product that is manufactured,
licensed, and specifically marked for distribution to educational institutions
and students at reduced prices is diverted into normal commercial channels of
distribution. Typically this product will contain a sticker indicating that it is
academic product and for use only by educational institutions.
(2) Not for Resale (NFR) product misuse.
Again, this form of license misuse occurs when a product that has been clearly
marked "Not for Resale," and is typically distributed as a promotional or
sample product and is not licensed for normal commercial distribution and
use, is diverted into normal commercial channels of distribution.
(3) Original equipment manufacturer (OEM) stand-alone product. This form
of license misuse occurs when OEM version software has been unbundled from
its designated computer system and distributed as a separate, “stand-alone”
product. Microsoft’s agreement with computer manufacturers prohibits them from
distributing Microsoft products in this fashion, i.e. without accompanying
computer hardware.
Microsoft products on the retail shelf should never include a line on the front
cover of the User’s Guide that states, “For Distribution Only With New Computer
Hardware.”
(3) “Microsoft Easy Fulfillment” (MEF) product misuse. This form of license
misuse occurs when a “Microsoft Easy Fulfillment” (MEF) product is diverted
into normal commercial channels of distribution. The MEF product may be
distributed only to end users who have a Select or Open (MOLP) license and
who order the product in accordance with their license terms. The MEF
product has a sticker on the jewel case identifying the product as “Microsoft
Easy Fulfillment.”
(4) Volume licensing misuse. Volume Licensing enables organizations to acquire
the rights to copy and use specific Microsoft software products with
agreements tailored to the number of products needed at the particular
organization. These volume programs offer a broad range of products and
licensing options and reduce administrative overhead and software
management costs.
[email protected] 124
INTRODUCTION TO COMPUTERS
b. Open provides savings for small and medium organizations for licenses of as
few as 20 units of a particular software product, with a simple ordering
process.
Misuse under volume licensing occurs when organization copies software
purchased through the volume program on more computers than specified in their
license agreement. Other violations occur when an organization allows concurrent
use of software products (which currently is offered only as an option under the
Select and Open programs) without the purchase of the option that allows for this
concurrent use.
User licenses show users rights to use pieces of software.
Is a collection of files?
An organized collection of interrelated files.
Is a collection of related files that provides a way of finding information quickly
and easily from a chosen reference point?
Is an integrated collection of logically related records or files?
A database consolidates records previously stored in separate files into a common
pool of data records that provides data for many applications.
[email protected] 125
INTRODUCTION TO COMPUTERS
Secondary key-An alternative index for identifying an entity. Its value
can identify single entity occurrences of all entity occurrences. A subset of
all entity occurrences.
Foreign key-Are pointers or links to occurrences of a different file. A
foreign key in one file must be a primary key in another file.
Descriptors-Are any other fields that describe business entities.
This is programming with files. Each user defines and implements the files
needed for a specific application so that each application has its own separate data
files and software programs
Although both users will be interested in the same data, each maintains separate
files and programs to manipulate these files and this results in data redundancy
and a lot other problems associated with it.
Disadvantages
Database systems are complex, difficult and time consuming to design
There is greater impact of failure
Extensive conversion costs involved
Initial training is required for all users
Concurrence problems - where more than one user access and attempt to update
the same record at the same time - there is file edit locking to prevent this.
Ownership problems - sometimes some individuals tend to own the data and thus
refuse access by other individuals or departments in the organisation.
Resources problem - with database extra resources are needed e.g. more
workstations and other devices. Substantial hardware and software startup costs
are involved
Security problems - there is increased exposure to unauthorised entry into the data.
However, this could be reduced by the use of regularly changed passwords and by
physically denying access to unauthorised users.
[email protected] 126
INTRODUCTION TO COMPUTERS
DATABASE TERMINOLOGY
Entity - a real world object or event or anything that is capable of independence
existence and about which we can collect information e.g. person, building,
transaction, election
Attribute – a characteristic or property of an entity e.g. name
Primary key – an attribute that uniquely identifies an entity or record. A field
that uniquely identifies a record in a table. In a students table, for instance, a key
built from last name + first name might not give you a unique identifier (two or
more Jane Does in the school, for example). To uniquely identify each student,
you might add a special Student ID field to be used as the primary key.
Foreign key - A key used in one table to represent the value of a primary key in a
related table. While primary keys must contain unique values, foreign keys may
have duplicates. For instance, if we use student ID as the primary key in a
Students table (each student has a unique ID), we could use student ID as a
foreign key in a Courses table: as each student may do more than one course, the
student ID field in the Courses table (often shortened to Courses.student ID) will
hold duplicate values.
Normalization - The process of structuring data to minimise duplication and
inconsistencies. The process usually involves breaking down a single table into
two or more tables and defining relationships between those tables. The process
of breaking up a table into multiple tables, each of which has a single theme,
thereby reducing data redundancy; 2) The technique that reduces or eliminates the
possibility that a database is subject to modification anomalies
Query - A view of your data showing information from one or more tables. For
example, you could query a Students database asking "Show me the first and last
names of the students who take both history and geography and have Alice
Hernandez as their advisor". Such a query displays information from the Students
table (firstname, lastname), Courses table (course description) and Advisor table
(advisor name), using the keys (student ID, course ID, advisor ID) to find
matching information. Literally, a question you ask about data in the database in
the form of a command, written in a query language, defining sort order and
selection, that is used to generate an ad hoc list of records; 2) The output subset of
data produced in response to a query.
SQL - Structured Query Language (pronounced sequel or ess-queue-ell). A
computer language designed to organize and simplify the process of getting
information out of a database in a usable form, and also used to reorganize data
within databases.
Relation - A single store of related information. A table consists of records, and
each record is made up of a number of fields. You can think of the phone book as
a table: It contains a record for each telephone subscriber, and each subscriber’s
details are contained in three fields – name, address and telephone.
DBMS - Database management system. A program which lets you manage
information in databases. Microsoft Access is a DBMS, although the term is often
shortened to ‘database’. So, the same term is used to apply to the program you use
to organize your data and the actual data structure you create with that program.
[email protected] 127
INTRODUCTION TO COMPUTERS
Domain - A collection or range of all the possible values a field can contain.
Although a field’s domain is typically finite, it may be infinite as well.
Derived attribute - Synonymous with computed attribute, for which the value is
calculated from those contained in other fields. Usually, computed fields’ values
are calculated from other fields’ values that occur in the same record
Metadata - Data about data and the data’s structure within a database. Technical
metadata reflects the description of the structure, content, keys, and indexes of
data and their source of origin, while business metadata reflects definitions about
measures (facts) using calculations
OLAP - (Online Analytical Processing)The OLAP Council defines online
analytical processing as, "A category of software technology that enables
analysis, managers and executives to gain insight into data through fast,
consistent, interactive access to wide variety of possible views of information that
have been transformed from raw data to reflect the real dimensionality of the
enterprise as understood by the user."
Record - Synonymous with row and tuple. An instance of data in a table, a record
is a collection of all the facts related to one physical or conceptual entity; often
referring to a single object or person, usually represented as a row of data in a
table, and sometimes referred to as a tuple in some, particularly older, database
management systems.
Schema - The database’s metadata -- the structure of an entire database, which
specifies, among other things, the tables, their fields, and their domains. In some
database systems, the linking or join fields are also specified as part of the schema
2) The description of a single table. Also called a Logical Schema.
Concatenated key – a key formed by joining two or more attributes
Relationship a link or association between any two entities in a database
ERD - An entity-relationship (ER) diagram is a specialized graphic that illustrates
the interrelationships between entities in a database. ER diagrams often use
symbols to represent three different types of information. Boxes are commonly
used to represent entities. Diamonds are normally used to represent relationships
and ovals are used to represent attributes.
[email protected] 128
INTRODUCTION TO COMPUTERS
One-to-Many
o Exactly one record in one table is related by a common linking field to one or more
records in another table, implying that each value of the linking field is unique in
the first table, but not necessarily so in the second. The primary key table contains
only one record that relates to none, one, or many records in the related table. This
relationship is similar to the one between you and a parent. You have only one
mother, but your mother may have several children.
Many-to-Many
One or more records in one table may be related to one or more records in a
second table by a common value or linking (join) field. This implies that each
value of the linking field may appear any number of times in either or both tables.
Each record in both tables can relate to any number of records (or no records) in
the other table. For instance, if you have several siblings, so do your siblings
(have many siblings). Many-to-many relationships require a third table, known as
an associate or linking table, because relational systems can't directly
accommodate the relationship.
[email protected] 129
INTRODUCTION TO COMPUTERS
Implementing access privileges for all users of the database; that is, specifying
which items can be accessed and / or changed by each user.
Allocating passwords to each user.
Providing training to users in how to access and use the database.
Manage the organizations
-data resources
-database plans
-design
-operations
-training
-user support
-security & Maintenance
1. Data storage, retrieval and update. The DBMS must allow users to store
retrieve and update information as easily as possible, without having to be aware
of the internal structure of the database.
2. Creation and maintenance of the data dictionary
3. Managing the facilities for sharing the database. The DBMS has to ensure that
problems do not arise when two people simultaneously access a record and try to
update it
4. Back up and recovery. The DBMS must provide the ability to recover the
database in the event of system failure.
5. Security. The DBMS must handle password allocation and checking, and the
‘view’ of the database that a given user is allowed.
[email protected] 130
INTRODUCTION TO COMPUTERS
It will contain information such as:
1. What tables and columns are included in the present structure?
2. The names of the current tables and columns
3. The characteristics of each item of data, such as its length and data type;
4. Any restrictions on the value of certain columns
5. The meaning of any data fields that are not self-evident; for example, a field such
as ‘course type’;
6. The relationships between items of data
7. Which programs access which items of data, and whether they merely read the
data or change it?
# ADVANTAGES # DISADVANTAGES
1 Supports data sharing 1 Limitations of databases arise from
increased technological complexity
2 Ensures increased data security 2 Developing a large database and installing a
DBMS can be difficult and expensive.
3 Ensures data independence 3 More hardware capability is required, since
storage requirements for the organization of
data, overhead control data, and the DBMS
is greater
4 Data integrity is guaranteed. The functions 4 Problems of data inconsistency can arise if
in the DBMS can be used to enforce the a distributed database approach is used.
integrity rules with minimum programming
in the application programs.
5 Reduces or minimizes data redundancy 5 Longer processing times may result from
high volume transaction processing
applications since extra layer software [the
DBMS] exists between application
programs and the Operating system.
6 Consistence of data is ensured 6 Security and integrity of data are major
concerns.
7 Support data integration. Since related Centralized databases are vulnerable to
data is stored in one single database, errors, fraud and failures.
enforcing data integrity is much easier
8 Related data can be shared across
programs since the data is stored in a
centralized manner
9 Enforcing of standards in the organization
and structure of data files is required and
also easy in a Database System, since it is
one single set of programs, which is always
interacting with data files
10 The application programmer need not build
the functions for handling issues like
concurrent access, security, data integrity,
etc. The programmer only needs to
implement the application business rules.
This brings in application development
ease.
[email protected] 131
INTRODUCTION TO COMPUTERS
Q* Limitations of file Processing Systems that the DBM system address
i. Data duplication - Same kind of information is stored in several files
ii. Lack of Data integration – Independent files make it difficult to provide end users with
info for ad-hoc requests that require accessing data stored in different files
iii. Data dependence – In a file processing system, the organization of files, their physical
location on storage hardware and application software used to access those files depend
on each other.
Changes in format and structure o data and records in file require changes to all the
programs
A collection of software programs that stores organizes and allows access to the
data in a uniform and consistent way
Is a collection of programs that enables users to create and maintain a database?
A general purpose software system that facilitates the process of defining
constructing and manipulating databases for various applications.
Database Environment
i. Database
ii. Database users
iii. DBM System
iv. Data Dictionary
v. Database Administrator
vi. User/system interface
Database Users
i. Casual users
ii. Naïve users – parametric users
iii. Sophisticated end users
I. Occasionally use it, and if they do a HLL such as AQL may be used.
II. Those who use Standard queries and updates only e.g. bank cashiers, data entry
clerks’ e.t.c.
III. Know the whole range of facilities on a database environment.
[email protected] 132
INTRODUCTION TO COMPUTERS
8. Integrity
9. Data Independence
10. Utilities
4. Concurrency Control
- Allows a mechanism to ensure that the database is updated correctly when
multiple users are updating the database concurrently
LOCKING OR DEADLOCK situations must be avoided
5. Recovery
- Allows a mechanism for recovering the database in the event that the database is
damaged in any way.
- A before / after image is usually created
6. Security
- Allows a mechanism to ensure that only authorized users can access the database.
- Authorizations, encryption features and limited views can be used as security
provisions
7. Communication
- Must be capable of integrating with communications software on the database
environment on a multi-user environment.
8. Integrity
- Allows a mechanism to ensure that both the data in the database and changes to
the data follow certain rules.
9. Data Independence
- (Has facilities to) support the independence of programs from the actual structure
of the database.
10. Utilities
- Provide a set of utility services e.g. optimized
COMPONENTS OF A DBMS
1. Data dictionary/directory
2. Data language
3. Application development tools
4. Security software
5. Report writers
6. Query language
7. Web server software
8. Teleprocessing monitors
9. Archiving, backup and Recovery systems
[email protected] 133
INTRODUCTION TO COMPUTERS
Contains the names and descriptions of every data element in the
database.
Also contains descriptions of how data elements relate to one another.
Ensures that data is stored in a uniform and consistent manner hence
reducing redundancy.
2. DATA LANGUAGES
[email protected] 134
INTRODUCTION TO COMPUTERS
10. Data accessibility and responsiveness.
11. Structured Query Language e.g. select name from customer where town = Harare”
Diagram
[email protected] 135
INTRODUCTION TO COMPUTERS
Is almost similar to the hierarchical model but is more flexible and versatile because a
record can be linked to any other record in the model; i.e. the network model can reflect a
many-to-many (M:N) relationship.
The route to data is not necessarily downwards but can in any direction
The major advantage is its ability to handle sophisticated relationships among various
records and more than one path can lead to desired data level
Network complexity limits users in their ability to access the database without the help of
programming staff
A record can belong to a number of parents
Relationship among records is many to many
Allows entry into a database at multiple points because any data element or record can be
related to many other data elements.
Permits a record to be a member of more than one set at a time Hierarchical and
network models are less flexible than other database models because the relationship
between records must be determined and implemented before a search can be conducted.
A Network database management system uses a data model similar to Hierarchical
database management systems.
The major difference here is that the tree structure in the Network models can have a
many parent to many child relational model.
The Network model structure is based on records and sets and most of these databases
use SQL for manipulation of their data.
Network database management systems tend to be very flexible but are rarely used and
were very quiet common in the1960s and 1970s.
Diagram
[email protected] 136
INTRODUCTION TO COMPUTERS
Diagram
[email protected] 137
INTRODUCTION TO COMPUTERS
[email protected] 138
INTRODUCTION TO COMPUTERS
Diagram
[email protected] 139
INTRODUCTION TO COMPUTERS
Data Security/Protection
Refers to keeping data safe from various hazards or dangers like natural
hazards, deliberate corruption or destruction of software & hardware by
malicious or terrorist acts, illegal access to data by hackers [people who break
into the system] & accidental destruction of data by hardware or software
failure [operator error].
2. Firewall
A firewall is a software program designed to prevent unauthorized access to a PC
or network through a connection to the Internet. It works by monitoring all data
sent to and from the PC and comparing the data with a set of user-defined security
criteria. Any data that does not meet that criteria is blocked. Firewalls also
process encrypted data. They verify the validity of the user. User would require
access to the firewall before they can transmit data. Latest firewalls also have the
[email protected] 140
INTRODUCTION TO COMPUTERS
ability to detect virus software in packets of data that is sent through the network.
Firewalls disallow data transmission if it detects strains of virus on the data being
transmitted.
3) Usernames & Passwords
Passwords restrict only authorized personnel/users to have access to the data or
computer rooms [cards]. Passwords bring in an aspect of accountability, if a file is
deleted, the person with the password will be reported as the culprit through
logging. Passwords can be forgotten. Widely used by companies to protect their
equipment & data
4) Authorized entry to computer installations
Most installations have card readers, voice recognition systems or keypads on the
doors that prohibit entry to unauthorized personnel.
5) Backing-up files on external disks periodically.
6) Keeping backup copies of files in a different location and making about 3 generations
of backup.
7) Saving work frequently
8) Avoiding viruses.
9) Restricting access to the computer room. Access could be only through codes, voice
recognition etc.
10) Installing fire alarms.
11) Lining computer rooms with fire resistant material.
12) Placing the computer room in upper floors of a building to avoid burglaries.
13) Having a security guard 24 hours a day.
BACK UP
Copying or saving data to a different location. One can restore the backup
copy if data is lost or damaged.
[email protected] 141
INTRODUCTION TO COMPUTERS
To create a copy of a disk’s contents on another location for safe keeping.
Since hard drives are not infallible, it is recommended that you backup its
contents regularly.
DISASTER PLANNING
Many companies have comprehensive emergency plans so that even after suffering a
severe:
Bomb
Fire damage
Natural disaster, the company can be up and running within a day or
two.
Disaster plan
The documented policies and procedures intended to either prevent damage,
minimize damage, or recover from damage to record materials.
[email protected] 142
INTRODUCTION TO COMPUTERS
Data can be lost or become corrupted by computer viruses.
Data can be hacked into by unauthorized users and deleted or altered.
Data can be destroyed by terrorist activities, war, bombs and fire.
Data can be deleted or altered by unpleasant employees wishing to make money
or seek revenge on their employers.
Explain 5 major threats to information systems; for each threat describe its impact
and preventative measure you would adopt to prevent it. [15].
As use of internet and related telecommunications technologies and systems has become
pervasive ,use of these networks now creates a new vulnerability for organizations or
companies .These networks can be infiltrated or subverted a number of ways .As a result
,organizations or companies will faced threats that affect and vulnerable to information
system security . Threats to information system can come from a variety of places inside
and external to an organizations or companies .In order to secure system and information
,each company or organization should analyze the types of threats that will be faced and
how the threats affect information system security .Examples of threats such as
[email protected] 143
INTRODUCTION TO COMPUTERS
unauthorized access (hacker and cracker ) ,computer viruses ,theft ,sabotage ,vandalism
and accidents
[email protected] 144
INTRODUCTION TO COMPUTERS
Unauthorized One of the most common security risks in relation to computerized Spoofing and Sniffing
Access information systems is the danger of unauthorized access to confidential Denial of Service Attacks
(Hacker and data .The main concern comes from unwanted intruders, or hackers, who (DOS)
Cracker) use the latest technology and their skills to break into supposedly secure
computers or to disable them .A person who gains access to information
system for malicious reason is often termed of cracker rather than a
hacker.
Computer Computer virus is a kind of nasty software written deliberately to enter a Worms
Viruses computer without the user’s permission or knowledge ,with an ability to Trojan horses
duplicate itself ,thus continuing to spread .Some viruses do little but
duplicate others can cause severe harm or adversely affect program and
performance of the system .Virus program may still cause crashes and
data loss .In many cases ,the damages caused by computer virus might be
accidental ,arising merely as the result of poor programming .Type of
viruses ,for example ,worms and Trojan horses .
Theft The loss of important hardware, software or data can have significant Physical Theft
effects on an organization’s effectiveness .Theft can be divided into three Data Theft
basic categories: physical theft, data theft, and identity theft. Identity Theft
Sabotage With regard to information systems , damage may be on purpose or Individual Sabotage
accidental and carried out an individual basis or as an act of industrial Industrial Sabotage
sabotage .Insiders have knowledge that provide them with capability to Unintentional Sabotage
cause maximum interruption to an agency by sabotaging information
systems .Examples include destroying hardware and infrastructure
,changing data ,entering incorrect data ,deleting software ,planting logic
bombs ,deleting data ,planting a virus .
Vandalism Deliberate damage cause to hardware, software and data is considered a
serious threat to information system security .The threat from vandalism
lies in the fact that the organization is temporarily denied access to
someone of its resources .Even relatively minor damage to parts of a
system can have a significant effect on the organization as a whole.
Accidents Major of damage caused to information systems or corporate data arises Inaccurate data entry
as a result of human error .Accidental misuse or damage will be affected Attempts to carry out
over time by the attitude and disposition of the staff in addition to the tasks beyond the ability of
environment .Human errors have a greater impact on information system the employee
security than do manmade threats caused by purposeful attacks .But most
accidents that are serious threats to the security of information systems
can be mitigated.
[email protected] 145
INTRODUCTION TO COMPUTERS
2. Computer A computer virus is a small piece of software that can spread from one infected computer to another. The virus could
corrupt, steal, or delete data on your computer—even erasing everything on your hard drive. A virus could also use other
virus: programs like your email program to spread itself to other computers.
3. Rogue Have you ever seen a pop-up window that advertises a security update or alert? It appears legitimate and asks you to click
on a link to install the “update” or “remove” unwanted malicious software that it has apparently detected. This could be
security rogue security software designed to lure people into clicking and downloading malicious software. Microsoft has a useful
software: webpage that describes rogue security software and how you can protect yourself.
4. Trojan Users can infect their computers with Trojan horse software simply by downloading an application they thought was
legitimate but was in fact malicious. Once inside your computer, a Trojan horse can do anything from record your
horse: passwords by logging keystrokes (known as a keystroke logger) to hijacking your webcam to watch and record your
every move.
Trojan horses, commonly referred to as Trojan, are programs. They masquerade as normal, safe applications, but their
mission is to allow a hacker remote access to your computer. In turn, the infected computer can be used as part of a
denial of service attack and data theft can occur.
A particularly nasty Trojan is a keystroke logger than can be used to capture passwords, credit card numbers and other
sensitive information.
5. Malicious Malicious spyware is used to describe the Trojan application that was created by cybercriminals to spy on their victims.
An example would be keylogger software that records a victim’s every keystroke on his or her keyboard. The recorded
spyware: information is periodically sent back to the originating cybercriminal over the Internet. Keylogging software is widely
available and is marketed to parents or businesses that want to monitor their kids’ or employees’ Internet usage.
Spyware usually invades computers through software downloads. Shareware and freeware downloads, in addition to
peer-to-peer file sharing are typical infection points. Like Trojans, spyware can pilfer sensitive information, but are often
used as advertising tools as well. The intent is to gather a user's information by monitoring Internet activity and
transmitting that to an attacker.
6. Computer A computer worm is a software program that can copy itself from one computer to another, without human interaction.
Worms can replicate in great volume and with great speed. A worm is a specific type of virus. Unlike a typical virus, it's
worm: goal isn't to alter system files, but to replicate so many times that it consumes hard disk space or memory. Worm victims
will notice their computers running slower or crashing.
7. Botnet: A botnet is a group of computers connected to the Internet that have been compromised by a hacker using a computer
virus or Trojan horse. An individual computer in the group is known as a “zombie“computer.
The botnet is under the command of a “bot herder” or a “bot master,” usually to perform nefarious activities. This could
include distributing spam to the email contact addresses on each zombie computer, for example. If the botnet is
sufficiently big in number, it could be used to access a targeted website simultaneously in what’s known as a denial-of-
service (DoS) attack. The goal of a DoS attack is to bring down a web server by overloading it with access requests.
Popular websites such as Google and Twitter have been victims of DoS attacks.
8. Spam: Spam in the security context is primarily used to describe email spam —unwanted messages in your email inbox. Spam,
or electronic junk mail, is a nuisance as it can clutter your mailbox as well as potentially take up space on your mail
server. Unwanted junk mail advertising items you don’t care for is harmless, relatively speaking. However, spam
messages can contain links that when clicked on could go to a website that installs malicious software onto your
computer.
9. Phishing: Phishing scams are fraudulent attempts by cybercriminals to obtain private information. Phishing scams often appear in
the guise of email messages designed to appear as though they are from legitimate sources. For example, the message
would try to lure you into giving your personal information by pretending that your bank or email service provider is
updating its website and that you must click on the link in the email to verify your account information and password
details.
10. Rootkit: According to TechTarget, a rootkit is a collection of tools that are used to obtain administrator-level access to a computer
or a network of computers. A rootkit could be installed on your computer by a cybercriminal exploiting a vulnerability or
security hole in a legitimate application on your PC and may contain spyware that monitors and records keystrokes.
Rootkits are some of the most difficult to detect. They are activated when your system boots up -- before anti-virus
software is started. Rootkits allow the installation of files and accounts, or the purposes of intercepting sensitive
information.
[email protected] 146
INTRODUCTION TO COMPUTERS
fraud, embezzlement, theft, malicious damage, unauthorized use, denial of
service, and misappropriation
Definitions of hacking on the Web:
DATA INTEGRITY/RELIABILITY
Refers to the correctness AND The accuracy of data after being transmitted or
processed
Data in the computer system may become incorrect, corrupted or of poor quality
in many different ways & at any stage during data processing.
COMPUTER CRIME/FRAUD
Computer crimes are criminal activities, which involve the use of information
technology to gain an illegal or an unauthorized access to a computer system with
intent of damaging, deleting or altering computer data. Computer crimes also
include the activities such as electronic frauds, misuse of devices, identity theft
and data as well as system interference. Computer crimes may not necessarily
involve damage to physical property. They rather include the manipulation of
confidential data and critical information. Computer crimes involve activities of
software theft, wherein the privacy of the users is hampered. These criminal
activities involve the breach of human and information privacy, as also the theft
and illegal alteration of system critical information. The different types of
computer crimes have necessitated the introduction and use of newer and more
effective security measures.
Computer Fraud/Crime
Criminal actions accomplished through the use of computer systems,
especially with the intent to defraud, destroy, damage, or make
unauthorized use of computer resources.
[email protected] 147
INTRODUCTION TO COMPUTERS
E.g. improper transfer of funds from one account to another
Hacking: The activity of breaking into a computer system to gain an unauthorized access
is known as hacking. The act of defeating the security capabilities of a computer system
in order to obtain an illegal access to the information stored on the computer system is
called hacking. The unauthorized revelation of passwords with intent to gain an
unauthorized access to the private communication of an organization of a user is one of
the widely known computer crimes. Another highly dangerous computer crime is the
hacking of IP addresses in order to transact with a false identity, thus remaining
anonymous while carrying out the criminal activities.
Computer Viruses: Computer viruses are computer programs that can replicate
themselves and harm the computer systems on a network without the knowledge of the
system users. Viruses spread to other computers through network file system, through the
network, Internet or by the means of removable devices like USB drives and CDs.
[email protected] 148
INTRODUCTION TO COMPUTERS
Computer viruses are after all, forms of malicious codes written with an aim to harm a
computer system and destroy information. Writing computer viruses is a criminal activity
as virus infections can crash computer systems, thereby destroying great amounts of
critical data.
Identity Theft: This is one of the most serious frauds as it involves stealing money and
obtaining other benefits through the use of a false identity. It is the act of pretending to be
someone else by using someone else's identity as one's own. Financial identity theft
involves the use of a false identity to obtain goods and services and a commercial identity
theft is the using of someone else’s business name or credit card details for commercial
purposes. Identity cloning is the use of another user's information to pose as a false user.
Illegal migration, terrorism and blackmail are often made possible by means of identity
theft.
The different types of computer crimes involve an illegal exploitation of the computer
and communication technology for criminal activities. While the advancing technology
has served as a boon to mankind, the destructively directed human intellects are all set to
turn technology into a curse. However, crimes are sure to end, as it is truth that always
triumphs!
1. Intellectual crime – cracking into a computer system with the sole aim of
transferring or stealing funds, e.g. Salami slicing which is the activity of
obtaining or stealing money repeatedly in extremely small quantities over a period
of time
2. Destruction of property
3. Software piracy
4. Deliberate circumvention of computer security systems or unauthorized access to
or modification of computer programs and data; i.e. hacking which attempts to
bypass the security mechanism of a computer system or network
5. Theft of computer hardware and software or taking away software without the
owner’s consent
6. Making and distributing pornography
[email protected] 149
INTRODUCTION TO COMPUTERS
Separation of duties
Use of passwords
Security manager software-to monitor attempts to access the system
whether successful or not.
Educating staff
Prevention of unauthorized access to the computer operations room
Data Encryption/Decryption
Cloutier shares his tip for crafting a hard-to-crack password: use a combination of
capital and lower-case letters, numbers and symbols and make it 8 to 12
characters long.
You should definitely avoid using: any personal data (such as your
birthdate), common words spelled backwards and sequences of characters or
numbers, or those that are close together on the keyboard.
Use their convenient password checker to see how strong yours is.
As for how often you should change your password, Cloutier says that the
industry standard is "every 90 days," but don't hesitate to do it more frequently if
your data is highly-sensitive.
Another key: make sure every individual has their own username and password
for any login system, from desktops to your CMS. "Never just use one shared
password," says Cloutier.
[email protected] 150
INTRODUCTION TO COMPUTERS
towards being fully protected; there's little point in installing all this great
software if you're not going to maintain it right.
"Your security applications are only as good as their most recent update,"
Watchinski explains. "While applications are not 100 percent fool-proof, it is
important to regularly update these tools to help keep your users safe."
Frequently updating your programs keeps you up-to-date on any recent issues or
holes that programmers have fixed.
5. Secure your laptops
Because of their portable nature, laptops are at a higher risk of being lost or stolen
than average company desktops. It's important to take some extra steps to make
certain your sensitive data is protected.
Encryption software changes the way information looks on the harddrive so that,
without the correct password, it can't be read.
6. Secure your mobile phones
Cloutier points out that smartphones hold so much data these days that you should
consider them almost as valuable as company computers -- and they're much
more easily lost or stolen. As such, securing them is another must.
The must-haves for mobile phones:
Encryption software
Password-protection (Cloutier also suggests enabling a specific "lock-out"
period, wherein after a short amount of time not being used, the phone locks
itself)
Remote wiping enabled
7. Backup regularly
Scheduling regular backups to an external hard drive, or in the cloud, is a painless
way to ensure that all your data is stored safely.
The general rule of thumb for backups: servers should have a complete backup
weekly, and incremental backups every night; personal computers should also be
backed up completely every week, but you can do incremental backups every few
days if you like ("however long you could live without your data," Cloutier
explains).
Getting your data compromised is a painful experience -- having it all backed up
so you don't completely lose it will make it much less so.
8. Be careful with e-mail, IM and surfing the Web
It's not uncommon for a unsuspecting employee to click on a link or download an
attachment that they believe is harmless -- only to discover they've been infected
with a nasty virus, or worse.
9. Educate your employees
Teaching your employees about safe online habits and proactive defense is
crucial.
"Educating them about what they are doing and why it is dangerous is a more
effective strategy than expecting your IT security staff to constantly react to end
users’ bad decisions," Watchinski says.
It's not easy: "One of the most difficult things to do is protect end users against
themselves," he adds. But ultimately, prevention is the best approach to handling
your data security.
[email protected] 151
INTRODUCTION TO COMPUTERS
Make sure your employees understand how important your company's data is, and
all the measures they can take to protect it.
10. Data encryption
Encryption scrambles data, and is used to protect information that is being held on
a computer, stored on external media such as DVDs or transmitted over a
network.
11. Intrusion detection
These products monitor system and network activity to spot potential security
breaches. If a detection system suspects an attack, it can generate an alarm, such
as an email alert, based upon the type of activity it has identified.
COMPUTER VIRUS
What is it?
An executable computer program written intentionally to alter the way a
computer operates without permission, to do harm to the computer.
DEFINITION2.
[email protected] 152
INTRODUCTION TO COMPUTERS
A virus is a computer program designed to enter your computer and tamper with your
files without your knowledge. Once the program containing the virus is open, the
activated virus can not only infect other programs and documents on your computer, it
can duplicate and transmit itself to other computers that are connected to yours, just like
a physical virus can move from one human host to another.
Virusesbegan in the late 1980s as personal computers and electronic bulletin boards
became more common. Back then, operating systems, word processing programs and
other programs were stored on floppy disks. Hidden Viruseswere programmed onto these
disks; as the disks were transferred from person to person, the virus spread.
[email protected] 153
INTRODUCTION TO COMPUTERS
File names change.
The keyboard makes a clicking noise.
The screen becomes distorted.
Text on screen does unusual things.
CMOS settings, AUTOEXEC.BAT, or CONFIG.SYS files change unexpectedly
(Symantec).
A large part of detection is anti-virus software. Like a doctor, anti-virus
software often uses the above listed symptoms to identify and eradicate an
infection.
It’s not always easy to tell if your computer has been compromised. More than ever
before, the authors of viruses, worms, Trojans and spyware are going to great lengths to
hide their code and conceal what their programs are doing on an infected computer.
That’s why it’s essential to follow the advice given in this guide: in particular, install
Internet security software, make sure you apply security patches to your operating system
and applications and backup your data regularly.
Your computer behaves strangely, i.e. in a way that you haven’t seen before.
You see unexpected messages or images.
You hear unexpected sounds, played at random.
Programs start unexpectedly.
Your personal firewall tells you that an application has tried to connect to the
Internet (and it’s not a program that you ran).
Your friends tell you that they have received e-mail messages from your address
and you haven’t sent them anything.
Your computer ‘freezes’ frequently, or programs start running slowly.
You get lots of system error messages.
The operating system will not load when you start your computer.
You notice that files or folders have been deleted or changed.
You notice hard disk access (shown by one of the small flashing lights) when
you’re not aware of any programs running.
Your web browser behaves erratically, e.g. you can’t close a browser window.
[email protected] 154
INTRODUCTION TO COMPUTERS
Use of network files/direct connection/through networks.
Software piracy [buying software from unauthorized agents]. Pirated software.
Booting a PC from an infected medium.
Executing an infected program.
Opening an infected file.
Shareware.
Viruses may be sent by opening email attachments,
clicking on spam,
visiting corrupt websites and links online,
Opening spreadsheets or even the original method—infected disks.
But the Internet is now the superhighway for virus transmission.
Sharing of storage media
Through e-mail attachments
Networks – if your computer is connected to a home network or if your work
computer is part of network, you may find yourself with an infection through no
fault of your own. There isn’t much you can do to stop these kinds of infections,
short of having your network administrator ensure that everyone’s antivirus
software is up to date so that the invading bug can be removed as quickly as
possible.
Internet downloads including software piracy
Rogue Websites. It is depressing to know that you may become infected with
spyware or a virus by doing nothing more than simply visiting a website, but it
istrue. Many adult websites, gambling websites and other less than trustworthy
websites will attempt to automatically access your computer when you visit them.
They often install adware bugs that will cause a flurry of pop ups to appear on
your screen. This adware will often allow for other programs with even more
nefarious purposes to be installed and before you know it, your computer will be
swamped. To stop these rogue websites, adjust the settings on your antivirus
software and firewall so that no outside connections can be made and no
programs can be installed without your express permission.
1) Size.The sizes of the program code required for computer viruses has been
demonstrated to be surprisingly small. This has facilitated the ability of these
programs to attach themselves to other applications and escape notice for long periods
of time.
[email protected] 155
INTRODUCTION TO COMPUTERS
3) Propagation. Once a computer virus has infected a program, while this program is
running, the virus is able to spread to other programs and files accessible to the
computer system. The ability to propagate is essential to a virus program.
6) Persistence. Even after the virus program has been detected, recovery of data,
programs, and even system operation has been difficult and time consuming. In many
cases, especially in networked operations, eradication of viruses has been complicated
by the ability of the virus program to repeatedly spread and reoccur through the
networked system from a single infected copy.
[email protected] 156
INTRODUCTION TO COMPUTERS
SCANNER – examine every file on a specific disk drive, looking/searching for known
virus
“signatures”. A “signature” is a string of software code that identifies a virus program.
Every virus has a unique signature
[email protected] 157
INTRODUCTION TO COMPUTERS
Boot the system from virus free disks
Using write protect tabs on floppy disks
Scan every floppy diskette for viruses before use. Unknown floppy
diskettes should not be used
Avoid using foreign storage media
Use genuine software
Avoid opening e-mails from suspicious or unknown sources
Write protect disks
Install antivirus software, e.g. Avira, Eset Nod32, AVG, Norton, Dr.
Solomon’s Toolkit
Install a reliable anti virus program – From the first moment you turn your computer
on, you should have a trusted anti virus program by your side. Even if you have a
machine that isn’t hooked up to the Internet, a reliable anti virus program is a low cost
and common sense addition to any machine. There are even free anti virus programs you
can download that work almost as well as industry giants like Norton and McAfee.
Install anti-spyware and anti-malware programs – As good as the best anti virus
programs are, they sometimes need a little bit of help. Thankfully, many of the top anti-
spyware programs are completely free. Spybot Search and Destroy and CCleaner are just
two free programs that can help prevent computer viruses from doing any damage on
your machine. As helpful as these programs are, however, you must update them and run
them on a regular basis for them to do any good.
Avoid suspicious websites – A good virus protection program will alert you when you
visit a website that attempts to install or run a program on your computer. Many less than
reputable adult websites do this, so if you get a warning, don’t go back, you may end up
with a bug you can’t get rid of.
Never Open Email Attachments Without Scanning Them First – The most common
way viruses are spread throughout the Internet is still via email. Some attachments, like
pictures, now display in emails and don’t require an attachment to be manually opened,
but other documents do. Make sure you use an email client that scans all email
attachments before you are allowed to open them. This will help prevent computer
viruses from getting a foothold on your machine.
Set up Automatic Scans – Many of the top anti virus programs, as well as the best anti-
spyware programs, now have settings that will let them automatically run during down
times or in the middle of the night. Of course, your computer must be on for this to
happen, but having daily scans run when nothing else is going on is a great way to
prevent even the latest computer viruses from sticking around too long.
Watch Your Downloads – Part of the fun of the Internet is downloading music, movies
and other items. However, since these downloads are so massive, it can be easy to sneak
a virus along for the ride. Only download these files from trusted sites that you can count
on, or, at the very least, scan them before you open them.
Updates, Updates, Updates – There is a reason why Windows has a feature called
Critical Updates. There is an entire branch of Microsoft dedicated to staying one step
ahead of the hackers out there so when they manage to fix a possible security loophole,
you need to download the patch right away. Help Microsoft help you prevent computer
viruses from causing too much trouble.
[email protected] 158
INTRODUCTION TO COMPUTERS
Know What To Look For – Even if you are just a casual computer user, you should
have an idea of how your machine operates, what normal pop up windows look like and
what popular viruses are out there, that way, when your computer begins exhibiting tell
tale signs, you’ll know. You can help prevent computer viruses by staying updated and
educated.
Stay Away From Cracked Software – It is so secret that you can download illegal,
cracked versions of some programs online. As tempting as it may be, these files are
almost always infested with advanced and difficult to detect bugs. Play it safe and get
your software from the source.
Install a Firewall – A firewall is a program that screens incoming Internet and network
traffic. Along with your virus program, it can help prevent unauthorized access to your
computer.
Be prepared to Lock Down – If you hear of a virus that is spreading like wildfire
through the Internet, make an extra effort to be careful. Don’t open any suspicious emails
or accept any downloads for a week or two until your virus protection program has been
updated and you are, once again, safe.
FILE MANAGEMENT
File management is the storing, naming, sorting and handling computer files.
It is the process of maintaining folders, documents and multimedia into categories
and subcategories as desired by a user.
Fundamental aspects of file management are organizing, labeling and classifying
computer data.
File management helps to eliminate clutter so that a user can access and retrieve data
faster and more conveniently.
[email protected] 159
INTRODUCTION TO COMPUTERS
There are two types of file managers: electronic and three-dimensional.
Three-dimensional file management is basically the traditional method of keeping
hard-copy documents in cabinets and safes.
However, digital and electronic technology has evolved and enabled better
management, access and retrieval of documents.
It enables users to sort files by type, size, name, color and date that they were created
or modified.
This orderly arrangement saves time usually spent looking for records, which
maximizes productivity.
Most common operations done on stored computer files are editing, viewing, playing,
copying, moving and deleting.
Modern applications have been developed to help users search, access and manage
files in a computer and mobile devices.
Creating master folders for related files helps to organize files more efficiently.
Documents, music and movies can be the master folders for all other files.
Next, a user may create several subfolders under the main one to differentiate data
[email protected] 160
INTRODUCTION TO COMPUTERS
File system
Is the way in which files are named and where they are placed logically for storage and
retrieval?
Without a file system, stored information wouldn't be isolated into individual files and would
be difficult to identify and retrieve.
As data capacities increase, the organization and accessibility of individual files are becoming
even more important in data storage.
Digital file systems and files are named for and modeled after paper-based filing systems
using the same logic-based method of storing and retrieving documents.
File systems can differ between operating systems (OS), such as Microsoft Windows, macOS
and Linux-based systems.
Some file systems are designed for specific applications.
Major types of file systems include distributed file systems, disk-based file systems and
special purpose file systems.
A file system stores and organizes data and can be thought of as a type of index for all the data
contained in a storage device. These devices can include hard drives, optical drives and flash
drives.
File systems specify conventions for naming files, including the maximum number of characters
in a name, which characters can be used and, in some systems, how long the file name suffix can
be. In many file systems, file names are not case sensitive.
Along with the file itself, file systems contain information such as the size of the file, as well as
its attributes, location and hierarchy in the directory in the metadata. Metadata can also identify
free blocks of available storage on the drive and how much space is available.
A file system also includes a format to specify the path to a file through the structure of
directories. A file is placed in a directory -- or a folder in Windows OS -- or subdirectory at the
desired place in the tree structure. PC and mobile OSes have file systems in which files are placed
somewhere in a hierarchical tree structure.
[email protected] 161
INTRODUCTION TO COMPUTERS
Before files and directories are created on the storage medium, partitions should be put into place.
A partition is a region of the hard disk or other storage that the OS manages separately. One file
system is contained in the primary partition, and some OSes allow for multiple partitions on one
disk. In this situation, if one file system gets corrupted, the data in a different partition will be
safe.
File systems use metadata to store and retrieve files. Examples of metadata tags include:
Date created
Date modified
Last date of access
Last backup
User ID of the file creator
Access permissions
File size
While the procedures for managing files differ from operating system to operating
system, many of the concepts and commands behind the procedures are the same. These
essential commands are examined below.
Creating Files/Folders
In order for a file to exist, it must be created, and thus saved to the disk. Normally, this is
done in a program by saving the file currently being edited. It is also possible in
Windows to right-click a folder anywhere and select an option to create a new empty file.
This is only possible for certain file types that have been programmed into the operating
system (like text files), or when a specific program has made the command available to
the operating system.
[email protected] 162
INTRODUCTION TO COMPUTERS
Right-clicking to create a file folder: Windows
File naming
While in theory you could name a file anything you like, there are certain conventions to
be followed, as well as limitations.
A file's name should easily identify its content. I.e., "Letter" is a pretty ambiguous file
name, while "Letter to Mom (March 16)" is much more descriptive.
A file name must have a file extension, to associate it with a particular program.
Though, as described above, in default installs of some operating systems (like Windows
XP), these extensions won't be immediately visible.
File names in Windows cannot be longer than 255 characters, and cannot contain the
characters: \ / : * ? " < > |
Save As
The Save as command saves a new copy of the file currently being edited, but under a
new name. This is very handy for creating several versions of a document, prior to
[email protected] 163
INTRODUCTION TO COMPUTERS
making edits. Simply save the current state of the document, then select Save As, and
save a new version in which to carry out your edits. If you don't like the way the edits are
going, you can always go back to the file containing the version of the document prior to
the edits.
Copy
Copy, paste, and cut are incredibly handy commands. Mostly used for file editing, they
also can be used for managing files. When you copy a file, it is placed into a specific part
of your computer's memory (called the Clipboard), and can then be pasted into any folder
or drive that you can access from your computer. When you copy a file, the original file
remains untouched.
Paste
When you paste, you create a new copy of whatever file is saved into the operating
system's Clipboard memory. The pasted file will always carry the same name as the
original file that was copied-unless it is pasted back into the same directory as the
original. In that case, the new copy of the file will have its name modified slightly, to
indicate it is a new copy.
Cut/Move
To cut a file is to copy it into the Clipboard, and then delete it from its current spot on a
drive. You then can paste the file anywhere else you can access from your computer. The
cut and paste combination is also known as moving a file, since all the file's data only
exists in the new spot once it has been cut, and can no longer be found in the old.
Rename
Selecting Objects
In order to carry out the file management tasks described previously, you need some way
to indicate to the operating system which files are to be affected. Using the pointer in the
GUI, there are a couple of techniques for selecting files. The first is the click. Click once
on a file, and it becomes highlighted. This means that it is selected, and the operating
system is then waiting for a command from you (like "rename" or "delete") to apply to
the selected object.
[email protected] 164
INTRODUCTION TO COMPUTERS
Lasso
If you click at a point above or below a group of files, hold down the mouse
button and start dragging the pointer, you will see a rectangular outline begin to
grow between the point you first clicked and the pointer. This is called the lasso.
Any icons "caught" in that lasso will be selected as soon as you release the
mouse button. This is the easiest way to select large numbers of adjacent files in
the same folder.
[email protected] 165
INTRODUCTION TO COMPUTERS
Selecting non-adjacent objects
By holding down the CTRL key while you lasso or click objects to select them,
you can maintain the current selection and select more objects that are not
adjacent.
Deleting
Just like a paper file can be thrown into the trash (or shredded, or recycled) to get rid of
it, and to clear out space for more files, so too can data files on the computer be deleted to
free up space for other files. There are many different ways to carry out the delete
command, but by far the easiest is to select the files to be deleted, and drag them to the
Recycle bin (called the Trash folder on non-Windows computers). If the Recycle Bin
icon is not visible, you can also press the Delete key on the keyboard.
[email protected] 166
INTRODUCTION TO COMPUTERS
computer, though. So
every now and then you
need to empty this
special folder. Once the
Recycle Bin has been
emptied, the space taken
up by the files is freed
and they are truly gone.
When a file is in the Recycle Bin, it cannot be opened by the operating system.
The Recycling Bin is simply an intermediate place where all deleted files
collect. That way, if you delete something and then decide in a few hours that
you actually needed it, it is a very simple task to restore it from the Recycle Bin.
File management, as you have no doubt guessed, involves a lot more than simply moving
files around from one place to another on the computer and changing names. The
operating system also automates other complicated activities that are indispensable to
managing files and information on the computer.
[email protected] 167
INTRODUCTION TO COMPUTERS
Searching
There can be times when even the sharpest user forgets where the file that he or she needs
is located. That is when it is time to get the operating system to carry out a search for the
file.
A search for a file scans all storage devices connected to the computer and builds up a list
of any files that match the criteria being searched for. These procedures are slightly
different between Windows and Macintosh computers.
Windows
The following example shows how to search for files on the hard drive using Windows.
The search function is initiated by choosing the Start button, selecting Search and then
following through with the appropriate search criteria. Selecting the Search button
executes the "search".
Step 1: Select type of search. Step 2: Fill in criteria and select "Search".
[email protected] 168
INTRODUCTION TO COMPUTERS
Completed Search Result!
[email protected] 169
INTRODUCTION TO COMPUTERS
File Explorer is the file management application used by Windows operating systems to
browse folders and files. It provides a graphical interface for the user to navigate and
access the files stored in the computer.
The main way to access the File Explorer is by clicking the folder icon in the Taskbar.
After clicking the icon, the File Explorer window will open.
The File Explorer ribbon, which resembles the ribbon featured in Microsoft
Office. The ribbon contains buttons for common tasks to perform with your files
and folders.
[email protected] 170
INTRODUCTION TO COMPUTERS
The Navigation Pane gives you access to your libraries of documents and
pictures, as well as your storage devices. It also features frequently used folders
and network devices.
The Frequent folders section on the right features the folders you’ve worked
with recently to allow for quick access to them.
The Recent files section in the lower part of the window features files and
documents that you’ve opened recently.
In Windows 10, the File Explorer features a new ribbon toolbar, similar to the one
featured in the recent versions of Microsoft Office. This ribbon contains buttons and
commands for the most common tasks.
The Ribbon features four tabs, each with different commands. Among the tasks you can
perform from the Home tab are −
Copying and pasting files and folders from one place to another.
Moving files and folders to another location.
Copying files and folders to another location.
Deleting a file or folder permanently or sending it to the Recycle Bin.
Renaming a file or folder.
Creating a new folder or other new items.
Verifying or modifying the Properties of a document or folder.
Opening a file or folder.
Different options to select one or various files and folders.
The Share ribbon gives you different options to share your files and folders. For example
−
[email protected] 171
INTRODUCTION TO COMPUTERS
The View ribbon allows you to change the way Windows displays your files and folders.
Some of the changes you can make here are −
[email protected] 172
INTRODUCTION TO COMPUTERS
Watch the video below to learn more about using files and folders in Windows.
What is a file?
There are many different types of files you can use. For example, Microsoft Word
documents, digital photos, digital music, and digital videos are all types of files. You
might even think of a file as a digital version of a real-world thing you can interact with
on your computer. When you use different applications, you'll often be viewing,
creating, or editing files.
Files are usually represented by an icon. In the image below, you can see a few different
types of files below the Recycle Bin on the desktop.
What is a folder?
Windows uses folders to help you organize files. You can put files inside a folder, just
like you would put documents inside a real folder. In the image below, you can see some
folders on the desktop.
File Explorer
You can view and organize files and folders using a built-in application known as File
Explorer (called Windows Explorer in Windows 7 and earlier versions).
[email protected] 173
INTRODUCTION TO COMPUTERS
To open File Explorer, click the File Explorer icon on the taskbar, or double-click any
folder on your desktop. A new File Explorer window will appear. Now you're ready to
start working with your files and folders.
From File Explorer, double-click a folder to open it. You can then see all of the files
stored in that folder.
[email protected] 174
INTRODUCTION TO COMPUTERS
Notice that you can also see the location of a folder in the address bar near the top of
the window.
To open a file:
There are two main ways to open a file:
Find the file on your computer and double-click it. This will open the file in its
default application. In our example, we'll open a Microsoft Word document
(BdayInvites.docx), which will open in Microsoft Word.
[email protected] 175
INTRODUCTION TO COMPUTERS
Open the application, then use the application to open the file. Once the
application is open, you can go to the File menu at the top of the window and
select Open.
[email protected] 176
INTRODUCTION TO COMPUTERS
Moving and deleting files
As you begin using your computer, you will start to collect more and more files, which
can make it more difficult to find the files you need. Fortunately, Windows allows you to
move files to different folders and delete files you no longer use.
To move a file:
It's easy to move a file from one location to another. For example, you might have a file
on the desktop that you want to move to your Documents folder.
2. Release the mouse. The file will appear in the new location. In this example, we
have opened the folder to see the file in its new location.
[email protected] 177
INTRODUCTION TO COMPUTERS
You can use this same technique to move an entire folder. Note that moving a folder
will also move all of the files within that folder.
1. Within File Explorer, locate and select the New folder button. You can also
right-click where you want the folder to appear, then select New > Folder.
[email protected] 178
INTRODUCTION TO COMPUTERS
2. The new folder will appear. Type the desired name for the folder and press
Enter. In our example, we'll call it School Documents.
3. The new folder will be created. You can now move files into this folder.
[email protected] 179
INTRODUCTION TO COMPUTERS
To rename a file or folder:
You can change the name of any file or folder. A unique name will make it easier to
remember what type of information is saved in the file or folder.
1. Click the file or folder, wait about one second, and click again. An editable text
field will appear.
2. Type the desired name on your keyboard and press Enter. The name will be
changed.
You can also right-click the folder and select Rename from the menu that appears.
[email protected] 180
INTRODUCTION TO COMPUTERS
[email protected] 181
INTRODUCTION TO COMPUTERS
2. To permanently delete the file, right-click the Recycle Bin icon and select Empty
Recycle Bin. All files in the Recycle Bin will be permanently deleted.
Note that deleting a folder will also delete all of the files within that folder.
[email protected] 182
INTRODUCTION TO COMPUTERS
Selecting multiple files
Now that you know the basics, here are a few tips to help you move your files even
faster.
There are a few ways to select more than one file at a time:
If you're viewing your files as icons, you can click and drag the mouse to draw
a box around the files you want to select. When you're done, release the mouse;
the files will be selected. You can now move, copy, or delete all of these files at
the same time.
To select specific files from a folder, press and hold the Control key on your
keyboard, then click the files you want to select.
[email protected] 183
INTRODUCTION TO COMPUTERS
To select a group of files from a folder, click the first file, press and hold the
Shift key on your keyboard, then click the last file. All of the files between the
first and last ones will be selected.
[email protected] 184
INTRODUCTION TO COMPUTERS
Selecting all files
If you want to select all files in a folder at the same time, open the folder in File Explorer
and press Ctrl+A (press and hold the Control key on your keyboard, then press A). All
of the files in the folder will be selected.
Ctrl+A is an example of a keyboard shortcut. We'll talk more about these in our lesson
on Keyboard Shortcuts in Windows.
If working with files and folders feels a little tricky right now, don't worry! Like anything
else, working with files and folders is largely a matter of practice. You'll start to feel
more comfortable as you continue using your computer. In the next lesson, we'll talk
about another important concept: how to find files on your computer that you can't easily
locate.
Shortcuts
If you have a file or folder you use frequently, you can save time by creating a shortcut
on the desktop. Instead of navigating to the file or folder each time you want to use it,
you can simply double-click the shortcut to open it. A shortcut will have a small arrow in
the lower-left corner of the icon.
Note that creating a shortcut does not create a duplicate copy of the folder; it's simply a
way to access the folder more quickly. If you delete a shortcut, it will not delete the
actual folder or the files it contains. Also note that copying a shortcut onto a flash drive
will not work; if you want to bring a file with you, you'll need to navigate to the actual
location of the file and copy it to the flash drive.
[email protected] 185
INTRODUCTION TO COMPUTERS
To create a shortcut:
1. Locate and right-click the desired folder, then select Send to Desktop (create
shortcut).
2. A shortcut to the folder will appear on the desktop. Notice the arrow in the lower-
left corner of the icon. You can now double-click the shortcut to open the folder at
any time.
You can also hold the Alt key on your keyboard, then click and drag the folder to the
desktop to create a shortcut.
In the previous lesson, we talked about how folders can help to keep your files
organized. However, there may be times when you have trouble finding a certain file. If
this happens to you, don't panic! The file is probably still on your computer, and there are
a few simple ways to find it. In this lesson, we'll show you different techniques you can
use to find your files, including searching and looking in common places.
[email protected] 186
INTRODUCTION TO COMPUTERS
Watch the video below to learn more about finding files in Windows.
If you're having a difficult time finding a file, there's a good chance you can find it in one
of the following places:
Default folders: If you don't specify a location when saving a file, Windows will
place certain types of files into default folders. For example, if you're looking for
a Microsoft Word document, you could try looking in the Documents folder. If
you're looking for a photo, try looking in the Pictures folder. Most of these
folders will be accessible on the left side of the File Explorer window.
[email protected] 187
INTRODUCTION TO COMPUTERS
Recycle Bin: If you deleted a file by mistake, it may still be in the Recycle Bin.
You can double-click the Recycle Bin icon on the desktop to open it. If you find
the file you need, click and drag it back to the desktop or to a different folder.
[email protected] 188
INTRODUCTION TO COMPUTERS
Let's say you recently downloaded a few photos that were attached to an email message,
but now you're not sure where these files are on your computer. If you're struggling to
find a file, you can always search for it. Searching allows you to look for any file on
your computer.
In the Cortana Search Box next to the Start button, type to search for a file. The search
results will appear above the search box.
[email protected] 189
INTRODUCTION TO COMPUTERS
Click the Start button to go to the Start screen, then start typing to search for a file. The
search results will appear on the right side of the screen. Simply click a file or folder to
open it.
[email protected] 190
INTRODUCTION TO COMPUTERS
Click the Start button, type the file name or keywords with your keyboard, and press
Enter. The search results will appear. Simply click a file or folder to open it.
[email protected] 191
INTRODUCTION TO COMPUTERS
Tips for finding files
If you're still having trouble finding the file you need, here are some additional tips.
Try different search terms. If you're using the search option, try using different
terms in your search. For example, if you're looking for a certain Microsoft Word
document, try searching for a few different file names you might have used when
saving the document.
Open the last application used to edit the file. If you know you used a certain
application to edit a file, open that application and select File > Open > Recent
from the menu. The file may appear in the list of recently edited files.
Move and rename the file after finding it. Once you've located the file, you
may want to move it to a related folder so you can find it more easily in the
future. For example, if the file is a picture, you might move it to your Pictures
folder. You may also want to give it a file name that will be easy to remember.
You can review our lesson on Working with Files to learn more about managing
files.
Learning how to use a computer can feel overwhelming at times. Fortunately, there are
some common computer skills that will work the same way in almost any situation.
[email protected] 192
INTRODUCTION TO COMPUTERS
Once you learn how to use these skills, you'll be able to use them to perform a variety of
tasks on your computer. In this lesson, we'll talk about some common commands you can
use in almost any application, including cut, copy, paste, and undo.
Most applications have a Menu bar at the top of the window. Each menu has a set of
commands that will perform a specific action within the program. While each
application is different, there are some common commands that work the same way, no
matter which application you're using. Whenever you open a program for the first time,
try clicking these menus to see the various options available.
You'll find the File menu on the leftmost side of the Menu bar in almost every
application. The File menu will usually have the same type of commands. For example,
you can create a new file, open an existing file, and save the current file, among other
functions.
[email protected] 193
INTRODUCTION TO COMPUTERS
Many applications allow you to copy items from one place and then paste them to
another. For example, if you're working with a word processor, you might copy and paste
text to avoid typing the same thing over and over. If there's something you want to move
from one place to another, you can cut and paste instead.
1. Select the item you want to copy. In our example, we'll select a word in a
document.
2. Right-click the mouse and select Copy from the menu that appears. You can also
press Ctrl+C on your keyboard.
[email protected] 194
INTRODUCTION TO COMPUTERS
3. Locate and right-click the desired location for the item, then select Paste. You can
also press Ctrl+V on your keyboard.
4. The item will be copied to the new location. Notice how the original text that was
copied has not been moved or changed.
[email protected] 195
INTRODUCTION TO COMPUTERS
1. Select the item you want to cut. In our example, we'll select a paragraph of text in
a document.
2. Right-click the mouse and select Cut from the menu that appears. You can also
press Ctrl+X on your keyboard.
3. Locate and right-click the desired location for the item, then select Paste. You can
also press Ctrl+V on your keyboard.
[email protected] 196
INTRODUCTION TO COMPUTERS
4. The item will be pasted, or moved, to the new location. In our example, we used
the cut and paste commands to move the second paragraph above the first
paragraph.
[email protected] 197
INTRODUCTION TO COMPUTERS
To copy and paste files:
You can use the cut, copy, and paste commands for a variety of tasks on your computer.
For example, if you wanted to create a duplicate copy of a file, you could copy it from
one folder to another.
1. Right-click the file and select Copy from the menu that appears. You can also
press Ctrl+C on your keyboard.
[email protected] 198
INTRODUCTION TO COMPUTERS
2. Locate and right-click the new location, then select Paste. You can also press
Ctrl+V on your keyboard. In our example, we'll paste the file to the desktop.
3. The duplicate file will appear. Notice how the original file has not been moved or
changed. Also, note that if you make a change to the original file, it will not
update any copies of that file.
[email protected] 199
INTRODUCTION TO COMPUTERS
Copying a file is not the same as creating a shortcut. You can review our lesson on
Working with Files to learn more about using shortcuts.
Undoing changes
Let's say you're working on a text document and accidentally delete some text.
Fortunately, you won't have to retype everything you just deleted! Most applications
allow you to undo your most recent action when you make a mistake like this. Just
locate and select the Undo command, which is usually in the upper-left corner of the
window near the Menu bar. You can also press Ctrl+Z on your keyboard. You can
continuing using this command to undo multiple changes in a row.
[email protected] 200
INTRODUCTION TO COMPUTERS
Note that the Undo command will work almost all of the time, but not in every situation.
For example, if you empty the Recycle Bin to permanently delete a file, you can't undo
the action.
Now you know some of the most commonly used commands, which you'll be able to use
in almost any application on your computer. As we mentioned earlier in this lesson, you
can also use keyboard shortcuts to perform these commands even faster. We'll talk
more about keyboard shortcuts in our lesson on Keyboard Shortcuts in Windows.
At some point, you may want to adjust your computer's settings. For example, you might
want to change your desktop background or modify your Internet settings. You can
change these settings and more from the Control Panel.
However, in Windows 10, the Control Panel has mostly been replaced by the Settings
app. The Control Panel is still available, but most of the tasks and settings are now also
located in the Settings app.
[email protected] 201
INTRODUCTION TO COMPUTERS
To open the Control Panel (Windows 10):
Right-click the Start button, then select Control Panel.
In Windows 8, you can open the Control Panel directly from the Start screen. Using your
keyboard, type Control Panel and press the Enter key.
[email protected] 202
INTRODUCTION TO COMPUTERS
To open the Control Panel (Windows 7 and earlier):
2. The Control Panel will appear. Simply click a setting to adjust it. In this example,
we'll click Change desktop background to choose a new wallpaper for our
desktop.
[email protected] 203
INTRODUCTION TO COMPUTERS
You'll also be able to change the settings for different applications on your computer.
You will usually find application settings under File > Options, Tools > Options, or
within a separate Settings menu. Keep in mind that the location will vary, and some
applications may not have any settings you can change.
[email protected] 204
INTRODUCTION TO COMPUTERS
A user account allows you to sign in to your computer. By default, your computer
already has one user account, which you were required to create when you set up your
computer. If you plan to share your computer with others, you can create a separate user
account for each person.
At this point, you may be wondering why you would even need to use separate user
accounts. But if you're sharing a computer with multiple people—for example, with your
family or at the office—user accounts allow everyone to save their own files, preferences,
[email protected] 205
INTRODUCTION TO COMPUTERS
and settings without affecting other computer users. When you start your computer, you'll
be able to choose which account you want to use.
Before you create new user accounts, it's important to understand the different types.
Administrator: Administrator accounts are special accounts that are used for
making changes to system settings or managing other people's accounts. They
have full access to every setting on the computer. Every computer will have at
least one Administrator account, and if you're the owner you should already have
a password to this account.
Standard: Standard accounts are the basic accounts you use for normal everyday
tasks. As a Standard user, you can do just about anything you would need to do,
such as running software or personalizing your desktop.
Standard with Family Safety: These are the only accounts that can have
parental controls. You can create a Standard account for each child, then go to
the Family Safety settings in your Control Panel to set website restrictions, time
limits, and more.
The process for adding and managing user accounts is quite different for each version of
Windows. To learn more about adding and managing user accounts, review the
appropriate lesson from these Windows tutorials:
[email protected] 206
INTRODUCTION TO COMPUTERS
Windows 10: Managing User Accounts and Parental Controls
Windows 8: Managing User Accounts and Parental Controls
Windows 7: Managing User Accounts and Parental Controls
Windows XP: Managing User Accounts
If you have multiple user accounts on your computer, it's easy to switch between users
without signing out or closing your current apps. Switching users will lock the current
user, so you won't need to worry about someone else accessing your account.
Click the current user icon on the left side of the Start menu, then select the desired
user from the drop-down menu. The user will then need to enter a password to sign in.
[email protected] 207
INTRODUCTION TO COMPUTERS
To switch between user accounts (Windows 8):
Click the current user in the upper-right of the Start screen, then select the desired
user from the drop-down menu. The user will then need to enter a password to sign in.
You can switch back by selecting the desired user from the drop-down menu. You'll
need to re-enter your password to unlock the account.
[email protected] 208
INTRODUCTION TO COMPUTERS
Click the Start button, click the arrow next to Shut Down, and select Switch user.
[email protected] 209
INTRODUCTION TO COMPUTERS
If you're finished using the computer, you can also choose to log off. This will allow
other users to sign in to the computer with different accounts.
[email protected] 210
INTRODUCTION TO COMPUTERS
Keyboard shortcuts are keys or a combination of keys you can press on your keyboard
to perform a variety of tasks. Using keyboard shortcuts is often faster than using a
mouse because you can keep both hands on the keyboard. Keyboard shortcuts are also
universal, which means you can use many of the same shortcuts in a variety of
applications. For example, you can use the shortcuts to copy and paste text in a word
processor and in a web browser.
Watch the video below to learn more about keyboard shortcuts in Windows.
Using shortcuts
Many keyboard shortcuts require you to press two or more keys in a specific order. For
example, to perform the shortcut Ctrl+X, you would press and hold the Ctrl key, then
press the X key, then release.
You'll use the Ctrl (Control) or Alt key to perform most keyboard shortcuts. You'll find
these keys near the bottom-left corner of your keyboard.
[email protected] 211
INTRODUCTION TO COMPUTERS
Working with text
These keyboard shortcuts are useful when working with text in word processors, email
applications, and more. They can help you perform commonly repeated tasks, like
copying and pasting text.
You can use keyboard shortcuts to open, close, and switch applications. When working
with a file, like a Microsoft Word document, shortcuts can be used to create new files,
find words, and print.
[email protected] 212
INTRODUCTION TO COMPUTERS
Internet shortcuts
Keyboard shortcuts can also be used to navigate your web browser. Many of the text
shortcuts above are also useful online, like the shortcuts for selecting, copying, and
pasting text into your web browser's address bar. Note that some of these shortcuts may
work a bit differently depending on the web browser you're using.
[email protected] 213
INTRODUCTION TO COMPUTERS
When you press the Alt key, you will have access to all of the menus in the current
application. This means you can perform almost any task with just your keyboard. For
example, you can type Alt+F+X to quit an application. When performing these shortcuts,
you will not need to hold down the Alt key.
[email protected] 214
INTRODUCTION TO COMPUTERS
Finding more keyboard shortcuts
In some applications, you may need to hover over a button to display its keyboard
shortcut.
[email protected] 215
INTRODUCTION TO COMPUTERS
TYPES OF FILES
a) Master Files
They hold permanent data for use in applications such as stock control and
credit control. Usually much of the data items in these files do not change
frequently or with each transaction, e.g. name, address or date of birth.
b) Transaction files
These are also called movement files. They hold temporary records of values.
They are used to update the master file and are overwritten after the updating
of the master file. Examples of Transaction files:
A customer order file or records, each of which has data on a particular
order.
A time sheet data file that contains records, each of which has data on
the number of hours worked by a particular employee.
A stock transaction file that contains records of stock additions or
removals – one record for each movement.
c) Look up files
They are reference files from which such information as prices list and mailing
list can be obtained.
d) Archive files
These are files that are used to store information that has not been in use in the
recent past and would not be in use in the near future – so are used to store
historical data.
e) Backup files
These are copies of transaction files and master files held for security purposes
f) Transition files
Derived from a transaction file by the addition or deletion or ammendment of
data. It is produced as a temporary file during data processing often by the
addition of master file information to a transaction file prior to updating or
output. Examples of transition files:
An employee time sheet transaction file which has had employee
names added (from an employee master file) and re-sorted into
department order
A customer order transaction file to which the price of each item
ordered has been taken from a (computerised) catalogue and added
FILE PROCESSING
[email protected] 216
INTRODUCTION TO COMPUTERS
Is the process of updating the records in a file to accurately reflect changes
in the data?
It can be a manual process where procedures are in place to update forms,
which are sent to the respective person responsible for the update.
It can also be a computerized process where information is first stored in
transaction files until the master file is updated.
[email protected] 217
INTRODUCTION TO COMPUTERS
where online subsystems were turned off and system capacity was used to run
jobs common to all data (accounts, users or customers) on a system. In a bank, for
example, EOD jobs include interest calculation, generation of reports and data
sets to other systems, print (statements) and payement processing.
Printing
A popular computerized batch processing procedure is printing. This normally
involves the operator selecting the documents they need printed and indicating to
the batch printing software when, where they should be output and priority of the
print job. Then the job is sent to the print queue from where printing daemon
sends them to the printer.
Databases
Batch processing is also used for efficient bulk database updates and automated
transaction processing, as contrasted to interactive online transaction processing
(OLTP) applications.
Images
Batch processing is often used to perform various operations with digital images.
There exist computer programs like Batch Image Processor that let one resize,
convert, watermark, or otherwise edit image files.
Converting
Batch processing is also used for converting a number of computer files from one
format to another. This is to make files portable and versatile especially for
proprietary and legacy files where viewers are not easy to come by.
Job scheduling
UNIX utilizes cron and at facilities to allow for scheduling of complex job scripts.
Windows has a job scheduler. Most high-performance computingclusters use
batch processing to maximize cluster usage.
2. REAL-TIME PROCESSING,
[email protected] 218
INTRODUCTION TO COMPUTERS
An early example of a large-scale real-time operating system was
Transaction Processing Facility developed by American Airlines and IBM
for the Sabre Airline Reservations System.
Real-time Processing
The master records are updated as and when the transactions
occur.
A form of transaction processing in which each transaction is
executed as soon as complete data becomes available for the
transaction.
A supermarket chain would be linked by a network to a main
computer.
Each time a sale is made the stock information is updated and the
sale information is also updated.
It is expensive and complicated.
Record and file locks are implemented to avoid problems with
real-time processing.
Benefits
Online Processing has two key benefits: simplicity and efficiency. Reduced paper
trails and the faster, more accurate forecasts for revenues and expenses are both
examples of how OLP makes things simpler for businesses.
[email protected] 219
INTRODUCTION TO COMPUTERS
Disadvantages
As with any information processing system, security and reliability are
considerations. Online transaction systems are generally more susceptible to
direct attack and abuse than their offline counterparts. When organizations choose
to rely on OLP, operations can be severely impacted if the transaction system or
database is unavailable due to data corruption, systems failure, or network
availability issues. Additionally, like many modern online information technology
solutions, some systems require offline maintenance which further affects the
cost-benefit analysis.
Centralized processing
An information system where all critical data and programs are
stored on one main computer, usually a mainframe. Unlike the
task-sharing concept of a client/server system, the central
computer retains all the brains and brawn.
A computing environment in which all processing takes place on a
mainframe or central computer.
Puts all processing and control authority within one computer to
which all other computing devices respond.
Distributed Processing
The ability to have several computers working together in a
network, where each processor runs different activities for a user,
as required.
Computers connected together by a communications network. Data
processing occurs on each of the computers, unlike a centralized
processing system in which terminals are connected to a host
computer that performs all of the data processing.
Use of computers at various locations, typically interconnected via
communication links for the purpose of data access and/or transfer.
A computer system in which processing is performed by several
separate computers linked by a communications network. The term
often refers to any computer system supported by a network, but
more properly refers to a system in which each computer is chosen
to handle a specific workload, and the network supports the system
as a whole.
Offline processing
When your computer performs an operation when it is not
connected to any other computers, it is working offline.
Means that your computer is not currently connected to an Internet
server.
Not connected (to a network). Not available to the network
Time sharing
A way of sharing out computer facilities between a number of
people who want to use the computer at the same time. Each has a
separate terminal and gets the impression that they have sole use
[email protected] 220
INTRODUCTION TO COMPUTERS
of the computer with their own 'account'. Similar to
NETWORKING.
Transaction processing
o A type of computer processing in which the computer responds
immediately to User requests, with each User interaction considered to
be a transaction. Automatic teller machines for banks are probably the
best-known example.
o In computer science, transaction processing is information processing
that is divided into individual, indivisible operations, called
transactions. Each transaction must succeed or fail as a complete unit;
it cannot remain in an intermediate state.
[email protected] 221
INTRODUCTION TO COMPUTERS
i. SEQUENTIAL FILE ORGANISATION
- records are arranged in a pre-determined sequence determined by the
primary key
- appropriate for files which are store on tape or disk
- nor generally used for online system that demand fast response
- mainly used for batch processing applications
- suitable when there is for little file enquiry
- can be used for variable length records as well as fixed length records
- waste space as some space is left of reserved for other records to be
inserted in order to preserve the order or organization
UPDATING
Updating on tape is carried out in batch mode by reading the whole file
and rewriting it after necessary modification on to a new file.
On disk can be carried out without rewriting the whole file.
RETRIEVAL
Retrieval of a record from a sequential file on tape media can be made
only in the sequential mode by reading all the records in sequence till the
desired record is reached.
Retrieval of a record from a sequential file on direct access media (DISK)
can be made by using sequential reach skip search, binary search.
HIT RATE
In a batch processing run: The proportion of the number of records
processed during a run to the total number of records on the file is called a
hit rate.
The higher the volatility and the lower the frequency of updating,, the
higher the hit rate.
[email protected] 222
INTRODUCTION TO COMPUTERS
Files are stored or haphazardly and an address key is used as reference.
Records are physically located at an address that is calculated from its
primary key field.
The calculation of the address from the key field is called hashing.
Records are scattered on the storage disk instead of being arranged next to
one another or linked via a pointer field.
Records can rapidly be retrieved and accessed directly
Used on magnetic disks (e.g. floppies, hard disk) and optical disks.
Costly in terms of device used and space.
[email protected] 223
INTRODUCTION TO COMPUTERS
DATA TRANSMISSION
When we enter data into the computer via keyboard, each keyed element is encoded by the
electronics within the keyboard into an equivalent binary coded pattern, using one of the
standard coding schemes that are used for the interchange of information.
To represent all characters of the keyboard, a unique pattern of 7 or 8 bits in size is used.
The use of 7 bits means that 128 different elements can be represented, while 8 bits can
represent 256 elements. A similar procedure is followed at the receiver that decodes every
received binary pattern into the corresponding character.
The most widely used codes that have been adopted for this function are the Extended
Binary Coded Decimal (EBCDIC) and the American Standard Code for Information
Interchange codes (ASCII). Both coding schemes cater to all the normal alphabetic,
numeric, and punctuation characters, collectively referred to as printable characters and a
range of additional control characters, known as non-printable characters.
Data transmission refers to the movement of data in form of bits between two or more
digital devices.
This transfer of data takes place via some form of transmission media (for example, coaxial
cable, fiber optics etc.)
Parallel transmission
Within a computing or communication device, the distances between different subunits are too
short. Thus, it is normal practice to transfer data between subunits using a separate wire to carry
each bit of data. There are multiple wires connecting each sub-unit and data is exchanged using
a parallel transfer mode. This mode of operation results in minimal delays in transferring each
word.
o In parallel transmission, all the bits of data are transmitted simultaneously on separate
communication lines.
o In order to transmit n bits, n wires or lines are used. Thus each bit has its own line.
• All n bits of one group are transmitted with each clock pulse from one device
to another i.e. multiple bits are sent with each clock pulse.
• Parallel transmission is used for short distance communication.
[email protected] 224
INTRODUCTION TO COMPUTERS
• As shown in the fig, eight separate wires are used to transmit 8 bit data from
sender to receiver.
It is speedy way of transmitting data as multiple bits are transmitted simultaneously with a
single clock pulse.
It is costly method of data transmission as it requires n lines to transmit n bits at the same time.
Serial Transmission
When transferring data between two physically separate devices, especially if the separation is
more than a few kilometers, for reasons of cost, it is more economical to use a single pair of
lines. Data is transmitted as a single bit at a time using a fixed time interval for each bit. This
mode of transmission is known as bit-serial transmission.
• In serial transmission, the various bits of data are transmitted serially one after
the other.
• It requires only one communication line rather than n lines to transmit data
from sender to receiver.
• Thus all the bits of data are transmitted on single line in serial fashion.
• In serial transmission, only single bit is sent with each clock pulse.
• As shown in fig., suppose an 8-bit data 11001010 is to be sent from source to
destination. Then least significant bit (LSB) i,e. 0 will be transmitted first
followed by other bits. The most significant bit (MSB) i.e. 1 will be transmitted
in the end via single communication line.
• The internal circuitry of computer transmits data in parallel fashion. So in
order to change this parallel data into serial data, conversion devices are used.
• These conversion devices convert the parallel data into serial data at the sender
side so that it can be transmitted over single line.
• On receiver side, serial data received is again converted to parallel form so that
the interval circuitry of computer can accept it
[email protected] 225
INTRODUCTION TO COMPUTERS
Use of single communication line reduces the transmission line cost by the factor of n as
compared to parallel transmission.
Use of conversion devices at source and destination end may lead to increase in overall
transmission cost.
This method is slower as compared to parallel transmission as bits are transmitted serially one
after the other.
There are two types of serial transmission-synchronous and asynchronous both these
transmissions use 'Bit synchronization'
Bit Synchronization is a function that is required to determine when the beginning and end
of the data transmission occurs.
Bit synchronization helps the receiving computer to know when data begin and end during
a transmission. Therefore bit synchronization provides timing control.
Asynchronous Transmission
Asynchronous transmission sends only one character at a time where a character is either
a letter of the alphabet or number or control character i.e. it sends one byte of data at a time.
Bit synchronization between two devices is made possible using start bit and stop bit.
Start bit indicates the beginning of data i.e. alerts the receiver to the arrival of new group
of bits. A start bit usually 0 is added to the beginning of each byte.
Stop bit indicates the end of data i.e. to let the receiver know that byte is finished, one or
more additional bits are appended to the end of the byte. These bits, usually 1s are called
stop bits.
[email protected] 226
INTRODUCTION TO COMPUTERS
Addition of start and stop increase the number of data bits. Hence more bandwidth is
consumed in asynchronous transmission.
There is idle time between the transmissions of different data bytes. This idle time is
also known as Gap
The gap or idle time can be of varying intervals. This mechanism is called
Asynchronous, because at byte level sender and receiver need not to be synchronized.
But within each byte, receiver must be synchronized with the incoming bit stream.
1. Asynchronous transmission is well suited for keyboard type-terminals and paper tape devices.
The advantage of this method is that it does not require any local storage at the terminal or the
computer as transmission takes place character by character.
[email protected] 227
INTRODUCTION TO COMPUTERS
This method is less efficient and slower than synchronous transmission due to the overhead
of extra bits and insertion of gaps into bit stream.
Successful transmission inevitably depends on the recognition of the start bits. These bits
can be missed or corrupted.
Synchronous Transmission
In the absence of start & stop bits, bit synchronization is established between sender &
receiver by 'timing' the transmission of each bit.
Since the various bytes are placed on the link without any gap, it is the responsibility
of receiver to separate the bit stream into bytes so as to reconstruct the original
information.
In order to receive the data error free, the receiver and sender operates at the same
clock frequency.
This method is faster as compared to asynchronous as there are no extra bits (start
bit & stop bit) and also there is no gap between the individual data bytes.
[email protected] 228
INTRODUCTION TO COMPUTERS
Data in a Simplex transmission is always one way. Simplex transmission are not often used
because it is not possible to send back error or control signals to the transmit end.
[email protected] 229
INTRODUCTION TO COMPUTERS
2. HALF DUPLEX
A half-duplex transmission can send and receive in one direction, but not at the same time.
It's like a one-lane bridge where two-way traffic must give way in order to cross. Only one
end transmits at a time, the other end receives. In addition, it is possible to perform error
detection and request the sender to retransmit information that arrived corrupted. In some
aspects, you can think of Internet surfing as being half-duplex, as a user issues a request for
a web document, then that document is downloaded and displayed before the user issues
another request.
Another example of half-duplex is talkback radio, and CB Radio (Citizens Band). You
might have seen movies where a truck driver (drivers of very big trucks) communicates to
each other, and when they want the other person to speak they say "over". This is because
only one person can talk at a time
3. FULL DUPLEX
Data can travel in both directions simultaneously. There is no need to switch from transmit
to receive mode like in half duplex. It like a two lane bridge on a two-lane highway. Have
you ever watched these television talk shows where the host has a number of people on the
show, and they all try to talk at once. Well, that's full duplex!
[email protected] 230
INTRODUCTION TO COMPUTERS
Of course, in the world of data communications, full duplex allows both way
communications simultaneously. An example can be a consumer, which uses a cable
connection not only, receives TV channels, but also the same cable to support their phone
and Internet surfing. All these activities can occur simultaneously.
[email protected] 231
INTRODUCTION TO COMPUTERS
Properties
Computer networks:
1. Facilitate communications
Using a network, people can communicate efficiently and easily via email, instant
messaging, chat rooms, telephone, video telephone calls, and video conferencing.
2. Permit sharing of files, data, and other types of information
In a network environment, authorized users may access data and information
stored on other computers on the network. The capability of providing access to
data and information on shared storage devices is an important feature of many
networks.
3. Share network and computing resources
In a networked environment, each computer on a network may access and use
resources provided by devices on the network, such as printing a document on a
[email protected] 232
INTRODUCTION TO COMPUTERS
shared network printer. Distributed computing uses computing resources across a
network to accomplish tasks.
4. May be insecure
A computer network may be used by computer hackers to deploy computer
viruses or computer worms on devices connected to the network, or to prevent
these devices from normally accessing the network (denial of service).
5. May interfere with other technologies
Power line communication strongly disturbs certain forms of radio
communication, e.g., amateur radio. It may also interfere with last mile access
technologies such as ADSL and VDSL.
6. May be difficult to set up
A complex computer network may be difficult to set up. It may also be very
costly to set up an effective computer network in a large organization or
company.
NETWORK TOPOLOGIES
A common connection point for devices in a network. Hubs are commonly used
to connect segments of a LAN. A hub contains multiple ports. When a packet
arrives at one port, it is copied to the other ports so that all segments of the LAN
can see all packets. A passive hub serves simply as a conduit for the data,
enabling it to go from one device (or segment) to another. ...
Node – a terminal point in a communications network.
Workstation – A computer terminal or micro- or minicomputer system designed
to support the work of one person.
MESH TOPOLOGY
[email protected] 233
INTRODUCTION TO COMPUTERS
It works by sending data along the fastest route from one device to another as all devices are
either directly or indirectly connected creating many pathways for data to travel
Internet employs the Mesh topology and the message finds its route for its destination. Router
works in find the routes for the messages and in reaching them to their destinations.
It is the topology in which every devices connects to every other device is called a full Mesh
topology unlike in the partial mesh in which every device is indirectly connected to the other
devices.
In Other topologies like star and bus, messages are usually broadcasted to every computer,
especially in bus topology.
Similarly in the Ring topology message can travel in only one direction i.e clockwise or
anticlockwise.
[email protected] 234
INTRODUCTION TO COMPUTERS
8. There are high chances of redundancy in many of the network connections.
9. Overall cost of this network is way too high as compared to other network topologies.
10. Set-up and maintenance of this topology is very difficult. Even administration of the network is
tough.
STAR TOPOLOGY
[email protected] 235
INTRODUCTION TO COMPUTERS
All traffic between two nodes passes through the central node. If the central
component breaks down, the whole network is down.
The number of ports of the central component limits the number of connected nodes.
Costs are usually higher than with bus or ring networks
If you have only one central device and it fails, it brings the network down
A star topology requires a lot of cabling since all data path connections must be to the
central node.
There is no direct communication between or among workstations
Sharing of processor delays in the processing of jobs.
[email protected] 236
INTRODUCTION TO COMPUTERS
BUS/LINEAR TOPOLOGY
When a node breaks down, the network does not break down.
A bus uses relatively less cables compared to other topologies
Direct communication due to direct connection.
Fast processing since there is no Host computer
Once a cable has been laid down any new equipment can easily be connected to the
network by a simple tapping into the cable.
Easy to install
Costs are usually low
Easy to add systems to network
Great for small networks
[email protected] 237
INTRODUCTION TO COMPUTERS
In a bus topology it is not always easy to add a node. [E.g. installation of extra tap in
thick Ethernet].
Diagnosis/trouble shooting can be difficult.
Expensive to run [several processors] – Detectors.
Communication between components of the network traveling in opposite direction along
the bus can collide causing loss of transmitted information.
Because of this collision a detection system has to be present to control the re-
transmission of lost information thereby making it a more expensive option
Out-of-date technology
If cable breaks, whole network is down
Can be difficult to troubleshoot
Unmanageable in a large network
If a malicious user were on this network and utilized a packet capture program, he could
see every conversation that occurred between machines.
RING NETWORK
[email protected] 238
INTRODUCTION TO COMPUTERS
A network topology in the form of a closed loop or circle. Each node in the network is
connected to the next, and messages move in one direction around the system. When a
message arrives at a node, the node examines the address information in the message. If the
address matches the node's address, the message is accepted; otherwise the node regenerates
the signal and places the message back on the network for the next node in the system. ...
The message return provides the source with a form of acknowledgement. The node
removes its own message from the ring.
Little cabling needed compared to Star.
Each node acts as relay unit.
Packet collisions do not occur because information is traveling in one direction.
Relatively cheap to install.
Efficient and accurate means of communication.
There is no dependency on the host computer or file server as each node controls
transmission to and from itself.
When the load on the network increases, its performance is better than that of Bus
topology.
There is no need for network server to control the connectivity between workstations.
Additional components do not affect the performance of network.
Each computer has equal access to resource.
Token ring technology reduces the need of server or central hub to manage the
workstations.
[email protected] 239
INTRODUCTION TO COMPUTERS
The message return provides the source with a form of acknowledgement. The node
removes its own message from the ring.
Little cabling needed compared to Star.
Each node acts as relay unit.
Packet collisions do not occur because information is traveling in one direction.
Relatively cheap to install.
Efficient and accurate means of communication.
There is no dependency on the host computer or file server as each node controls
transmission to and from itself.
TREE TOPOLOGY
Also known as Hierarchical Topology, this is the most common form of network
topology in use presently.
This topology imitates as extended Star topology and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network.
Mainly in LANs, a network is bifurcated into three types of network devices.
The lowermost is access-layer where computers are attached.
The middle layer is known as distribution layer, which works as mediator between upper
layer and lower layer.
The highest layer is known as core layer, and is central point of the network, i.e. root of
the tree from which all nodes fork.
All neighboring hosts have point-to-point connection between them.
Similar to the Bus topology, if the root goes down, then the entire network suffers even
though it is not the single point of failure.
Every connection serves as point of failure, failing of which divides the network into
unreachable segment.
[email protected] 240
INTRODUCTION TO COMPUTERS
[email protected] 241
INTRODUCTION TO COMPUTERS
Tree Topology
HYBRID TOPOLOGY
A network structure whose design contains more than one topology is said to be hybrid topology.
Hybrid topology inherits merits and demerits of all the incorporating topologies.
The diagram below represents an arbitrarily hybrid topology.
The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain topologies.
Most WANs are connected by means of Dual-Ring topology and networks connected to them are
mostly Star topology networks.
Internet is the best example of largest Hybrid topology
[email protected] 242
INTRODUCTION TO COMPUTERS
1. Complex in design.
2. Costly.
[email protected] 243
INTRODUCTION TO COMPUTERS
[email protected] 244
INTRODUCTION TO COMPUTERS
[email protected] 245
INTRODUCTION TO COMPUTERS
In a virtual area network, different switches of LAN are logically connected to each other to make
the single switch. This type of network is used to logically differentiate and limit the different
level of computers. For example, there are different departments in the office like the accounting
department, support department, and administrative department. All the computers of these
departments are logically connected to the same switch but one department computer cannot
access another department computer. So same department computers can communicate with each
other but different department computers cannot communicate with each other.
Sharing of resources:
All the resources are attached to one network and if any computer needs any resources then it can
be shared with the required computer. Types of resources are the DVD drive, printers, scanners,
modems and hard drives. So there is no need to purchase separate resources for each computer
and it saves money.
All the data from attached computers can be stored in one server. If any computer (Client) needs
data then that computer user can simply log in and access the data from the server. For example
movies and songs can be stored on the server and can be accessed by any authorized user (Client
computer).
In offices and net cafes, we can see that one internet connection is shared between all computers.
This is also the type of LAN technology in which main internet cable is attached to one server
and distributed amoung attached computers by the operating system.
Software programs can also be shared on the LAN. You can use single licensed software and any
user can use it in the network. It is expensive to buy a license for each user in the network so
sharing software program is easy and cost-effective.
Securing of data:
Keeping data on the server is more secure. And if you want to change or remove any data you can
do it easily on one server computer and other computers can access updated data. You can also
give access or revoke access to specific users so that only authorized users can access the data in
the network.
[email protected] 246
INTRODUCTION TO COMPUTERS
In LAN computers can exchange data and messages in the easy and fast way. It also saves time
and makes our work fast. Every user can share messages and data with any other user on LAN.
The user can log in from any computer on the network and access the same data placed on the
server.
Computer identification:
Each computer is given a MAC address and is temporarily stored in the switch or router during
communication. All computers on the LAN are identified by MAC addresses which are used to
send and receive messages and data. Note that MAC address is stored in the network adapter that
is attached in the motherboard of each computer. In old computers, network adapters were not
built in with motherboards but in modern computers, they come built-in with motherboards.
If the server computer is not set up correctly and there is a leak in security then unauthorized
users can access the data also. So there should be privacy policy and rules set up correctly on the
server.
Limitation of distance:
Local area networks are usually made within a building or nearby building and cannot extend to
the wider area.
If any file on the server is corrupted or hard drive fails then all the attached computers face
problems in functioning properly.
It is expensive to set up LAN because there is special software required to make a server. Also,
communication devices like hubs, switches, routers, cables are costly. The special administrator is
required to maintain and troubleshoot LAN for a large office.
A network consisting of computers of LAN's connected across a distance WAN can cover small
to large distances, using different topologies such as telephone lines, fiber optic cabling, satellite
transmissions and microwave transmissions. Wide Area Networks (WANs) connect larger
geographic areas. A WAN is a Wide Area Network covering a large geographical area.
[email protected] 247
INTRODUCTION TO COMPUTERS
Wide area network (WAN) is a type of network that provides transmission of voice, data,
images, and videos over the large geographical area. WAN is made with the
combinations of LAN and MAN. The transmission of data is carried out with the help of
hubs, switches, fiber optics, modem, and routers. To transfer data from any computer
over the internet we use some technologies including:
[email protected] 248
INTRODUCTION TO COMPUTERS
Wide
area network (WAN) diagram
[email protected] 249
INTRODUCTION TO COMPUTERS
Advantages of a wide area network (WAN)
Centralized data:
Your company doesn’t need to buy email, files, and backup servers, they can all reside on
head office. All office branches can share the data through the head office server. You
can get back up, support, and other useful data from the head office and all data are
synchronized with all other office branches.
Global business:
Now everyone with computer skills can do business on the internet and expand his
business globally. There are many types of business like a shopping cart, sale, and
purchase of stocks etc.
High bandwidth:
If you get leased lines for your company then it gives high bandwidth than normal
broadband connection. You can get a high data transfer rate that can increase your
company productivity.
[email protected] 250
INTRODUCTION TO COMPUTERS
Security problems:
WAN has more security problem as compare to MAN and LAN. WAN has many
technologies combined with each other which can create a security gap.
Troubleshooting problems:
As WAN covers a lot of areas so fixing the problem in it is difficult. Most of WAN wires
go into the sea and wires get broken sometimes. It involves a lot of resources to fix lines
under the sea. In ISP (Internet service provider) head office many of internet lines,
routers are mixed up in rooms and fixing issues on the internet requires a full-time staff.
[email protected] 251
INTRODUCTION TO COMPUTERS
1. Speed. Networks provide a very rapid method for sharing and transferring files.
Without a network, copying them to floppy disks, then carrying or sending the
disks from one computer to another shares files. This method of transferring files
(referred to as sneaker-net) is very time-consuming.
[email protected] 252
INTRODUCTION TO COMPUTERS
network, allowing users to see invoices, results of surveys, company newsletters,
and other information.
7. Flexible Access. Networks allow data & information access from any computer
in the campus.
DISADVANTAGES
3. File Server May Fail. Although a file server is no more susceptible to failure
[email protected] 253
INTRODUCTION TO COMPUTERS
than any other computer, when the files server "goes down," the entire network
may come to a halt. When this happens, the entire school may lose access to
necessary programs and files.
4. Cables May Break. Some of the configurations are designed to minimize the
inconvenience of a broken cable; with other configurations, one broken cable can
stop the entire network.
5. Security concerns. Some user can gain unauthorized access to private data. There
is a danger of hacking, particularly with wide area networks. Security procedures
are needed to prevent such abuse. Of all the disadvantages, the greatest drawback
is security concerns; therefore, network security is a priority in the development
of network applications.
NETWORK SECURITY
The field of network security in general and of TCP/IP security in particular is too wide
to be dealt with we take the most common security exposures and measures to counteract
them. Because many, if not all, security solutions are based on cryptographic algorithms.
Security Issues
This section gives an overview of some of the most common attacks on computer
security, and it presents viable solutions to those exposures and lists actual
implementations.
Common Attacks
For thousands of years, people have been guarding the gates to where they store their
treasures and assets. Failure to do so usually resulted in being robbed, neglected by
society or even killed. Though things are usually not as dramatic anymore, they can still
become very bad. Modern day I/T managers have realized that it is equally important to
protect their communications networks against intruders and saboteurs from both inside
[email protected] 254
INTRODUCTION TO COMPUTERS
and outside. We do not have to be overly paranoid to find some good reasons why this is
the case:
Tapping the wire: to get access to clear text data and passwords
Impersonation: to get unauthorized access to data or to create unauthorized e-
mails, orders, etc.
Denial-of-service: to render network resources non-functional
Replay of messages: to get access to and change information in transit
Guessing of passwords: to get access to information and services that would
normally be denied.
Guessing of keys: to get access to encrypted data and passwords (brute-force
attack, chosen cipher text attack, chosen plaintext attack)
Viruses, Trojan horses and logic bombs: to destroy data
Though these attacks are not exclusively specific to TCP/IP networks, they should be
considered potential threats to anyone who is going to base his/her network on TCP/IP,
which is what the majority of enterprises, organizations and small businesses around the
world are doing today. Hackers (more precisely, crackers) do likewise and hence find
easy prey.
User IDs: Make sure that every user has a password and that users are locked out
after several logon attempts with wrong passwords (typically five attempts). Keep the
passwords to superuser accounts (root, supervisor, administrator,etc.) among a very
limited circle of trusted system, network and security administrators.
System defaults: Make sure that default user IDs are either disabled or have
passwords that adhere to the minimum requirements stated above. Likewise, make
sure that only those services are enabled that are required for a system to fulfill its
designated role.
Physical access: Make sure that access to the locations where your systems and users
physically reside is controlled appropriately. Information security begins at the
receptionist, not at the corporate firewall.
Help desk: Make sure that callers are properly identified by help desk representatives
or system administrators before they give out "forgotten" passwords or user IDs.
[email protected] 255
INTRODUCTION TO COMPUTERS
Social engineering is often the first step to attack a computer network.
[email protected] 256
INTRODUCTION TO COMPUTERS
INTERNET SERVICES
The Internet is the network of networks being a worldwide collection of
computers that communicate with one another over cables, satellites and optical
fibers. It is literally the whole hardware mass. The Internet is the network used to
transport information.
Internet, by definition is a network of networks that interact with each other through
exchange of data packets. The Internet hosts an enormous information base and
carries numerous information resources and services..
When we refer to the Internet we are usually talking about the World Wide Web
(WWW) which is the most used feature of the Internet.
The WWW stores millions of web pages on web servers. These pages can
contain text, pictures, movies, animation and sound. Web pages are written in a
language or code called HTML (Hypertext Markup Language). A set of web
pages is called a website.
Each web page has its own unique address or URL. The URL will have the
format "http" and a domain (such as ."co.uk"). What goes in between is arbitrary,
but often has the term "www "such as in "http://www.name.co.uk". but it
doesn’t have to (e.g. http://news.bbc.co.uk).
Most sites have a page that links the user to the other main areas of the site. This
is called the homepage.
Web pages are connected by hypertext links. When a link is clicked you will be
taken to another page which could be on another server in any part of the world.
When you move around web pages you are said to be surfing the net. For this you
need a program to read the pages (called a browser), such as Firefox or Internet
Explorer.
To search for a particular item or topic on the net you use a search engine. There
are many different kinds of search engine, each using slightly different ways of
searching and indexing web content. Google, MSN and Alta Vista are all examples
of search engines, while Yahoo and Exciteare web directories (a bit like the
Yellow Pages phone book) which have a search function built in.
The World Wide Web Is software that runs on the internet which includes all
documentation that is shared and accessed on the internet.
A Web page is a document designed to be accessed and read over the WWW. It
must have an address in a recognized format.
DEFINITION OF TERMS
[email protected] 257
INTRODUCTION TO COMPUTERS
Most offer the same basic package of Internet access, email addresses, web space for
your own pages and local rate call charges.
Search engines
Internet search engines help users find web pages on a given subject. The search
engines maintain databases of web sites and use programs (often referred to as
"spiders" or "robots") to collect information, which is then indexed by the search
engine. Similar services are provided by "directories," which maintain ordered lists of
websites, eg Yahoo!
Examples of search engines are: Google, MSN, Bing, Yahoo, AltaVista
[email protected] 258
INTRODUCTION TO COMPUTERS
Internet address
The numbering system used in TCP/IP internetwork communications to specify a
particular network or a particular host on that network with which to communicate.
Internet addresses are commonly denoted in dotted decimal form.
Examples of internet addresses
1. www.facebook.com
2. www.google.com
3. www.yahoo.com
4. www.gmail.com
5. www.herald.co.zw
IP address
An IP address (Internet Protocol address) is a unique number, a kind of telephone
number, used by machines (usually computers) to refer to each other when sending
information through the Internet. This allows machines passing the information
onwards on behalf of the sender to know where to send it next, and for the machine
receiving the information to know that it is the intended destination.
Internet Service Provider: A company, which provides users with an access to the
Internet, is known as an Internet service provider or Internet access provider. ISP, as it is
called, offers email accounts and other services like remote storage of files for its
customers.
Internet Protocol Suite: It is a set of communication protocols, which are used for the
Internet. Transmission Control Protocol (TCP) and Internet Protocol (IP) were the two
pioneering protocols to be introduced in the Internet protocol standard. The Internet
protocol suite is composed of a set of layers wherein; each layer provides a service to the
upper layers in the set. The upper layers deal with abstract data while the lower layer
protocols translate data into physically transmittable forms.
PPP: Point-to-Point protocol (PPP) is a data link protocol that facilitates the
establishment of a direct connection between two nodes on a network.
MAC Address: Media Access Control address (MAC) is the physical hexadecimal
address assigned to each device on a network.
Domain Name System: DNS, as it is called, refers to the hierarchical naming system
used for computers, resources and services on the Internet. It translates the computer
hostnames to IP addresses. By way of the implementation of DNS, the domain name
'www.buzzle.com' translates to its IP address, say, 208.70.178.150. With the help of
DNS, domain names can be assigned to Internet users.
[email protected] 259
INTRODUCTION TO COMPUTERS
Cyberspace: This term coined by William Gibson, is used to refer to the computer
networks connected to each other and the content they host. It is often used to refer to the
Internet.
WWW: It is a collection of interlinked documents that are accessible over the Internet. It
consists of millions of web pages that contain text, images, voice and videos. Sir Tim
Berners-Lee, a British scientist working at CERN, created the World Wide Web.
Website: A website is a set of web pages consisting of text, audio and video. Web servers
host websites.
URL: It specifies the location of a resource on the Internet. It consists of the basic
address and path.
Web Page: Web pages are resources of information. They are generally created in the
HTML format and provide the web users with navigational abilities through hyperlinks to
other web pages on the web.
Home Page: The term home page is used to refer to the page that is the default page of
any website. It is the main page of a complex website.
Proxy Server: Client machines on a network connect to the proxy server, which forwards
the client requests to other servers and returns responses to the clients.
Web Server: A web server is a computer program that accepts HTTP requests from web
clients and provides them with HTTP responses.
Web Browser: A web browser is a software application that facilitates user interaction
with the text, audio, video and other information that is located on the web.
Cache: Web browsers maintain a cache of recently visited web pages. Some of them use
an external proxy web cache, which is a server program through which web requests
pass. This enables the browsers to cache frequently visited pages. Even search engines
make available already indexed web pages through their caches.
Web Cookie: Also known as an HTTP cookie, it is piece of text that is exchanged
between the web client and the web server. It is sent by the web server to the web client
and returned unchanged by the client each time it accesses the server. You might want to
know how do websites use cookies?
[email protected] 260
INTRODUCTION TO COMPUTERS
Hyperlink: A reference in a document to another section of the document or to another
document is termed as a hyperlink. Hyperlinks are used to redirect the user from one
section of a page content to another.
Internet security: It is one of the major concerns today. As the Internet acts as a
communication platform that can be accessed by millions of users around the world, it
becomes necessary that proper measures be implemented. Issues like Internet safety that
deal with the content that is made accessible over the Internet are equally important.
Internet privacy relates to safeguarding the privacy of the web users and the sensitive
information on the web from hackers and stalkers.
Email Address: It identifies the network location to which an email can be delivered. An
email address is a combination of the user name of the mail user and the host name of the
mailing system. It is of the form, 'username@domain-name'. An email alias is a
forwarding email address. It simply forwards emails to specific email addresses.
Spamming: The act of sending unsolicited bulk messages over an email system is known
as spamming. It is an undesirable use of the electronic messaging systems.
Email Scams: With the increase in the use of email systems, its security needs also rose.
Fraudulent users started tampering with the email systems to breach security.
Email Virus: It is a computer code that is transmitted through an email in the form of an
attachment. The email attachment causes the destruction of some of the files on the
receiver computer's hard disk and is programmatically emailed to the contacts in the
address book of the receiver.
Email Client: It is also known as a mail user agent (MUA). An email client is a front-end
computer program or an agent that acts as a client for the email server.
[email protected] 261
INTRODUCTION TO COMPUTERS
Mail Server: It can also be called Mail Transfer Agent (MTA) and is responsible for
receiving incoming email from local users and forwarding outgoing mails for delivery. A
mail server application forms the heart of a messaging system that performs all the
functions to keep the mails moving over the network.
SMTP: Short for Simple Mail Transfer Protocol, SMTP is the standard for the
transmission of electronic mails. The electronic mail server software uses SMTP to send
and receive mail messages. ESMTP, that is known as extended or enhanced SMTP refers
to the protocol extensions made to SMTP and is widely used today.
POP3: Short for Post Office Protocol, POP3 is an application layer Internet standard
protocol. It is used to retrieve mails from a remote server. Here is a brief introduction to
POP3.
Internet Chat: It is a real-time Internet chat or synchronous conferencing that is used for
group communication as well as one-to-one communication over the Internet. Jarkko
Oikarinen, a Ph.D. from the University of Oulu is the developer of the first Internet chat
network. He developed the client and server programs for Internet Relay Chat in August
1988.
ADSL: Asymmetric Digital Subscriber Line, abbreviated as ADSL, is used for the
transmission of digital information using high bandwidths on existing phone lines. ADSL
technology is characterized by high download and low upload rates.
Dial-up: It is the means to connect to the Internet using the copper phone lines and a
modem. Dial-up connections are capable of sending information from the client's end at
very slow speeds of about 56kbps.
Modem: It is a device that modulates analog carrier signals to encode digital information
and demodulates carrier signals to decode information. A cable modem provides access
to data signals sent over the cable television infrastructure. Modems are commonly used
for facilitating Internet access.
Communication Bandwidth: It refers to the data that can be transferred between two
points in a given period of time. It is expressed in terms of bits per second. It is
commonly known as the bit rate.
Blogs: Blogs are the expressions of the common masses about social or political issues or
simply anything. Blogs can often be in the form of creative write-ups by writers in
[email protected] 262
INTRODUCTION TO COMPUTERS
different parts of the world.
Internet Forums: It is a bulletin board that serves as a platform for group discussion.
Registered users are free to contribute to the issues raised in forums thus making them
open discussion platforms.
Search Engine Optimization: The process of organizing the content of a website with
intent to increase its relevance with respect to keywords and search engines. The process
of optimization involves editing website content and HTML coding to support search
engine strategies of ranking and indexing.
Internet Bookmark: The Internet browsers of the modern times aim at enabling the
users to organize the web pages they access. Links once visited can be saved in the
favorites or preferences categories. Bookmarks are usually integrated into browsers.
Social bookmarking is a method used by Internet users to store and manage web pages.
Web Directories: It is a directory, which links to other websites and organizes those
links. They should not be mistaken as being search engines.
OTHER TERMS
Router: A router connects two or more logical subnets and performs the functions of
routing and forwarding information.
Intranet: It is a relatively smaller private network that uses the Internet protocols and
connectivity. It is an extension of the Internet and is privately used by organizations.
Extranet: It is a private network that uses Internet technology to share a part of the
business information and operations with suppliers and customers. It can be a part of a
company's intranet that provides access to the users outside the company.
Virtual Private Network: It is a private network that allows the exchange of information
[email protected] 263
INTRODUCTION TO COMPUTERS
between computers over a shared or a public network.
Wireless Networking: It refers to computer networking that is carried out over the
wireless media.
Broadband Internet: Broadband connectivity to the Internet provides the users with a
high-speed Internet access.
Dial-up Internet: In this type of access to the Internet, the user's computer is attached to
a modem connected to a telephone line. Dial-up Internet access involves a modem that
dials into an Internet service provider to establish a connection.
Satellite Internet: Internet services that make use of the satellite communication media
are termed as satellite Internet services. They are used in locations that are mobile thus
making terrestrial Internet connectivity, an impossibility.
Advantages
Faster Communication
The foremost target of Internet has always been speedy communication and it has
excelled way beyond the expectations. Newer innovations are only going to make it faster
and more reliable. Now, you can communicate in a fraction of second with a person who
is sitting in the other part of the world. For more personal and interactive communication,
you can avail the facilities of chat services, video conferencing and so on. Besides, there
are plenty of messenger services in offering. With the help of such services, it has
become very easy to establish a kind of global friendship where you can share your
thoughts and explore other cultures.
Information Resources
Information is probably the biggest advantage that Internet offers. Internet is a virtual
[email protected] 264
INTRODUCTION TO COMPUTERS
treasure trove of information. Any kind of information on any topic under the sun is
available on the Internet. The search engines like Google, Yahoo are at your service on
the Internet. There is a huge amount of information available on the Internet for just
about every subject known to man, ranging from government law and services, trade fairs
and conferences, market information, new ideas and technical support, the list is simply
endless.
Students and children are among the top users who surf the Internet for research. Today,
it is almost required that students should use it for research or the purpose of gathering
resources. Even teachers have started giving assignments that require extensive research
on the Internet. Besides, you can have an access to latest researches in the field of
medicine, technology and so on. Numerous web sites such as America's Doctor also
allow you to talk to the doctors online.
Entertainment
Entertainment is another popular raison d'être why many people prefer to surf the
Internet. In fact, the Internet has become quite successful in trapping the multifaceted
entertainment industry. Downloading games or just surfing the celebrity websites are
some of the uses people have discovered. Even celebrities are using the Internet
effectively for promotional campaigns. Besides, there are numerous games that can be
downloaded for free. The industry of online gaming has tasted dramatic and phenomenal
attention by game lovers.
Social Networking
One cannot imagine an online life without Facebook or Twitter. Social networking has
become so popular amongst youth that it might one day replace physical networking. It
has evolved as a great medium to connect with millions of people with similar interests.
Apart from finding long-lost friends, you can also look for job, business opportunities on
forums, communities etc. Besides, there are chat rooms where users can meet new and
interesting people. Some of them may even end up finding their life partners.
Online Services
The Internet has made life very convenient. With numerous online services you can now
perform all your transactions online. You can book tickets for a movie, transfer funds,
pay utility bills, taxes etc., right from your home. Some travel websites even plan an
Itinerary as per your preferences and take care of airline tickets, hotel reservations etc.
e-commerce
The concept of e-commerce is used for any type of commercial maneuvering or business
deals that involves the transfer of information across the globe via the Internet. It has
become a phenomenon associated with any kind of shopping, business deal etc. You
name a service, and e-commerce with its giant tentacles engulfing every single product
and service will make it available at your doorstep. Websites such as eBay allow you to
even bid for homes, buy, sell or auction stuff online.
Additional advantages
[email protected] 265
INTRODUCTION TO COMPUTERS
1. Global Audience
Content published on the World Wide Web is immediately available to a
global audience of users. This makes the World Wide Web a very cost-
effective medium to publish information. Reaching more than 190 countries.
2. Operates 24 hours, 7 days a week
You don't need to wait until resources are available to conduct business. From
a consumer's perspective as well as a provider's business can be consummated
at any time. The fact that the Internet is operational at all times makes it the
most efficient business machine to date.
3. Relatively Inexpensive
It is relatively inexpensive to publish information on the Internet. At a fraction
of the cost to publish information by traditional methods, various
organizations and individuals can now distribute information to millions of
users. It costs only a few thousand dollars to establish an Internet presence and
publish content on the Internet.
4. Product Advertising
You can use the World Wide Web to advertise various products. Before
purchasing a product, customers will be able to look up various product
specification sheets and find out additional information. You can use the
multimedia capabilities of the World Wide Web to make available not only
various product specification sheets but also audio files, images, and even
video clips of products in action. The beauty of the Web is that it allows
customers to explore products in as much detail as they desire. If the client
just wants a general overview, he or she can look at the advertising
information. For those wanting more in depth information, you can provide
white papers and product descriptions for download. The Web allows a
business to provide timely information, you can simply place the information
on the Web page and it is available immediately for your customers.
5. Distribute Product Catalogs
The World Wide Web is a very effective medium for distributing product
catalogs. In the old days, putting together a product catalog used to be very
costly in terms of time and money needed to publish and distribute it. The
World Wide Web changes all this by allowing content developers to put
together a sales catalog and make it available to millions of users
immediately. Furthermore, unlike printed product catalogs that are usually
updated around once a month, product catalogs on the World Wide Web can
be updated as needed to respond to various changing market conditions.
6. Online Surveys
Traditional methods of performing surveys are often relatively slow and
expensive compared to online surveys conducted on the Internet. For example,
in order to fill out various needs of customers or what they would like to see
in a future product, it's often necessary to compile a list of address and mail a
questionnaire to many customers. The success of such an attempt is not
always guaranteed and can be very costly in terms of mailing the
questionnaires and entering responses to a databases and analyzing it. On the
other hand, you can use the World Wide Web to automate the whole process.
[email protected] 266
INTRODUCTION TO COMPUTERS
For example, you can set up a CGI script to conduct online surveys. Results of
such a survey can be automatically updated to a database. This database can
then be used to keep a pulse on various opinions and needs of customers.
7. Announcements
With the World Wide Web, you can distribute various announcements to
millions of users in a timely manner. Because there is virtually no time lag
from the time it takes to publish information to making the information
available to users, the Web is an ideal medium to publicize announcements.
As more people discover the virtues of the Web and get connected to the
Internet, the Web will become the medium of choice for many organizations
and individuals to publicize various announcements.
8. Provide Technical Support
You can also use Web site to provide technical support to users. Because Web
pages can be updated immediately with new information, various technical
support literature can be immediately modified in light of new findings and
developments. This can be accomplished without having to distribute changes
to all users affected by any changes using traditional mediums of information
distribution, which are often quite costly compared to the World Wide Web.
9. Create Online Discussion Forums
By using applications such as WebBoard, it's possible to set up online
discussion forums on the Web.
10. Obtain Customer Feedback
The interactive nature of the World Wide Web is ideal for obtaining customer
feedback. You can easily set up a CGI script to obtain customer feedback
about a product or service. Because customer feedback submitted by
customers can be read immediately, it's possible to respond to various
customer concerns in a timely manner, increasing customer satisfaction and
quality of customer service.
11. Immediate Distribution of Information
When information is added to a Web site, it's immediately available for
browsing by millions of Internet users. The World Wide Web is an ideal
medium of information distribution because it takes away the time lag
associated with publishing content and actually making it available to users
12. Easy Integration with Internal Information Systems
Internet information systems deployed on the Internet can be easily integrated
with internal information systems managed with office productivity
applications such as Microsoft Office.
13. Powerful Content Publishing Tools
A new breed of Internet aware applications will start emerging in software
stores by the time you read this. These applications will enable users to
develop content for the World Wide Web by simply saving as an HTML file.
In addition to software developers making existing applications Internet
aware, various new, powerful, and easy-to use Internet content publishing
applications are also being developed. These applications will make the task
of publishing content on the Internet even easier. Most of these applications
are developed for Windows users.
[email protected] 267
INTRODUCTION TO COMPUTERS
14. Multimedia
The capability to incorporate multimedia into Web pages is a major advantage
of using World Wide Web to publish information. For example, many Web
sites use sounds and video clips to make the content easier and more
interesting to browse.
15. Formatting Capabilities
Content published on the World Wide Web can be richly formatted by using
various HTML tags and graphic formats. The capability to do this is a major
reason for the success of the World Wide Web. In addition to using HTML
tags and various multimedia formats in Web pages, various interactive
controls can also be added to a web page. This capability allows Web site
content developers to create "active" Web sites. For example, before a user
sends some information to a Web server for processing, a VBScript or
JavaScript subroutine can be used to verify information typed in by the user.
Various formatting capabilities, along with technologies such as Java and
VBScript, make the World Wide Web a richly interactive medium that you
can use to distribute information to millions of users.
Disadvantages
Spamming
Spamming refers to sending unwanted e-mails in bulk, which provide no purpose and
needlessly obstruct the entire system. Such illegal activities can be very frustrating for
you as it makes your Internet slower and less reliable.
Virus Threat
Internet users are often plagued by virus attacks on their systems. Virus programs are
inconspicuous and may get activated if you click a seemingly harmless link. Computers
connected to the Internet are very prone to targeted virus attacks and may end up
crashing.
Pornography
Pornography is perhaps the biggest disadvantage of the Internet. Internet allows you to
access and download millions of pornographic photos, videos and other X-rated stuff.
Such unrestricted access to porn can be detrimental for children and teenagers. It can
even play a havoc in marital and social lives of adults.
Social Disconnect
Thanks to the Internet, people now only meet on social networks. More and more people
[email protected] 268
INTRODUCTION TO COMPUTERS
are getting engulfed in virtual world and drifting apart from their friends and family.
Even children prefer to play online games rather than going out and mingling with other
kids. This may hamper a healthy social development in children
To send e-mail access the Internet, both the sender and receiver need:
3) A MODEM - the type of modem you need to use is dependent on the type of
connection you have. Some of the choices are:
An analogue modem and an ordinary phone line. This type of modem links your
[email protected] 269
INTRODUCTION TO COMPUTERS
computer to the phone and converts computer signals to analogue phone line signals -
and back again. Typical analogue modem speeds are 56Kbps (bps stands for bits per
second) which means they can receive about 6000 characters per second. This is the
slowest and oldest type of connection and becoming less common with the
introduction of broadband.
An ISDN line and terminal adaptor. This digital connection is slightly faster than an
analogue connection. ISDN or Integrated Services Digital Network provides digital
transmission of voice and data services. Although now it is primarily used for Voice
as it give you the options of having more than one Channel (line). They come in
many ‘flavours’… 2, 10, 20 and 30 and you can also increase the number of Channels
as your business expands by multiple ISDNs to meet your requirements. Medium to
large businesses prefer this product as it gives them the option of integrating it with
their phone systems (PABX) and takes advantage of multiple features. Like using a
100 number range, groups, queues, on hold music and RVAs, etc.
When ISDN was launched it was able to simultaneously support early video
conferencing systems and analogue phone lines. A few years ago ISDN was the
fastest Internet speed available (128 kbps) but its popularity is rapidly declining due
to the introduction of cloud communications.
An ADSL or cable telephone line and broadband modem. Broadband modems are
much faster than the other two options and their use is increasing. ADSL or
Asymmetric Digital Subscriber line or in other words ‘the Internet’. Ok, not quite the
Internet, but it is the means to connect to the Internet. This type of service is most
commonly used by small businesses because it provides enough bandwidth for a
small group of users to access the Internet. It works only over an existing PSTN, so
you need to have an active PSTN to be able to have ADSL.
Most offer the same basic package of Internet access, email addresses, web space for
your own pages and local rate call charges.
5) Browser software
[email protected] 270
INTRODUCTION TO COMPUTERS
A web browser is a software application that enables a user to display and
interact with HTML documents hosted by web servers or held in a file system.
Popular browsers available for personal computers include Microsoft Internet
Explorer, Mozilla Firefox, Opera, and Safari. A browser is the most commonly
used kind of user agent. The largest networked collection of linked documents is
known as the World Wide Web.
Is a program that allows you to view the pages on the Web? The most widely
used are
6. Internet Explorer
7. Mozilla Firefox
8. Google chrome
9. Opera
10. Safari
All browsers will have a number of similar features to help you use the Web:
Forward and back buttons to move between pages
A history folder which stores details of recently visited web pages
A stop button if a page is taking too long to load
Favorites and bookmark options to store often visited pages
Options to cut, copy, save and print the information viewed
ELECTRONIC MAIL
Electronic mail or email is a means of sending messages, text, and computer files
between computers via the telephone network. Because the telephone network
covers the whole world, email enables you to communicate world wide.
EMAIL
To set up email you need:
A computer
An internet connection via an analogue modem (ordinary phone line) or terminal
adaptor (ISDN) or broadband modem (ADSL and cable)
An account with an ISP (Internet Service Provider)
Email software
Your Internet Service Provider will give you an email account, a password and a mailbox
such as [email protected]. You can also set up an email account with a
mailbox and passwords with non-ISPs such as Google and Hotmail.
With a dial-up connection, you have to pay the cost of your internet phone calls (local
rate), and in most cases a subscription to your provider (though some are free). A
broadband connection is 'always on', with only a flat-rate subscription. Very few people
pay by the minute nowadays and the majority of people pay a monthly fee for broadband
access.
[email protected] 271
INTRODUCTION TO COMPUTERS
Anti-virus scanning is becoming standard on email accounts and many email providers
now offer an anti spam (electronic junk mail) service.
WEB MAIL
Web mail, as its name suggests, is web-based email. To use web mail, you do not need
any email software - just a computer connected to the internet via any one of the
connection types listed above, and a browser.
Users simply sign up to the web mail service of a web portal such as MSN or Yahoo.
They are given a unique user name and a personal mailbox on the portal's email server,
and they can then send and receive messages via a special web page.
A basic web mail account is usually free, although this will have a very limited amount of
storage.
The advantage of web mail is that users can receive and send mail from any computer in
the world with internet access. If you have a dial-up connection you can download your
emails and then read them offline to avoid staying on-line for long periods.
Some ISPs will enable their regular email customers to access their mailbox via web mail
as well as through the email software on their PC.
Features of email
Automatic reply to messages
Auto forward and redirection of messages
Facility to send copies of a message to many people
Automatic filing and retrieval of messages
Addresses can be stored in an address book and retrieved instantly
Notification if message cannot be delivered
Automatically date and time stamped
Signatures can be attached
Files, graphics or sound can be sent as attachments, often in compressed formats
Web mail and mobile email can be used to receive and send messages while on
the move.
Using email
Broadband email
- Your connection is always on - so simply write and address your message and
hit 'send' to send your mail and 'receive' to download any incoming messages
from your email provider's server.
Web mail
- Connect to the internet (if using a dial-up account) and open your browser.
- navigate to your web mail provider's portal and enter your user-name and
password.
-all incoming mail will now be visible, and you can also compose and send mail,
and download attachments to your computer.
- When you're done, log out and close your connection.
Dial-up email
- Prepare your message offline as typing your message online will increase phone
[email protected] 272
INTRODUCTION TO COMPUTERS
charges.
- Connect to the internet and log on to your email account.
- Send your message and download any incoming mail sitting on your service
provider's computer.
- Log off and close your connection.
Email is evolving...
Many mobile phones already allow messages to be sent to the recipient's email
inbox while the sender is on the move. The latest generation of mobile phones
enables users to send and receive wireless email in exactly the same way as a
static computer.
Email can be sent and received via digital TV, specially adapted phones, public
kiosk terminals and the latest generation of games console.
A spreading network of wireless 'hotspots' in public places allows people to send
and receive email via laptop computers.
A new range of in-car phones will enable motorists to check their email on the
road
Email benefits
Fast delivery of your message
Available 365 days, 24 hours per day - and, with web mail, wherever you are in
the world as long as you have access to the internet.
Cheap: when using broadband, individual mail transfers are effectively free.
When going online from a dial-up account, calls are charged at local rates and (for
conventional email) need only last a few seconds.
Facility to send the same message to more than one person
Email concerns
It can only be sent to people who themselves have access to the internet.
Viruses are easily spread via email attachments - anti virus measures must be in
place to avoid this and are now offered by many e-mail providers.
Phishing - sending an e-mail to a user falsely claiming to be a legitimate
company to scam the user into providing information such as personal
information and bank account numbers on a bogus website. The details will then
be used for identity theft.
No guarantee the mail will be read until the user logs on and checks their mail.
Spam! Or Junk mail
[email protected] 273
INTRODUCTION TO COMPUTERS
Many people spend hours a day in front of a computer without thinking about the
impact on their bodies. They physically stress their bodies daily without realizing
it by extending their wrists, slouching, sitting without foot support and straining to
look at poorly placed monitors.
These practices can lead to cumulative trauma disorders or repetitive stress
injuries, which create a life-long impact on health. Symptoms may include pain,
muscle fatigue, loss of sensation, tingling and reduced performance.
Ergonomics is a field of study that attempts to reduce strain, fatigue, and injuries
by improving product design and workspace arrangement. The goal is a
comfortable, relaxed posture.
Ergonomics is the science of designing a job, equipment and/or workplace to fit the
worker. The goal is to optimize the "fit" between each worker and his or her work
environment to optimize performance and reduce the risk of repetitive strain injuries.
Some experts in this field also use the term "visual ergonomics" when talking about
designing a computer workstation with the goal of preventing CVS.
You don't need an expensive consultant to create a computer workstation that reduces
your risk of stress, discomfort and potential injury.
Here are some of the top computer ergonomics tips recommended by the Department of
Labor's Occupational Safety & Health Administration (OSHA). These tips are designed
to reduce the risk of stress, physical injury and computer eye strain from prolonged
computer use.
[email protected] 274
INTRODUCTION TO COMPUTERS
1. Use a good chair with a dynamic chair back and sit back in this
2. Top of monitor casing 2-3" (5-8 cm) above eye level
3. No glare on screen, use an optical glass anti-glare filter where needed
4. Sit at arm’s length from monitor
5. Feet on floor or stable footrest
6. Use a document holder, preferably in-line with the computer screen
7. Wrists flat and straight in relation to forearms to use keyboard/mouse/input device
8. Arms and elbows relaxed close to body
9. Center monitor and keyboard in front of you
[email protected] 275
INTRODUCTION TO COMPUTERS
10. Use a negative tilt keyboard tray with an upper mouse platform or downward
tiltable platform adjacent to keyboard
11. Use a stable work surface and stable (no bounce) keyboard tray
12. Take frequent short breaks (micro breaks)
With better posture, this computer worker might avoid neck and back strain.
1. Sit so your head and neck are upright and in-line with your torso, not bent down
or tilted back.
2. Face your computer screen directly. Avoid viewing your screen with your head
turned or your back twisted.
3. Keep your elbows comfortably close to your body.
4. Use a chair that provides support for your lower back and has a cushioned seat
with a contoured front edge.
5. Keep your mouse close to your keyboard so you don't have to reach for it.
6. Position your computer display so the top of the screen is at or slightly below eye
level. This will allow you to view the screen without bending your neck.
7. Adjust the position of your display to prevent reflections of overhead and outdoor
lighting appearing on your screen.
8. Put your monitor close enough to your eyes so you can comfortably read text on
the screen without leaning forward.
9. When working with print documents, use a document holder that positions them
at the same height and distance as your computer screen.
[email protected] 276
INTRODUCTION TO COMPUTERS
10. Use a hands-free headset when talking on the phone while working at your
computer.
Your upper arms are perpendicular to the floor, not stretched forward or angled
backward
Your forearms, wrists and hands form a 90-degree angle with your upper arms
Your thighs are parallel to the floor and your lower legs are perpendicular to the
floor
Your wrists and palms are not resting on sharp edges
If you wear bifocals or trifocals, you should be able to comfortably view your computer
screen without tilting your head back. If this is not the case, consider purchasing
computer glasses.
Following these tips will help you avoid stressful postures that lead to headaches, neck
and back pain and computer vision syndrome.
To relieve stress that can lead to computer vision syndrome and physical disorders, be
sure to take frequent breaks when working at a computer.
Many experts, including optometrists who specialize in computer vision, recommend that
you get up and move away from your computer for short breaks at least every 20 to 30
minutes.
Take a few minutes to stretch your arms and back, and let your eyes relax their focus by
looking at something at least 20 feet away.
Also, blink fully and frequently to reduce your risk of dry eyes from computer use. If
necessary, apply "artificial tear" eye drops to moisten and lubricate your eyes.
Adapt Laptops:
Laptop computers are not ergonomically designed for prolonged use. The monitor
and keyboard are so close together that they cannot both be in good positions at
the same time. For prolonged use, it's best to add a separate monitor and
keyboard. The laptop can be planced on books so the top of the screen is at eye
[email protected] 277
INTRODUCTION TO COMPUTERS
level, then use an external keyboard so that your elbows can rest at 90° by your
side.
Move!
Movement has many benefits: it relaxes tissues, lubricates joints and prevents
stiffness, improves circulation, reduces fatigue, and builds stamina. One study
showed that heavy computer users who successfully avoided computer-related
pain moved every 7 minutes.
At least every 10 minutes, take a short (10-20 second) break. Take your hands off
the keyboard and move!
Every 30-60 minutes, take a brief (2-5 minute) break to stretch and/or walk
around.
Neck/Shoulders
Neck Rotation: Slowly rotate your head as far as comfortable to the right, then
left.
Shoulder Rotation: Circle your shoulders, then reverse directions.
Head Side to Side: Bend your neck so left ear approaches left shoulder, then
repeat for right. Add a little resistance by pressing your hand against the side of
your head.
Chin Tuck: Slide your chin inward, without bending your neck up or down. This
is easiest to practice initially against a wall. Tuck chin in, attempting to touch
back of neck to the wall while also maintaining head contact. Don't jam your chin
down to your chest.
Shoulder Blade Retraction: Pull your shoulders down and back.
Shrug: Slowly raise your shoulders toward ears and hold for a few seconds.
Gradually bring shoulders down and relax.
Back
[email protected] 278
INTRODUCTION TO COMPUTERS
Shoulder Squeeze: Raise your arms in front of body, with elbows bent and thumbs
up. Pull elbows back, squeezing shoulder blades together. Hold for a few seconds
then release.
Stretch Up: Sit up straight and imagine a cable attached to the top of your head.
Gradually stretch to be as tall as possible, hold for a few seconds, then relax.
Arms
Arm Relaxation: Drop your arms and hands to your sides. Gently shake them for
a few seconds.
Arm Rotation: Raise your arms in front of your body. Rotate arms so palms face
up, then rotate so backs of hands face each other.
Hands/Wrists
Wrist Flex: With your elbows on desk, gently use left hand to bend right hand
back toward forearm. Hold for a few seconds, then relax. Repeat on other side.
Finger Fan: Spread your fingers as far apart as possible, hold, then clench fists,
then release.
Feet
Toe Curl: Flex toes up, then curl toes under. Release.
Foot Rotation: Circle foot slowly from the ankle, then reverse.
Eyes
Eye Rolls: Roll your eyes clockwise then counterclockwise briefly.
Palm Eyes: Without touching your eyes, cup hands lightly over eyes for 30
seconds to rest them from light.
Look Away: Exercise your eyes by periodically looking away from your
computer to focus on distant objects.
Keep fit:
Physical fitness can help you avoid and treat problems related to computer use.
Build your stamina with exercises for strength, flexibility, and cardiovascular
health.
1. Cleanliness [books, manuals not encouraged] because they bring dust & caught fire
easily.
2. Air conditioners, which control the room and dehumidates it.
3. It should be dust free; dust is the biggest “killer” of hard drives.
4. No carpets, they caught fire more easily.
[email protected] 279
INTRODUCTION TO COMPUTERS
5. You are not allowed to eat, smoke or drink in the computer room.
6. No magnetic material should be in the computer room.
7. The computer room should be located in such a way that computers are not exposed
to direct sunlight or hot environments, use curtains if otherwise.
8. The computer room should be fitted with burglar bars, alarm systems, or guarded
24hours to ensure security.
9. The computer room should have surge protectors or suppressors to guard against
electrical faults and high voltages.
10. The computer room should have UPS [uninterrupted power supply] in case of power
failures, which may be fatal.
11. Computer room should be well ventilated, to allow for air circulation,
12. Foreign media, such as floppy diskettes, flash disks should not be allowed in order
to minimize virus spread.
13. Always switch off machines if not in use.
14. Avoid overloading circuits.
15. All cabling and wiring should not be exposed; it should be covered and should not
criss cross the room.
16. Leave enough space between computers and the walls.
17. Do not use chalk the computer room , dry wipe markers are encouraged.
1. BACK PROBLEMS
Many computer users suffer serious back problems. This is probably due to a poor
posture or an awkward position while sitting at a computer.
Solutions
A fully adjustable chair should avoid poor posture.
Footrests can reduce these problems.
Screens should tilt and turn to a position that avoids awkward movements.
2. EYE-STRAIN
One health issue that can occur after using computers for a long time is eye-strain
(tiredness of the eyes).
This is caused by looking at a monitor which is a constant distance away. The muscles
that focus your eyes do not move, and so get tired and painful. Eye-strain can also cause
headaches.
Solutions
Look away from the monitor at regular intervals – re-focus on distant or close objects
to exercise the muscles in the eye.
Take regular breaks.
Use an anti-glare filter in front of the monitor to cut down on screen reflections that can
also tire the eyes.
3. BACK AND NECK ACHE
Many people suffer from back and neck pain after working at a computer for a long
time. This is usually due to them having a bad sitting posture.
Solutions
Use an adjustable, ergonomic chair, and take the time to set it up properly.
The computer keyboard and monitor should be at the correct height for the seated
person (keyboard lower than the elbow, top of monitor at eye level).
[email protected] 280
INTRODUCTION TO COMPUTERS
Take regular breaks: get up, walk around, stretch your muscles
4. INJURY (RSI) IN WRISTS AND HANDS
Any repetitive movement (same movement over and over again) can result in a health
problem called repetitive strain injury (RSI).
In particular, typing and using a mouse for long periods are common causes of RSI in
the wrist (it is often called carpal-tunnel syndrome).
Solutions
Use a wrist-rest to support the wrists while typing and when using the mouse.
Take regular breaks from typing or using the mouse.
5. OZONE IRRITATION
Health experts have suggested that ozone emitted from laser printers can lead to
breathing problems.
Solution
It is recommended that laser printers should be situated at least one metre away from
where people are sitting and there should be good ventilation in the area.
6. MUSCULOSKELETAL PROBLEMS:
Muscle soreness and muscle fatigue are the most common complaints of regular
computer users. Back pain, chest pain, pain or numbness in arms, shoulder and feet top
the list. These types of problems mainly occur because your posture while using the
computer is not correct. Either you are sitting on an uncomfortable chair or your
workstation is not supportive of correct posture.
Solution
Adjust your chair and desk such that your screen is either at your eye level or lower. Sit
with your back straight and legs perpendicular to the floor with feet resting flat on the
floor. Your elbows should rest at the sides.
Take mini breaks from work and stretch a bit or go for a short walk.
7. HEADACHE
Because of increased muscle tension or pain in the neck at the base of the skull, headache
is common problem with computer use. Many a times, prolonged use can affect eye
power which needs vision correction. This can also result in headache.
Solution
Get your eye power tested if headache is a common problem with computer use. Keep
your neck straight when in front of the computer. Constantly looking down or stretching
the neck sideways can also cause pain. Take breaks in between and circle your neck a bit
to release the strain.
8. OBESITY
Studies have shown that prolonged use of computers, especially in children, is the major
contributing factor of sedentary lifestyle and childhood obesity.
Solution
Set limits for your children if they insist to playing computer games non-stop.
Encourage your children to play outdoor games or to take up a hobby. Involve them in
extra-curricular activities
Adults who work for 7-8 hours should avoid spending time on computer after reaching
home. Your body and mind both need to relax. Join a gym or go for evening jog and stay
physically active.
9. STRESS DISORDERS
Technology has a huge impact on our behavior and emotions. Prolonged computer use
along with other factors like poor health, work pressure and job environment can make
you susceptible to stress. Moreover, the longer you uphold the stress, the more
[email protected] 281
INTRODUCTION TO COMPUTERS
susceptible you become to other health issues mentioned above. It can also lead to loss of
concentration, dizziness and weariness.
Solution
Be proactive and take necessary measures to beat stress before it affects your health.
SPREADSHEET TERMINOLOGY
Microsoft Excel is a spreadsheet program written and distributed by Microsoft for
computers using the Microsoft Windows operating system and for Apple Macintosh
computers. It features an intuitive interface and capable calculation and graphing tools
which, along with aggressive marketing, have made Excel one of the most popular
microcomputer applications to date. ...
Sums the numbers in the specified range and then divides the
AVERAGE function:
sum by the number of non-zero cells in the range.
[email protected] 282
INTRODUCTION TO COMPUTERS
The lettered gray area at the top of each column that identifies
Column heading:
the letter of the column, such as column B.
Dummy data: Used in place of actual data to verify formulas in the template.
Exploded Pie chart: A Pie chart with one or more slices offset.
[email protected] 283
INTRODUCTION TO COMPUTERS
A built-in formula; a named and stored procedure that
Function:
performs a specific operation and returns a value.
NOW function: Used to enter the system date in a cell in the worksheet.
Unprotected cells: Cells whose values you can change at any time.
[email protected] 284
INTRODUCTION TO COMPUTERS
A set of rows, columns, and cells in which you store and
manipulate data. Several worksheets can appear in one
Worksheet:
workbook, and you can switch among them easily by clicking
their tabs with the mouse.
[email protected] 285
INTRODUCTION TO COMPUTERS
ABBREVIATIONS
Here is a list of all common IT acronyms which is very useful nowadays for most
computer users as well as students!
A
ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ARC net - Attached Resource Computer Network
B
BIOS - Basic Input Output System
BCD - Binary Coded Decimal
BIOS - Basic Input/Output System
BIS - Business Information System
BIT - Binary Digit
BLOG - Web Log
BSYNC - Binary Synchronous Communications (protocol)
BNC - Barrel Nut Connector
C
C - C Programming Language
CAD - Computer Aided Design
CAL - Computer Aided Learning
CASE - Computer Aided Software Engineering
CDMA - Code Division Multiple Access
CD-R - Compact Disk - Recordable
CD-ROM - Compact Disk - Read Only Memory
CD-RW - Compact Disk - Rewritable
COBOL - Common Business-oriented Language (See HLL)
CODEC - Coder/Decoder + Compression/Decompression
COE- Common Operating Environment
CPU - Central Processing Unit
CRC - Cyclic Redundancy Check
CRT - Cathode Ray Tube
CSMA/CA- Carrier Sense Multiple Access/with Collision Avoidance
CSMA/CD -Carrier Sense Multiple Access/with Collision Detection
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)
D
DDR - Double Data Rate
[email protected] 286
INTRODUCTION TO COMPUTERS
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSS - Decision Support System
DTE - Data Terminal Equipment + Dumb Terminal Emulator
DVD - Digital Video Disk
DVD-A - Digital Video Disk-Audio
DVD-AR - Digital Video Disk-Audio Recording
DVD-R - Digital Video Disk-Recordable
DVD-RAM - Digital Versatile Disc-RAM
DVD-ROM - Digital Versatile Disc-ROM
DVD-SR - Digital Video Disk-Stream Recording
DVD-VR - Digital Video Disk-Video Recording
DVR - Digital Video/Voice Recorder
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory
E
ECC - Error Correction Code
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EBCDIC - Extended Binary Coded Decimal Interchange Code [IBM]
EEPROM - Electrically Erasable Programmable Read-Only Memory
EFTS - Electronic Funds Transfer System
E-MAIL - Electronic Mail
EPROM - Electrically Programmable Read Only Memory +
Erasable Programmable Read Only Memory
F
FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FTP - File Transfer Protocol [Internet]
FDDI - Fiber Digital Device Interface +
Fiber Distributed Data Interface
FDISK - Fixed Disk
FDM - Frequency Division Multiplexing
FDMA - Frequency Division Multiple Access
FDX - Full Duplex
FEC - Forward Error Correction
FM - Frequency Modulation
FORTRAN - Formula Translator (Programming Language)(See HLL)
FTP - File Transfer Protocol
FSB - Front Side Bus
G
GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHZ - Gigahertz
[email protected] 287
INTRODUCTION TO COMPUTERS
GIGO - Garbage In, Garbage Out
GIS - Geographic Information System
GSM - Global System for Mobile-Communications (network)
GUI - Graphical User Interface
GHz - Gigahertz
H
HDD - Hard Disk Drive
HDD- Hard Disk Drive
HDLC - High-Level Data Link Control
HLL - HIGH LEVEL LANGUAGE
HDTV - High Definition Television
HTML - HyperText Markup Language
HTTP - HyperText Transfer Protocol
Hz - Hertz
HP - Hewlett-Packard
HSF - Heatsink-Fan
I
IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IP - Internet Protocol
IQL - Interactive Query Language
ISDN - Integrated Services Digital Network
IT - Information Technology
LAN - Local Area Network
LCD - Liquid Crystal Display
LED - Light Emitting Diode
LPT - Line Printer Terminal
LPT1 - FirstParallelPrinterPort
LPT2 - SecondParallelPrinterPort
LPT3 - ThirdParallelPrinterPort
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization
J
K
Kbps - Kilobits Per Second
KBps - KiloBytes per second
L
LG - LG Electronics
LAN - Local Area Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode
M
MAC - Media Access Control
MB - MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
[email protected] 288
INTRODUCTION TO COMPUTERS
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MBps- Megabytes Per Second
Mbps- Megabits Per Second
MBR- Master Boot Record
MHz- Megahertz
MICR- Magnetic Ink Character Recognition
MIDI- Musical Instrument Digital Interface
MIS- Management Information System
MODEM- Modulator/Demodulator
MP3- MPEG Audio Layer 3
MSAV- Microsoft Anti Virus [Microsoft]
MS-DOS -Microsoft - Disk Operating System [Microsoft]
N
NAS - Network Attached Storage
NAT - Network Address Translation
NIC - Network Interface Card
O
OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer
P
PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Micro channel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PDF Package Definition File + Portable Document Format +
Portable Document File + Processor Defined Function +
Program Development Facility
PDF Printer Description (file name extension)[Borland, Lotus]
P2P Peer To Peer + People To People
PSU - Power Supply Unit
R
RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute
S
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
[email protected] 289
INTRODUCTION TO COMPUTERS
SODIMM - Small Outline Dual Inline Memory Module
SRAM - Static Random Access Memory
Extensions
SVGA - Super Video Graphics Array
T
TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
U
UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair
V
VCD - Video CD
VPN - Virtual Private Network
W
WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get
X
XGA - Extended Graphics Array
XMS - Extended Memory Specification
XT - Extended Technology
[email protected] 290
INTRODUCTION TO COMPUTERS
INTRODUCTION TO COMPUTERS
PRACTICALS
1. WINDOWS OS
2. WORD PROCESSING
3. SPREADSHEET PACKAGE
4. DATABASE
5. PRESENTATION
[email protected] 291
¾
! "
# ! $ "
%
¾ & &
! ! ' ( )
! ( *
% ,
' - ! " .
%
% $ ! 0 ! ' 1 2 ! ! 3
% *
$
' $ ! $ ! %
%
$ $ $ 1 2 # 1 2 6 1 2 !
! ' 7
%
%
7
! 3 %
%
!
'
'
$
! 3 %
% ; $ $ ! %
&KDQJHDJLYHQILOH¶VDWWULEXWHVWR³5HDG 2QO\´DQGYLFH
<
% 7 7 %
%
> 3
7 '
' $ ! $ %
+ ?
% &
7
+ +
% '
1 2 ! $ '
%
+ /
% 6 > $ ! 3
%
x ± #
6
'
A '
;
#
'
&
- ! "
% A ' # ! ; B ' 3 , $ @ $ *
% A # ! ; B ' 3 ; @ $ *
±
4
% A # ! ! > " , $ @ - * *
% 7 * * * A A ; C ! & %
% A A " @ ' # ! -
% A " !
% A A " @ ' # ! -
% A " !
% # ' $ $ '
% D ! ! 3
'
! ' ' 3
% A A " @ ' # ! -
% A " !
% # ' $ $ '
% ' 3
% ' 3 ! 3
& 3 @
& 1
E F G H I J H K J L M J I N O
P P Q R S T U V L W X N T U H O
P P P Q G T I J W Y R J Z P U [ \ H T N O
P ] Q ^ T H _ T ` S R J G X S S L J H
] Q G Y X H V L a U b Y T G c O H T N d L M R e e f g T O H I J H h H W Q
[email protected]
r s t u v w x y z w { | y } u ~ w | x w u { z | z u
x } u u z w | w | } w w x v |
s v | } w u z y |
s v | } w } y | y |
s u | z } w x z w w | y z u v
s } | } w
| | z
¡ ¢ £ ¤ ¥ ¦ § ¨ ¨ ¥ ¤ ¤ ¨ © ¨ ¥ ª ¨ ¨
« ¬
6FUHHQDSSVGRQ¶WQHHGWREHFORVHG ¥ ¤ ¨ § ® ¯ § ® ° § ¤ ¨ ¨ ¥ ¥ ± ¤ ¥ ° ¤ ¨
§ ¨ ¨ ¨ ¥ ° ¦ ¨ ² ¨ ¨ § ° ¦ ¨ ¡ ¤ ³ ¨ ¡ ¤ ´ ³
° ¤ ¦ ¨ ¡ ¡ ¤ µ ¤ £ ¨ ± ° ¥ ³ ° ¤ ¦ ³ § ¨ ³ ° ¦ ¨ ¨ ± £
¨ § ° £ £ ¢ ³ ¨ ¡ ¤
¶ ¢ ° ¡ ¨ ¡ §
· ¢ ° ¡
¢ ° ¡
¸ ¹ ¹
x
´ ¨ ´ ¯ º ¤ ¦ ¨ ¬ ¤ ¯ » ² £ ´ ¨ ¯ ¼ ¯ © ° ¨ ¤ ¡ ¬ ³ ¬ ¤ ¢
º ¨ ¨ ½ ¨ ½ ¯ ° § ½ ¤ £ ¨ ª ¥ ¡ ® ¨ ± ¤ ¯ ± ¾ £
x
´ ¨ ´ ½ ® ¢ ° ¤ ° ¤ ¦ ® § ¬ ¿ ¨ ° ¡ ¢ º ° ¤ ½ ¢ » ¤ ± ¤ ½ ´ ¤ ¨ ° ¤ À ° ¤ ¨ ¾ ° ¡ ´ ¯
¯ ¥ ° ¤ ¦ À ° ¨ ° ¤
i j k l m n o p q
[email protected]
x
© ¢ ¨ ¡ ¡ ¨ ¬ ¤ ¨ º ³ ¨ ª ° £ ³ ¨ µ © ¢ ¨ ® ¡ ± £ µ ´ ¨ ´ Ê £ ¯
© ¢ ¨ ¡ ¡ ¨ ¼ § ¯ Ë ° ¦ ¨ ¯ ¯ º ³ ¨ ª ¨ ¨ ° ¤ ¦ ½ ¨ ¯
x
© ¢ ¨ ¡ ¡ ¨ ¬ ¤ ¯ Ë ° ¦ ¨ ª ° £ ¬ ³ ¯
x
® ¨ ¯ Ì Í Î Í Ï Í Ð Ñ Ò Ó Ô Õ Ö × Ø Ô Õ Í » ½ Ê £ ¼ Ë § ° ¤ ¦ ¡ ¨ ® ¨
¯ © ° ³ ³ ¤ ¡ ´ ¾ ¯ Ë § ¼ § ¤ ° £ ° ¤ ¦ ¯ À ° ¨ ° ¤
x
´ ¨ ´ ¤ ° ¨ ° ¨ ª § ¯ ¬ § § ¤ £
x
´ ¤ ¾ £ Ù ¤ ¨ ´ Ê £ ¯ ¯ ¯ Ú Û ¨ º ° ¤
x
½ Ê £ ¯ ¯ ´ ¤ Ù ° ¨ © ° ¡ ¨ ° ¤ ¾ ° ¨ ¨ Ë § ° ¤ ¦ ¯ Û ¨
x
ª ± ° ¨ ¡ ´ ¨ ¬ ¤ ¯ ¯ ¥ ¥ ° ¨ ¢ º ¨ ¨ ½ ¤ £ ¬ ³ ³ ¯ ¯ ¥ ª § ¢ ¢ º ¨ ¨
x
´ ¨ ´ ª ± ° ¨ ¡ £ ¬ ¤ ¯ ¯ ¥ Ú § ² ¯ ¨ ´ Ü Ý Þ ½ ¤ © ´ ³ ´ ¨ ´ ¬ ³ ³ ß ½ Ú ¨ ½ ² ¢
¯ ¯ ¥ ¯ Ú § ² ¼ § ¯ Ú § ² À £
x
´ ¨ ´ ¯ ¤ ¡ ¢ § § ¤ £
Ë ° ¦ ¨ ¢ ° ¡ ¬ ¤ ½ ¢ ½ ¬ ³ ¯ © ¨ ¥
« ª ¢ ¡ ¨ Ú ± ½ ¤ £ ¢ ° ¡ ¼ ¢ £
¶ ¯ ¥ ° ¤ ¼ ¢ £ Ú §
· À Ù ¤ ¨ ¬ ¤ ¯ » ² £
Á Â Ã Ä Å Æ Ç È É
[email protected]
¢ ° ¡ ¯ ¼ ¢ £ ¯ ¨ ß ¾ ¤ ¨ ¯ © ¢ ¨ µ ¯ á ° ¦ ¢ ° ¦ ¨ ´ ¨ ¬ ª ¢ ¡ ¨
« À ¯ © ¢ ¨ » ¬ ¤ ¢
¶ ½ ¾ ° ¤ £ ± ¬ © ° ¢ ¦ ® Û ¤ ³ ° § ¼ ¢ £ ¬ ¼ ° ¢ © ¢ ¨ µ ¬ © ¢ ¨ ¼ ¢ £
½ ¥ ¥ ¬ ¤ ¯ ª ¡ ¤
· ¢ ° ¡ ß ¯ © ¢ ¨ ¬ ß ¬ ¤ ¯ » ² £
Ë ° ¦ ¨ ¢ ° ¡ ¬ ¤ ¯ ¼ ¢ £ ¾ ° ¡ ß ¾ ¤ ¨ ¯ © ¢ ¨
« ª ¢ ¡ ¨ ½ ¤ £ ¢ ° ¡ © ¢ ¨
¶ ½ ¾ ° ¤ £ ± ¬ © ° ¢ ¦ ® Û © ¢ ¨ ¼ ¢ £ ½ ¥ ¥ ¬ ¤ ª ¡ ¤
· ¢ ° ¡ ß ¬ © ¢ ¨ ¬ ß ¬ ¤ ¯ » ² £
x
© ² ¢ ¢ ° ¡ ¯ ¼ ¢ £ ¾ ° ¡ ß ¾ ¤ ¨ ¯ ¬ ¥ ¤
Ë ° ¦ ¨ ¢ ° ¡ ¯ ¼ ¢ £ ¾ ° ¡ ß ¾ ¤ ¨ ¯ ¬ ¥ ¤
« ª ¢ ¡ ¨ ½ ¤ £ ¢ ° ¡ ¬ ¥ ¤
á ° ¦ ¢ ° ¦ ¨ ¬ ª ¢ ¡ ¨ ¯ ¼ ¢ £ ß ¾ ¤ ¨ ¯ ¬ ¥ ¤ ® ¢ ° ¡ ° ¤ ¦ ´ ¨
« À Ù ¤ ¨ » ¬ ¤ ¯ » ² £
Ë ° ¦ ¨ ¢ ° ¡ ¯ ¼ ¢ £ ¯ ¨ ß ¾ ¤ ¨ ¯ Ë ¤ §
« ª ¢ ¡ ¨ ½ ¤ £ ¢ ° ¡ Ë ¤ §
¶ ¯ ¥ ´ ¤ ¯ Ú ± Ú §
· À Ù ¤ ¨ » ¬ ¤ ¯ » ² £
Á Â Ã Ä à Æ Ç È É
[email protected]
ã ä å æ ç è é ê ë ì í î ï ç ð æ ñ ò ó î ô ñ õ
ê ö
÷ ä å æ ç è é ø ç æ î ù ë ú û î æ î è ü å æ ñ ý î
þ ÿ
ÿ
ÿ
ÿ
ÿ ÿ
ÿ ÿ
ÿ
!
ÿ
" ÿ ! # ! # ! ÿ
* ÿ ÿ
+ ÿ , ! ' ÿ
Á Â Ã Ä â Æ Ç È É
[email protected]
û ü ð ü î ü í î / î ð ë ç ë ò ñ 0 1 ñ 2 ú 3 4 2 ñ è î ý ý ç ë ò ð ë ú ò ç 5 î ü 1 ñ î õ ð / 4 æ î ý ñ 0 1 ñ 2 ú 3 4 2 ñ è î ý ý ç ë ò
4 ð è é ð ò î
ã 6 å æ ç è é û ü ð 2 ü ê ë ì í î ì ð ý é ô ð 2
÷ 6 å æ ç è é
7 6 û è 2 ñ æ æ ï ñ 1 ë ù ë ú å æ ç è é ì ñ 8 ç è 2 ñ ý ñ 0 ü ê 0 0 ç è î
9 6 û î æ î è ü ù ë ú å æ ç è é 8 ç è 2 ñ ý ñ 0 ü ê 0 0 ç è î
ã 6 å æ ç è é ê ë ì í î ì ð ý é ô ð 2
÷ 6 ? ñ ñ é ø ñ 2 8 ç è 2 ñ ý ñ 0 ü ê 0 0 ç è î ; ñ 2 ú ÷ < < = ê ë ì í î û ü ð 2 ü 8 î ë ó
7 6 å æ ç è é @ ü
ã ä A ý ç ë ò B ñ ó 2 8 ñ ó ý î C ñ ì ñ ì í î ö ç ò í ü û ç ú î ê 0 ì í î û è 2 î î ë D ù ü ì í î E ë ú 6 3 F 8 ñ 5 î
A 4 ù ë ú ï ñ 1 ë û æ ñ 1 æ G
÷ ä û ñ / î @ è ñ ë ý H ñ 4 ý A 4 D ä 6
7 ä û î æ î è ü ù ë ú å æ ç è é ì í î û î ð 2 è í @ è ñ ë
7\SH,Q³:RUG´
9 ä
I ä å æ ç è é ô æ ð ë é ï ñ è ó / î ë ü
ã ä ê ë ì í î J î G K ñ ð 2 ú å æ ç è é ì í î ; ç ë ú ñ 1 ý J î G ô î ü 1 î î ë å ü 2 æ ù ë ú ù æ ü
7 ä å æ ç è é @ ü
9 ä å æ ç è é ô æ ð ë é ï ñ è ó / î ë ü
ã 6 ê ë ì í î 8 î ë ó ô ð 2 ê 2 ö ç K K ñ ë
÷ 6 å æ ç è é ì í î L î ð ú î 2 @ è ñ ë ù ë ú 8 ñ 5 î ï ñ 1 ë 1 ð 2 ú ý
7 6 å æ ç è é E ú ç ü L î ð ú î 2
9 6 ì G 4 î @ ë B ñ ó 2 ï î ü ð ç æ ý ù ë ú A ë ú î 2 æ ç ë î ù ü ì í î E ë ú
6 å æ ç è é ì ñ E õ ç ü ï ñ ó K æ î å æ ç è é ì í î ; í ç ü î û 4 ð è î
:
, - - .
[email protected]
ã 6 å æ ç è é ì í î ê ë ì í î ö ç K K ñ ë
÷ 6 ì í î û ð 5 î ù ý ï ç ð æ ñ ò ô ñ õ ù 4 4 î ð 2 ý
7 6 å æ ç è é ï î ý é ü ñ 4 D N O P Q P R S T Q U S V W P Q X Y Z S [ \ ] P W 6
9 6 å æ ç è é B ñ ó 2 ø ñ æ ú î 2
6 å æ ç è é ê 4 î ë ù ü ì í î ô ñ ü ü ñ / ö ç ò í ü ê 0 ì í î ï ç ð æ ñ ò ô ñ õ
:
I 6 ì G 4 î @ ë ì í î ø ç æ î ^ ð / î
= 6 å æ ç è é û ð 5 î
ã 6 å æ ç è é ì í î
÷ 6 û î æ î è ü ù ë ú å æ ç è é û ð 5 î ê 2 û ð 5 î ù ý
7 6 ì í î û ð 5 î ù ý ï ç ð æ ñ ò ô ñ õ ê 2 ; ç ë ú ñ 1 ù 4 4 î ð 2 ý
9 6 å æ ç è é ï î ý é ü ñ 4 D N O P Q P R S T Q U S V W P Q X Y Z S [ \ ] P W 6
6 å æ ç è é B ñ ó 2 ø ñ æ ú î 2
:
I 6 å æ ç è é ê 4 î ë ù ü ì í î ô ñ ü ü ñ / ö ç ò í ü
= 6 å æ ç è é û ð 5 î
x
ù æ æ ñ 1 ý ì í î A ý î 2 ì ñ û î î ì í î û ð 5 î ù ý ï ç ð æ ñ ò ô ñ õ ; í î ë ì í î ø ç æ î ê 2 ï ñ è ó / î ë ü
L ð ý ^ ñ ü ô î î ë ^ ð / î ú
x
ù 0 ü î 2 û ð 5 ç ë ò ê 2 C ç 5 ç ë ò ì í î ø ç æ î ù ^ ð / î B ñ ó ; ç æ æ ^ î 5 î 2 û î î ì í î û ð 5 î ù ý
ï ç ð æ ñ ò ô ñ õ ä
x
@ ü @ ý ì í î û ð / î ù ý û ð 5 î @ 0 ì í î ï ñ è ó / î ë ü L ð ý ^ ñ ü ô î î ë ^ ð / î ú
x
@ 0 ì í î ï ñ è ó / î ë ü L ð ý ù æ 2 î ð ú G ô î î ë û ð 5 î ú ê 2 L ð ý ù ^ ð / î F å 2 î ð ü î ý
ù ë ñ ü í î 2 å ñ 4 G ; ç ü í ù ï ç 0 0 î 2 î ë ü ø ç æ î ^ ð / î F
, M - .
[email protected]
` a b c d c e f g h g ` ` a i c j f k k g e
ã ä å æ ç è é ì í î ê ë ì í î ö ç K K ñ ë
÷ ä û î æ î è ü l å æ ç è é ^ î 1
7 ä å æ ç è é å 2 î ð ü î
ã ä å æ ç è é ê ë ì í î ì ð ý é ô ð 2 ä
÷ ä û î æ î è ü ù ë ú å æ ç è é 8 û ; ñ 2 ú ÷ < < =
, _ - .
[email protected]
ã ä å æ ç è é ê ë ì í î ì ð ý é ô ð 2
÷ ä å æ ç è é
7 ä û è 2 ñ æ æ ï ñ 1 ë ì ñ A ý ç ë ò ù 2 2 ñ 1 J î G ý ê 2 ì í î 8 ñ ó ý î
9 ä û î æ î è ü ù ë ú å æ ç è é 8 ç è 2 ñ ý ñ 0 ü ê 0 0 ç è î
ä 8 ñ 5 î ì ñ 8 ç è 2 ñ ý ñ 0 ü ; ñ 2 ú ÷ < < = ù ë ú å æ ç è é
:
X o p S T Q q S V W P Q
r s t u v w x y z { | t } ~ w v u x v x } z
s x w x w v x z
s u x x z v w } x } x ~ |
s x w x t u x ~ x } ~ } w x ~ y | } x x s s x | }
¡ ¢ £ ¤ ¥ ¦ ¤
~
¡ ¢ £ ¤ ¥ ¦ ¤ § ¡ ¢ ¨ © ª
~
s
¡ ¢ £ ¤ « ¤ ¦ ¡ ¬ ª ® ¯ ° ± ° ± ² ³ ª ¦ ¡ ¢ ² ¨ ª ® ± ´ µ ¶ ¤ ¦
r s · } } u x } v } z u x } w x ~ ¸ x | } ¹
s } º w x w v } ~ } w x ~ } x z y s
s } º w x w v u x } » x z } x z y s
, m n - .
[email protected]
r s · } } u x } v } z
} ~ } w x ~ x s s ¸ x | } ¹
s w v } w x ~ t v u { } | x } Å v u w v u y ~ x w x y
s Æ ~ x | | z u x Ç x È º } ~
s w v u x } » x z t u v u } t z } x z } Å v u w v u y ~ x w x y
s Æ ~ x | | z u x Ç x È º } ~
« ± É ² ª Ê É « ¤ ¦
r s w v v x } z
s x w x w v Æ ~ v z
s u x Æ ~ v z v w } x } x ~ |
s u } } | x Ë } s
} v x | } Æ ~ v z Ì Æ ~ v z x ~ Ì
¡ « ± ¤ Í ¤ Î ¡ É É ¶ ¤ µ
s w v Æ ~ v z } ~
Ï Ð Ñ Ò Ó Ô Õ Ö × Ó Ï Ø Ù Ú Û Ü Ü Ý
r s w v v x } z
±
s x w x Æ ~ v z
¦ ª ¡ ¡ ¢
s { } Þ x } u x ß v u z w v Æ ~ v z Æ ~ x Þ v x à
Ï Ð Ñ Ò Ó Ô Õ Ö × Ó Ï Ø Ù Ú Û Ü á Ü â á ã
r s w v v w x { x z
s w v Æ ~ v z
s } t v w w · x Æ ~ x Þ v x à } ~ } » x z z u x ß v u v x u x ~ x x z
¼ ½ ¾ ¿ À À Á Â Ã Ä
[email protected]
r s w v u x
v x } z
s · } } u x } } » z w v ä å
« ¤ ¦
s { t } ~ v | x ~ |
w w } à | } } w } | x } ~ ~ ~ x z } » x z Ë } { | t } ~ s
x æ ç è é ê ë ì í î ë ï è ð ñ í î ë ï è ï ê ë ì ò í ì ò ò è é ñ ó ë ô ì õ è é ñ ö ì ñ ÷ ë ñ ø ï æ ë ò ù
x æ ç è é ê ë ì ú ï è û ü ý ñ þ ÿ ç è í ì ò ò è é ñ ó ë ô ì õ è é ñ é ù ø ï æ ë ò ù í î ë ï è ï
¼ ½ ¾ ¿ À Ä Á Â Ã Ä
[email protected]
ð é ñ ç è ± ñ ë ñ ç è ò ý ç ñ ë ñ ç è
ø ý ô ò ë ï ë ñ ý ô è ö ì ñ ñ ë é ë ì ý î î ï è è é ò è
ô î î è ù ñ ç è ý õ è ë é
î è ñ ÿ ç ý ï ò è ý ï ì ý ñ è ç é ù ï ý ñ ô ì ò ò è é ñ î
ô ë é ñ ý é ï ï è è ò î ë ñ ç è õ ë ï ñ ì ï è ù ì ñ ñ ë é ï ý é
ý ô è î ý ô ñ ý ë é ï ± è þ ú é ù ë þ è ù ë þ ò ý é ñ é ù ò ý é ñ ò è ý è ê ë ì ô é ô ì ï ñ ë õ ý è ñ ç ý ï
ñ ë ë î ò ù ù ý é é ù ò è õ ë ý é ï õ é ì ý ô ô ô è ï ï ì ñ ñ ë é ô ç ë ý ô è ï ï ë ì ù è ï ý ò è
ð é ñ ç è ì ý ô ô ô è ï ï ÿ ë ë î ò ë é ñ ç è î è ñ ë ì
ô é ï è è è ù ù è ù ñ ç è ð é ï è ò ñ ý ô ñ ì ò è ì ñ ñ ë é ±
ï ý é ô è è ò è ì ï ý é ý ñ î ë ñ ë ò ñ ç ý ï ñ ì ñ ë ò ý î
ÿ ë ñ ç ý ï ñ ë ñ ç è ñ ë ë î ò è
ñ ç è é ù
ñ ç è é è ë ñ ç è
ô ç ë ý ô è ï ï
æ ç è é è ñ ç è ð é ï è ò ñ ý ô ñ ì ò è
ì ñ ñ ë é ï ù ù è ù ê ë ì ô é ù ù é ì ñ ñ ë é ë ì ô ç ë ë ï è ù ë ý é ñ ç ý ï
ÿ ë ò è õ ë è ì ñ ñ ë é ï
ò ë õ ñ ç è ì ý ô
ô ô è ï ï ÿ ë ë î ò
ì ï ñ
ë é ñ ç è ì ñ ñ ë é ë ì
ù è ï ý ò è ñ ë ò è õ ë è
é ù
[email protected]
ó ë ì î è í î ý ô æ ë ò ù ÿ ë è î è ô ñ ð ñ
ò ! ý ç î ý ç ñ ð ñ
ÿ ò ý î è í î ý ô ð é ò ò ç ÿ ë ! ý ç î ý ç ñ ð ñ ò è î è ô ñ ð ñ
ò è ï ï í ë é ñ ò ë î " è é ÿ ç è " è ö ë ò ù í ë é ñ ý é ì ë ì ï î é ù ÿ ç è é í î ý ô ú ï ý é ÿ ç è
ø ë ì ï è ÿ ç è è é ñ è é ô è ê ë ì æ é ñ ÿ ë ! ý ç î ý ç ñ
é ÿ ç è # è ñ ø ò ý é æ ç ý ñ è ò ñ ÿ ò ý î è í î ý ô ÿ ë è î è ô ñ ÿ ç è û é ñ ý ò è ó ë ô ì õ è é ñ
ò è ï ï ç ý ñ " è ò ö ì ñ ñ ë é é ÿ ç è " è ö ë ò ù í ë é ñ ý é ì ë ì ï î é ù ÿ ç è é ó ë é
ò ò ë ò " è ó ë é ò ò ë
ò è ï ï ç ý ñ " è ò ö ì ñ ñ ë é é ÿ ç è " è ë ò ù í ë é ñ ý é ì ë ì ï î é ù ÿ ç è ú ò ò ë
" è ÿ ë ! ý ç î ý ç ñ # è ñ ò ù ï ÿ ç è í ì ò ï ë ò ë ï ý ñ ý ë é
! ý ç î ý ç ñ # è ñ ò ù ï ÿ ç è í ì ò ï ë ò ë ï ý ñ ý ë é
! ý ç î ý ç ñ ý ç ñ ò ù ï ÿ ç è í ì ò ï ë ò ë ï ý ñ ý ë é
¾ ! ý ç î ý ç ñ ú ï ý é ÿ ç è ø ë ì ï è
¾ ê ë ì í î ý ô í ë é ñ ý é ì ë ì ï î é ù ø ë è
[email protected]
" û ê ö
ó
¾ æ ç è é ê ë ì æ é ñ ø æ ë ò ù ÿ ë í ç é è ò ñ ý ô ì î ò í ç ò ô ñ è ò þ æ ë ò ù þ ò ò ç
ò è é ñ è é ô è
¾ ê ë ì ç ë ì î ù % ý ò ï ñ ! ý ç î ý ç ñ ò è î è ô ñ ÿ ç è ÿ è ü ñ
¾ ÿ è ü ñ ø ì ï ñ î ï ë ö è ! ý ç î ý ç ñ è ù ò è î è ô ñ è ù ö è ë ò è è ò ë ò õ ý é ë õ è ô ñ ý ë é
ì ô ç ï
& ' ( ) * +
, - . / 0 / 1 /
±
- 3 1 / 7 8 7 8 ; 8 3 1 < ; = / > 3 1 < 1 0 / > ? 0 @ ; 8 > A 1 0 ; 1
2 ) 4 5 6 ( 9 6 : : ) : ) : + ) : 6 2 B C 2
@ - D @ @ ; 8 ? @ /
: ) 4 4 B
/ - E ; 8 G / H 1
) F :
I - . ; 8 1 7
4 ) * ( 6 * * : C 2
$
[email protected]
T U V T W X Y Z [ X X \ ] ^ \ _ ` \ \ a b ` [ a V T U V c d W e V f V g \ h i
k l m m n o
p q
n r s
- G / 0 ; , @ < / 1 ;
6 9 ( * ) 6 4 2 ) :
, - G / 3 1 < / 1 ;
9 ) : 2 ) :
- G / j 8 < / 1 ;
2 9 6 4 6 4 6 * 9 2 ) :
@ - < 1 0 / < / 1 ;
+ 2 ) :
/ - @ ; 1 ; 8 < / 1 ;
C : 2 ) :
J K L M N O P Q R S
[email protected]
&87«««3$67(
t u v w x y v z { | v } v ~ v v { v
| ~ | v { v x w { | v x w v ~ v
{ | v ~ x
x z | z v
x { v x } | x ~ z
z { | v } w v z x y { v
&23<««3$67(
x ~ z x x z | z v
&RS\'RHVQ¶W5HPRYH7KH7H[W%XW&UHDWH$QRWKHU&RS\2I7KH7H[W
| ~ | } v ~ v { | v } v x { v { | x { x x y v
~ { | v x w v x { | v ~ x } v x ~
x y v { | v z x x z x { x | v v x { | v { v { x v
¡ ¢
x { x { | v x w v x { | v ~ x } v x ~ z v
| ~ | } v ~ v { | v { | v { v { | x { x x y v
u | ~ { | v | ~ | v } v ~ v v { v
} v ~ v ~
¡
x y v { | v z x { x { | v x z x { x | v v x { | v { v { x v
£
{ | v z x x z x u | ~ } v ~ v z v
J K L M N R P Q R S
[email protected]
| ~ | } v ~ v { | v { v { | x { x x
~ { | v x w v x { | v u x
{ | v ~ x } v x ~ x
¡
x y v { | v z x { x { | v x z x { | x { | v { v { x v
¢
£
x { x { | v x w v x ~ z v
| ~ | } v ~ v { | v { v { | x { x x
u | ~ } v ~ v x { | v | ~ | v { v
x y v { | v z x x z x | v v x { | v { v { x v
¡
{ | v z x x z x u | ~ } v ~ v z v
| ~ | } v ~ v } v x { | v { v { | x { x | v
x { v
¢
x { x { | v x w v x
¢
x { x { | v x { v } v x
¡ ° ± ² ±
} x ~ ~ ® ¯ z x ¯ ¯ z { x | x x z v { | v x { v x
° Æ Ç ±
³ ´ µ ¶ · ¸ ¶ ¹ º » µ ¼ ½ ¾ ¿ ¼ À ´ Á Â ´ ¾ ³ ¼ Ã » µ ¼ ¾ Ä ¶ Â Å ¼ ½ ¼
£
~
| ~ | { | v } v x { | v { v x { x | v { | v x { v
u | ~ { | v | ~ | v } v ~ v v { v
} v ~ v ~ x
¡
{ | v x ~ x x v z È
¢
£
x { x { | v x } v x
É ° ± ² ±
³ ´ µ ¶ · ¸ ¶ ¹ º » µ ¼ ½ ¾
} x ~ ~ ® x ¯ { x { | v x x
° Æ Ç ±
¿ ¼ À ´ Á Â ´ ¾ ³ ¼ Ã » µ ¼ ¾ Ä ¶ Â Å ¼ ½ ¼
É
~
¤ ¥ ¦ § ¨ © ª « ¬
[email protected]
Ë Ì Í Î Ï Ð Ñ Î Ï Ð Ò Ó Ð Ô Õ Ô Ö Ò Î × Ø Ù Ú Ó Ð Ô Ó Ô Û Ò Ó Ð Ü Ò Ý × Þ ß Ü Ø Ò Ó × à Ð Ü Ø Ï Ô Ó Ð Ô á × Ø Ò
Ó â ã Ô Ì
ä Ì å × æ Ô Ý × Þ ç å × Þ è Ô é Ø Ò × Ó Ð Ô Í Î Ï Ð Ñ Î Ï Ð Ò Ô ê ë ç Ô Ü Ì
ì Ì ë Õ Ð × ç Ò Ö Þ Ò Ó × × Ñ í Ü ç î × ã è ï ã ð ë ã ã Ô Ü ç è Ì
ñ Ì Õ Ö ç × Ñ Ñ ï ã ë Ø ê ò × ó Ø Ó × î Î Ö ô á × Ø Ò Ó â ã Ô Ý × Þ ß Ü Ø Ò Ì
Ë Ì Í Î Ï Ð Ñ Î Ï Ð Ò Ô ê Ó Ð Ô Õ Ô Ö Ò Î × Ø Ù Ú Ó Ô Û Ò Ó Ð Ü Ò Ý × Þ ß Ü Ø Ò Ó × à Ð Ü Ø Ï Ô á × Ø Ò Õ Î õ Ô
ä Ì ö × Ó × Ó Ð Ô Í × ÷ Ô ø Þ Ò Ò × Ø Ù Ø Ó Ð Ô ù Î í í × Ø Ì
ì Ì é Ø Ó Ð Ô á × Ø Ò Õ Ô Ö Ò Î × Ø Ù Ú Ó Ð Ô Í × ÷ Ô ø Þ Ò Ò × Ø à Ñ Î Ö ô ß Ð Ô ç Ô Ý × Þ Õ Ô Ô ú Þ ÷ í Ô ç è û ü ý
þ þ ÿ þ ü
ñ Ì à Ñ Î Ö ô Ó Ð Ô Ó × à Ð × × è Ô Ó Ð Ô á × Ø Ò Õ Î õ Ô Ý × Þ ß Ü Ø Ò Ì
Ì à Ñ Î Ö ô é Ò Ó × Ó Ü ô Ô Ú Ú Ô Ö Ò
Ë Ì Í Î Ï Ð Ñ Î Ï Ð Ò Ó Ð Ô Õ Ô Ö Ò Î × Ø Ù Ú Ó Ô Û Ò Ó Ð Ü Ò Ý × Þ ß Ü Ø Ò Ó × à Ð Ü Ø Ï Ô Ó Ð Ô á × Ø Ò Õ Î õ Ô Ì
ä Ì ù Î Ï Ð Ò à Ñ Î Ö ô é Ø Ó Ð Ô Í Î Ï Ð Ñ Î Ï Ð Ò Ô ê ë ç Ô Ü
ì Ì Õ Ô Ñ Ô Ö Ò ë Ø ê à Ñ Î Ö ô á × Ø Ò Ì
ñ Ì Ó Ð Ô á × Ø Ò ò Î Ü Ñ × Ï Þ Ô ë ã ã Ô Ü ç è
Ì ö × Ó × Ó Ð Ô á × Ø Ò Õ Î õ Ô Õ Ô Ö Ò Î × Ø
Ì Õ Ö ç × Ñ Ñ ï ã ë Ø ê ò × ó Ø ë Ø ê à Ñ Î Ö ô á × Ø Ò Õ Î õ Ô Ý × Þ ß Ü Ø Ò Ù ç Ó â ã Ô é Ø Ó Ð Ô á × Ø Ò Õ Î õ Ô
Ý × Þ ß Ü Ø Ò û ü ý þ þ ÿ þ ü
Ì î ç Ô è è Ø Ò Ô ç Ù ç à Ñ Î Ö ô Ù ô
þ ü
! " # $ ! "
% & ' $
!
¤ ¥ ¦ § ¨ Ê ª « ¬
[email protected]
2 3 4 5 6 7 8 5 6 7 9 : ; < 9 5 = > ? @ A ; B 9 A 7 C 9 D = E F C > 9 A = G = 8 H
I 3 J K L K L M N O K P N G Q R R K S
T U V W X Y Z [ G K W H \ ] Y K S
^ U O X _ M W X _ M R L M N ` N Y R X K S a b L N c R L M d R e K Q f d S R L K G K W H
I U g X _ M R V W X Y Z h i j k l m i n l m i o j p q j r o l s t u v h i j h j w o
x y q j n j r o z t p { n l r | } s t o
~ y h i j } s t p l n s m j s w z j u s
y s h s h i j } s t o q o n j q j r o l s t z t p { n l r | u t u
y { n l r | u |
y k l m i n l m i o h i j q j r o l s t u v h i j h j w o s t o h s s n p
y q s s t z v o j { n l r | u t q i s t u t h i j q i s o { o h s s n
y k l m i n l m i o h i j q j r o l s t h i o s t o h s t s n p
y l m i o { n l r | t l p j h i j k l m i n l m i o j p z j
x y q j n j r o z t p { n l r | } s t o
~ y } s t o l n s m j s w z j u s
y s h s h i j } s t o q o n j q j r o l s t z t p { n l r |
y { n l r | u |
y k l m i n l m i o h i j q j r o l s t h i o s t o h s t s n p
y l m i o { n l r | h i j k l m i n l m i o j p z j
x y q j n j r o z t p { n l r | } s t o
~ y } s t o l n s m j z j u s
y s h s h i j } s t o q o n j q j r o l s t z t p { n l r |
y { n l r | u |
) * + , - . / 0 1 -
[email protected]
k l m i n l m i o h i j q j r o l s t u v h j w o k o s t o h s o n l r l « j
s h s h i j k s ¬ j o o s t u o l s t z t p { n l r | ®
¯ ° ± ² ³ ´ ± ² ³ µ ¶ ³ · ¸ · ¹ µ ± º » ¼ ½ ¶ · ¾ µ
¿ À
° ± ² ³ ´ ± ² ³ µ ¶ ³ · ¸ · ¹ µ ± º » ¼ ½ ¶ · ¾ µ ¶ ³ Á µ Â º Ã Ä Á » µ ¶ º Å » Æ · Ç ´ ± » ·
È À É
º ¶ º ¶ ³ · ° º Ê · Ë Ã µ µ º » Ì Í ± Î Î º »
Ï À Ð
´ ± ¹ Ñ
¿ À
° ± ² ³ ´ ± ² ³ µ ¸ · ¹ µ ± º » ¼ ½ ¶ · ¾ µ Â º Ã Ä Á » µ ¶ º Å » Æ · Ç ´ ± » ·
È À Ð
Í ± ² ³ µ ´ ± ¹ Ñ ¶ ³ · ° ± ² ³ ´ ± ² ³ µ · Æ Ò Ç · Á
Ï À Ð
¸ · ´ · ¹ µ Ò » Æ ´ ± ¹ Ñ Ó º » µ
Ô À
Ó º » µ Õ ± Á ´ º ² Ë º ¾ Ò Ö Ö · Á Ç × ¼ Ç Ø º Ö × Å Ö
À É Ð
º ¶ º ¶ ³ · Ú Û Ü Ý Þ ß à Û Ý á â ã ß Ý á Ý ä â à å Û Ò » Æ ´ ± ¹ Ñ ¶ ³ · Õ Ç º Ö Õ º æ » ç · » Ã
è À Ð Ð
³ º º × · Â º Ã Ç Å » Æ · Ç ´ ± » · ¸ µ é ´ · Ò » Æ ´ ± ¹ Ñ ¼ ê
¿ À Ð Ð
° ± ² ³ ´ ± ² ³ µ ¶ ³ · ¸ · ¹ µ ± º » ¼ ½ ¶ · ¾ µ ¶ ³ Á µ Â º Ã Ä Á » µ ¶ º ³ Á » ² · Ó º » µ º ´ º Ã Ç
È À É Ð
º ¶ º ¶ ³ · ° º Ê · Ë Ã µ µ º » Ò » Æ ´ ± ¹ Ñ ë ë ë ë ë ë ë ë
¿ À Ð Ð
° ± ² ³ ´ ± ² ³ µ ¶ ³ · ¸ · ¹ µ ± º » ¼ ½ ¶ · ¾ µ ¶ ³ Á µ Â º Ã Ä Á » µ ¶ º ³ Á » ² · Ó º » µ º ´ º Ã Ç
È À Ð
Í ± ² ³ µ ´ ± ¹ Ñ ¶ ³ · ° ± ² ³ ´ ± ² ³ µ · Æ Ò Ç · Á
Ï À Ð
¸ · ´ · ¹ µ Ò » Æ ´ ± ¹ Ñ Ó º » µ
Ô À
Ó º Ç Ê Õ ± Á ´ º ² Ë º ¾ Ò Ö Ö · Á Ç × ¼ Ç Ø º Ö × Å Ö
À É Ð Ð
º ¶ º ¶ ³ · Ó º » µ º ´ º Ã Ç ¸ · ¹ µ ± º » Ò » Æ ´ ± ¹ Ñ ¶ ³ · Õ Ç º Ö Õ º æ » ç · » Ã
è À Ð Ð Ð
³ º º × · ¶ ³ · º ´ º Ã Ç Â º Ã Ä Á » µ Ò » Æ ´ ± ¹ Ñ ¼ ê
¡ ¢ £ ¤ ¥ ¦ § ¨ © ¥
° ± ² ³ ´ ± ² ³ µ ¶ ³ · ¸ · ¹ µ ± º » ¼ ½ ¶ · ¾ µ ¶ ³ Á µ Â º Ã Ä Á » µ ¶ º ° Á ô · Ò Ë Á ¹ Ñ ² Ç º Ã » Æ
º ´ º Ã Ç
È À É
º ¶ º ¶ ³ · ° º Ê · Ë Ã µ µ º » ¼ » ¶ ³ · Í ± Î Î º »
Ï À Ð Ð Ð
´ ± ¹ Ñ Ò » õ ¹ º » õ » ¸ Ê Á ´ ´ ö · µ µ · Ç Ò » Æ Ò º ´ º Ã Ç Ë · ´ º æ ÷ ¶ · ¾ µ ° ± ² ³ ´ ± ² ³ µ º ´ º Ç ø
Ä · ° Á ô ·
ù ú û ü ý þ ü ý ÿ ü ü
ü ü
ü ü
ü ü
þ ü ÿ
/ 0 ! 1 2 ! " # 3 3 3 3 3 3
/ 0 ! 1 $ # 2 ! " #
/ 0 ! 1 $ # 2 ! " #
ì í î ï ð ð ñ ò ó ð
[email protected]
K L M N O P Q N O P R S P T U T V R N W X Y Z S T [ R S P \ R ] W ^ _ \ X R S W ` X O a \ b T
c L d N O P R e Q N V f S P T M N O P Q N O P R T g h a T \
i L U T Q T V R h X g e Q N V f j W X R
k L S P T j W X R l N \ Q W O m W [ h n n T \ a o Y a p W n o q n
L s W S W S P T ` Z Z T V R o U T V R N W X
r
t L S N V f m u e Q N V f N X O
L e Q N V f Y w
v
K L M N O P Q N O P R S P T U T V R N W X Y Z S P T S T [ R ] W ^ _ \ X R S W ` X O a \ b T
c L s W S W S P T M W x T m ^ R R W X
i L y X S P T Y Z S P T M W x T m ^ R R W X e Q N V f S P T h a a W z S P \ R s N b T o ] W ^
W a T h R S P T m W R R W x d N O P R | } ~ ~ ~ }
~ ~ ~
{
k L S P T j W X R l N \ Q W O m W [ h n n T \ a o
L s W S W S P T ` Z Z T V R o U T V R N W X
r
t L S N V f m u e Q N V f N X O ` X O a \ b T
L e Q N V f Y w
v
K L M N O P Q N O P R R P T o T V R N W X W Z R T [ R R P \ R u W ^ z \ X R R W T x W o o
c L d N O P R V Q N V f R P T P N O P Q N O P R T g \ a T \
i L U T Q T V R \ X g V Q N V f Z W X R
k L S P T Z W X R g N \ Q W O W [ \ n n T \ a o W a n W n o ^ n
L s W R W R P T T Z Z T V R o o T V R N W X
r
t L S N V f u V Q N V f N X O T x W o o
L e Q N V f Y w
v
\ U S d y w y s S M d Y q s M S ` S
l Y q m ` U S d y w ` S M d Y q s M S ` S
V U h e h p p y s S ` S
{
g U q m U e d y p S y s S ` S
T U q p ` d U e d y p S y s S ` S
B C D E F G H I J F
[email protected]
W R N V T N X R P T | \ W b T u W ^
P \ b T R P T L M W z T b T a
N Z u W ^ ^ o R
R P T R W R P T
| z P T X u W ^ V Q N V f
\
WKH2SHQ*URXSDUURZ<RX¶OOVHHWKLVDORW
o u W ^ a Q T \ a X x W a T \ W ^ R c
v
Y Z Z N V T L
{
\ X u
\
RIWKH³WULHGDQGWUXH´PHQXVFUHHQVZLOO
n n T \ a N X Q W O N V \ Q n Q \ V T o L
:KHQ\RX¶UHZRUNLQJZLWKWH[WDQGIRQWVDUHDOO\LQJHQLRXV³QHZWKLQJ´
W V V ^ a o \ o u W ^
y X R P T W X R P T z T
M N O P Q N O P R S T [ R L _ P T X
z T
LJKOLJKWD³VKDGRZOLNH´WRROEDU
¡ ¢
£ ¤ ¥ ¤ ¦
¢ § ¨ ©
ª ª
¦ ¥ ¦ ¤ ¥ ¥ ¤ ¥ ¥
¢ ¡ ¡ « ¨ © ¡ ¢ ¬
ª ª ª ª
¤ ¦ ¤ ¦ ¦ ¥ ¥ ¥ ¥ ¤ ¥ ¦ ¤ ¥ ¤ ¤ ¤ ¦ ¥
¢ § ® ® © § ¨ © § « § © ¬ ¢ « § ¯ § ¡ ¢ § ¢ ° ® ± § ¢ ¢
¥ ¤ ¥ ¥ ¤ ¦ £ ¥ ¤ ¥ £ ¤ ¥ ¦ ¥ ¤ ¦ ¥ ¦ ¥ ¤ ¦
« © ¡ ¢ © ± ² § « « § ³ § ¢
¥ ¤ ¾ ¤ ¥
¥ À ¤ ¥
§ ¢ § ¿ ® © ¡ § ¯ § § Á
¦ ¥ ¦ ¥ ¦
« ¡ ¨ Â § ¢ § ¯ ¢ § ² § ¡ ¢
£ ¤
Á ¢ © ¡ ¨
£ Ä ¦ ¥
¡
¥ ¥ ¥
¤ ¥
¢ ¯ Â § ¢ § ¯ ¢ § ²
© ¡
¥ ¥ ¥ ¤ ¥ ¥
¢ ¯ Â § ¢ § ¯ ¢ § ²
*URXS<RXVKRXOGQRZKDYHD³IHHO´IRUKRZWKH
¦ Å Æ ¤ ¦ ¦ ¥ ¥ ¥ ¦ ¦ ¤ ¦ ¥
§ ± ± ± § ¨ Ç ¢ ¡ ² ¢ ³ ¯ ¢ § © ¡
´ µ ¶ · ¸ ¹ º » ¼ ¸
[email protected]
É Ê Ë Ì Í Î Ï Ð Ì Ñ Ò Ó Ô Í Ó Ï
Ë Õ Í Ó Ï Ö Í Ð Ì Ñ Ò Ó Ô Í Ó Ï
Ë × Ñ Ò Ø Ï Ð Ì Ñ Ò Ó Ô Í Ó Ï
Ë Ù Ú Û Ï Ñ Î Ü Ð Ì Ñ Ò Ó Ô Í Ó Ï
Ý Þ ß à á â ã à á â ä å â æ ç æ è ä à é ê ë ì å æ í ä å â î ä ï é ð ñ î ê ä å é ò ð ã ã æ ä
ó Þ ô é å é å â æ ß é õ æ ò ð ä ä é ê ö ÷ î ø î á ø î ù â ç æ è ä à é ê
ú Þ û ã à è ü ý ý ý ý ý
Ý Þ ß à á â ã à á â ä å â æ ç æ è ä à é ê ë ì å æ í ä å â î ä ï é ð ñ î ê ä å é ò ð ã ã æ ä
¾
à á â ä û ã à è ü å â æ ç æ ã æ è ä æ ÿ ø æ î
'RQ¶W&OLFN
ó Þ ç æ ã æ è ä ò ð ã ã æ ä
ú Þ û ã à è ü å â æ ò ð ã ã æ ä à ê á ç ä ã æ ï é ð ñ î ê ä
Ý Þ ß à á â ã à á â ä å â æ ç æ è ä à é ê ë ì å æ í ä å â î ä ï é ð ñ î ê ä å é ð õ æ ø
ó Þ ô é å é å â æ ß é õ æ ò ð ä ä é ê ö ÷ î ø î á ø î ù â ç æ è ä à é ê
ú Þ û ã à è ü è é ê ý ý ý ý ý ý
Ý Þ ß à á â ã à á â ä å â æ ç æ è ä à é ê ë ì å æ í ä å â î ä ï é ð ñ î ê ä å é ð õ æ ø
ó Þ à á â ä û ã à è ü å â æ ß à á â ã à á â ä æ ÿ ø æ î
$QG&OLFN1XPEHULQJ2U'RQ¶W&OLFN%XW0DNH$&KRLFH$QG7KHQ&OLFN
ú Þ ç æ ã æ è ä
î ä æ ø Þ
´ µ ¶ · ¸ È º » ¼ ¸
[email protected]
Ý Þ ß à á â ã à á â ä å â æ ç æ è ä à é ê ë ì å æ í ä å â î ä ï é ð ñ î ê ä å é ê ÿ æ ê ä
ó Þ ô é å é å â æ ß é õ æ ò ð ä ä é ê ö ÷ î ø î á ø î ù â ç æ è ä à é ê
ú Þ û ã à è ü å â æ ý ý ý ý ý à è é ê ý ý ý ý ý à è é ê
Ý Þ ß à á â ã à á â ä å â æ ç æ è ä à é ê ë ì å æ í ä å â î ä ï é ð ñ î ê ä å é ê ÿ æ ê ä
ó Þ à á â ä û ã à è ü ê à ÿ æ å â æ ß à á â ã à á â ä æ ÿ ø æ î
ú Þ ç æ ã æ è ä ê ÿ û ã à è ü ÷ î ø î á ø î ù â
Þ ç æ ã æ è ä ê ÿ û ã à è ü ê è ø æ î æ ê ÿ æ ê ä ë ø æ è ø æ î æ ê ÿ æ ê ä æ ù æ î ä æ ÿ ã ì æ ð à ø æ ÿ
þ þ
î æ ì ä ã à á ê õ æ ê ä
à á â ä ã à á ê õ æ ê ä
è û æ ê ä ø æ ã à á ê õ æ ê ä
ÿ ð ä à ì ã à á ê õ æ ê ä
Ý Þ ß à á â ã à á â ä å â æ ç æ è ä à é ê ë ì å æ í ä å â î ä ï é ð ñ î ê ä å é æ ì ä ã à á ê
ó Þ ô é å é å â æ ß é õ æ ò ð ä ä é ê ö ÷ î ø î á ø î ù â ç æ è ä à é ê
ú Þ û ã à è ü å â æ æ ì ä ã à á ê è é ê ý ý ý ý ý ý ý ý
Ý Þ ß à á â ã à á â ä ç æ è ä à é ê ë ì å â î ä å æ í ä å â î ä ï é ð ñ î ê ä å é ã à á ê å é å â æ æ ì ä
ó Þ à á â ä û ã à è ü å â æ ß à á â ã à á â ä æ ÿ ø æ î
ú Þ ç æ ã æ è ä ê ÿ û ã à è ü ÷ î ø î á ø î ù â
Þ å â æ ÷ î ø î á ø î ù â ò é í ÷ é ù ù ë ø ù ù æ î ø
Þ ô é å é ñ â æ ø æ ä ñ ø à ä ä æ ê ê ÿ û ã à è ü å â æ ø é ù é ê æ ê ð î ü æ
û â é à è æ
[email protected]
! " # $ % & ' ( )
Ð * + , - . / 0 1 , - 2 3 4 2 /
5 6 7
4 2 / 8 4 0 1 , - 2 3 4 2 /
6 : ; <
/ , = , 4 > 0 1 , - 2 3 4 2 /
? @ A ? B C D E F ? B E A G H I ? B C
? ? @ J @ K F ? B E L
? ? ? @ M N O P D E F ? B E A G H I ? B C
? Q @ R S F E H L S F ? B E A G H I ? B C
Q @ T U H I S D V F ? B E A G H I ? B C
Q ? @ W O D S ? G D E F ? B E A G H I ? B C
J @ X ? C Y D ? C Y S Z Y E A E I S ? N B [ \ Z E U S Z Y H S ] N O ^ H B S Z N A ? B C D E _
, 2 4 ` a b 4
@ d N Z N Z Y E X N e E f O S S N B g h H i H C i H G Y A E I S ? N B
c
@ k D ? I l Z Y E F ? B E A G H I ? B C m I N B n n n n n n
j
@ W H l E ] N O i k Y N ? I E R B p k D ? I l m S J @ q r @ q r J @ K
o c
J @ X ? C Y D ? C Y S Z Y E A E I S ? N B [ \ Z E U S Z Y H S ] N O ^ H B S Z N _
, 2 4 ` a b 4
@ s ? C Y S k D ? I l Z Y E X ? C Y D ? C Y S E p R i E H
c
@ A E D E I S R B p k D ? I l h H i H C i H G Y
j
@ Z Y E h H i H C i H G Y M ? H D N C O E f N U N i ^ ? B p N t R G G E H i L [ i h N G L u G
o
K @ d N Z N Z Y E A G H I ? B C A E I S ? N B [ \ Z Y E M ? H D N C f N U
@ W H l E A O i E f E \ N i E R B p R \ S E i m L R S q h S w h N ? B S x
v
@ W H l E R k Y N ? I E z i N e Z Y E F ? B E A G H I ? B C M i N G M N t B W E B O
@ k D ? I l [ l
{
[email protected]
¡ ¢ £ ¤ ¥ ¤ ¦
ª « ¬ ¬
§ ¨ © ©
®
¬ ¬ ª
§ ¨ © © ¯ © ©
° ± ² ²
³ ´
µ ¶ « ¬ ¬
±
· ± ¸ ²
« ª ¬ ¬ ³ ´
¹ ± ¸
« ¬ ¬ ´ º » ´
¼ ±
´ ´
¾
« « ¬ ¬
¾
« ¬ ¬
¾
« ¬ ¬
¾
®
« ¬ ¬
¾
« ¬ ¬
¾
« ¬ ¬
¾
« ¬ ¬
© ©
¾
« ¬ ¬
© ©
¾
¿
²
¬ « ¬ ¬
¾
À « ¬ ¬
¾
« ¬ ¬
¨ ¯
¾
¿
²
¬
¾
¬ À Á
| } ~
[email protected]
° ²
³ ´
µ ª « ¬ ¬
±
· ¸ ²
« ª ¬ ¬ ³ ´
¹
´ » « ¬ ¬ ³ ¬ À º
© Ì ¯
¼
º ¬ « ´ » « ¬ ¬ ³
Ì © Ì
Í « ¬ ¬ ³ « ¬
© Ì ¯ ¯ ©
Î
« ¬ ¬ ³ «
ª ¬ ¬
© Ì
Ï ª « ¬ ¬ ª ¬ ¬
© ¯
Ð
ª « ¬ ¬
Ñ
³
Ó
° Ò
À ´ »
Ô Ô
²
´ « ³ ´
§ © ¨ ©
Ô ®
´ » Õ Á Á
Ô
« ¬
§ ¯ ¯ ©
Ô
±
Ö µ ¬
µ
§ ¯ ©
® ®
´ » ´ Õ Á Á
§ ¯
®
´ « ¬
§ ¯ ¯ ¯ ©
® ®
µ ¬ µ ´ ´ µ ¬
§ ¯ ¯ Ì ¯
®
´ » ´ «
§ ¯
Â Ã Ä Å Æ Ç È É Ê Ë
[email protected]
EHORZKDVORJLFDO³WKLQJV´WKDW\RXZRXOGLQVHUWLQWRD
±
Ô
²
´ ³ ª Á ¬ » ¬ ¬
¯ © Ø © Ø © Ø © © Ø © Ø © Ù © Ø
³ Á
\RX¶OOEHXVLQJWR
JHWD³IHHO´IRUWKHP
° ±
³ ³ ´
¯ ©
· ±
ª
¹ ±
Á
¼ ±
¬
© ©
±
Í »
Ô
Î ± ²
¬ ¬
±
Ï
Ð ±
³ Á
®
° ± ¸
¬ « Á Á
· ±
ª ³ ´ ´ » ¶ ¬ ª º ´ ¬ ´ »
¬ ´
¹ ±
Õ ¶ ¬ ª
¬ ³ ´
° ± ¸
¬ « ³ ´
· ± ¸
´ » ¶ ¬ ª « µ À ¬ «
®
¹ ±
´ » ¶ ¬ ¬ ¶ ¬ ª
Â Ã Ä Å Æ × È É Ê Ë
[email protected]
Ó
À ¬ ¬ ¬ ª « ¬ ¬ « » ª ¬ ¬ º «
© © © © ©
« ª
®
±
´ » ¬ « Á Á
±
´ » « » ª
± ¸
¬ Á ¬ Á Á
±
Á ´ ´ ´ » Á
© ©
±
¬ Á Á ¬
© ¯ ¯ ©
±
¶ ´ » ¬ À Á
±
¶ º ¬ ´ ¬ À Á ¬ À Á
© ¯ © ¯
± ¸
¬ Á ¬ Á Á
±
¬ ´ ´ ´ » ´ ¬
© © ¯
±
¬ À ´ ¬ » ´ ´ Á ´ ´ »
¯ ¯ ©
±
¶ ´ » ¬
Ú Ú Ú Ú Ú Û Ü Ý Þ ß Ý à á â Ý â ã Ý ä å æ ß á æ ç á ß è â è á à Ú Ú Ú Ú
é ê ë ì í ì í î ï é ð ñ ï ò í ó ô í í ì ð ì ð í î ï ò é ó ó ì ð
é é ê õ ð í î ï é ö ö ô ñ í ò ÷ í é ì ð ñ ï ø í é ì ð ø ö é ø ù ø ö é ú ÷ ò í
é é é ê û î ï ø ö é ú ÷ ò í ü é ÷ ö ì ý ô ï ó ì þ ÷ ú ú ï ÷ ò ñ ì ð í î ï ò é ý î í ñ é ü ï ì ÿ í î ï ñ ï ø í é ì ð
é ê ö é ø ù ì ò ý ÷ ð é ï ø ö é ú ñ é ð í î ï ü é ÷ ö ì ý ó ì þ ê
ê û î ï ÿ ÷ ì ô ò é í ï ñ ü é ÷ ö ì ý ó ì þ ÷ ú ú ï ÷ ò ñ ÷ ð ü ü ì ô ó ö ï ø ö é ø ù ì ÿ ÿ é ø ï ø ì ö ö ï ø í é ì ð ñ ê
é ê ò ì í î ï ì ÿ ÿ é ø ï ø ì ö ö ï ø í é ì ð ÷ ù ï ÷ ø î ì é ø ï ó ø ö é ø ù é ð ý ï ý ÷ ø ÷ ü ï é ø ÷ ý ò é ø ô ö í ô ò ï
÷ ð é ÷ ö ñ ï í ø ê
é é ê é ý î í ø ö é ø ù ÷ ð ü ø ì ú ÷ ø ö é ø ù ÷ ò í ì ÿ ì ô ò ø î ì é ø ï
é é é ê ö ì ñ ï í î ï ü é ÷ ö ì ý ó ì þ ê
é þ ê ô í ì ô ò ø ô ò ñ ì ò î ï ò ï ì ô ÷ ð í ì ô ò ø ö é ú ÷ ò í í ì ÷ ú ú ï ÷ ò ê
þ ê é ý î í ø ö é ø ù ÷ ð ü ú ÷ ñ í ï ê
Â Ã Ä Å Æ Ë È É Ê Ë
[email protected]
ë ì û ì û î ï õ ð ñ ï ò í ô í í ì ð ð û î ï é ó ó ì ð ê
õ ð û î ï ï ÷ ü ï ò ð ü ì ì í ï ò ï ø í é ì ð ÿ û î ï õ ð ñ ï ò í ô í í ì ð ö é ø ù ÷ ý ï ô ó ï ò
î ì ì ñ ï û î ï ì ñ é í é ì ð ÿ û î ï ÷ ý ï ô ó ï ò ê ý ê
÷ ù ï î ì é ø ï ø ò ì ö ö é ð ý 3 ì ð
1 2
ö é ø ù 5 ì ô ò î ì é ø ï ê
5 ì ô ÷ ð 6 ñ ï ô é ö í õ ð û ï þ í ì þ ò 5 ì ô ÷ ð 3 ò ÷ 5 ì ô ò ð û ï þ í ì þ ê
ë ì û ì û î ï õ ð ñ ï ò í ô í í ì ð ê
õ ð û î ï û ï þ í ï ø í é ì ð ö é ø ù û ï þ í ì þ ê
ò ì û î ï ô é ö í õ ð û ï þ í ì þ ï ñ ÷ ù ï î ì é ø ï ö é ø ù é ð ý ê
2
ø ò ì ö ö 3 ì ð û ì 7 é ü ï ð 5 ì ô ò î ì é ø ï ð ü í ö ï õ ÿ ï ø ï ñ ñ ÷ ò ê
1
7 î ï ð 5 ì ô ö é ø ù õ í õ í 7 é ö ö ú ú ï ÷ ò ð 5 ì ô ò 3 ì ø ô ï ð í û î ï ð 5 ì ô ÷ ð ü é í ê
4
ê ë ì í ì í î ï é ð ñ ï ò í ó ô í í ì ð ì ð í î ï ò é ó ó ì ð ê
ê ö é ø ù 7 3 û ÷ ð ü ÷ ù ï ì ô ò ø î ì é ø ï ó ø ö é ø ù é ð ý é í ê
ê û ú ï é ð í î ï ò ï ö ï ÷ ð í í ï þ í ÷ ð ü ú ò ï ñ ñ ì ù ê
ê é ý î ö é ý î í û î ï î ÷ ò ÷ ø í ï ò û î ÷ í ï ý é ð ñ ÷ ò ÷ ý ò ÷ ú î
8 9
ê ö é ø ù û î ï õ ð ñ ï ò í ô í í ì ð ð û î ï é ó ó ì ð ê
ê ö é ø ù 3 ê
ê ø ò ì ö ö 3 ì ð ð ü ö é ø ù 3 ò ì ú ÷ ú ú í é ì ð ñ ê
1
ê û î ï 3 ò ì ú ÷ ú 3 é ÷ ö ì ý ì þ ú ú ï ÷ ò ñ ê
ê ö é ø ù 3 ò ì ú ú ï ü ì û î ÷ í 5 ì ô ÷ ð 3 ò ì ú ê
:
ê ÷ ù ï î ì é ø ï ð < é ð ï ñ û ì 3 ò ì ú ý ê
2 1
ê ö é ø ù ù ê
=
[email protected]
ê ô í 5 ì ô ò ô ò ñ ì ò õ ð û î ï é ý î í ì ñ é í é ì ð ê
ê ö é ø ù õ ð ñ ï ò í ð û î ï é ó ó ì ð ê
ê õ ð û î ï û ï þ í ï ø í é ì ð ÿ û î ï õ ð ñ ï ò í ô í í ì ð ö é ø ù é ý ð ÷ í ô ò ï < é ð ï ê
ê 3 é ÷ ö ì ý ì þ ú ú ï ÷ ò ñ ? ö é ø ù ù ê
1
ê é ý ð ÷ í ô ò ï ï í 6 ú ì þ ú ú ï ÷ ò ñ ð û î ï ø ò ï ï ð ê
ê é ö ö õ ð ï ö ï ÷ ð í 3 ï í ÷ é ö ñ ð ü ö é ø ù ù ê
:
ê ô í 5 ì ô ò ô ò ñ ì ò õ ð û î ï é ý î í ì ñ é í é ì ð ê
ê ë ì û ì û î ï õ ð ñ ï ò í ï ð ô ð û î ï é ó ó ì ð ê
2
ê ö é ø ù õ ð ñ ï ò í 3 ÷ í ï ð ü û é ï ê
ê û î ï 3 ÷ í ï ð ü û é ï 3 é ÷ ö ì ý ì þ ú ú ï ÷ ò ñ ê
1
ê î ì ì ñ ï û î ï 3 ÷ í ï ì ò ÷ í 5 ì ô 7 ÷ ð í ð ü ö é ø ù ù ê
ê ô í 5 ì ô ò ô ò ñ ì ò õ ð û î ï é ý î í ì ñ é í é ì ð
ê ë ì û ì û î ï õ ð ñ ï ò í ô í í ì ð ð û î ï é ó ó ì ð
ê ö é ø ù ó @ ï ø í õ ð û î ï û ï þ í ï ø í é ì ð
ê û î ï ó @ ï ø í 3 é ÷ ö ì ý ô ï ì þ ú ú ï ÷ ò ñ
1
ê î ì ì ñ ï û î ï ó @ ï ø í û ú ï ð ü ö é ø ù A
ê 5 ì ô ÷ ð ò ï ÷ í ï ð ó @ ï ø í ò ì é ö ï ö é ø ù é ð ý ò ï ÷ í ï ò ì é ö ï
:
ê ô í û î ï ô ò ñ ì ò ð û î ï é ý î í ì ñ é í é ì ð
ê ë ì û ì û î ï õ ð ñ ï ò í ô í í ì ð ð û î ï é ó ó ì ð
ê ö é ø ù ó ì ö
ê ö é ø ù ð ó ì ö ÿ 5 ì ô ò î ì é ø ï ð ü õ ð ñ ï ò í õ í
1
>
[email protected]
±
û î ï ÷ ö ñ ì î ÷ ñ ö ì ý é ø ÷ ö ñ ï ö ï ø í é ì ð ñ û î ï ï ñ ÷ ý ï ï í ô ú ÷ ý ï
÷ ø ù ý ò ì ô ð ü ÷ ò ÷ ý ò ÷ ú î ÷ ð ü ò ò ÷ ð ý ï ê
ê ÷ ò ý é ð ñ
2
ê ò é ï ð í ÷ í é ì ð
ê é ï
ê ì ö ô ð ñ
1
ê ë ì û ì û î ï ÷ ý ï < ÷ ì ô í ô í í ì ð ð û î ï é ó ó ì ð
ê õ ð û î ï ÷ ý ï ï í 6 ú ï ø í é ì ð ÿ û î ï ÷ ý ï < ÷ ì ô í ô í í ì ð ö é ø ù ÷ ò ý é ð
2
ê ï ö ï ø í 3 ï ÿ ÷ ô ö í ÷ ò ý é ð ñ ò ô é ö í õ ð ÷ ò ý é ð ñ õ ÿ 5 ì ô 7 ÷ ð í ð ü ö é ø ù
2 2
ê í î ï ò é ñ ï ö é ø ù ô ñ í ì ÷ ò ý é ð ñ õ ÿ 5 ì ô 7 ÷ ð í û ì ï í 5 ì ô ò ð ÷ ò ý é ð ñ
1 2 2
ê ÷ ù ï ï ø ï ñ ñ ÷ ò ü @ ô ñ í ï ð í ñ õ ð û î ï ÷ ý ï ï í 6 ú 3 é ÷ ö ì ý ô ï ì þ C ÷ ò ý é ð ñ
2 2
ï ø í é ì ð ñ
ê ö é ø ù ù
:
û î ï ò ï ÷ ò ï í ì í ú ï ñ ì ÿ ú ÷ ý ï ì ò é ï ð í ÷ í é ì ð
% D $ - ) - % . ) - . ' / ) % ) . /
D F % / G 0 H % ! ' - . ' / ) % ) . /
ê ë ì û ì û î ï ÷ ý ï < ÷ ì ô í
ê õ ð û î ï ÷ ý ï ï í 6 ú ï ø í é ì ð ÿ û î ï ÷ ý ï < ÷ ì ô í ô í í ì ð ? ö é ø ù ò é ï ð í ÷ í é ì ð
ê î ì ì ñ ï ï í ï ï ð < ÷ ð ü ñ ø ÷ ú ï ò ì ò í ò ÷ é í ö é ø ù é ð ý õ í
B
[email protected]
N O P Q R S T Q R O U Q V S U Q W X Q V Y Z [ \ ] Q X X Q U ^ R X O X Q _ Q ` X ^ ] Q V P Q U ^ [ a ^ [ b ^ ] Q P O ] ^ c d ] S d ^ X O Y ] d S V
e f g
d h d h i Q N O P Q j O Z d k X l k X X d `
±
m f n
` h i Q b Q X o p b Q W X S d `
q r s t u v s w x
y z { | n ~
p p
s r } x v s w x x
z { ~
u x q s t x q r s t u s
z n | ~ | ~ {
p
} x v s w x q r s t u x x v s w x } x } }
z | ~ ~
u x } x } q r s t u u
z n n n ~ n n n n
p p
} v x t s s t s r s } } r x x x x
z
x x s r s }
m z { | ~ z
} }
±
y z n ~ ~ | ~
o p
x x v x } v x t } s q r s t u q r
z { | n ~ | ~ n | | ~
s t u x s r } q r s } x s x q r s t u x q r
z n | | ~ | ~ | {
p p
q r s t u x q r x q r s r x x
z | ~ | { | | ~ { ~
x q r s r x q x x q r q r s t u s
~ ~
o p
z n | | ~ { ~ ~ { ~ { ~ n
x u x } s x x } x x s t u x s x x } x x q r s t u s }
z
q r s t u u
z { | ~
} }
m z n ~ { | ~ ~
x x t u v x t } s q r s t u ¡ ¢ ¢ £
y z { { | n ~ |
p p
s } s r } } x u s r x x
z ~ { ~
q x x q r s t u s
z | { | ~
x x } } }
m z n ~ { | ~ ~
x x t u v x t } s q r s t u ¡ ¢ ¢ £
y z | {
p p
s r x x
z { | ~ ~ |
x } } q r s t u q } } x u
z ~ | {
p p
s } x } x u s r x x
z | { |
s t } x } x u q r s t u x q s t r x x x s t } x } x u
I J K L M
[email protected]
® ¯ ° ± ² ³ ´ µ ° µ ² ¶ · ± ² ¶ ¸ ¹ µ
º »
¯ ° ± ² ³ · ± ² ¶ ¸ ¹ µ ¼ ½ ¾ ¿ À µ Á µ Â ¶ ´ ± Ã µ
» Ä Å º Å Å
² ¸ ° µ ¯ ° ± ² ³ ¿ À µ Æ ° Ã µ ¹ Ç ´ È É Ê ° µ · ± ² ¶ ¸ ¹ µ ¼ ¿ ½ Ê µ ¾ Ë ¶
à ´ µ ° µ ² ¶ Ì · ± ² ¶ ¸ ¹ µ Í Î ¯ ° ± ² ³ ± ¾ Ï Ë ¶
µ ¯ ° ± ² ³ Ë ¾ ¼ µ ¹ ¶ Ì ¾ Ã ½ ³
Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Ú Û Ù × Ô Ü Û Ô Ý Þ ß à á Ý Ö â × Þ à Ô á ß × ã × ä Ó Ô × Ö â × Ö × Ø Ù Ú Û Ù × Ô Ü Û Ô Ý
» Å Å Å
È ¯ À ¼ µ Á È ¾ Ï ¸ È Ï µ å Ï å ¾ Ï ° ± ¼ À Ë Â æ ¶ ¿ À µ ¹ µ
º » Å Å Å ê
¿ Î Ê µ Ë ¾ ¿ À µ ¿ µ ç ¶ è ¸ é È ¾ ¶ ¿ Í µ ´ À ¾ Ì ¼ é È ¶ µ ¹ É È ¹ ³
» Å Å
² · ± ² ³ ¿ À µ Æ ¾ ¶ ¿ Î Ê µ è ¸ é È ¾ ¶
» Å
à ´ µ ° µ ² ¶ ¿ À µ ´ ± ë µ è ¸ é È ¾ ¶
» Å Å Å
µ ´ µ ° µ ² ¶ ¿ À µ ¯ ° ¸ ¹ è ¸ é È ¾ ¶
» Å Å
 ´ µ ° µ ² ¶ ¿ À µ Á È Î ¸ ¶ è ¸ é È ¾ ¶
Ï ¯ ° ± ² ³ Ì Ê Ê ° Î Ì ¾ Ã ¿ À µ ¾ ½ ì
Ñ î Ó Ö Ó ï Û ð × ñ Û ò Ó ó Ù ã ó Ù Ù Ó ô õ ô Ö â × ö à ÷ ÷ Ó ô
Ñ ù ô Ö â × ï Û ð × ã Û á Ý ð Ô Ó ó ô ú û × á Ù à Ó ô Þ ß à á Ý ï Û ð × Þ Ó ß Ó ó Ô
Ñ Þ â Ó Ó ý × Ö â × Þ Ó ß Ó ó Ô þ Ó ó Ú Û ô Ù ã ò Þ ß à á Ý à ô ð
Ñ î Ó Ö Ó Ö â × õ ô Ö â × ö à ÷ ÷ Ó ô
ø
Ñ ù ô Ö â × ï Û ð × ã Û á Ý ð Ô Ó ó ô ú û × á Ù à Ó ô Þ ß à á Ý ï Û ð × ã Ó Ô ú × Ô ý
Ñ Ö â × ã Ó Ô ú × Ô ý Õ ô ú û â Û ú à ô ð ÿ à Û ß Ó ð ó × ã Ó Ø Õ × Û Ô ý
Ñ Þ ß à á Ý ï Û ð × ã Ó Ô ú × Ô
Ñ Þ â Ó Ó ý × Õ ô ò û Ù ò ß × þ Ó ó Ú Û ô Ù Õ ô ú Ú à ú Ù â ù ä × á × ý ý Û Ô ò
Ñ Þ ß à á Ý õ Ú â × ô þ Ó ó Õ Ô × Ö â Ô Ó ó ð â
¤ ¥ ¦ § ¨ © ª « © ¬
[email protected]
! " #
±
" $ % & % $ ' ( " # %
$ % ) * + % * " , ! -
- / # # 0 * 1 ! 0 / 2 , 3 * 4 -
- $ 6 7 8 " "
- ) & 4 : $ 6 ) 3 *
- ) 1 ! 3 *
[email protected]
! 6 3 2 % F " % G G # % & * *
H 2 - ) ! * $ % : G G # % 0 * ) & * % H 2 8 !
* & -
H # % $ % 6 # % $ # %
$ * H ! -
- I 8 2 ( ! 7 8 " "
- ) H # : $ 6 : # , * I
- : # , * I J # ( + ,
- $ # 0 # : # 0 4 7 ) #
K - $ 0 1 ! , ! #
- I 8 2 ( ! 7 8 " "
- $ 6 0 * $ ! ) H # :
- 0 * $ ! J # ( + , 0 , :
- L ! 4 ! " 7 0 * , * , 3 * 7 J !
< = > ? @ A B C D E
- / # # 0 * 1 ! 0 $
- I 8 2 ( !
H&RPPHQW¶V6HFWLRQ&OLFN1HZ&RPPHQWV
9
- )
- $ 6 8 2 ( !
- ) H :
- $ 6 H J !
- $ 6 8 & # , * 3 * #
K - , J # ( + , 8 # 7 :
O 5 P
- I : 3 * # 8
Q - 6 ( $ 6 # , 7
- ) J * G ! $ 6 & # ) &
S 9
- I : , * $ 6 1 3 : : 3 # H
. T
- 3 1 ! H * , * $ 6 7 U
! # * ! V % * : W / * % X
* # ! 0 * -
7KLVJLYHV\RXD³IHHO´IRUKRZWKH7DEV5LEERQVZRUNLQ
- , # %
Y Z [ \ Y ] ^ _ Y ` a b [ ] Y g h i j k l m j n o p q r s _ _ ` ` _ \ Y r r `
B c d e f B B ? c B
` _ \ j k l x j y z k { o p | } ^ g _ Y ` _ \ ] s _ r s _ _ ` ` s g ] Y g h j q l { j { z
t t u v
? w ? B B C ? ~ = > ? = B B ? e
Y Y Y Z \ ^ s ] _ _ h ^ Y Z Z
f B B ? C c B d ? C = = ? c = c ?
¡ ¢ £ ¤ ¥ ¦ § £ ¨ © ¥ § © ª « ¬ ® ¯ ° « ± ® ° ° ² « ¬ ²
³ « ´ ° ² « ¬ ² ´ ² µ ² ¯ ¯ ² ¶
· ± ¶ « ° ¸ ¹ £ ¡ © ¨ ¦ § £ ¨ © ¥ § © ª ² ´ £ ¨ º £ ¦ § £ ¨ © ¥ § © ª «
< = > ? M N B C D E
[email protected]
À ¶ ¶ ² ² ´ Á ® ¶ « ¬ « ¶
·
Â Ã Ä Å Â Æ Ç È Â É Ê Ë Ä Ì Í Î Ï Ð Æ Â Ñ Ò Ó Ô Õ Ö × Ô Ø Ù Ú Û Ü Ý È È Ì É Ì É È Å Þ Í Â Ü Ü Ì É
É È Å Þ â Ô Õ Ö ã Ô ä å Õ æ Ù Ú ç è Ç Þ Ñ È Â Ì É Ì é È Å Þ ê ë ì Þ Æ ë í Ì Ý È Ü Ý È È Ì É î ï Þ É Ý Ï Ñ Æ Â Ñ Ò Ó Ô Õ Ö ä Ù ð Ù æ
ß ß à á
Â Â Â Ã Ð Å Ì Ì Ç Þ ë É í Ñ Ì Æ Ì Í é Í Ì ï È Å Þ Æ Â Ç È ë ñ ë Â Æ ë Ü Æ Þ Ü í Ñ Æ Â Ñ Ò Â É ì  È
Â Ã Ä Å Â Æ Ç È Â É Ê Ë Ä Ì Í Î Ï Ð Æ Â Ñ Ò Ó Ô Õ Ö × Ô Ø Ù Ú Û Ü Ý È È Ì É Ì É È Å Þ Í Â Ü Ü Ì É
É È Å Þ â Ô Õ Ö ò Ö Û Ú â Ç Þ Ñ È Â Ì É Ì é È Å Þ ê ë ì Þ Æ ë í Ì Ý È Ü Ý È È Ì É î ï Þ É Ý Ï Ñ Æ Â Ñ Ò Ù æ Ö ç Û Ô Û Ù ç
ß ß à á ß ß
Â Â Â Ã Ê ë Ò Þ í Ì Ý Í Ñ Å Ì Â Ñ Þ Ü Þ È ó Þ Þ É ê Ì Í È Í ë Â È Ì Í Æ ë É Î Ç Ñ ë ê Þ Ì Í Â Þ É È ë È Â Ì É Ü í Ñ Æ Â Ñ Ò Â É ì
Â Ã Ä Å Â Æ Ç È Â É Ê Ë Ä Ì Í Î Ï Ð Æ Â Ñ Ò Û ô Ö õ ç ò Ö æ Û Ü Ý È È Ì É Ì É È Å Þ Í Â Ü Ü Ì É
Â Â Ã É È Å Þ â Ô Õ Ö ò Ç Þ Ñ È Â Ì É Ì é È Å Þ É Ç Þ Í È Ü Ý È È Ì É Ï Ð Æ Â Ñ Ò â Ô Õ Ö ã æ Ö Ô å
á á
   à ö ë ì Þ Ü Í Þ ë Ò Â Ç Þ é é Þ Ñ È Þ Î
 ñ Ã Ä Å Â Æ Ç È Â É Ê Ë Ä Ì Í Î Ï Ð Æ Â Ñ Ò Ó Ô Õ Ö × Ô Ø Ù Ú Û Ü Ý È È Ì É Ì É È Å Þ Í Â Ü Ü Ì É
É È Å Þ â Ô Õ Ö ò Ö Û Ú â Ç Þ Ñ È Â Ì É Ì é È Å Þ ê ë ì Þ Æ ë í Ì Ý È Ü Ý È È Ì É î ï Þ É Ý Ï Ñ Æ Â Ñ Ò ø Ô æ Õ ç ò
à á ß
ñ Â Ã Ð Å Ì Ì Ç Þ é Í Ì ï Î Þ é ë Ý Æ È ï ë Í ì Â É Ç Â Ã Þ Ã ù ú û ü ý þ ÿ ù ý û û ú Ü í Ñ Æ Â Ñ Ò Â É ì
ñ Â Â Ã Í Ñ Æ Â Ñ Ò Ì É ú ü ü ý û ù È Ì Ç Þ È í Ì Ý Í Ì É ï ë Í ì Â É Ç
ñ Â Â Â Ã Î Ý Ç È í Ì Ý Í ï ë Í ì Â É Ç ë Ç Í Þ
Ý Â Í Þ Î Â É È Å Þ ï ë Í ì Â É Ç Ç Þ Ñ È Â Ì É Ì é È Å Þ ê ë ì Þ Ç Þ È Ý ê Î Â ë Æ Ì ì Ü Ì Ã
Â Ã Ð Æ Â Ñ Ò Ì Ò
 ñ Ã Ä Å Â Æ Ç È Â É Ê Ë Ä Ì Í Î Ï Ð Æ Â Ñ Ò Û ô Ö õ ç ò Ö æ Û Ü Ý È È Ì É Ì É È Å Þ Í Â Ü Ü Ì É
ñ Ã É È Å Þ Å Þ ë Î Þ Í ë É Î é Ì Ì È Þ Í Ç Þ Ñ È Â Ì É Ì é È Å Þ É Ç Þ Í È Ü Ý È È Ì É Ï Ð Æ Â Ñ Ò Å Þ ë Î Þ Í
á á
ñ Â Ã Ð Å Ì Ì Ç Þ é Í Ì ï Î Þ é ë Ý Æ È Å Þ ë Î Þ Í Ç Ü í Ñ Æ Â Ñ Ò Â É ì
7 7 : 0 ) % ! & ; < 4 =
³ ² » ¼ ½ ¾ ¿
[email protected]
R S T U R V W X R Y Z [ T \ ] ^ _ ` V R a b c d e f g g h i e j k X X \ Y \ Y X U l ] R j j \ Y
R R S [ l V l a X m ] R Y X n o p q p r s t u s v w
R R R S Z \ x l X \ X U l ] R y U X z Y ^ a V R a b { | h } c { | e ~ h e
R x S ] R Y X m ] l x R l R W l l a X l ^
R S T U R V W X R Y Z [ T \ ] ^ _ ` V R a b c d e } e | c j k X X \ Y \ Y X U l ] R j j \ Y
R R S Y X U l { e W l a X R \ Y \ X U l Y W l ] X j k X X \ Y _ ` V R a b i ~ e | { e
R R R S ` U \ \ W l ] \ X U l h c h } a \ x l ] m z y l W V R W X l ^ j a V R a b R Y y \ k ] a U \ R a l
R S R y U V R y U X X U l W l a X R \ Y \ X l X X U z X \ k z Y X X \ ^ \ k j V l W m z a l S
R R S ` V R a b e j k X X \ Y \ Y X U l ] R j j \ Y
R R R S Y X U l s r u p q \ X U l U \ l j k X X \ Y a V R a b X U l V R Y l W m z a R Y y R a \ Y
R x S ` U \ \ W l ] \ ^ l z k V X V R Y l W m z a R Y y j a V R a b R Y y _ l S y S R Y X U R W a z W l S l z Y W ^ \ k j V l
x S ] a V R a b ¡ ¢ £ ¤ ¥ ¡ ¦ ¥
x R S § ¨ © ª « ¬ « ¬ « ª ¨ ® ¯ « ° ± ² ± ³ « ª ª © « ¬ ´
x R R S µ ± ¶ ± ¶ ¨ © ´ ª « · ¯ ¸ ´ © · ¶ ¯ ± ¸ ¹ º ¸ ® © ¬ ¹ ° ¯ ¸ © ´ ª « · ¯ ¸ ¹ · ¨ ± ± ´ © » ± º ² ° ©
x R R R S ¼ ° ¯ · ½ ± ½
R S T U R V W X R Y Z [ T \ ] ^ _ ` V R a b c d e } e | c j k X X \ Y \ Y X U l ] R j j \ Y
R R S Y X U l U l z ^ l ] z Y ^ \ \ X l ] W l a X R \ Y \ X U l Y W l ] X j k X X \ Y _ ` V R a b z y l ¾ k j l ]
u u u ¿ À Á Â Ã Ä Å Æ Ç Å È É Â Ê Ë Á Â Ì Ì Í Î Í Ï Ê Ð Å Ñ Â Ê Â Å Ï Â Ï Æ Å Ì Ê Ë Í Ð Ã Æ Í Ï Ò Ó Ç Í Î Ã Ð Ð Í Ã Î Ñ Ô Ó Ã Õ Í Ã Ö Ë Å Â Ö Í Ç ×
Ö Ä Â Ö Õ Â Ï Æ Í Ø Æ Ø Ù Ú Û Û Ú Ü Ú Ý Þ ß à á
 â Ø ã Ö Î Å Ä Ä Á Å É Ï Ì Å Î Á Â Ì Ì Í Î Í Ï Ê Á Í Ì Ã Ò Ä Ê Ð Å Ñ Â Ê Â Å Ï Ñ Ã Ï Á Ö Ä Â Ö Õ Ê Ë Í Å Ï Í × Å Ò É Ã Ï Ê ä
Â Ø å Â Æ Ë Ä Â Æ Ë Ê Ê Ë Í Ñ Í Ö Ê Â Å Ï Å Ì Ê Í È Ê Ê Ë Ã Ê × Å Ò É Ã Ï Ê Ê Å æ Ò Ñ Ê Â Ì × Ø
Â Â Ø ç Ä Â Ö Õ è é ê ë Ç Ò Ê Ê Å Ï Å Ï Ê Ë Í Î Â Ç Ç Å Ï
Â Â Â Ø ì Ï Ê Ë Í í ß î ß à î ß í ï ð á ñ Û ò Ú ó Å Ì Ê Ë Í Ë Å Ó Í Ç Ò Ê Ê Å Ï Ö Ä Â Ö Õ Ê Ë Í æ Ò Ñ Ê Â Ì × Ê Í È Ê Â Ö Å Ï
Â Ø å Â Æ Ë Ä Â Æ Ë Ê Ê Ë Í Ñ Í Ö Ê Â Å Ï Å Ì Ê Í È Ê Ê Ë Ã Ê × Å Ò É Ã Ï Ê Ê Å Â Ï Ñ Í Î Ê Ç Ò Ä Ä Í Ê Ñ Ø
Â Â Ø ç Ä Â Ö Õ è é ê ë Ç Ò Ê Ê Å Ï Å Ï Ê Ë Í Î Â Ç Ç Å Ï
Â Â Â Ø ì Ï Ê Ë Í í ß î ß à î ß í ï ð á ñ Û ò Ú ó Å Ì Ê Ë Í Ë Å Ó Í Ç Ò Ê Ê Å Ï Ö Ä Â Ö Õ Ê Ë Í Ç Ò Ä Ä Í Ê Ñ Â Ö Å Ï
 â Ø ç Ä Â Ö Õ Ê Ë Í Á Î Å Ð Á Å É Ï Ã Î Î Å É Ó Í Ï Ò Ì Å Î Á Â Ì Ì Í Î Í Ï Ê Ç Ò Ä Ä Í Ê Ñ Ê × Ä Í Ñ
[email protected]
ù ú û ù ü ý þ ù ü ý ÿ ÿ ý ÿ ù ÿ ÿ ÿ ý ÿ
ÿ ÿ ù ÿ ú
ù ù ú þ ù ÿ ÿ ÿ ý ù
ù ù ù ú ÿ ý ÿ ý ý ! ÿ ÿ þ ù ÿ ý ù ù ÿ ù
ù ú þ ù ÿ ý " ÿ ÿ
ù ù ú # ÿ ÿ ý $ % & % ' ( ÿ ù ÿ ý ý ! ÿ ÿ
ù ù ù ú ) þ ÿ þ ù * + , - .
ù / ú ÿ ý 0 1 2 ÿ ù ÿ 3 4 5
/ ú ÿ ý 6 2 ÿ ù ÿ 3 2 7
/ ù ú þ ù 8 + , - . - , ,
/ ù ù ú þ ù 9 þ ù þ
ù ú û ù ü ý þ ù ü ý ÿ ÿ ý þ
ÿ ÿ ÿ ý ÿ
ÿ 3
ù ù ú þ ù ÿ ÿ ÿ ý ù
ù ù ù ú ÿ ý þ ù 3 ÿ ù ÿ ý ý ! ÿ ÿ þ ù ÿ 3
ù / ú : / ÿ ÿ ý ÿ ù ÿ ý ! ÿ
ý
ù ý ÿ ù ÿ 3 ÿ ÿ ý þ
ÿ ÿ ;
ÿ ý ù ý þ ù ù ÿ ÿ ý ú
/ ú ÿ ý þ ù 3 ÿ ù ÿ ý ý ! ÿ ÿ þ ù ÿ 3 ÿ
ù ù ú ÿ ý ? þ ÿ ù ÿ ý ÿ ÿ ÿ ; þ ù ÿ þ
ù ù ù ú ý ! þ ÿ ÿ þ þ ù
ù ü ÿ ý 3 ÿ ù
ÿ
4 @ A B C D E C F G H I J K L L M N O J
E U V B W W X Y D E X D [ \ Y [ ] X ^ ^ X B V
P Q R S T T T Z T
E U W B W U ` a Y B [ b B [ c V X U C [ D ` a U V X V U
P Q _ T S T T Z T T Z T Z
E E D E C F [ F
P Q d
E E D V W E U f g [ B D E C F i j k l m n k o i Y ` W W [ U [ U W B E Y Y [ U
Q e S e Z h d S T
E E U W ] W V C W E [ U [ b W U V B W Y ` W W [ U B [ ^ X ^
Q p S T R T T S T p T h q d
E E E [ [ V b B [ a b X ` D W B [ ^ X ^ V Y r C D E C F E U \ W [ ^ W E [ U r [ ` c X U W
Q d S T Z T q d S T
E A B C D E C F B [ ^ X ^ A ^ W E [ U V
P Q Z d
B [ ^ C X ^ E X D [ \ Y [ ] X ^ ^ X B V
P Q R S T Z Z T
E D E C F B [ ^ ^
P Q d Z T Z
E E [ [ V D E U V W [ B [ ^
P Q d S T T Z
E E E D E C F [ F
P Q d
Ã Æ Í õ ö Å Ì ÷ ø
[email protected]
w x y z w { | } w ~ y
{ w } } ~ ~ } z w ~
~ } z | } w ~ } z { } } } ~ ~ { w ¡ ¢ £
w w w x z | { } { ~ | w x x ¤ ¥ ¦ § ¨ © ¤ ¨ ª « ¦ ¦ § ¬ ¦ ¨ § « ® ¯ ª ¨ { w w ~
w ° x ± { w ~ ² ¤ « ¦ ³ ¤ ¬ ´ ² ¥ µ
° x ¶ z { ~ | w { · |
° w x z | } z ~ { ~ | ¸ ~ }
° w w x { w ~ } ¸ ~ w | ¹ w } w w } } } }
° w w w x { w
w x º w z { w z } } z ¸ ¸ ~ } } z ~ |
w w x { w » ¢ } } ~ ~ } z w ~
w w w x ~ } z ¼ ~ } | } w ~ } z » ¢ } } ~ { w
w ° x z | w ~ } w x x µ ¦ ¥ ¨ ¦ ¥ ³ ¦ ³ ½ µ ¦ § ¬ ¤ © ¦ « ³ ½ µ ¦ § ´ ¾ ¾ ¦ « ³ ½ µ ¦ § ¨ ¤ ¯ ¯ ¬ ¦ ³ ½ µ ¦ § ¦ ¨ ³
{ w w ~
¿ À Á Â Ã Ä Å Æ Ç
È É Ê Ë Ì Í Î Ï Ð Ë Ñ Ì Ò Ë Ì Ó Ò Ô Î Õ Ï Î Õ Ö Í Ó Ì É × Î É Ø Ï Ñ Ì Ð Ô Î Õ Ï Ù Ð Ë Ë Î Í Î Ë Ñ Ì × Î Ö Ö Î Ï Ê Ð Ú Û
Ü Ý Þ
Ê Ú Ñ Ë ß Ö Ê ß à Î Ð Ù ß Ö Ì Ù á Ù á Ì Ù Î × Ë Ñ Ì Í Ì Ò à Ë Î Ó
â Ý ã
Ì Ö Ì ß Ë Ð Ì Ï Ù Ð Í ß Ö Ê ß à × Î Ö Í Ì á
ä Ý å
Ô Ó Ì Ð Ì Ï Ù Ð Í ß Ö Ê ß à × Î Ö Í Ì á Ð Ù Ø Ì
æ Ý ç
á Ì Ò Ò Ì Ð Ë Ì á Î Ð Ë Ñ Ì à Ì Ô è Î Ù á Í
X \ [ b u v
T t t
[email protected]
ó ô õ ö ÷ ø ù ú û ø ü ý ú þ ö ÿ ø ý ù ø ö ü û ý û ö ù þ ö ö û ø ý ø ý þ ø ø ù ÷ ý
ô
÷ ý þ ø
ö û ú ý
ô
÷ ý þ ø
þ ú ý ú ý
ô ö ý û þ ø ù û ø ø ý ú û ö ÷
ô þ ý þ ø ý ý û
ó ô õ ö ÷ ø ù ú û ø ü ý ú þ ö ÿ ø ý ù ø ö ü û ý û ö ù þ ö ö û ø ý ø ý þ ø ø ù ÷ ý ô ö û
ô
6FUHHQDSSVGRQ¶WQHHGWREHFORVHG ø þ ø
þ ö û ù ö û ô þ ø
þ ö û ù ö û ù ö ø ú þ ö ö ø ö û ù þ ø ü ý ú ý
ü ý ú û ý ú ù ø ö þ ø ý û þ ý û ý ý û þ ý û ø û ý þ ø ù û ø ø ô ü ý ú ö û ø
ú ù ö ý ú þ ù û ø ø ü ý ú ø ø ý ù ø ü ý ú û ø û û ý þ ø ö û û þ ý ö û ù
þ ø ø ý þ ø ù û ø ø ô
ô
÷ þ ø þ ö û ô
ô
÷ ô
ô
÷ ô
ó ô
÷ þ ø
ô ø ø ö ÷ ù ö ÿ ø ý û ù ö ÿ ø ö ù
ô þ ø ù ö ÿ ø ö ù ö ý ý ý û ý ö ø ö û ù
ô
ø ø
÷ þ ù
ý û
ý ú ø û
ô ý ú ù ø ø ü ý ú û ø ý û ü ù ÷ ù ø ú ø û ! " # $ % & ! #
' ( ) * + , - . / 0 1 2 3 2 4 5 6 7 8 9 : ;
( ) * + , - / = > ? @ A A B > C / A A / D 1 + E B A
<
F ( ) * + , - G @ H >
é ê ë ì í î ï ð ñ ò
[email protected]
\ ] ^ _ ` _ a b c d e a ` f a g h c i c j i c h k
l ] m k _ h c i c j i c h k n o p h o h q r h o i c h h _ c i q
] t o b o u k _ i _ f b f q u i f b b _ d c d e a ` f a g b k _ e i o h e o u d v _ d r w a ` f a g a _ d b _ i
x ] o d b k _ v _ d r n c i o i i f n n o d
y ] z ` f a g b k _ k _ c e _ i f a o d c d e v o { _ e o u d u c i e q
\ ] z ` f a g _ e f b k _ c e _ i
l ] m | h _ f d | o r i e _ b c f ` q c d e r d e _ i ` f d _ c b b k _ _ d e
] z ` f a g b o _ p f b e o r n ` _ a ` f a g b k _ u k f b _ q h c a _
x ] } o r n ` _ z ` f a g b k _ ~ o ` e _ i b k c b a o d b c f d q b k _ q r n ~ o ` e _ i b k c b | o r u c d b b o e _ ` _ b _ b o
o h _ d f b ]
y ] z ` f a g b k _ ~ o ` e _ i b k c b | o r u c d b b o e _ ` _ b _ b o k f j k ` f j k b f b o i q _ ` _ a b f b
\ ] i _ q q b k _ e _ ` _ b _ g _ | o d b k _ g _ | n o c i e ]
l ] u f d e o u o i e f c ` o j r _ n o p a o d ~ f i v ~ o ` e _ i o i ~ f ` _ e _ ` _ b _ o i e _ ` _ b _ ~ o ` e _ i c h h _ c i o d
b k _ q a i _ _ d ]
] z ` f a g | _ q b o e _ ` _ b _ o i | o d b k _ g _ | n o c i e
x ] ~ b _ i j _ b b f d j f d q f e _ b k _ ~ o ` e _ i b k c b a o d b c f d q b k _ q r n ~ o ` e _ i b k c b | o r u c d b b o e _ ` _ b _
y ] f j k b a ` f a g o d b k _ q r n ~ o ` e _ i u k f a k | o r u c d b b o e _ ` _ b _
\ ] ^ _ ` _ a b c d e a ` f a g e _ ` _ b _ ]
l ] u f d e o u o i e f c ` o j r _ n o p e _ ` _ b _ ~ o ` e _ i c h h _ c i o d q a i _ _ d
] z ` f a g | _ q o i e _ ` _ b _ o i | o d b k _ g _ | n o c i e
x ] c g _ q r i _ | o r k c { _ a ` o q _ e c d | h i o j i c v q b k c b c i _ o h _ d o d b k _ } _ q g b o h
y ] z ` f a g o d b k _ ^ b c i b n r b b o d
\ ] z ` f a g o d b k _ n r b b o d
l ] c f b ~ o i b k _ a o v h r b _ i b o i _ n o o b
R S T U V W X Y Z [
[email protected]
x ] c g _ q r i _ | o r k c { _ a ` o q _ e c d | h i o j i c v q b k c b c i _ o h _ d o d b k _ } _ q g b o h ] ^ b c i b
y ]
6FUHHQDSSVGRQ¶WQHHGWREHFORVHG
h _ d b k _ z k c i v q c i ] m k _ z k c i v q c i f q c v _ d r b k c b c h h _ c i q u k _ d | o r h o f d b
| o r i v o r q _ c b b k _ b o h i f j k b o i n o b b o v i f j k b a o i d _ i o ~ b k _ q a i _ _ d ] ~ | o r c i _
r q f d j c b o r a k q a i _ _ d | o r d _ _ e b o q u f h _ | o r i ~ f d j _ i ~ i o v b k _ ~ c i i f j k b b o u c i e q
b k _ v f e e ` _ o ~ b k _ q a i _ _ d ]
\ ] z ` f a g b k _ a k c i v ]
l ] z ` f a g ]
] z ` f a g ]
x ] } o r n ` _ a ` f a g b k _ i _ a | a ` _ n f d o d b k _ e _ q g b o h b o o h _ d f b
y ] f j k b a ` f a g b k _ ~ f ` _ ~ o ` e _ i b k c b | o r u c d b b o i _ q b o i _
\ ] ^ _ ` _ a b c d e a ` f a g i _ q b o i _
l ] m k _ ~ f ` _ ~ o ` e _ i f q i _ q b o i _ e b o u k _ i _ f b u c q e _ ` _ b _ e ~ i o v ]
[email protected]
x
¡ ¡ ¢ £ ¤ ¥ ¡ ¦ ¥ § ¦ ¨ ¤ © ¤ ª « £ ¬ « ¥ ¦ ¦ ¤ © ¨ « ¤ £ £ ¥ ¨ ¡ ¬ ¤ ¤ ¥ ®
x
¦ ¨ ¦ ° ¬ £ ¤ ¥ ¤ ¥ ¡ « ¦ ¥ ¦ ¨ £ ¢ £ ¬ ¢ ¤ ¥ ¤ © ¤ ¨ ° ± ¥ ¢ ± « ¨ ¤ © « ¨ ¤ £ ¢ ² £ ¢ ²
¥ ¦ £ « ¤ £ ³ ¤
´ ® µ « £ ¦ ¶ « ª © ¤ ¡ ¦ « ³ © « « ¤ ³ § ± « ¤ ª ¥ « · ¨ ¡ ¢ « ¥ ¡ ¦ « ³ © « « ¤
¡ £ ¸ § « £ ¬ ¦ ¦ « ¤ ¢ ° § « « ¦ ¢ ¬ « ®
¹ ® µ « £ ¦ ¶ « ¤ © « ¡ ¦ « ³ © « « ¤ ¡ § « ¢ ° ¥ ¬ ¤ º £ ¥ ¢ ¬ ¨ ² ¦ ¥ ª ³ £ « ¢ ¢ » ®
¼ ® µ « £ ¦ ¶ « © ¥ ª ¤ ¥ £ © § « ¦ ¥ ª ½ « ®
¾ ® ¿ ¤ « ¦ ¨ ¡ ¢ « ¥ ¦ ¨ ¬ ¢ £ « ¢ ¢ ®
® Á « ¤ © « Â ¥ ¡ ° ³ ¤ « ¤ ¥ ¥ ¢ ¤ ¥ ³ ¬ ¡ ¢ £ ¤ « £ « ¢ ¢ £ ¥ ¤ « ¤ ¥ ¤ © « ¦ ¡ ¦ ¤ ¥
ª ¥ ¦ ¸ © « « ¤ ®
à ® Á « ¡ ¦ « ³ © « « ¤ ¡ £ ¸ § « º ¥ ¤ ª ¦ « » ¤ ¥ ¡ ¦ « ¡ ¦ « ¦ « £ ¥ ¦ ³ ¥ ¤ « ¢ « ± ¥ « ¤
¬ £ £ « ¬ ¢ ¢ ° ¦ « ¡ ¦ « ³ ¶ ° « £ © ¥ · Ä ¥ ¬ ¦ « ° ¡ « ¦ ¥ ¡ « ¦ ª « « ¸ ¥ ¦ § ± «
¨ ¥ ¤ © ®
® ¦ « ¡ ¦ « º ¥ ¦ ¨ ¤ » ¡ ¦ « ³ © « « ¤ ¡ § « ¤ ¥ ¦ « £ « ± « ³ ¨ ¡ ¬ ¢ ¤ « ¤ ¥ £ ¸ £ ¥ ¤ ¦ ¥ ¢
³ ¤ ¬ ³ « ¦ ¤ © « ¥ ¢ ¢ ¥ ª § © « ³ § Æ
Á
-RXUQH\SHUVRQ¶VQDPH ¤ ³ « £ ¦ ¡ ¤ ¥ ®
Ç ¬ ¤ ¤ ° ³ ¦ ª ®
Â É « ¦ ¢ ¬ ¨ ¶ « ¦ ®
Ê
&OLHQW¶VQDPH ¥ ¶ £ ¦ ³ ¬ ¨ ¶ « ¦ ®
Ë ¤ ¥ ¦ « ¡ « ¦ ¥ º ¨ « »
¦ « ± ¥ ¬ ¤ ¥ £ ¸ º Ì ¬ ¤ ¤ ° » ®
 ¬ ¦ ¦ « ¤ ¤ ¥ £ ¸ º ¤ « ¦ ³ « ³ ¬ £ ¤ ¥ » ®
É « Í ¤ ¥ £ ¸ ¤ © ¦ « © ¥ ¢ ³ ¢ « ± « ¢
Î Ï Ð Ñ Ò Ó Ô Õ Ö Ö × Ó Ø Ù Ú Û Ø Ò Ó Ü Û Ò Ý Ô Û Ù Ù Þ Ú ß Ô Ù Ý à ß Û Ô Ô Ó á Ú Ý à â Ò Ó ã Ø Û à Ò Ý Ò Ý ß Ö Ú á Û ä à Ð å ß Ö Ò Ó Ô Õ Ý à â æ Þ
ç è è
Ø à Ý Ò Ö Ö × Ó Ø Ù Ú æ ß ß é é ß Ô Ò ß Ú Ó à Ô ß Ò × á ß Ö × Ó Ù Ú Ù ß ê ß Ù Ý Ö á ß Û Ô × ß Ú Ð
ë ì í î ï ð ñ ò ó ò ô ð ò õ õ ö ð ö ÷ ø ö ñ ô ò ø õ ÷ ø ù î ï õ ò ñ ô ò ø õ ÷ ø ù î ï õ ò ï ì
ú ì û ñ ò ð ü ò ý î ó ó î þ ÷ ø ù ý ÿ ø ô ð ÷ î ø ñ
í ÿ
ò ï ö ù ò
í ð ö ø õ ö ï õ õ ò ÷ ö ð ÷ î ø
î ÿ ø ð
î ÿ ø õ
[email protected]
ì ÿ õ ù ò ð ñ
ì ÷ ø ö ø ô ÷ ö ó ô ô î ÿ ø ð ÷ ø ù ò î ï ð ñ
ì ö ò ñ
ì í ð ÿ õ ò ø ð ñ ï ö õ ò ñ
ì î ó ÿ ø ñ î ý ò ð
ì ï ö ü ñ
÷ ñ ð ü ò ï î ù ï ö þ ò ÿ ñ ò ð î þ î ï þ ÷ ð ü ñ ï ò ö õ ñ ü ò ò ð ñ ì
ø ô ò ó ý ÷ ó ò ô î ø ñ ÷ ñ ð ñ î ý ð þ î ö ï ð ñ þ î ï ñ ü ò ò ð ñ ö ø õ þ î ï ! î î ñ ì
ö ï ò ð ü ò ö ô ð ÿ ö ó ñ ï ò ö õ ñ ü ò ò ð ñ ð ü ö ð ô î ø ð ö ÷ ø ð ü ò õ ö ð ö ÷ ø þ ü ÷ ô ü " î ÿ ô ö ø î ï ù ö ø ÷ # ò
ö ø õ ö ø ÷ ÿ ó ö ð ò ì
ö ï ò ð ü ò ò ø ð ÷ ï ò ô ò ó ý ÷ ó ò ñ ì $ î ï ! î î ñ ô ö ø ü ö ò ÿ ó ð ÷ ó ò þ î ï ñ ü ò ò ð ñ î ï ö ñ
ý ò þ ö ñ î ø ò ì ö ô ü þ î ï ñ ü ò ò ð ÷ ø ö þ î ï ! î î þ ÷ ó ó ü ö ò ö ÿ ø ÷ % ÿ ò ø ö ò ð ü ö ð ô ö ø ! ò ö ô ô ò ñ ñ ò õ
î ø ð ü ò ð ö ! ñ ö ð ð ü ò ! î ð ð î î ý ð ü ò ñ ô ï ò ò ø ì
' ( ) ò ð ô ì ì ì ) ð ü ò ï ò ö ï ò ) ë î ó ÿ ø ñ ÷ ø * í ô ò ó ì
ü ò ï ò ö ï ò ) + ë ) î þ ñ ÷ ø * í ô ò ó
,
ì ò ô ð ö ø ù ÿ ó ö ï ö ï ò ö ÷ ø þ ü ÷ ô ü ö ï î þ ö ø õ ô î ó ÿ ø ÷ ø ð ò ï ñ ò ô ð
ì ü ò ñ ò ó ò ô ð ò õ ô ò ó ó þ ÷ ð ü ð ü ò ü ò ö " ! î ï õ ò ï ö ï î ÿ ø õ ÷ ð
ì õ ò ñ ô ï ÷ ð ÷ î ø î ý þ ü ÷ ô ü ï î þ ö ø õ ô î ó ÿ ø ÷ ø ð ò ï ñ ò ô ð ð î ý î ï ð ü ò
ô ò ó ó ì ò ó ó ÷ ñ ð ü ò ö õ õ ï ò ñ ñ ý î ï ð ü ò ý ÷ ï ñ ð ô ò ó ó ÷ ø ð ü ò ý ÷ ï ñ ð ï î þ ö ø õ ý ÷ ï ñ ð ô î ó ÿ ø ì ü ò
ô î ï ï ò ô ð þ ö " ð î ø ö ò ö ô ò ó ó ó î ô ö ð ÷ î ø ÷ ñ î ó ÿ ø ð ü ò ø î þ ì
ì ü ò ö ï ò ö ð ü ö ð õ ÷ ñ ó ö " ñ ð ü ò ö õ õ ï ò ñ ñ î ý ð ü ò ö ô ð ÷ ò ô ò ó ó
ì ü ò ö ï ò ö ð ü ö ð õ ÷ ñ ó ö " ñ ð ü ò ô î ø ð ò ø ð ñ î ý ð ü ò ö ô ð ÷ ò ô ò ó ó ì - î ÿ ö "
ò õ ÷ ð " î ÿ ï õ ö ð ö ü ò ï ò
÷ $ ü ò ø ü ÷ ù ü ó ÷ ù ü ð ÷ ø ù ÷ ø ö ñ ï ò ö õ ñ ü ò ò ð ) ð ü ò ÷ ø ñ ÷ õ ò ô î ó î ï î ý ð ü ò ý ÷ ï ñ ð ô ò ó ó þ ÷ ó ó ! ò þ ü ÷ ð ò ì
x
ø ÷ ø ñ ð ï ÿ ô ð ÷ î ø ð î ô ö ó ô ÿ ó ö ð ò ö ø ÿ ! ò ï
x
ü ò ý î ï ÿ ó ö ÷ ñ ò ø ð ò ï ò õ ÷ ø ð ü ò ô ò ó ó þ ü ò ï ò ð ü ò ö ø ñ þ ò ï ñ ü î ÿ ó õ ö ò ö ï
x
ý ð ò ï " î ÿ ü ÷ ð ð ü ò . ø ð ò ï . ò " ) ð ü ò ö ø ñ þ ò ï ÷ ñ õ ÷ ñ ó ö " ò õ ÷ ø ð ü ò ö ô ð ÷ ò ô ò ó ó þ ü ÷ ó ò ð ü ò
ý î ï ÿ ó ö ï ò ö ÷ ø ñ ÷ ñ ÷ ! ó ò ÷ ø ð ü ò ý î ï ÿ ó ö ! ö ï
/ /
ü ò ý î ÿ ï ö ð ü î ò ï ö ð ÷ î ø ñ ö ï ò 0 ý î ï ö õ õ & ' ý î ï ñ ÿ ! ð ï ö ô ð & ý î ï ÿ ó ð ÷ ó ÷ ô ö ð ÷ î ø & ý î ï õ ÷ ÷ õ ò
[email protected]
7 8 9 : ; < = > ? @ A B @ C D E F ? ; F E G H F I J
W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W W
X Y
= H > F H O 9 : ; < = > ? E F I ? F Z K ; 9 : ; < E Z K L H ? > L ? > L = > ? F H : O E ? = F : < ? F H L ? > > T Q
W [ [ \ ]
8 P K ; ? U K 9 = O L F H : O E ? P K ; ? U K E ? U ; : = Z : 9 O = < ^ K ; E Q R 8 _ ` a 8 b ` V
W c c e \ f
W ] ] g f
W ] ]
W g j [ ] f
= O L F H : O E @ A B @ C D E F ? ; F G H F I J
S I K ; K ? ; K k Z ? ; F E : 9 ? 9 = O L F H : O l
X Y m n Y n Y o n Y p n Y q
Y m Y q
J R l l V
[ \ ]
R s t u t v w x y x w z x { | } ~ w z { { ~ x | ~ w } z x y } ~ w
} x w ~ z { { v ~ z | w w ~ z x ~ | w x ~ v z ~ { z ~ w z x w
w ~ z x { | } ~ x w w x y { z ~ } x | z | w x w w x z x { | } ~
1 2 3 4 5 6
[email protected]
} w ~ w x w x x } x w x y } w ~ w v x { ~ x y ~ {
} x | | x ~ v ~ w ~ x w y x w
x | } w z z x ~ ~ } ~ w ~ w { | w z { { |
~ w } z
x
x w } | { w | x z w z { z | { x ~ y x { | x { ~ z { {
$IRUPXODW\SLFDOO\VWDUWVZLWKWKH³ ´FKDUDFWHUDQ } ~ x { w x
} x { } z { { w w ~ z v | ~ z x ~ v x w x w x w } z v ~ z x ~ ~
QXPHULFWH[WHWFDVZHOODV³FHOOUDQJHV´)RUH[DPSOHWKHIRUPXOD
¡ ¢ £ ¡
¡
~ w | z z { { ~ y z w x { w | { x ~ { | ~ ~
£ ¡
| w z ~ { | ~ x z z { { w w ~ z ¤ ~ } v w w
w {
± ~ } x ¥ | ~ { | v y z | | x w
~ } x z { { ~ x w } | {
¢ ¢
x x w } | { } z x ~ v ~ x ~ } { w w x } x w ¦ ~ v
} ~ § z { x w x ~ w w x w } ~ x ~ } { w x ~ { x x | x w x ~
~ x w { { } w v x w ~ { { x | x y w ¤ | z ¨ © ª z
±
} { w x w x ~ w w x w } } { w { } x ~ z x | v x
x ~ z x | { w ~ w z x | v x w z x } w x { w ~
x y w v ~ x y { { } w x { { ~ x y x y w v ~ x { { ¨ z ~ x
x y w
± } ~ z x } } x ~ x w x ~ w w x w } } y ~ w x | x y w
z
¢ ¢
~ x w y x z x ~ z { { ¦ x | w z ~ ~ x ~ z { { w
z x ~ | x | v x | z ~ { x z x | w z z { { v ~ x { x y ~ { } x | | x ~ x ~
¢ ¢
z x ~ ~ { ¤ ~ ¥ | w ~ { x y w w z x w ~ w x x | w z y {
w ~ { x w ~ x ~ z { {
$³FRSLHG´IRUPXODLVQRWQHFHVVDULO\OLWHUDOO\FRSLHG5DWKHULWVIRUPLVFRSLHG
y { { ® ¯ ° ± ² ³ ´ ¯ µ ¯ ° ° ® ¯ ¶ ¯ ® ¯ · µ ¯ ¸ } x x z x { | } ~ w ~ { x ~ ~ w x y
¢ ¢
w ~ { x ~ y ~ x | w z ~ ~ x ~ z { { x z x ~ x w
} { v y z x w x } ¹ v x w } | {
¡ ¢ £ ¡
y x { { x y ~
¹ ~ x ~ z { { x { | } ~ w ~ { x ~ º x y w ~ { x ~ » x w } | {
¢ ¡ ½ ¢ £
¹ ¼ ¹ x ¹ ~ x z ~ ¼ ¼ ¼
¢ ¡ ¡ ¢ £
¹ ¾ ¹ x ¹ ~ x z ~ ¾ ¾ ¾
¢ ¡ ¢ £
¹ ¿ ¹ x ¹ ~ x z ~ ¿ ¼ ¿ ¿
¢ ¡ ¢ £
¹ À ¹ x ¹ ~ x z ~ À ¾ À À
7KHUHDUHKXQGUHGVRIIXQFWLRQVDYDLODEOHWR([FHOXVHUV:H¶OOWDONDERXWVRPHRIWKH
¬
} x z x } } x ~ { | | ~ z x ~ | ~ z x ~ | ~ x w } | { y ~ x x ~ x
x w }
· ± Á ¯ Â ¶ Ã Ä · µ ² ³ Å · Æ ± ® Ç Ä Á ¯ · ² ¸ È
y w ± ® Ç Ä Á ¯ · ² ¸ ¤ { x z { { É ± ® ± Á ¯ ² ¯ ® ¸ w { | x y z | ~ z x ~
x | { { ¦ w w } | { { w | } ~ v w w z x } } x w
} {
x © | } | ~ z x ~ } | x { { | x w | } ~
x w } { v
x w } | {
£ ¡ £
© Ê ¨ ¤ À
| © Ê ¨ | ~ z x ~ x x { { | ~ ® ± · Ç ¯ Å ¶ µ ¯ ° ° ¸
£ ¡
£
± v
£ ¡
z x ~ | x | w z ~ { x z { { y x x { z x w ~ w z { { ~ y x x x } w
z x w ~ w z { { À } z { z | { x ~ z x | { { w ~ { } | ~ x w } | {
£ ¡ Ë £ Ë £ Ë Ë
¼ ¾ ¿ À
© } { w { v y |
£ ¡ ¡ ¡ Í
© | } ¤ ¹ v § ¿ v
Ì
£ ¡ ¡
y x | { } ~ z x } | | } x { { z { { ~ ¹ ~ § ¿ ~ z x ~ ~
Ì
7KLVLVDQH[DPSOHRIDIXQFWLRQXVLQJPXOWLSOHDUJXPHQWVWKH\¶UHVHSDUDWHGE\
¡ Í
z x } } ~ ~ x { x x ~ x w | } ~ ¤ ~ x z { { w w ~ z
1RWHWKDWLIDQXPHULFFHOOGLVSOD\VDFRQILJXUDWLRQRIWKH³´FKDUDFWHULWGRHVQ¶W
}
± UDWKHULWPHDQVWKHFROXPQLVQ¶WZLGHHQRXJKWR
~ ~ w w x w x z z | w w
GLVSOD\WKHFHOO¶VYDOXHLQLWVFXUUHQWIRUPDW
x y x w z ~ w ~ } x { { x y ¹ x | { z { z x ~ ~
~ }
x } x ~ ~ | } w x w } | w w ~ z ¤ | x ~ y Ï } ~
~ | } w ~ x w } ¤ ~ ~ x } x w x w } { y x | { ~
} ~ | ~ v | ~ w ~ ~ x } ~ | ~
± z x } } x ~ w z z ~
z z x | ~ ~
x w x w x w } z
ª w x w § { ~ x ~ § } {
Ë £ ¡ Ë ¡
x ~ ¹
¢ ¢ £
© | w z x ~ ¤ { x { ~ ¼ ¼
} ~ | ~ ~ z x ~ ~
¾
Ð Ð
½ Ò
¨ | { { z x ~ ¹ Ñ ¹
Ó Ó
Ô Ô ½ Ò
¹ x ~ Ñ
Õ Õ
½ ¡
º x x y w ¤ x ~ ~ ¹ ¾
x z { { w w ~ z ~ ~ x ~ x x w } | { z ~ ~ w x w } | {
³FXUVRUSRLQWLQJ´FOLFNRQWKHFHOO
\RX¶UHHGLWLQJEXWLWGRHVVRZLWKDUDQJHRIFHOOVSURSRVHGIRULWVDUJXPHQWOLVW<RX
ç é Ú Ø å ß á á × ß â ë é Ù ì Ø ß è á × Ø ê ë Û ê Û â é Þ ß â ß Ù Ý Û ë ë Ø Ý á í
x
× Ø ï é ð è Ü Ù Ý á ß Û Ù ç é Ú ã Ø Ü â Ø å á Û Ý Û ç ê Ü á Ø á × Ø ç é ð ß ç Ü ç ñ é Þ Ü Ø é ç Û Ù ì ß á â é ë ì Ü ç Ø Ù á â í
ò Û ë Ø ð é ç ê Þ Ø ä á × Ø è Û ë ç Ü Þ é
ï ô õ ö ÷ ø ù ÷ ú û
Ý Û ç ê Ü á Ø â á × Ø ç é ð ß ç Ü ç ñ é Þ Ü Ø é ç Û Ù ì á × Ø Ý Ø Þ Þ â ß Ù á × Ø ë é Ù ì Ø ÷ ø ù ÷ ú í
ü Û á Ø è Û ë ç Ü Þ é â Ý é Ù ã Ø ñ ß Ø ý Ø å é Ù å ê ë ß Ù á Ø å é â è Û Þ Þ Û ý â ù þ Þ ß Ý à Û Û Þ â ä ÿ ê á ß Û Ù â í ÿ Ù á × Ø ß Ø ý
á é ã ä Ý × Ø Ý à á × Ø ò Û ë ç Ü Þ é â Ý × Ø Ý à ã Û ð ã Ú Ý Þ ß Ý à ß Ù ì ß Ù ß á í þ Þ ß Ý à á × Ø ÿ ã Ü á á Û Ù í Û Ü ç é Ú Ù Ø Ø å
á Û é å Ü â á Ý Û Þ Ü ç Ù ý ß å á × â Û ë ë Û ý × Ø ß ì × á â ã Ø è Û ë Ø ê ë ß Ù á ß Ù ì í
x
× Ø ï ß Ù è Ü Ù Ý á ß Û Ù ß â Ü â Ø å á Û Ý Û ç ê Ü á Ø á × Ø ç ß Ù ß ç Ü ç ñ é Þ Ü Ø é ç Û Ù ì ß á â é ë ì Ü ç Ø Ù á â í ò Û ë
Ø ð é ç ê Þ Ø ä á × Ø è Û ë ç Ü Þ é
Î
[email protected]
ï ü ö ÷ ø ù ÷ ú û
Ý Û ç ê Ü á Ø â á × Ø ç ß ç ß ç Ü ç ñ é Þ Ü Ø é ç Û Ù ì á × Ø Ý Ø Þ Þ â ß Ù á × Ø ë é Ù ì Ø ÷ ø ù ÷ ú í
x
× Ø ô ñ Ø ë é ì Ø è Ü Ù Ý á ß Û Ù ß â Ü â Ø å á Û Ý Û ç ê Ü á Ø á × Ø é ñ Ø ë é ì Ø ñ é Þ Ü Ø é ç Û Ù ì ß á â é ë ì Ü ç Ø Ù á â í ò Û ë
Ø ð é ç ê Þ Ø ä á × Ø è Û ë ç Ü Þ é
ô ô ö ÷ ø ù ÷ ú û
Ý Û ç ê Ü á Ø â á × Ø é ñ Ø ë é ì Ø ñ é Þ Ü Ø é ç Û Ù ì á × Ø Ý Ø Þ Þ â ß Ù á × Ø ë é Ù ì Ø ÷ ø ù ÷ ú í
7R³ZUDSWH[W´FLUFXODUO\IURP³OLQHWROLQH´ZLWKLQDFHOO)RUWKHFHOOVLQZKLFK\RX
ý Û Ü Þ å Þ ß à Ø á Û ý ë é ê á Ø ð á ä ß è Ù Ø Ý Ø â â é ë Ú ä â á ë Ø á Ý × á × Ø ë Û ý Û è á × Ø Ý Ø Þ Þ á Û á × Ø å Ø â ß ë Ø å × Ø ß ì × á
Ý Þ ß Ý à ò Û ë ç é á ä þ Ø Þ Þ â Û Ù á × Ø ô Þ ß ì Ù ç Ø Ù á á é ã ä Ý × Ø Ý à á × Ø Ö ë é ê á Ø ð á Ý × Ø Ý à ã Û ð é Ù å Ý Þ ß Ý à ÿ í
x
× Ø è è Ü Ù Ý á ß Û Ù ß â Ü â Ø å á Û Ý × Û Û â Ø ã Ø á ý Ø Ø Ù á ý Û ê Û â â ß ã Þ Ø ý é Ú â Û è ç é à ß Ù ì é Ý é Þ Ý Ü Þ é á ß Û Ù í
ò Û ë Ø ð é ç ê Þ Ø ä á × Ø è Û ë ç Ü Þ é
ò ö ø ä ä í ø û
ß â ß Ù á Ø ë ê ë Ø á Ø å é â è Û Þ Þ Û ý â ù ß è ø ö Ù Ø á ß Ù Ý Û ç Ø û ß â Þ Ø â â á × é Ù ä ä á × Ø Ù Ø ñ é Þ Ü é á Ø á × Ø
è Û ë ç Ü Þ é ö è Û ë é á é ð ë é á Ø û é â Û á × Ø ë ý ß â Ø ä Ø ñ é Þ Ü é á Ø á × Ø è Û ë ç Ü Þ é é â í ø í ï Û ë Ø
JHQHUDOO\LW¶VXVHGLQWKHIRUPDW
è ö ! " # $ " % $ & ' ( ) ' ( % * + ( ) ' ( ,
ý × Ø ë Ø á × Ø ! " # $ " ß â é Ù Ø ð ê ë Ø â â ß Û Ù á × é á Ø ñ é Þ Ü é á Ø â é â ë Ü Ø Û ë ò é Þ â Ø á × Ø
ë Ü Ø é Ù å á × Ø * + ( ) ' ( ß â á × Ø Ø ð ê ë Ø â â ß Û Ù á Û Ø ñ é Þ Ü é á Ø á × Ø è è Ü Ù Ý á ß Û Ù ã Ú ß è á × Ø
! " # $ " ß â ò é Þ â Ø í
x
× Ø Û Ü Ù å è Ü Ù Ý á ß Û Ù ß â Ü â Ø å á Û ç é à Ø ë Û Ü Ù å Û è è ê é ë á Û è é Ý é Þ Ý Ü Þ é á ß Û Ù í á â è Û ë ç ù
Û Ü Ù å ö ( . / & ( + + " % # ( 0 1 ( + û
× Ø ë Ø â Ü Þ á Û è Ü â ß Ù ì Û Ü Ù å ù á × Ø ñ é Þ Ü Ø Û è á × Ø ( . / & ( + + " ß â ë Û Ü Ù å Ø å Û è è ö ß Ù á × Ø ë Ø â Ü Þ á Û è á × Ø
Ý é Þ Ý Ü Þ é á ß Û Ù û á Û á × Ø Ù Ü ç ã Ø ë Û è # ( 0 1 ( + â ê Ø Ý ß è ß Ø å ã Ú á × Ø ø 2 3 ê é ë é ç Ø á Ø ë í ò Û ë Ø ð é ç ê Þ Ø ä
ç é Ù Ú Ü Ù ë Û Ü Ù å Ø å Ý é Þ Ý Ü Þ é á ß Û Ù â Û è ç Û Ù Ø Ú ì Ø Ù Ø ë é á Ø è ë é Ý á ß Û Ù â Û è é ê Ø Ù Ù Ú á × é á ç é Ú é å å Ü ê ä ß Ù
á Û á é Þ â ä á Û é ê ê é ë Ø Ù á Ø ë ë Û ë â í Û é ñ Û ß å â Ü Ý × é ê ê é ë Ø Ù á Ø ë ë Û ë â ä ý Ø Ý é Ù ë Û Ü Ù å á × Ø â Ø Ý é Þ Ý Ü Þ é á ß Û Ù â í
)RUH[DPSOHLQFRPSXWLQJDWD[SD\HU¶VWD[WKHH[DFWFDOFXODWLRQ
ø 4 ø
ö Ù Ø á ß Ù Ý Û ç Ø á ß ç Ø â á é ð ë é á Ø û ç é Ú × é ñ Ø è ë é Ý á ß Û Ù â Û è é Ý Ø Ù á ä ã Ü á Û Ü Ù å ö ø 4 ø ä ø û
ß â ë Û Ü Ù å Ø å Û è è á Û á × Ø Ù Ø é ë Ø â á ê Ø Ù Ù Ú í
[email protected]
ô ý Û ë à â × Ø Ø á Ý é Ù ã Ø ß Ù â Ø ë á Ø å ß Ù á Û é ý Û ë à ã Û Û à ã Ú Ý Þ ß Ý à ß Ù ì Ù â Ø ë á ä Ö Û ë à â × Ø Ø á í
ô Ù Û á × Ø ë ä ç Û ë Ø Ý Û ç ê Þ Ø ð ä Ø ð é ç ê Þ Ø ù Û ê é Ú é Ù × Û Ü ë Þ Ú Ø ç ê Þ Û Ú Ø Ø ý × Û ç é Ú × é ñ Ø Û ñ Ø ë á ß ç Ø
× Û Ü ë â ä ý Ø Ý é Ù Ü â Ø á × Ø è Û ë ç Ü Þ é
ò ö þ ø 5 ä 4 ÷ ø 6 ö þ ø û 4 ÷ ø 4 í ä þ ø 4 ÷ ø û
ý × ß Ý × ý Ø Ý é Ù Ø ð ê Þ é ß Ù é â è Û Þ Þ Û ý â ä é â â Ü ç ß Ù ì þ ø ß â á × Ø × Û Ü ë â ý Û ë à Ø å ä ß â á × Ø Ù Ü ç ã Ø ë Û è
× Û Ü ë â Ü â Ø å é â á × Ø Û ñ Ø ë á ß ç Ø á × Ø â × × Û Þ å ä ÷ ø ß â á × Ø × Û Ü ë Þ Ú ë é á Ø Û è ê é Ú ù
x RQGLWLRQ&!LVWKHWHVWIRUWKHH[LVWHQFHRIRYHUWLPH,ILW¶VWUXHZH
× Ø Ý
Ý Û ç ê Ø Ù â é á Ø á × Ø Ø ç ê Þ Û Ú Ø Ø ã Ú Ü â ß Ù ì á × Ø â Ü ã è Û ë ç Ü Þ é
x
4 ÷ ø 6 ö þ ø û 4 ÷ ø 4 í í × ß â ë Ø ê ë Ø â Ø Ù á â á ý Û á Ø ë ç â í × Ø è ß ë â á á Ø ë ç ä 4 ÷ ø ä ß â á × Ø
î î
³UHJXODUSD\´IRUUHJXODUKRXUVDWKRXUO\UDWH
÷ ø í × Ø â Ø Ý Û Ù å á Ø ë ç ä ö þ ø
û 4 ÷ ø 4 í ä ß â á × Ø Û ñ Ø ë á ß ç Ø ê é Ú ä â ß Ù Ý Ø þ ø ß â á × Ø Ù Ü ç ã Ø ë Û è Û ñ Ø ë á ß ç Ø × Û Ü ë â ä ý × ß Ý ×
é ë Ø ç Ü Þ á ß ê Þ ß Ø å ã Ú ÷ ø ö á × Ø ã é â Ø ë é á Ø Û è × Û Ü ë Þ Ú ê é Ú û é Ù å ã Ú í ö á × Ø á ß ç Ø é Ù å é × é Þ è
- - -
è é Ý á Û ë û í
x
ÿ á × Ø ë ý ß â Ø ö ß è á × Ø Ý Û Ù å ß á ß Û Ù þ ø 5 ß â è é Þ â Ø û ä á × Ø Ø ç ê Þ Û Ú Ø Ø × é â Ù Û Û ñ Ø ë á ß ç Ø ä
× Ø Ù Ý Ø ß â ê é ß å ã Ú á × Ø ñ é Þ Ü Ø Û è þ ø 4 ÷ ø ä á × Ø × Û Ü ë â á ß ç Ø â á × Ø × Û Ü ë Þ Ú ë é á Ø í
ô â é ã Û ñ Ø ä á × Ø ê Û â â ß ã ß Þ ß á Ú Û è è ë é Ý á ß Û Ù â Û è é ê Ø Ù Ù Ú ã Ø ß Ù ì Ý é Þ Ý Ü Þ é á Ø å é Ù å å ß â á Û ë á ß Ù ì
â Ü ã â Ø 7 Ü Ø Ù á Ý é Þ Ý Ü Þ é á ß Û Ù â ç é à Ø â ß á å Ø â ß ë é ã Þ Ø á Û ç Û å ß è Ú á × Ø è Û ë ç Ü Þ é é ã Û ñ Ø á Û
ÿ 8 ü ö ò ö þ ø 5 ä 4 ÷ ø 6 ö þ ø û 4 ÷ ø 4 í ä þ ø 4 ÷ ø û ä ø û
× Ø ë Ø é ë Ø × Ü Ù å ë Ø å â Û è Û á × Ø ë è Ü Ù Ý á ß Û Ù â é ñ é ß Þ é ã Þ Ø á Û ð Ý Ø Þ Ü â Ø ë â í ï Û ë Ø ß Ù è Û ë ç é á ß Û Ù ç é Ú ã Ø
è Û Ü Ù å ß Ù á × Ø ð Ý Ø Þ 9 Ø Þ ê â Ú â á Ø ç í
ò Û ë ç é á á ß Ù ì è Ø é á Ü ë Ø â ß Ù Ý Þ Ü å Ø á × Ø è Û Þ Þ Û ý ß Ù ì ù
x
ô Ý Ø Þ Þ ý ß á × é Ù Ü ç Ø ë ß Ý ñ é Þ Ü Ø ç é Ú ã Ø å ß â ê Þ é Ú Ø å ß Ù á × Ø þ Ü ë ë Ø Ù Ý Ú è Û ë ç é á ö â × Û ý â é
Ý Ü ë ë Ø Ù Ý Ú â Ú ç ã Û Þ â Ü Ý × é â û ã Ú Ý Þ ß Ý à ß Ù ì á × Ø þ Ü ë ë Ø Ù Ý Ú ã Ü á á Û Ù ä Û ë á × Ø þ Û ç ç é è Û ë ç é á ã Ú
Ý Þ ß Ý à ß Ù ì á × Ø Ý Û ç ç é ã Ü á á Û Ù í ÷ Û á × Û è á × Ø â Ø è Û ë ç é á â â × Û ý Ù Ø ì é á ß ñ Ø Ù Ü ç ã Ø ë â ß Ù
ê é ë Ø Ù á × Ø â Ø â ý ß á × Û Ü á é Þ Ø é å ß Ù ì Ù Ø ì é á ß ñ Ø â ß ì Ù ã Û á × â × Û ý Ý Û ç ç é â ß è á × Ø Ù Ü ç ã Ø ë
ë Ø 7 Ü ß ë Ø â Ø Ù Û Ü ì × å ß ì ß á â í ò Û ë á × Ø þ Ü ë ë Ø Ù Ý Ú è Û ë ç é á ä Ú Û Ü ç é Ú Ý × é Ù ì Ø á × Ø Ý Ü ë ë Ø Ù Ý Ú
â Ú ç ã Û Þ ã Ú Ý Þ ß Ý à ß Ù ì ò Û ë ç é á ä þ Ø Þ Þ â Û Ù á × Ø ü Ü ç ã Ø ë á é ã ä Ý × Û Û â Ø á × Ø þ Ü ë ë Ø Ù Ý Ú Ý é á Ø ì Û ë Ú
é Ù å Ý × Û Û â Ø á × Ø å Ø â ß ë Ø å Ý Ü ë ë Ø Ù Ý Ú â Ú ç ã Û Þ í
x
× Ø ê Ø ë Ý Ø Ù á è Û ë ç é á ß â Ý é Þ Þ Ø å ß Ù á Û ê Þ é Ú ñ ß é á × Ø : Ø ë Ý Ø Ù á ã Ü á á Û Ù í
[email protected]
ÿ á × Ø ë Ù Ü ç ã Ø ë è Û ë ç é á â Ý é Ù ã Ø Ý × Û â Ø Ù ã Ú Ý Þ ß Ý à ß Ù ì ò Û ë ç é á ä þ Ø Þ Þ â Û Ù á × Ø ü Ü ç ã Ø ë á é ã ä
±
Ý × Û Û â ß Ù ì á × Ø å Ø â ß ë Ø å þ é á Ø ì Û ë Ú í ü Û á ß Ý Ø á × Ø æ Ý ß Ø Ù á ß è ß Ý ü Û á é á ß Û Ù è Û ë Ø ð é ç ê Þ Ø ä á × Ø ñ é Þ Ü Ø
å ß â ê Þ é Ú Ø å é â ø í ø < ú 6 =
± PRUHJHQHUDOO\WKH³(´
ë Ø ê ë Ø â Ø Ù á â ø í ø < ú á ß ç Ø â á Û á × Ø = > 3 ê Û ý Ø ë
UHSUHVHQWV³WLPHVWRWKHSRZHU´
x
× Ø å Ø è é Ü Þ á é Þ ß ì Ù ç Ø Ù á â é ë Ø ù á Ø ð á ñ é Þ Ü Ø â é Þ ß ì Ù Ø å á Û á × Ø Þ Ø è á ý ß á × ß Ù á × Ø ß ë Ý Ø Þ Þ â Ù Ü ç Ø ë ß Ý
ñ é Þ Ü Ø â é Þ ß ì Ù Ø å á Û á × Ø ë ß ì × á ý ß á × ß Ù á × Ø ß ë Ý Ø Þ Þ â í æ Û ç Ø á ß ç Ø â á × Ø â Ø å Ø è é Ü Þ á â é ë Ø
Ü Ù å Ø â ß ë é ã Þ Ø í ò Û ë Ø ð é ç ê Þ Ø ä Ý Û Þ Ü ç Ù × Ø é å Ø ë â â × Û Ü Þ å é ê ê Ø é ë Û ñ Ø ë á × Ø å é á é ß Ù á × Ø ß ë
Ý Û Þ Ü ç Ù â ä ã Ü á á × ß â ç é Ú Ù Û á × é ê ê Ø Ù ß Ù é ý ß å Ø Ý Û Þ Ü ç Ù ß è ý Ø ë Ø Þ Ú Û Ù å Ø è é Ü Þ á é Þ ß ì Ù ç Ø Ù á â í
Ö Ø ç é Ú Ü â Ø á × Ø é Þ ß ì Ù ç Ø Ù á ã Ü á á Û Ù â ö â ß ç ß Þ é ë á Û á × Û â Ø Û è Ö Û ë å û á Û é Þ ß ì Ù å é á é ý ß á × ß Ù ß á â
Ý Ø Þ Þ é â é ê ê ë Û ê ë ß é á Ø í
x
Û Ü ç é Ú Ý × é Ù ì Ø è Û Ù á Ø è è Ø Ý á â â Ü Ý × é â ã Û Þ å è é Ý Ø ä ß á é Þ ß Ý â ä Ü Ù å Ø ë Þ ß Ù ß Ù ì ä × ß ì × Þ ß ì × á ß Ù ì ö è ß Þ Þ
Ý Û Þ Û ë û ä è Û Ù á â ß ? Ø ä è Û Ù á Ý Û Þ Û ë ä è Û Ù á â á Ú Þ Ø ä Ø á Ý í ä ç Ü Ý × é â ß Ù Ö Û ë å í
x
Û Ü ç é Ú Ý × Û Û â Ø ñ é ë ß Û Ü â ã Û ë å Ø ë â á Ú Þ Ø â è Û ë é Ý Ø Þ Þ Û ë ì ë Û Ü ê Û è Ý Ø Þ Þ â ã Ú Ý Þ ß Ý à ß Ù ì ò Û ë ç é á ä
þ Ø Þ Þ â Û Ù á × Ø ÷ Û ë å Ø ë á é ã ä Ý × Û Û â Ø á × Ø å Ø â ß ë Ø å ã Û ë å Ø ë â á Ú Þ Ø í
x
Û Ü Ý é Ù Ý Û Ù á ë Û Þ á × Ø Ù Ü ç ã Ø ë Û è å ß â ê Þ é Ú Ø å å Ø Ý ß ç é Þ ê Þ é Ý Ø â ß Ù é Ý Ø Þ Þ ã Ú Ü â ß Ù ì á × Ø
Ù Ý ë Ø é â Ø Ø Ý ß ç é Þ â é Ù å Ø Ý ë Ø é â Ø Ø Ý ß ç é Þ â ã Ü á á Û Ù â í
Ö Ø ç é Ú Ü â Ø á × Ø ê Û ý Ø ë Û è é â ê ë Ø é å â × Ø Ø á á Û ë Ø Ý é Þ Ý Ü Þ é á Ø á Û ç é à Ø á × Ø â ê ë Ø é å â × Ø Ø á é ê Û ý Ø ë è Ü Þ
Ø ð ê Ø ë ß ç Ø Ù á é Þ á Û Û Þ í ò Û ë Ø ð é ç ê Þ Ø ä â Ü ê ê Û â Ø Ú Û Ü è ß Ù å Ú Û Ü ë â Ø Þ è ß Ù á × Ø è Û Þ Þ Û ý ß Ù ì â ß á Ü é á ß Û Ù ù
Û Ü ç Ü â á å Ø Ý ß å Ø á × Ø ê Ø ë Ý Ø Ù á é ì Ø Û è ê é Ú ë é ß â Ø â é ý é ë å Ø å á Û Ø é Ý × Û è â Ø ñ Ø ë é Þ Ø ç ê Þ Û Ú Ø Ø â ä
â Ü ã Ø Ý á á Û á × Ø è Û Þ Þ Û ý ß Ù ì Ý Û Ù â á ë é ß Ù á â ù
x 3D\UDLVHVVKRXOGDYHUDJH³DERXW´
x
ï Û ë Ø ê ë Û å Ü Ý á ß ñ Ø Ø ç ê Þ Û Ú Ø Ø â ö ë é á Ø å Û Ù é â Ý é Þ Ø Û è á Û ö ù ý Û ë â á û û ì Ø á é × ß ì × Ø ë
ê Ø ë Ý Ø Ù á é ì Ø í
x 7KHWRWDOLQFUHDVHVKRXOGEHDWOHDVWRIWKHSUHYLRXV\HDU¶VWRWDO
x 7KHWRWDOLQFUHDVHVKRXOGEHDWPRVWPRUHWKDQRIWKHSUHYLRXV\HDU¶VWRWDO
ü Û á ß Ý Ø á × Ø Ü â Ø Û è á × Ø ô ü è Ü Ù Ý á ß Û Ù í Ö Ø ý é Ù á á Û â é Ú ý Ø × é ñ Ø é ñ é Þ ß å è Ü Ù Ý á ß Û Ù ß è é Ù å Û Ù Þ Ú
ß è
ï ß Ù ß ç Ü ç ß Ù Ý ë Ø é â Ø é Ý á Ü é Þ ß Ù Ý ë Ø é â Ø ç é ð ß ç Ü ç ß Ù Ý ë Ø é â Ø ä Û ë
ø = í
ó ó
+RZHYHU([FHOZRQ¶WLQWHUSUHWWKHODWWHUQRWDWLRQFRUUHFWO\1RWLFHWKDWDFKDLQRI
ß Ù Ø 7 Ü é Þ ß á ß Ø â ß â é Ù é ã ã ë Ø ñ ß é á ß Û Ù ù × Ø é ã Û ñ Ø ä ß Ù á Ø ë ê ë Ø á Ø å é â é Ù é Þ ì Ø ã ë é ß Ý â á é á Ø ç Ø Ù á ä ß â â × Û ë á
è Û ë
ø é Ù å = í
ó ó
;
[email protected]
× Ü â ä ß Ù ð Ý Ø Þ ä ý Ø Ü â Ø á × Ø è Û ë ç Ü Þ é
ô ü ö ø ä = û
ó ó ó
VWKHVWXGHQW¶VSHUFHQWDJHZHZDQWWRPDNHDFDOFXODWLRQRIWKHIRUP
â á Ü å Ø Ù á
é â
9 ø F 9
± EXWWKLVGRHVQ¶W
é Ù å ý Ø ç ß ì × á á × Ø Ù á × ß Ù à ý Ø Ý é Ù Ý Û ê Ú á × ß â è Û ë ç Ü Þ é å Û ý Ù ß á â Ý Û Þ Ü ç Ù
FRUUHFWO\EHFDXVHZHZDQW+WREHWKHGHQRPLQDWRULQHYHU\VWXGHQW¶VIRUPXODEXW
è Û ë Ø ð é ç ê Þ Ø ä á × Ø å Ø Ù Û ç ß Ù é á Û ë Ý Û ê ß Ø â é â 9 G è Û ë á × Ø â á Ü å Ø Ù á ß Ù ë Û ý = í
Ö Ø Ü â Ø á × Ø Ý × é ë é Ý á Ø ë á Û è ß ð Ø ß á × Ø ë é ë Û ý ë Ø è Ø ë Ø Ù Ý Ø Û ë é Ý Û Þ Ü ç Ù ë Ø è Ø ë Ø Ù Ý Ø ö Û ë ã Û á × û ß Ù é
è Û ë ç Ü Þ é í ò Û ë Ø ð é ç ê Þ Ø ä é Þ Þ Û è á × Ø è Û Þ Þ Û ý ß Ù ì ë Ø è Ø ë á Û Ý Ø Þ Þ 9 ù
x ±
9 ë Ø Þ é á ß ñ Ø ß Ù Ý Û Þ Ü ç Ù ä ë Ø Þ é á ß ñ Ø ß Ù ë Û ý
x ±
9 è ß ð Ø å ö é ã â Û Þ Ü á Ø û ß Ù Ý Û Þ Ü ç Ù ä ë Ø Þ é á ß ñ Ø ß Ù ë Û ý
x
9 ë Ø Þ é á ß ñ Ø ß Ù Ý Û Þ Ü ç Ù ä è ß ð Ø å ö é ã â Û Þ Ü á Ø û ß Ù ë Û ý
x
9 è ß ð Ø å ö é ã â Û Þ Ü á Ø û ß Ù Ý Û Þ Ü ç Ù é Ù å ß Ù ë Û ý
× Ø ê Ü ë ê Û â Ø Û è Ü â ß Ù ì é è ß ð Ø å ö é ã â Û Þ Ü á Ø û ë Ø è Ø ë Ø Ù Ý Ø ß â á Û è ß ð á × Ø ë Ø è Ø ë Ø Ù Ý Ø ß Ù é Ý Û ê Ú é Ù å
- -
±
ê é â á Ø Û ê Ø ë é á ß Û Ù á × é á ß â ä å Û Ù Û á é å Ü â á á × Ø ë Ø è Ø ë Ø Ù Ý Ø ä ã Ü á Ý Û ê Ú Ü Ù é å Ü â á Ø å í
x
ô â ê ë Ø é å â × Ø Ø á å Û Ý Ü ç Ø Ù á á × é á Ý Û Ù á é ß Ù â Û Ù Ø Û ë ç Û ë Ø ý Û ë à â × Ø Ø á â ä é ï ß Ý ë Û â Û è á ð Ý Ø Þ
å Û Ý Ü ç Ø Ù á í
x
ô Ý Û Þ Þ Ø Ý á ß Û Ù Û è ë Ø Þ é á Ø å ý Û ë à â × Ø Ø á â Ý Û Ù á é ß Ù Ø å ý ß á × ß Ù é â ß Ù ì Þ Ø è ß Þ Ø í ö ß Ù â ê ë Ø é å â × Ø Ø á
é ê ê Þ ß Ý é á ß Û Ù â û í
x
× Ø ý Û ë à ã Û Û à ß â á × Ø ç é ß Ù å Û Ý Ü ç Ø Ù á Ü â Ø å ß Ù â Û è á ý é ë Ø ê ë Û ì ë é ç â Þ ß à Ø ð Ý Ø Þ í ô
ý Û ë à ã Û Û à Ý Û Ù â ß â á â Û è ß Ù å ß ñ ß å Ü é Þ ý Û ë à â × Ø Ø á â ä Þ ß à Ø é Ù é Ý Ý Û Ü Ù á é Ù á H â ý Û ë à ã Û Û à ä Ø é Ý ×
Û è ý × ß Ý × Ý é Ù Ý Û Ù á é ß Ù å é á é í ÷ é â ß Ý é Þ Þ Ú ä é ý Û ë à ã Û Û à ß â é ñ Ø ë Ú â Û ê × ß â á ß Ý é á Ø å Þ Ø å ì Ø ë í
[email protected]
x
ô â ß Ù ì Þ Ø â ê ë Ø é å â × Ø Ø á á × é á Ý Û Ù á é ß Ù â ë Û ý â é Ù å Ý Û Þ Ü ç Ù â Û è å é á é í Ù ð Ý Ø Þ ä é
ý Û ë à â × Ø Ø á ý ß Þ Þ × é ñ Ø é Þ ß á á Þ Ø ý × ß á Ø á é ã é á á × Ø ã Û á á Û ç Û è á × Ø â Ý ë Ø Ø Ù í ô ý Û ë à â × Ø Ø á ß â
á ë Ø é á Ø å Þ ß à Ø é å é á é ã é â Ø á é ã Þ Ø í
x
ô Ù Ø Þ Ø Ý á ë Û Ù ß Ý â ê ë Ø é å â × Ø Ø á Ý Û Ù á é ß Ù ß Ù ì ø G Ý Û Þ Ü ç Ù â ã Ú G ä = < ë Û ý â í ö ß Ù
â ê ë Ø é å â × Ø Ø á é ê ê Þ ß Ý é á ß Û Ù â û í
x
ô ý Û ë à é ë Ø é Ý Û ç ê ë ß â Ø å Û è ë Û ý â é Ù å Ý Û Þ Ü ç Ù â ä é Þ â Û à Ù Û ý Ù é â é â ê ë Ø é å â × Ø Ø á í
x
ô Þ é ã Ø Þ å Ø â Ý ë ß ã ß Ù ì á × Ø ð é ð ß â Û è é Ý × é ë á í ö ß Ù â ê ë Ø é å â × Ø Ø á é ê ê Þ ß Ý é á ß Û Ù â
ô Ù ß Ù á Ø ë â Ø Ý á ß Û Ù Û è é ë Û ý é Ù å Ý Û Þ Ü ç Ù ä á × Ø â ç é Þ Þ Ø â á Ø Þ Ø ç Ø Ù á ß Ù ý × ß Ý × Ú Û Ü Ý é Ù
Ø Ù á Ø ë å é á é í
ô ñ Ø ë á ß Ý é Þ â Ø Þ Ø Ý á ß Û Ù Û è Ý Ø Þ Þ â ß å Ø Ù á ß è ß Ø å ã Ú Û Ù Ø Û ë ç Û ë Ø Þ Ø á á Ø ë â ä â á é ë á ß Ù ì ý ß á × ô é á
á × Ø Þ Ø è á â ß å Ø Û è á × Ø â ê ë Ø é å â × Ø Ø á í
J K L M N O L P Q R S T U S U V Q N L P L W V U S S T N X U P Q N W N U X Y Z R P [ \ Y U M ] T Q R M Q N P ^ _ N Q K ` R Q Q K U Q L a
L W Q K U T a M U R X T K U U Q b
J P U c [ R Q N L P Q K R Q a U M W L M \ T R P L a U M R Q N L P L P V U S S X R Q R R P X X N T a S R Z T Q K U M U T [ S Q b d L M
U e R \ a S U ] Q L R X X Q K U V L P Q U P Q T L W V U S S T J ` R P X J f ] R P X X N T a S R Z Q K U M U T [ S Q T N P J g ]
V U S S J g _ L [ S X V L P Q R N P h J ` i J f ] R T N \ a S U W L M \ [ S R b
J a M U j X U W N P U X W L M \ [ S R Q K R Q R S S L _ T Z L [ Q L c [ N V k S Z a U M W L M \ R \ L M U X N W W N V [ S Q
L a U M R Q N L P L P V U S S X R Q R ] T [ V K R T W N P X N P ^ Q K U R l U M R ^ U L W R M R P ^ U L W P [ \ Y U M T b
d [ P V Q N L P T R S _ R Z T Q R k U m n o p q r s t u ] L M R X X N Q N L P R S N P W L M \ R Q N L P Q K R Q U P R Y S U T Q K U
V L \ a [ Q R Q N L P Q L L V V [ M b d L M U e R \ a S U ] Q K U R M ^ [ \ U P Q Q L Q K U J v w ] L M R l U M R ^ U ]
W [ P V Q N L P N T Q K U M R P ^ U L W V U S S T Q L Y U R l U M R ^ U X x h J v w y J ` b b z ` { | R l U M R ^ U T R S S V U S S T
Y U Q _ U U P J ` y N P Q K U [ a a U M S U W Q | R P X z ` { y N P Q K U S L _ U M M N ^ K Q | b
x
K U V L S [ \ P P [ \ Y U M R P X Q K U M L _ S U Q Q U M L W R V U S S b
x
K U R X X M U T T L M P R \ U L W R T a U V N W N V V U S S b z U S S M U W U M U P V U T \ R Z Y U [ T U X N P W L M \ [ S R T
R P X R M U M U S R Q N l U L M R Y T L S [ Q U b y ~ a M U R X T K U U Q R a a S N V R Q N L P | b
x
J V U S S P R \ U [ T U X N P R W L M \ [ S R b
x
J K N ^ K S N ^ K Q U X M U V Q R P ^ S U R M L [ P X R V U S S Q K R Q N P X N V R Q U T Q K U R V Q N l U V U S S b y ~ a M U R X T K U U Q
R a a S N V R Q N L P |
x
T U X Q L N P X N V R Q U R M U S R Q N l U a L T N Q N L P N P R _ L M k T K U U Q b K N T R S S L _ T Z L [ Q L V L a Z R P X
}
\ L l U W L M \ [ S R T W M L \ L P U R M U R Q L R P L Q K U M L W Q K U T R \ U X N \ U P T N L P T b e V U S ] W L M
U e R \ a S U ] R [ Q L \ R Q N V R S S Z V K R P ^ U T Q K U V L S [ \ P R P X M L _ P [ \ Y U M T Q L M U W S U V Q Q K U P U _
a L T N Q N L P b y N P T a M U R X T K U U Q R a a S N V R Q N L P T | b
x
z U S S M U W U M U P V U T N P W L M \ [ S R T Q K R Q V K R P ^ U _ K U P e V U S V L a N U T Q K U \ Q L R P L Q K U M
S L V R Q N L P b
L P Q K U U Y x
x
J V U S S M U W U M U P V U N P _ K N V K R X L S S R M T N ^ P y | a M U V U X U T Y L Q K Q K U V L S [ \ P R P X M L _
a L M Q N L P T L W Q K U V U S S M U W U M U P V U b
x
z U S S M U W U M U P V U N P _ K N V K U N Q K U M Q K U V L S [ \ P L M Q K U M L _ N T P U l U M R X [ T Q U X N W Q K U
W L M \ [ S R V L P Q R N P N P ^ N Q N T V L a N U X Q L R P L Q K U M S L V R Q N L P b
I
[email protected]
x
T [ R S S Z Q K U N P Q U M T U V Q N L P L W R V U S S T M L _ R P X V L S [ \ P b
x
P N c [ U S L V R Q N L P N X U P Q N W N U X Y Z N P Q U M T U V Q N P ^ V L S [ \ P R P X M L _ V L L M X N P R Q U T b
y ~ a M U R X T K U U Q R a a S N V R Q N L P |
x
K U a M L V U T T L W a S R Z N P ^ _ N Q K P [ \ Y U M T Q L T U U K L _ Q K U Z N P Q U M R V Q N P R T a M U R X T K U U Q b
x
d M U U O N P ^ a R P U T a M U l U P Q T Q K U X R Q R N P Q K U a R P U T W M L \ T V M L S S N P ^ R T Z L [ \ L l U Q L
X N W W U M U P Q R M U R T N P Q K U _ L M k T K U U Q b
L P Q K U U Y x
x
w L R S ~ U U k N T R Q L L S Q K R Q N T [ T U X Q L W N P X Q K U l R S [ U P U U X U X N P L P U V U S S Q L R Q Q R N P R
M U T [ S Q Z L [ _ R P Q N P R P L Q K U M V U S S b
x
J T U Q L W N P T Q M [ V Q N L P T Q K R Q Z L [ U P Q U M N P R V U S S Q L a U M W L M \ P [ \ U M N V
V R S V [ S R Q N L P T y R X X N P ^ ] \ [ S Q N a S Z N P ^ ] R l U M R ^ N P ^ ] U Q V b | W L M U e R \ a S U ] i J ` i ` b
y N P T a M U R X T K U U Q R a a S N V R Q N L P T |
x
P T Q M [ V Q T Q K U T a M U R X T K U U Q Q L a U M W L M \ R V R S V [ S R Q N L P [ T N P ^ Q K U V L P Q U P Q T L W R
T a U V N W N V V U S S L M M R P ^ U L W V U S S T
x
J a M L ^ M R \ Q K R Q a M L V U T T U T N P X N l N X [ R S ] a U M T L P R S a M U W U M U P V U T N P R P R Q Q U \ a Q Q L X U S N l U M
M U S U l R P Q N P W L M \ R Q N L P Q L R a R M Q N V [ S R M U P X [ T U M b
J V U S S R X X M U T T N P R W L M \ [ S R Q K R Q X L U T P L Q V K R P ^ U _ K U P
V L a N U X Q L R P L Q K U M V U S S b J P R Y T L S [ Q U M U W U M U P V U K R T Q K U W L M \
J Y T L S [ Q U V U S S M U W U M U P V U x
J ` b
K U T U S U V Q U X V U S S N P R _ L M k T K U U Q b K U R V Q N l U V U S S N T
} }
T [ M M L [ P X U X Y Z R K U R l Z Y L M X U M R P X N T N X U P Q N W N U X Y Z Q K U V U S S
J V Q N l U V U S S x
R X X M U T T b
K U N P W L M \ R Q N L P Q K R Q R W [ P V Q N L P [ T U T Q L a M L X [ V U R P U _ l R S [ U
L M a U M W L M \ R P R V Q N L P b d L M U e R \ a S U ] R P U _ l R S [ U N T X N T a S R Z U X
_ K U P Q K U ~ W [ P V Q N L P R X X T Q K U R M ^ [ \ U P Q y J x J ` f | b J P
J M ^ [ \ U P Q x
R M ^ [ \ U P Q V L P T N T Q T L W P [ \ Y U M T ] M U W U M U P V U T ] Q U e Q ] L a U M R Q L M T ] L M
U M M L M l R S [ U T b
J T V U P X N P ^ x
J \ U Q K L X L W L M X U M N P ^ R ^ M L [ a L W N Q U \ T W M L \ S L _ U T Q Q L
[email protected]
K N ^ K U T Q ] T [ V K R T W M L \ J Q L b
~ [ \ T Q K U P [ \ Y U M T N P Q K U T a U V N W N U X M R P ^ U R P X Q K U P X N l N X U T Q K U
J v J w W [ P V Q N L P x
T [ \ Y Z Q K U P [ \ Y U M L W P L P j O U M L V U S S T N P Q K U M R P ^ U b
J P [ P N c [ U R X X M U T T ^ N l U P Q L R V U S S Q K U V L L M X N P R Q U T L W Q K U
z U S S M U W U M U P V U x
N P Q U M T U V Q N L P L W R V L S [ \ P R P X R M L _ b
z U S S x R T N V [ P N Q L W R _ L M k T K U U Q N P Q L _ K N V K Z L [ U P Q U M X R Q R b
J ^ M R a K N V M U a M U T U P Q R Q N L P L W _ L M k T K U U Q X R Q R b v R S [ U T W M L \
_ L M k T K U U Q V U S S T R M U X N T a S R Z U X R T Y R M T ] S N P U T ] L M L Q K U M T K R a U T b
z K R M Q x
z L \ \ L P V K R M Q Q Z a U T R M U a N U ] Y R M ] S N P U ] R P X R M U R b
K U S U Q Q U M U X ^ M R Z R M U R R Q Q K U Q L a L W U R V K V L S [ \ P Q K R Q
z L S [ \ P K U R X N P ^ x
}
N X U P Q N W N U T Q K U S U Q Q U M L W Q K U V L S [ \ P ] T [ V K R T V L S [ \ P b
J \ U Q K L X L W L M X U M N P ^ R ^ M L [ a L W N Q U \ T W M L \ K N ^ K U T Q Q L
U T V U P X N P ^ x
S L _ U T Q ] T [ V K R T W M L \ Q L J b
J V K R M Q Q K R Q U e N T Q T L P R _ L M k T K U U Q N P T Q U R X L W L P R T U a R M R Q U
\ Y U X X U X V K R M Q x
V K R M Q T K U U Q b
J T U c [ U P V U L W l R S [ U T ] V U S S M U W U M U P V U T ] P R \ U T ] W [ P V Q N L P T ] L M
L a U M R Q L M T Q K R Q a M L X [ V U T R P U _ l R S [ U W M L \ U e N T Q N P ^ l R S [ U T b J
d L M \ [ S R x
W L M \ [ S R R S _ R Z T Y U ^ N P T _ N Q K R P U c [ R S T N ^ P y h | b
J Y [ N S Q j N P W L M \ [ S R R P R \ U X R P X T Q L M U X a M L V U X [ M U Q K R Q
d [ P V Q N L P x
a U M W L M \ T R T a U V N W N V L a U M R Q N L P R P X M U Q [ M P T R l R S [ U b
T U X N W Z L [ k P L _ Q K U M U T [ S Q Z L [ _ R P Q R W L M \ [ S R Q L a M L X [ V U
Y Z X U Q U M \ N P N P ^ Q K U l R S [ U L W R V U S S L P _ K N V K Q K U W L M \ [ S R
w L R S T U U k N P ^ x
X U a U P X T b
[email protected]
w M N X S N P U T x K U K L M N O L P Q R S R P X l U M Q N V R S S N P U T L P Q K U _ L M k T K U U Q b
J W [ P V Q N L P Q K R Q Q U T Q T Q K U V L P Q U P Q L W Q K U V U S S ] a U M W L M \ T R
V R S V [ S R Q N L P ] R P X X N T a S R Z T R l R S [ U L M Q U e Q Y R T U X L P _ K U Q K U M
d W [ P V Q N L P x
Q K U Q U T Q N T Q M [ U L M W R S T U b
R Y U S x L _ Q N Q S U L M V L S [ \ P Q N Q S U b
U ^ U P X x J Y L e V L P Q R N P N P ^ Q K U P R \ U L W U R V K X R Q R T U M N U T N P R V K R M Q b
J W [ P V Q N L P x N T a S R Z T Q K U K N ^ K U T Q l R S [ U N P R M R P ^ U b
W [ P V Q N L P x ¡ ¢ £ ¤ ¥ ¦ ¡ § ¨ ¦ ¤ © ¢ ¡ ª ¦ « ¢ ¬ ¢ « ¦ ®
ª « ³ ¤ § « ´ µ ¦ ¶ ¤ § ¦ « ¤ ¦ ¬ ¤ ¥ ¦ £ ¤ ¦ · ¶ ¢ ¤ ¦ « ¢ ³ ¦ ¡ ¡ « ¤ ¥ ¦ ¨ § ¬ ¸ ¥ ¦ ¦ ¤ ®
¯ ° ± ²
» « « ¤ ¦ ¬ ¢ ³ ¤ © ¦ ³ ¥ ¢ ¬ ¤ ¤ ¥ ¢ ¤ ¬ § © ¶ ¦ ¤ ¥ ¦ ª ¦ ¬ ¨ ¤ ¥ ¨ ¢ £ ¤ §
¬ ¢ ¥ ³ ¢ ¡ ¡ £ ¢ « ¢ ¡ £ ¼ ¦ ¶ ¢ ¤ ¢ ½ £ © ¢ ¬ £ « ¤ ¥ ¦ ¦ ¡ ¶ ¢ « ¶ ³ ¢ ¤ ¦ § ¬ ¦
© § ¤ º ¥ ¢ ¬ ¤ ´
²
¹
¤ § ¬ ¦ ¦ « ¤ ¶ ¦ ¬ ¦ « ¤ © ¦ ¨ ®
² ²
» « « ¤ ¦ ¬ ¢ ³ ¤ © ¦ ¨ § ¬ ¸ ¥ ¦ ¦ ¤ ¤ ¢ ½ ¡ ¦ ¤ ¥ ¢ ¤ ª · · ¢ ¬ ¼ ¦ ¶ ¢ ¤ ¢ ª « ¢
¦ ¡ ¦ ³ ¤ ¦ ¶ § ¬ · ¢ ¤ ¢ « ¶ ³ ¢ ¡ ³ ª ¡ ¢ ¤ § « ® ¿ ¤ ³ ¢ ¡ ¡ ¦ ¶ ¢ © § ¤ ¤ ¢ ½ ¡ ¦
²
© § ¤ ¾ ¢ ½ ¡ ¦ ´
¹
½ ¦ ³ ¢ ª ¦ £ § ª ³ ¢ « ¬ ¦ ¢ ¬ ¬ ¢ « ¦ ¤ ¥ ¦ ¤ ¢ ½ ¡ ¦ ¤ ¬ ª ³ ¤ ª ¬ ¦ ¢ ¬ § ª « ¶ ¤ ¥ ¦
¶ ¢ ¤ ¢ ®
¬ § ¤ ¦ ³ ¤ ¦ ¶ ³ ¦ ¡ ¡ ´ º ¦ ¡ ¡ ¤ ¥ ¢ ¤ £ § ª ³ ¢ « « § ¤ ³ ¥ ¢ « ¦ ®
¹
¦ ¬ ¦ § ¤ ¨ § § ¬ · § ¬ ¦ ¢ ¶ Â ¢ ³ ¦ « ¤ ³ ¦ ¡ ¡ « ¢ ³ § ¡ ª · « § ¬ ¬ § ¨ § ¬ ¢
²
¢ « ¦ ´ Á
À
¬ ¦ ³ ¤ ¢ « ª ¡ ¢ ¬ ¬ § ª § ³ ¦ ¡ ¡ ®
²
¦ ¦ ¬ ¦ « ³ ¦ ´ » ³ ¦ ¡ ¡ ¢ ¶ ¶ ¬ ¦ ª ¦ ¶ « ¢ § ¬ · ª ¡ ¢ ®
À ² ²
¦ ¡ ¢ ¤ © ¦ ³ ¦ ¡ ¡ ¬ ¦ ¦ ¬ ¦ « ³ ¦ ´
À ²
¿ « § ¬ · ª ¡ ¢ Ã ¢ ¬ ¦ ¦ ¬ ¦ « ³ ¦ ¤ § ¤ ¥ ¦ ¢ ¶ ¶ ¬ ¦ § ¢ « § ¤ ¥ ¦ ¬ ³ ¦ ¡ ¡ «
² ² ²
[email protected]
¬ ¦ ¡ ¢ ¤ § « ¤ § ¢ ³ ¦ ¡ ¡ ¤ ¥ ¢ ¤ ³ § « ¤ ¢ « ¢ § ¬ · ª ¡ ¢ ®
²
¦ ³ ¢ ¡ ¨ § ¬ ¸ ½ § § ¸ § ¬ ¨ § ¬ ¸ ¥ ¦ ¦ ¤ £ § ª ³ ¢ « ³ ¬ ¦ ¢ ¤ ¦ ¢ « ¶ ¤ ¥ ¦ « ª ¦
¾ ¦ · ¡ ¢ ¤ ¦ ´ Á
¢ ¢ ¢ ¤ ¤ ¦ ¬ « ¤ § ³ ¬ ¦ ¢ ¤ ¦ « ¦ ¨ Ã · ¡ ¢ ¬ ¨ § ¬ ¸ ½ § § ¸ § ¬ ¨ § ¬ ¸ ¥ ¦ ¦ ¤ ®
µ « ¬ § ¤ ¦ ³ ¤ ¦ ¶ ³ ¦ ¡ ¡ ´ º ¦ ¡ ¡ ¨ ¥ § ¦ © ¢ ¡ ª ¦ £ § ª ³ ¢ « ³ ¥ ¢ « ¦ ¢ ¤ ¢ « £ ¤ · ¦ ®
» ¦ ¤ § ¬ § ¨ Ã ³ § ¡ ª · « Ã ¢ « ¶ ³ ¦ ¡ ¡ « ¨ ¥ ³ ¥ £ § ª ¤ § ¬ ¦ ¢ « ¶
²
· ¢ « ª ¡ ¢ ¤ ¦ ¶ ¢ ¤ ¢ ® ¦ © ¦ ¬ ¢ ¡ ¨ § ¬ ¸ ¥ ¦ ¦ ¤ ³ ¢ « ¢ ¦ ¢ ¬ « § « ¦
§ ¬ ¸ ¥ ¦ ¦ ¤ ´ Á
±
¨ § ¬ ¸ ½ § § ¸ Ã ¢ « ¶ £ § ª ³ ¢ « ¨ ¤ ³ ¥ ¢ · § « ¤ ¥ ¦ · ¦ ¢ ¡ £ ½ £
³ ¡ ³ ¸ « ¤ ¥ ¦ ¬ ¤ ¢ ½ ¨ ¤ ¥ ¤ ¥ ¦ · § ª ¦ ®
» ¡ « ¦ Ã ª ª ¢ ¡ ¡ £ ¥ § ¬ ¼ § « ¤ ¢ ¡ Ã ¢ ¡ § « ¤ ¥ ¦ ½ § ¤ ¤ § · § ¢ ³ ¥ ¢ ¬ ¤ ® ¾ ¥ ¦
²
Ï ¢ Ï ¥ § ¨ ¤ ¥ ¦ ¡ ¢ ½ ¦ ¡ § ¬ ¤ ¥ ¦ ¶ ¢ ¤ ¢ ¦ ¬ ¦ ® » ¡ § ³ ¢ ¡ ¡ ¦ ¶ ¤ ¥ ¦
¢ Ï ´
Î ²
Í Î
¥ § ¬ ¼ § « ¤ ¢ ¡ ¢ Ï ®
» ¡ « ¦ Ã ª ª ¢ ¡ ¡ £ © ¦ ¬ ¤ ³ ¢ ¡ Ã ¢ ¡ § « ¤ ¥ ¦ ¡ ¦ ¤ ¶ ¦ § ¢ ³ ¥ ¢ ¬ ¤ ® ¾ ¥ ¦ £
² ² Î
¢ Ï ´
Ð Î
¢ Ï ¥ § ¨ ¤ ¥ ¦ © ¢ ¡ ª ¦ § ¬ ¤ ¥ ¦ ¶ ¢ ¤ ¢ ¦ ¬ ¦ ®
²
¢ ¬ ¤ »
¹
® ¢ « ¦ ¡ ¦ ³ ¤ ¬ § « ³ ¬ ¦ ¢ ¶ ¥ ¦ ¦ ¤ ³ § « ¤ ¢ « « Ñ Ò Ó ³ § ¡ ª · « ½ £ Ô Ó Õ Ö × ¬ § ¨ ® »
« ¡ ¦ ¬ ¦ ¢ ¶ ¥ ¦ ¦ ¤ ¤ ¥ ¢ ¤ ³ § « ¤ ¢ « ¬ § ¨ ¢ « ¶ ³ § ¡ ª · « § ¶ ¢ ¤ ¢ ® » ¦ ¤ § ¬ § ¨ Ã
² ²
³ § ¡ ª · « ¢ « ¶ ³ ¦ ¡ ¡ « ¨ ¥ ³ ¥ £ § ª ¤ § ¬ ¦ ¢ « ¶ · ¢ « ª ¡ ¢ ¤ ¦ ¶ ¢ ¤ ¢
® ª ª ¢ ¡ ¡ £ ¤ ¥ ¦ « ¤ ¦ ¬ ¦ ³ ¤ § « § ¢ ¬ § ¨ ¢ « ¶ ¢ ³ § ¡ ª · « ® ¿ ¤ ¥ ¦ ¡ § ³ ¢ ¤ § « § ¢
² ²
³ ¦ ¡ ¡ § « ¢ ¨ § ¬ ¸ ¥ ¦ ¦ ¤ ¢ « ¶ ¶ ¦ « ¦ ¶ ½ £ ¤ ¥ ¦ ³ § ¡ ª · « ¡ ¦ ¤ ¤ ¦ ¬ ¢ « ¶ ¤ ¥ ¦ ¬ § ¨ « ª · ½ ¦ ¬ ® Ø ® ®
²
³ ¦ ¡ ¡ » Ô ¨ ¥ ¦ ¬ ¦ ³ § ¡ ª · « » ¢ « ¶ § ¨ Ô « ¤ ¦ ¬ ¦ ³ ¤ ®
À
® ¢ ¦ ¤ § « ¤ ¬ ª ³ ¤ § « ¤ ¥ ¢ ¤ £ § ª ¦ « ¤ ¦ ¬ « ¢ ³ ¦ ¡ ¡ ¤ § ¦ ¬ § ¬ · « ª · ¦ ¬ ³
² ²
³ ¢ ¡ ³ ª ¡ ¢ ¤ § « Ù » Ô Ú Û Ô
© ® Ü ³ ª ¬ § ¬ Ý » ¥ ¥ ¡ ¥ ¤ ¦ ¶ ¬ ¦ ³ ¤ ¢ « ¡ ¦ ¢ ¬ § ª « ¶ ¢ ³ ¦ ¡ ¡ ¤ ¥ ¢ ¤ « ¶ ³ ¢ ¤ ¦ ¤ ¥ ¦
¢ ³ ¤ © ¦ ³ ¦ ¡ ¡ ®
© ® ¢ « « ¤ ¦ ¬ ¦ ³ ¤ § « § ¢ ¬ § ¨ ¢ « ¶ ³ § ¡ ª · « Ã ¤ ¥ ¦ · ¢ ¡ ¡ ¦ ¤ ¦ ¡ ¦ · ¦ « ¤ « ¨ ¥ ³ ¥ £ § ª ³ ¢ «
²
¦ « ¤ ¦ ¬ ¶ ¢ ¤ ¢ ®
¢ ¬ ¤ Û
¹
® ¤ ¦ Ï ¤ ¤ ¥ ¢ ¤ ¢ ¦ ¢ ¬ ¢ ¤ ¤ ¥ ¦ ½ § ¤ ¤ § · § ¦ © ¦ ¬ £ ¢ ¦ « ¢ ¶ § ³ ª · ¦ « ¤
²
® ¤ ¥ ¢ ¤ ¢ ¦ ¢ ¬ ¢ ¤ ¤ ¥ ¦ ¤ § § ¦ © ¦ ¬ £ ¢ ¦ § ¢ ¶ § ³ ª · ¦ « ¤ ¨ ¥ ¦ « ¤ ¬ « ¤ ¦ ¶ ®
² ²
Ä Å Æ Ç È É Ê Ë Ì É
[email protected]
® ß Ô ¨ § ¬ ¶ ¬ § ³ ¦ « ª « ³ ¤ § « ¨ ¥ ³ ¥ ¦ ¢ ¬ ³ ¥ ¦ § ¬ ¢ « ¶ ³ § ¬ ¬ ¦ ³ ¤
² ²
SHOOLQJVE\FRPSDULQJDGRFXPHQW¶VZRUGVZLWKWKRVHLQEXLOW
· « ¦ ¡ ¡ «
Î
¶ ³ ¤ § « ¢ ¬ £ ®
© ® ¢ ¤ £ ¡ ¦ ¢ « ¶ ¼ ¦ § ¤ £ ¦ ¦ ® ¾ · ¦ ¦ ¨ § · ¢ « Ã Ô Ñ § « ¤ ¢ ¦ ¤ § ¢ ¡ ¡
² ¯ À ²
¤ ¥ ¦ ³ ¥ ¢ ¬ ¢ ³ ¤ ¦ ¬ ¢ © ¢ ¡ ¢ ½ ¡ ¦ « § « ¦ ¤ £ ¦ ¢ ³ ¦ ¢ « ¶ ¼ ¦ Ã « ³ ¡ ª ¶ « ª ¦ ¬ ³ ¢ ¦ ¢ « ¶
²
¡ § ¨ ¦ ¬ ³ ¢ ¦ ¡ ¦ ¤ ¤ ¦ ¬ Ã ª « ³ ¤ ª ¢ ¤ § « Ã ¢ « ¶ « ª · ¦ ¬ ¢ ¡ ®
WKHSRVLWLRQRIOLQHVLQDSDUDJUDSKLQUHODWLRQWRWKHGRFXPHQW¶VOHIW
© ®
¢ « ¶ ¬ ¥ ¤ · ¢ ¬ « ® ¦ ® ¨ ¥ ¦ ¤ ¥ ¦ ¬ ¤ ¥ ¦ £ ¢ ¬ ¦ ¡ ¦ ¤ ¢ ¡ « ¦ ¶ Ã ³ ¦ « ¤ ¦ ¬ ¦ ¶ Ã ¬ ¥ ¤ ¢ ¡ « ¦ ¶ § ¬
² Î Î
 ª ¤ ¦ ¶ ®
²
à á â ã ä å ã â æ ç è é ê ä å ë ì
¢ í ¢ · ¦ ¢ « £ Ñ ¨ § ¬ ¶ ¬ § ³ ¦ « ¢ ³ ¸ ¢ ¦ í
¯
½ í ¥ ¢ ¤ ¢ ¦ ½ ¬ ¦ ¢ ¸ « ¨ § ¬ ¶ ¬ § ³ ¦ « ¢ « ¶ ¨ ¥ £ ¤ ª ¦ ¶
±
³ í î § ¨ ¶ § £ § ª ¢ © ¦ ¢ ¡ ¦ § « ¢ ¡ § £ ¶ ¸ ª « ¤ ¥ ¦ ¨ § ¬ ¶ ¬ § ³ ¦ § ¬ £ § ª ¥ ¢ © ¦
² ²
¤ ª ¶ ¦ ¶ ï
¶ í î § ¨ ¶ § £ § ª ª « ¶ ¦ ¬ ¡ « ¦ ¢ ½ ¡ § ³ ¸ § ¬ ¦ © § ª ¡ £ ¤ £ ¦ ¶ ¤ ¦ Ï ¤ ª « ¤ ¥ ¦ ¨ § ¬ ¶ ¬ § ³ ¦ § ¬
²
£ § ª ¥ ¢ © ¦ ¤ ª ¶ ¦ ¶ ï
¦ í Ø Ï ¡ ¢ « ¤ ¥ ¦ ¶ ¦ ¬ ¦ « ³ ¦ ½ ¦ ¤ ¨ ¦ ¦ «
² ²
í ¢ © ¦ ð ¢ © ¦ ¢
í º § £ ð ³ ª ¤
í ¦ ¡ ¦ ¤ ¦ ð ½ ¢ ³ ¸ ¢ ³ ¦
© í § ¬ ¤ ¬ ¢ ¤ ð ¡ ¢ « ¶ ³ ¢ ¦
¹
© í ¾ § ¡ ¦ ³ ¢ ¦ ð ª ¦ ¬ ³ ¢ ¦
ñ ò ó ô õ ö ÷ ñ ø ù ö ú û ü ý õ ô ñ ò ó ü ñ
ñ ñ ò þ ÿ õ ø ñ ø ù ö ú û ü ý õ ô ñ ñ ò ñ ù ÷ ü ñ
ñ ñ ñ ò õ ö ô ñ ø ù ú û ü ý õ ô û ô ú ñ ü õ ñ ñ ñ ò
û ü õ ü ñ
ñ ò õ ø ö ñ ø ù ö ú ñ ü õ û ô ú û ü ý õ ô ñ ò
ô ö ù
ò ó ô õ ö ÷ ñ ø ù ö û ô ÷ ÷ ú û ô ö ú ñ ü õ û ô ú û ü ý õ ô ò û ö ý ñ ø ù ñ ø ý û
ñ ò ó û ÿ ú ñ ü õ ú ô û û ø õ ú û ü ý õ ô ÷ û ö ø û ÷ õ ô ñ ò ÷ ÷ ñ ø ù ý û ø ö û ÿ ÷ õ ô
ñ ñ ò û õ ö ú ñ ü õ ú ô û û ø õ ú û ü ý õ ô ÷ û ö ø û ÷ õ ô ñ ñ ò ÿ ÷ ñ ø ù ô õ ü õ ñ ø
ñ ñ ñ ò
õ ü õ ÷ ñ ø ù ö ú ñ ü õ û ô ú û ü ý õ ô ñ ñ ñ ò
ñ ò ô ô ö ø ù õ ñ û ø û ø ÷ õ ý õ ÷ û ÿ
ò ó ö ø ù õ ô õ õ ø ö õ ô
) $ " # * ! $ $ $ ! # ! # +
, - + . ! $ / %
, - 0 - ! 1 2 ! # +
Ä Å Æ Ç È Þ Ê Ë Ì É
[email protected]
ò þ ÿ õ ø ñ ø ù ö ñ ô û û ú ÷ ý û ? õ ø ÷ ò ý ý ñ ø ù û ü ? ø ÷ û ö
= > G
û ô ý ÿ ô û ù ô ö ú û ô ÷ ÿ ñ ø ù ò ñ ÷ K û ô ý ÷ ö ü õ
= @
ò ö ñ ø ù ö ý û ? õ ø ÷ ò ö õ ö ý û ? õ ø ÷ ò
õ ü õ ÷ ñ ø ù ô û û ú ö ÷ ö ü õ
> = A > I
ò õ ÷ ô ñ õ ñ ø ù ö ý û ? õ ø ÷ ò ó û ÿ ö ý û ? õ ø ÷ û ô ö ò
õ ü õ ÷ ñ ø ù û ü ? ø û ú ö
@ = @ J
B
ò õ ÷ ÷ ñ ø ù ü ö ø ý ö ÿ õ û ô û ô ý ÷ ö ü õ
A
ÿ û ô ÷ ô ö ñ ÷ û ô ñ õ ø ÷ ö ÷ ñ û ø ò
û ? ü õ ü ñ ø õ ÿ ö ñ ø ù ò ö ý ñ ø ù ö ÷ ö ü õ
= D @ =
ò C ô ñ ø ÷ ÿ ô õ ñ õ ò H ø õ ô ÷ ö õ ö ý õ ô ò õ ô ù ñ ø ù õ ü ü û ú ö ÷ ö ü õ
= @ >
B F
ò E û ô ö ÷ ÷ ñ ø ù ÷ õ ÷ ñ ø ÷ û ò H ø õ ô ÷ ÿ ö ù õ ø ? õ ô ò ÿ ü ñ ÷ ÷ ñ ø ù õ ü ü
D = G @ @
ñ ÷ ö ü ñ ò ö õ ö ý û ? õ ø ÷ û ø ÷ û ö ò ó ö ø ù ñ ø ù ÷ õ ÷ ý ñ ô õ ÷ ñ û ø
= I @ A
ò õ ÷ ÷ ñ ø ù ü õ ú ÷ ö ø ý ô ñ ù ÷ ú ü û ÿ ÿ ý ñ
ò H ø õ ô ÷ ñ ø ù ý ô û ÿ ö ÿ
@
F B
ö ô ù ñ ø ò ö ñ ü õ ô ù õ ò M ö ñ ø ù û ü ? ø û ø ö
> J @ D >
ò H ø õ ô ÷ ñ ø ù ö õ ö ý õ ô û ô ö ò L ? ÷ ñ ú ñ ø ù ÷ õ ÷ û ô ý ý û ? õ ø ÷
G > =
ú û û ÷ õ ô ò H ø õ ô ÷ ñ ø ù ? ü ü õ ÷ ò N û ô ý õ ô ñ ø ù ö ø ý ö ý ñ ø ù ö
> > @
F
ò þ ÿ õ ø ö ý û ? õ ø ÷ ñ ò H ø ý õ ø ÷ ñ ø ù ÷ õ ÷ ÿ ö ô ö ù ô ö ÿ
I > @
ö õ õ ø ö õ ý õ ú û ô õ ò û ñ ø ù ö ü û
û ú ÷ õ ÷ ò ó ö ø ù õ ö õ û ú ö û ô ý
> A @ G
ò H ø õ ô ÷ ö ÿ ñ ÷ ? ô õ ò ó û ÿ ñ ø ù ö ü û
û ú ÷ õ ÷
= J >
B
O P
û ñ ø ù ö û ô ý ú ñ ü õ ñ ÷
ò H ø õ ô ÷ ö ÷ ö ü õ ò ó ô õ ö ÷ ñ ø ù ö ÷ ö ü õ
= = > D
ö ÿ ö û ô ý
ò C ô ñ ø ÷ ñ ø ù ö û ô ý ò ý ý ñ ø ù ô û ÷ û ö ÷ ö ü õ
= > >
F
Q R S T U V W X
Y Z ( # [ \ ! * # ! " $ % * # ! $ 0 ! ] ^ + $ / _
Y * Z % " ! ! 1 $ + # $ %
) 2
) ) - ] ` + $ / % _
Y Z % " ! ! 1 $ + # 1 ! $ $ !
) a ! " $ # $
) ) b $ $ # $
) ) ) c % # $ #
) d . ! 1
d e $ % ] ` + $ / % _
Q R S T U V W X
Y Z ( " $ ! $ % ] + $ / _
O
Y * Z f g " $ ! , * [ $ % ] g + $ / _
Y Z . % 1 ! $ $ ! h ] ` + $ / _
Y Z % " ! ! 1 1 ! $ $ ! $ +
i # " !
b $ $ # $
a ! " $ # $
, b $
) e $ ! ] ` + $ / % _
Q R S T U V W X
$ " [ % " ! ! 1 $ + # $ %
3 4 5 6 7 8 9 : ; <
[email protected]
Y Z , Y Z - , $ " $
Y * Z 2 Y + Z 2 ! $
Y Z f Y Z * ! # $ " $
Y Z . % " [ Y ! Z r $ " $
Y Z f * Y Z . ! $ / * ! ! /
Y " Z l m n 2 c ) e n Y s Z o ! /
Y Z o - p b Y $ Z -
Y % Z l ! $ + # Y Z p $ !
Y Z 2 $ Y Z l $ 0
Y q Z . ! $ / % Y # Z + * % $
Y / Z 2 $ " $ Y , Z - ! 1 t ! # +
] & + $ / % _
Q R S T U V W X
$ " [ % " ! ! 1 $ + # . ! $ $ !
Y Z e $ % Y + Z ! $ $
Y * Z b $ Y Z #
Y Z l ! ! $ Y ! Z b $ $ # $
Y Z c r p f c Y Z a c c m a -
Y Z a % / $ Y s Z ) !
Y " Z l e n c Y $ Z a ! " $ # $
Y Z c a c e p a Y Z . ! 1 u e $ % 2 ! $ !
Y % Z r + $ Y Z . ! 1
Y Z l ! [ Y # Z c % # $ #
Y q Z i # " ! Y , Z l ! $ + * $
Y / Z . ! $ 1 $ Y 1 Z a $ * $
Y Z ! Y Z 2 $ +
] & + $ / % _
Q R S T U V W X
Y Z ( " 1 ! $ $ ! ! $ t , + ] ` + $ / _
Y * Z f ! 1 g " $ ! , * [ 1 ! $ $ ! ! $ ] g + $ / _
Y Z o , # * $ + u % $ % * $ * % " ! ! 1 + 1 ! $
$ !
Z c % # ! + + ! , + ! " [ ! % 1 v 1 % ! #
$ % $ / [
HUHQW³KDQGZULWLQJV´LQDFRPSXWHU
Z ( " "
Z f ] & + $ / % _
3 4 5 6 7 k 9 : ; <
[email protected]
Y Z ( " $ % , + ] ` + $ / _
Y Z o , % " " $ * 1 $ % t 1 ! $ / % ] ` + $ / _
Y " Z o , # * 1 ! $ u % $ % * $ * % " ! ! 1 $ % $ +
) 2 ] ` + $ / _
) ) b $ ! [ ] ` + $ / _
) ) ) 2 $ $ + ! [ ! " 1 ! $ / % ! ! + # $ ] ` + $ / _
Y Z ( " % $ + e $ a [ + ] + $ / _
O
Y * Z a [ \ " # ! ! " ! $ [ + ] \ + $ / _
Y Z a [ + ! " e $ [ + Y # % . ! 1 " + [ Z
O
] + $ / _
O
Y Z ( " % " ! ! 1 . ! 1 e $ a [ + * $ + w
( / !
) !
c / * $
, . ! 1
, 2 1 ! 1 ] ` + $ / % _
% " ! ! 1 * * $ , !
x y z { z | y y y
}
y ~ { ~ z y | y ª y |
y y y ~ ¥ y ª | ¥
y y y y | |
y | y { y { y {
¡ ¡
y | y y { y
¢ ¢
y { y y y ~ ~ ~
¡ ¨ £ £
y | y | y | y «
¢ ¤ ¤
y { { y y y « | {
£ ¦ ¦
y | y ¥ y y { ¥
¤ ¨ ¨
y ~ { y § z y x x x y
¦
} } }
y z { y y y |
¨
y ~ { x x y © y |
} }
¬ ®
y y y « x ¯
Q R S T U V W X
% " ! ! 1 $ + v , + 1 % $ *
Z °
9 ± ² ³ ´ 6 µ ² 6 µ ¶ ² · 6 µ 4 ¸ ¹
* Z
3 µ 9 5 µ 4 ±
Z º
¸ ³ 6 ´ 9 9 ´ ·
Z °
9 ± ² ³ ´ 6 µ
Z »
4 µ ¼ ½ 4 µ 6
" Z ¾
9 : ´ ½ 4 µ 6
Z ¿
² 6 µ 4 ´ ¶ À 5 ¹ Á ¹ ´ 6 ±
% Z Â
² ² ¸ ¶ Ã 4 ´ ¶ 9 À ¹ 9 : ´ ½ 4 µ 6
Z Ä
´ ¶ ¸ ¶ ´ Á ¹ 9 : ´ ½ 4 µ 6
q Z Å
4 Ã · ¶ À 6 ¸ 4 À 5 ³ 4 5 6 Æ
/ Z Ç Â Å ] ` ' + $ / _
4 À ¼ 9 ± Ã Ã 6 ¹ ¹ 6 ± 9 µ Á
3 4 5 6 7 7 9 : ; <
[email protected]
Ñ Ò Ó Ô Õ Ö × Ø
Ù Ú Û Ü Ý Þ ß à á â ã ä Ü Ü ä å Þ ß æ à â ç è é Ý é ê é â ë Þ ß å ä ç ë Û ç ä ì â é é Þ ß æ ä ç é Û ç â Ý ë é á â â à
Ý í î â ß ê
í ð ä ä à â ç
ì í ñ ä ã à ç â à ê ç ß
ë í Ù ë Þ à
â í ò â Ü Ü
ã í ó Ý â Ü
æ í ò á Ý ç à
á í î Ý Þ Ü è â ç æ â
Þ í ô ç Þ ß à Û ç â õ Þ â å
í ÷ ä ç ø é á â â à ù ú û è Ý ç ø é â Ý ì á ü
Ñ Ò Ó Ô Õ Ö × Ø
ý ï ï
Ý í þ Þ é ì ê é é Ý ß ÿ Û ä é é Þ Ü â ê é â é ä ã é Û ç â Ý ë é á â â à é Þ ß Ý ê é Þ ß â é é ä ç æ Ý ß Þ Ý à Þ ä ß ù ú è Ý ç ø é ü
ý ï
í Ù Ú Û Ü Ý Þ ß à á â ã ä Ü Ü ä å Þ ß æ à â ç è é Ý é ê é â ë Þ ß é Û ç â Ý ë é á â â à é
á â Þ ß à â ç é â ì à Þ ä ß ä ã Ý ç ä å Ý ß ë Ý ì ä Ü ê è ß ä ß Ý é Û ç â Ý ë é á â â à Þ ß å á Þ ì á ë Ý à Ý
ì Ý ß â â ß à â ç â ë ù
ñ â ç Þ â é ä ã à å ä ä ç è ä ç â Ý ë Ý ì â ß à ì â Ü Ü é Þ ß Ý ì ä Ü ê è ß ä ç ç ä å ä ç Ý
ç â ì à Ý ß æ ê Ü Ý ç æ ç ä ê Û ä ã ì â Ü Ü é ù
ù ú û è Ý ç ø é â Ý ì á ü
ì í Ù Ú Û Ü Ý Þ ß à á â ã ä Ü Ü ä å Þ ß æ à â ç è é Ý é ê é â ë Þ ß Ý å ä ç ë Û ç ä ì â é é Þ ß æ
é ä ã à ç â à ê ç ß Þ é â ß à â ç â ë Ý ê à ä è Ý à Þ ì Ý Ü Ü ÿ ÿ Ý å ä ç ë Û ç ä ì â é é ä ç é å ä ç ë å ç Ý Û
ã â Ý à ê ç â å á â ß à á â à â Ú à ç â Ý ì á â é à á â â ß ë ä ã à á â Ü Þ ß â ù à Þ é ì ä ß à ç Ý é à â ë å Þ à á Ý
á Ý ç ë ç â à ê ç ß å á Þ ì á Þ é ê é â ë Û ç Þ è Ý ç Þ Ü ÿ à ä â æ Þ ß Ý ß â å Û Ý ç Ý æ ç Ý Û á ù Ü Þ à à Ü â
ø ß ä å ß ã â Ý à ê ç â ä ã î Þ ì ç ä é ä ã à ÷ ä ç ë Ý ß ë Û â ß ã ã Þ ì â ù ù ù ù
ï ï
î Ý ë â ÿ Û ç â é é Þ ß æ à á â ç â à ê ç ß ä ç â ß à â ç ø â ÿ ä ß à á â ø â ÿ ä Ý ç ë ù á Ý ç ë
ç â à ê ç ß ä ç ì Ý ç ç Þ Ý æ â ç â à ê ç ß ì ç â Ý à â é Ý Ü Þ ß â ç â Ý ø Ý ß ë Þ ë â ß à Þ ã Þ â é à á â â ß ë ä ã
Ý Û Ý ç Ý æ ç Ý Û á ù
ô ç ä õ Þ ë â é Ý Ü Þ é à Þ ß æ ä ã å ä ç ë é Ý ß ë à á â Þ ç é ÿ ß ä ß ÿ è
ç â Ü Ý à â ë å ä ç ë é ù
ê Þ ë â à ä ê é â ä ã à â ç è é é á ä å Þ ß æ ç â Ü Ý à Þ ä ß é á Þ Û é â à å â â ß à á â è ã ä ç à á â
Û ê ç Û ä é â ä ã Û ç ä õ Þ ë Þ ß æ é à Ý ß ë Ý ç ë Þ â ë ì ä ß à ç ä Ü Ü â ë õ ä ì Ý ê Ü Ý ç ÿ ã ä ç
Þ ß ã ä ç è Ý à Þ ä ß é à ä ç Ý æ â Ý ß ë ç â à ç Þ â õ Ý Ü
ß à ÿ Û â é â à à Þ ß æ Ý å Þ ë ä å ä ì ì ê ç é å á â ß à á â è Ý ä ç Þ à ÿ ä ã Ý Û Ý ç Ý æ ç Ý Û á
Ý Û Û â Ý ç é ä ß ä ß â Û Ý æ â å Þ à á à á â Ü Ý é à Ü Þ ß â ä ã à á Ý à Û Ý ç Ý æ ç Ý Û á ã Ü ä å Þ ß æ à ä à á â
à ä Û ä ã à á â ã ä Ü Ü ä å Þ ß æ Û Ý æ â ù ù ù ù
È É Ê Ë Ì Í Î Ï Í Ð
[email protected]
á â Ü Ý é à Ü Þ ß â ä ã Ý Û Ý ç Ý æ ç Ý Û á Ý à à á â à ä Û ä ã Ý Û Ý æ â ä ã à â Ú à ù
ß à ÿ Û â é â à à Þ ß æ Ý ß ä ç Û á Ý ß Þ é à á â ã Þ ç é à Ü Þ ß â ä ã Ý Û Ý ç Ý æ ç Ý Û á Ý Û Û â Ý ç Þ ß æ ä ß
Þ à é ä å ß Ý à à á â ä à à ä è ä ã Ý Û Ý æ â å Þ à á à á â ç â è Ý Þ ß Þ ß æ Û ä ç à Þ ä ß ä ã à á â
Û Ý ç Ý æ ç Ý Û á Ý Û Û â Ý ç Þ ß æ ä ß à á â ã ä Ü Ü ä å Þ ß æ Û Ý æ â ù á â ã Þ ç é à Ü Þ ß â ä ã à á â
ï ï
Û Ý ç Ý æ ç Ý Û á å Ý é Ü â ã à â á Þ ß ë ÿ à á â ç â è Ý Þ ß Þ ß æ Û ä ç à Þ ä ß ä ã à â Ú à ù ù ù ù
ó Þ ß â ä ã à ÿ Û â ä ß Þ à é ä å ß Ý à à á â ä à à ä è ä ã Ý Û Ý æ â ù
ú û è Ý ç ø é â Ý ì á ü
Ñ Ò Ó Ô Õ Ö × Ø
Ý í þ â ã Þ ß â Ý ß â Ü â ì à ç ä ß Þ ì é Û ç â Ý ë é á â â à ù ú è Ý ç ø é ü
ý ï ï
í ó Þ é à ã Ý ì Þ Ü Þ à Þ â é Û ç ä õ Þ ë â ë ÿ Ý é Û ç â Ý ë é á â â à ù ú è Ý ç ø é ü
ì í ÷ á Ý à Þ é å ä ç ë Û ç ä ì â é é Þ ß æ ú û è Ý ç ø é ü
ë í Ù Ú Û Ü Ý Þ ß à á â ã ä Ü Ü ä å Þ ß æ å ä ç ë Û ç ä ì â é é Þ ß æ à â ç è é
ö ý ï ö
Ý ù ß à ÿ Û â é â à à Þ ß æ ê é à Þ ã Þ ì Ý à Þ ä ß ì Ý ß Ý Ü é ä â ç â ã â ç ç â ë à ä Ý é ã ê Ü Ü ê é à Þ ã Þ ì Ý à Þ ä ß í Þ é
à á â à ÿ Û ä æ ç Ý Û á Þ ì Ý Ü Þ æ ß è â ß à é â à à Þ ß æ ä ã à â Ú à ä ç Þ è Ý æ â é å Þ à á Þ ß Ý ì ä Ü ê è ß ä ç
è â Ý é ê ç â à ä Ý Ü Þ æ ß Ý Ü ä ß æ ä à á à á â Ü â ã à Ý ß ë ç Þ æ á à è Ý ç æ Þ ß ù â Ú à é â à à á Þ é å Ý ÿ
ï ö
Þ é é Ý Þ ë à ä â ê é à Þ ã Þ â ë ù
ù á â Ý Ü Þ æ ß è â ß à ä ã à â Ú à Þ ß Ý Û Ý ç Ý æ ç Ý Û á é ä à á Ý à à á â è Ý ç æ Þ ß é Ý ç â Ý Ü Ü é à ç Ý Þ æ á à ä ß
ï ö
à á â ç Þ æ á à é Þ ë â ä ç à á â Ü â ã à é Þ ë â ä ç ä à á ù Ù ù æ ù à á Þ é à â Ú à Þ é Ü â ã à ê é à Þ ã Þ â ë ù
ù Ý ç ë ç â à ê ç ß
ù ñ ä ã à ç â à ê ç ß
â Ú à à á Ý à Ý Û Û â Ý ç é Ý à à á â à ä Û ä ã â õ â ç ÿ Û Ý æ â ä ã Ý ë ä ì ê è â ß à å á â ß Þ à Þ é
Û ç Þ ß à â ë ù
÷ á â à á â ç Û Ý æ â Þ é õ â ç à Þ ì Ý Ü Ü ÿ ä ç á ä ç Þ ä ß à Ý Ü Ü ÿ Ý Ü Þ æ ß â ë ù ð ä ç â Ú Ý è Û Ü â å â á Ý õ â Û ä ç à ç Ý Þ à
Ý ß ë Ü Ý ß ë é ì Ý Û â ä ç Þ â ß à Ý à Þ ä ß ù
ù á â è ä ë â Þ ß å á Þ ì á ì ä ß à â ß à Þ é õ Þ â å â ë å á â ç â à á â å Þ ë à á Þ é
é á ä ç à â ç à á Ý ß à á â á â Þ æ á à ù ô ä ç à ç Ý Þ à ä ç Þ â ß à Ý à Þ ä ß è Þ è Þ ì é à á â å Ý ÿ è ä é à ç â Ý ë Þ ß æ è Ý à â ç Þ Ý Ü
Þ é Û ç Þ ß à â ë â æ Ü â à à â ç é ß â å é Û Ý Û â ç é ä ä ø é ù ù ù ù
ù á â è ä ë â Þ ß å á Þ ì á ì ä ß à â ß à Þ é õ Þ â å â ë å á â ç â à á â å Þ ë à á Þ é
Ü ä ß æ â ç à á Ý ß à á â á â Þ æ á à ù ó Ý ß ë é ì Ý Û â Þ é à á â à ç Ý ë Þ à Þ ä ß Ý Ü ä ç Þ â ß à Ý à Þ ä ß ã ä ç ì ä è Û ê à â ç
õ Þ â å Þ ß æ Ý ß ë Þ é Ý Û Û ç ä Û ç Þ Ý à â å á â ß õ Þ â å Þ ß æ é Û ç â Ý ë é á â â à é õ Þ ë â ä æ Ý è â é Ý ß ë è ä õ Þ â é ù
ú û è Ý ç ø é â Ý ì á ü
Ñ Ò Ó Ô Õ Ö × Ø
ý ý ï
Ý í ì à Þ õ â ì â Ü Ü í ò â Ü Ü
È É Ê Ë Ì Î Ï Í Ð
ì í ó â æ â ß ë è í ò â Ü Ü Û ä Þ ß à â ç
ý ý ï
ë í ÷ á Ý à Þ ã Ý ß Ý Ü ÿ é Þ é ß í é ä Ü ê à â ì â Ü Ü ç â ã â ç â ß ì â
ý ï ý
â í ó Ý â Ü ä í î Þ Ú â ë ì â Ü Ü ç â ã â ç â ß ì â
ý ý ï
ã í ð ò Û í ÷ ä ç ø ä ä ø
ý ý
æ í ô í ä Ý Ü é â â ø
ý ý
á í ð ä ç è ê Ü Ý ç í Ý ß æ â
ý ý
Þ í ò â Ü Ü Ý ë ë ç â é é é í ô ç ä à â ì à â ë ì â Ü Ü é
ý ö ý
í ÷ ä ç ø é á â â à à í ð ç â â â Û Ý ß â é
ý ý ï
ø í ò â Ü Ü ç â ã â ç â ß ì â ê í Ù è â ë ë â ë ì á Ý ç à
ý ý
Ü í â Ü Ý à Þ õ â ì â Ü Ü ç â ã â ç â ß ì â õ í ä å ì ä Ü ê è ß
ç Þ â ã Ü ÿ â Ú Û Ü Ý Þ ß à á â ã ä Ü Ü ä å Þ ß æ à â ç è é Ý é ê é â ë Þ ß Ý ÷ ä ç ë Û ç ä ì â é é Þ ß æ
ý ý
Ý í ç Û á Ý ß Û í ñ ñ
ý ï ý
í â Ý ë â ç í ß ë â ß à Ý à Þ ä ß
ý ý
ì í ð ä ä à â ç ç í ñ ä ã à ç â à ê ç ß
ý ý
ë í Ù î ô ó Ù é í ÷ Þ ë ä å
ç Û á Ý ß ò ä ß à ç ä Ü
ý ý
â í ñ Û â Ü Ü ì á â ì ø â ç à í ÷ Þ ë ä å
ý ý
ã í ð ê í á â é Ý ê ç ê é
ý ý ï
æ í ñ ô ñ õ í ð ä ç è Ý à Ý ç
ý ý ï
á í î Ý Þ Ü è â ç æ â å í ñ à Ý ß ë Ý ç ë Ý ç
ý ý
Þ í ð ä ß à à ÿ Û â Ú í ò â ß à â ç Ý Ü Þ æ ß è â ß à
±
ý ö ý
í ê é à Þ ã Þ ì Ý à Þ ä ß ÿ í
! " # $ %
ø í ÷ ä ç ë å ç Ý Û
&
% ' $ ( ) * ! + ! # % $ % $
Ü í ä Ü ë
&
è í ä ç ë â ç é 1
ß í ê Ü Ü â à é
% ! # % / % " " 2 0
ä í Ý ç ë ç â à ê ç ß
3 4
# % + 5 % / - 6
7 8 9 : ; < = >
?
3 C
& @ A &
?
3
@ D
@ G &
&
' + ! / $ 0
@ I
- % ! # % / # ! , # $ ! ) 2 ' * ! - $ . " $ J . - !
&
' + $ - $ + 5 2 0
È É Ê Ë Ì Î Ï Í Ð
'LIIHUHQW³KDQGZULWLQJV´LQDFRPSXWHU 3 4
@ D &
$ ' % / $ 0 # % + 5 % / - 6
?
3 C
@ A &
?
3 C
@ G
5 , - ) ) + $ / F . $ % ' + % - B % . ! + 5 - # % + 5 6
@ G &
3 C
T U
0 V " " # % + 5 6
3 C
0 W % + / ! ' 2 # % + 5 6
3 C
U T
&
?
3 Z
@ A & Y
) $ - + # X ' + % $ 2 # 0 # % + 5 6
?
3
@ Y &
) % % $ 2 [ ) $ / ! $ ! ) % $ ! ' + % $ 2 # 0 [ # % + 5 6
? ?
Z
& @ Y & @
3 Z
# % + 5 6
@ A & & Y
I &
Y &
&
T T
&
&
^ c
% / + % $ % / ! $ 0
I I
- F % + % " " 2 ) ! $ % - F ! ! # ! ) % \ $ ! . / + $ 0 - % 5 F % + - ! . . - / -
& Y
& &
^ d
&
! - + ) ! " + / % $ F 5 ' % $ ! + % $ a 0
T T
&
^
4 g h i j
& G @ &
&
T T
& G @
2 # 0
& &
$ - _ / + ! ! ) \ $ ! . ! ' + % $ 2 # J - % - ! " $ % + % ) ! +
&
@ &
^ c
&
K L M N O P Q R O S
& &
& &
&
&
^ c
&
! ) % / - . $ ! . - ! . $ 0
& @
^ c
- " F % + , F "
3 C
# % + 5 % / - 6
* ' " % $ - ) ! " " ! . $ + # $ % " J , $ * % # ' " . - + % ' ' " / % F " 0
@ &
F e + ! + % #
&
&
' ! + % F " , / J % $ / ! $ $ / , 2 ! - $ + $ 0 0 0 0
F 0 m " ! ! - - $ % # , $ ! % + % ! / - $ ! " ! 2 # % 5 $ + % $ # ! $ ! )
&
V ! # ' +
W % + . % +
@ Y
) ! ) . % +
& @ &
X ' + % $ 2 #
@
c
` " 2 ! ) . % +
@ & &
( _ % / - $ " % $ % 0
3 C i
@ o
5 % $ ! # % / / # # ! + 2 0 # % + 5 6
K L M N O k Q R O S
p q r s t u v w x y z { s s { | u v } w y ~ t y u v | { ~ r ~ { y u v } { ~ r ~ y t x y y w
¡
¡ ¢ ¢
£
¤
¢
£
¥
¦
¡
§
¨ © ª
K L M N O S Q R O S
[email protected]
TECH TUTOR
ONE-ON-ONE COMPUTER HELP COMPUTER CLASSES
Microsoft
Excel 2016
LEVEL 1
kcls.org/techtutor
Microsoft Excel 2016 Level 1 Manual
Rev 11/2017
[email protected]
Microsoft Excel 2016 – Level 1
Welcome to Microsoft Excel 2016 - Level 1. In this class you will learn the basics of Excel, and work on a
small project using commands and calculations. You will connect to online tutorials and courses to
reinforce and advance your learning. As you’re going through the class, think about how you could
use Excel at home or work.
Contents!
What is Microsoft Excel? ..........................................................................................................................................................1!
Microsoft Excel 2016 Interface ..............................................................................................................................................2!
The Welcome Page................................................................................................................................................................2
The Ribbon ...............................................................................................................................................................................2!
Quick Access Toolbar ...........................................................................................................................................................3!
File Tab.......................................................................................................................................................................................3!
Exercise – “My Pet Store Earnings”.......................................................................................................................................4!
Entering Data into Cells .......................................................................................................................................................4!
Basic Formatting - Labels ....................................................................................................................................................4!
Basic Formatting - Values....................................................................................................................................................5!
Calculating with Formulas ..................................................................................................................................................6!
Copy a Formula with Autofill .............................................................................................................................................7!
Quick Addition with AutoSum ..........................................................................................................................................8!
Save Your Work ......................................................................................................................................................................8!
Exercise – “Welcome to Excel” ...............................................................................................................................................9!
One-on-One Help, Classes, and Online Courses .............................................................................................................9!
Figure 1 - Microsoft
Open Excel 2016 on your computer. Locate the Excel icon on the computer desktop (see Excel icon
Figure 1), place the pointer arrow on it, and double-click the left mouse button.
Try it! Open a new “Blank workbook” from Welcome Page. Simply click the template with that name.
You will be working in this blank workbook during the class exercise.
TIP: if you have a Microsoft account (like outlook, hotmail, or Office 365) you can log in near the upper
right corner of the Welcome Page where it reads, “Sign in to get the most out of Office”. Doing this
allows you to save your work to “OneDrive”, and then accessing it from any other computer with
Internet connection. For example, you start a document in the library, save it to your Microsoft
account, and retrieve at home or work later. This is known as “saving to the cloud,” or more formally
“cloud computing”.
The Ribbon
The Ribbon is a toolbox at the top of the screen. It’s organized into three main parts (see Figure 3):
!! Tabs – Tabs represent a general activity area. For example, the “Home” has the tools most often
used, and the “Insert” tab has the tools to “put objects into” the work area.
!! Groups – Groups show related “tools” together more specifically, like “Font” or “Alignment”.
!! Commands – A command is one of the actual “tools”, which can be a button, expandable menu, or
a box for entering information.
Try it! Click the various tabs and observe how the Groups and Commands change. Let the mouse
arrow rest over a command (icon) and the name and description of that command will appear.
TIP: If you have a question about Excel, type it into the box labeled “Tell me what you want to do…”
Try it! Click into any of the blank rectangles (cells) in the large white grid area (worksheet). Type your
name, then click the “Undo” button. The Undo command “takes back” any changes made in the
document. Use it when you want to “go back” a few steps. On that note, it is important to “save early
and save often.” (see “Saving Your Work” on page 9.)
File Tab
The File Tab is where you can create a New document, Open an existing one, Save changes, Save As a
different file with a different name, Print the current workbook, and many other options.
Try it! Click the File Tab and observe the options described. This area is called the “backstage view”.
Click the “back” arrow at the top to return to the main Excel work area.
Try it! Select cell range A1:E1 (click and drag from cell A1 to E1). Click the “Merge and Center”
command in the Alignment Group of the Home Tab. Now add a little style: click the “Good” command
in the Styles Group of the Home Tab. Your worksheet should look like Figure 7.
Try it! Type the values you see in columns “B” and “C” in Figure 8. Click into cell B3, type “27”, then
press “Enter” on the keyboard. Continue until you’ve added all the values in range B3:C9. Note: when
typing the values in column “C” (prices), do not include the dollar sign.
TIP: A “cell range” is a group of cells in a worksheet that you may have to select or refer to. A cell range
uses the cell address of the first and last cells in the cell range, separated by a colon. For example, a cell
range that included cells A1, A2, A3, A4, and A5 would be written as A1:A5.
Try it! Click into cell D3. Type the equal sign (=). Note: formulas always begin with an equal sign. Click
cell B3. Type an asterisk (*). Note: in an Excel formula, an asterisk is used for multiplication. Click cell
C3. Your worksheet should look like Figure 10. Press “Enter”. How much did the pet store earn from
sales of pet dogs? Repeat these steps similarly for the “Cats” row. Hint: start in cell D4.
Tip: When you select a cell when preparing a formula, the moving lines around the cell that look like
marching ants is called “selection marquee”. Also, notice the “formula bar” above the column letters
which shows the formula in the selected cell. The box in the top left of Figure 10 is the “Name box”
which shows you what cell is currently selected.
Try it! Select cell range D3:D4. Place your mouse over the “fill handle” in the bottom right corner of
the selection. The mouse pointer changes from a large white cross to a thin black cross. Click and drag
the fill handle down to cell D9. Release the mouse button and you observe the power of Autofill.
Tip: You can see the formula used for a cell in the formula bar. If you click into cell D5, for example,
you will see =B5*C5 appears in the formula bar.
Try it! Let’s suppose a store clerk misplaced a few receipts for rodent sales. Five more rodents sold
than reported in the worksheet, so number of rodents sold is “23” and not “18”. Make this change in
cell B7, and press “Enter”. Notice the Total dollar amount for “rodents sold” (cell D7) adjusts
automatically (see Figure 11).
Challenge: How would you get the sum (total) for column “C” and “D” without manually writing a
formula or using AutoSum?
TIP: Want to earn a Microsoft Certification? Go to kcls.org/certify for more information. Certification is
a great way to prove your skill to teachers and employers. You’re already on track with this class, so
make it your learning goal!
—END—
Microsoft
Excel 2016
LEVEL 2
kcls.org/techtutor
Microsoft Excel 2016 Level 2 Manual
Rev 11/2017
[email protected]
Microsoft Excel 2016 – Level 2
Welcome to Microsoft Excel 2016 - Level 2. In this class you will learn the basics of Excel, and work on a
small project. You will connect to online tutorials and courses to reinforce and advance your learning.
As you’re going through the class, think about how you could use Excel at home or work.
Contents
In this class, you will… ..........................................................................................................................................................1!
Formulas and Functions .......................................................................................................................................................2!
Writing and Copying Formulas ........................................................................................................................................2!
Absolute References.............................................................................................................................................................3!
The AutoSum Function .......................................................................................................................................................4!
The Payment Function ........................................................................................................................................................4!
Excel Tables ................................................................................................................................................................................6!
Create an Excel Table ...........................................................................................................................................................6!
Table Tools – Design Tab ....................................................................................................................................................7!
Sort Your Data ........................................................................................................................................................................7!
Filter Your Data ......................................................................................................................................................................7!
Charts.............................................................................................................................................................................................8!
Insert a basic graph...............................................................................................................................................................8!
Move a chart to a new worksheet ...................................................................................................................................9!
One-on-One Help, Classes, and Online Courses .......................................................................................................9
Notes
!! Formulas and functions always begin with an equal sign (=).
!! Asterisk (*) means multiplication; to insert asterisk, hold Shift and press 8 on top row of keyboard.
!! Formulas and functions use cell names (B2, C2, etc.) for values in corresponding cell.
!! Formulas and functions appear in formula bar and can be edited.
!! Click check (!) in formula bar to “enter” formula (get answer); current cell stays selected.
Absolute References
A reference you make in a formula to the contents of a cell or cell range is either relative or absolute.
When you create and then copy a formula from the original cell, a relative reference formula changes
cell by cell as in the review exercise above. An absolute reference is a reference to a constant value
in a formula, such as a tax rate. Regardless of the subtotal, all the items bought in the practice file
will be charged the same, or absolute, tax rate.
To write a formula with an absolute reference:
1.! Click cell E2
2.! Type the equal sign (=)
3.! Click cell D2
4.! Insert an asterisk (*)
5.! Click cell H2
6.! Press F4 function key Screen shot of formula with absolute reference in cell E2
7.! Click check (!) in formula bar
Tax on a $3.00 purchase, at 9.6%, is $0.29. Use auto fill handle tool to copy formula down to cell E8.
Notes
! Function keys run across the top of the keyboard.
!! The $ signs indicate cell H2 (9.6% tax rate) is an absolute reference.
Click “insert
“i function”
fu ti ” button
bu to get
searchable window shown at right.
ig
Insert Function window: search functions by name or browse by category
After selecting data, the Quick Analysis button offers helpful tool options
Notes
!! Quick Analysis button has other tools for working with your data, including totals and charts.
!! Rest mouse pointer arrow over any Quick Analysis button to see what your data will look like.
!! Observe Table Style, arrows in the column headers and the Table Tools/Design tab in the Ribbon.
New Table Tools appear for your Excel Table: in this case, you get a Design tab with many useful options
Charts
There are many types of charts to choose from when you want to share your data with others.
Sometimes it can difficult to know which chart type to use for the data one wants to present. Excel
2016 has an excellent new feature called “Recommended Charts”, which shows a live preview of
selected data to be charted. It is found in both Insert Chart dialog as well as Quick Analysis.
A new worksheet tab is created with the name and content you indicated. You may move the position
of the worksheet by clicking and dragging. The chart gives a visual representation of quantities
purchased, cost per item and totals per item compared to other items. This helps you see which is
most popular among the desserts, which costs more, etc., and help you make decisions based on data.
TIP: Want to earn a Microsoft Certification? Go to kcls.org/certify for more information. Certification is
a great way to prove your skill to teachers and employers. You’re already on track with this class, so
make it your learning goal!
—END—
Microsoft
Excel 2016
LEVEL 3
kcls.org/techtutor
Microsoft Excel 2016 Level 3 Manual
Rev 11/2017
[email protected]
Microsoft Excel 2016 – Level 3
Welcome to Microsoft Excel 2016 - Level 3. In this class you will learn the basics of Excel, and work on a
small project. You will connect to online tutorials and courses to reinforce and advance your learning.
As you’re going through the class, think about how you could use Excel at home or work.
Contents!
In this class, you will… ..........................................................................................................................................................1!
More Helpful Tools in Excel 2016 .....................................................................................................................................2!
Converting Text to Columns .............................................................................................................................................2!
Conditional Formatting ......................................................................................................................................................2!
Using Count & Countif Functions ....................................................................................................................................3!
Removing Duplicates ...........................................................................................................................................................5!
Sheet Protection ....................................................................................................................................................................6!
The Excel Table Feature ......................................................................................................................................................6!
Pivot Tables ................................................................................................................................................................................7!
Create a Pivot Table ..............................................................................................................................................................7!
Using the Pivot Table ...........................................................................................................................................................9!
One-on-One Help, Classes, and Online Courses .................................................................................................... 11!
Now try converting the text in the City/State column. Follow all previous steps, but step 7 will require
multiple delimiters. Which additional delimiter must you use to separate “City/State”?
Conditional Formatting
Conditional formatting is great for formatting a cell(s)—like, changing font or fill color—based on
criteria or rules you set. For example, an employee at a construction company had a $9800 monthly
budget for purchases last year. Her boss wants to know how many months last year she went over
budget. Using conditional formatting in Excel makes it easy to show this information.
Here’s how to create a new rule for
conditional formatting (Figure 2):
1.! Click Conditional Formatting tab in the Excel
Level 3 workbook (bottom tabs)
2.! Select cell range B1:B12
3.! From the Home tab, under Styles group, click
the Conditional Formatting command
4.! Click “New Rule”
5.! Select “Format only cells that contain”
6.! Select “greater than” from the second drop
down menu
7.! Type 9800 in the blank field to the right
8.! Format fill color
Figure 2 – Select Rule Type and Edit the Rule Description in this dialog box.
a.! Click format button in dialog box
b.! Click Fill tab in dialog box
c.! Choose desired color
d.! Click OK
9.! Click OK in New Formatting Rule dialog box
Now use conditional formatting to find out which weeks during first quarter (January through March)
she spent under (less than) her $2450 weekly budget. Reminder: select multiple cells and cell ranges
by pressing the Ctrl key while clicking cells.
Figure 3 – The count function counts how many cells, like in column K,
have a value. The countif function counts how many cells, like in column H,
meet criteria such as contain “WA”.
The cell will display the number of orders that have required delivery date.
The COUNTIF function is great for counting an entry if it meets certain criteria. For example, the
shipping company is short on drivers in Washington and must determine how many orders are for
delivery in that state. We’ll count orders only if they are to be delivered in “WA” (Figure 3, column H).
The cell will display the number of orders that match the “WA” criteria in column H.
Figure 9 – Check My data has headers box and select all columns in this box.
Figure 9.5 – a dialog box will indicate how many values were found and will be removed, and how many unique values remain.
Before creating an Excel table, and especially for a pivot table, it is important to adhere to the
following standards (Figure 11):
!! Organize data in rows and columns in a spreadsheet
!! Apply one type of data for each row and column
!! Include a unique, descriptive header in the top row of the table for each column
!! For each row, include one unique record of data about a particular entity or transaction
!! Avoid blank rows or columns, including first row after header
!! Use a zero instead of a blank cell in the table
!! Keep list of data contained in its own worksheet
Figure 11 – A well-formatted list of data has clear headers and information in neat rows and columns.
Here’s how to create an Excel table:
1. Click the Excel table tab in the Excel Level 3
workbook (bottom tabs)
2.! Click into any cell in your list of data
3.! Click Insert tab in the Ribbon
4.! Click the Table command
5.! Confirm cell range and “My table has
headers” box is checked in Create Table
dialog box (Figure 12) Figure 12 – Confirm cell range in Create Table dialog box to create a table.
6.! Click OK
The worksheet is now an Excel table. Here are some useful tips for using tables:
!! The heading cells have drop down arrows for sorting or filtering data (see Filter Function, p. 3)
!! Any time you click within the table, the Table Tools Design tab appears at the end of the Ribbon
!! Change table styles in the Table Tools Design tab
!! Rename your table in the Properties group of the Table Tools Design tab
!! Click Convert to Range command in Table Tools Design tab to revert to a normal range of data
Pivot Tables
A pivot table is an interactive table that allows you to group and summarize large amounts of data in
a concise table. Sort, hide, count and add data to reveal patterns and trends and make data reporting
and analysis easier. In this section, we will learn how to create a pivot table and some important terms.
1
From The Spreadsheet Page:
http://spreadsheetpage.com/index.php/file/pivot
_table_demo_workbook
Figure 15 – One row from the Sales List worksheet showing sales data for 2009.
We will use the pivot table to find out which product line had the most units sold, in 2009.
TIP: Want to earn a Microsoft Certification? Go to kcls.org/certify for more information. Certification is
a great way to prove your skill to teachers and employers. You’re already on track with this class, so
make it your learning goal!
—END—
)UHH4XLFN5HIHUHQFHV
4XLFN5HIHUHQFH&DUG 9LVLWTUFXVWRPJXLGHFRP
7KH([FHO6FUHHQ .H\ERDUG6KRUWFXWV
4XLFN$FFHVV7RROEDU 7LWOHEDU
)RUPXOD%DU &ORVHEXWWRQ *HQHUDO
2SHQD:RUNERRN &WUO2
)LOHWDE &UHDWH1HZ &WUO1
5LEERQ 6DYH &WUO6
3UHYLHZDQG3ULQW &WUO3
1DPH &ORVHD:RUNERRN &WUO:
ER[
$FWLYHFHOO +HOS )
5XQ6SHOOLQJ&KHFN )
&ROXPQV &DOFXODWHZRUNVKHHWV )
&UHDWHDQDEVROXWH )
QRUPDORUPL[HGUHIHUHQFH
5RZV
6FUROO
EDUV
1DYLJDWLRQ
0RYH%HWZHHQ&HOOV np
mo
5LJKW2QH&HOO 7DE
/HIW2QH&HOO 6KLIW7DE
'RZQ2QH&HOO (QWHU
:RUNVKHHWWDEV
9LHZEXWWRQV =RRPVOLGHU 8S2QH&HOO 6KLIW(QWHU
'RZQ2QH6FUHHQ 3DJH'RZQ
7KH)XQGDPHQWDOV 8S2QH6FUHHQ 3DJH8S
7R&HOO$ &WUO+RPH
x The File tab menu and Backstage view contain commands x Cell addresses: Cells are referenced by
for working with a program’s files, such as Open, Save, addresses made from their column letter 7R/DVW&HOO &WUO(QG
Close, New, and Print. and row number, such as cell A1, A2, B1, *R7R'LDORJ%R[ )
B2, etc. You can find the address of a cell
x To Create a New Workbook: Click
the File tab, select New, and
by looking at the Name Box under the (GLWLQJ
clipboard &XW &WUO;
double-click workbook, or press Ctrl
+ N. x To Select a Cell: Click a cell or use the &RS\ &WUO&
keyboard arrow keys to select it. 3DVWH &WUO9
x To Open a Workbook: Click the File
tab and select Open, or press x To Select a Cell Range: Click and drag to 8QGR &WUO=
Ctrl + O. select a range of cells. Or, press and hold 5HGR &WUO<
down the Shift key while using the arrow )LQG &WUO)
x To Save a Workbook: Click the
Save button on the Quick Access
keys to move the mouse pointer to the 5HSODFH &WUO+
last cell of the range.
Toolbar, or press Ctrl + S. 6HOHFW$OO &WUO$
x To Preview and Print a Workbook: x To Select an Entire Worksheet: Click the (GLWDFWLYHFHOO )
Click the File tab and select Print, or Select All button where column and &OHDUFHOOFRQWHQWV 'HOHWH
press Ctrl + P. row headings meet. Or press Ctrl + A.
x To Undo: Click the Undo x To Minimize the Ribbon: Click the )RUPDWWLQJ
button on the Quick Access Toolbar, Minimize Ribbon button on the Ribbon. %ROG &WUO%
or press Ctrl + Z. Or, press Ctrl + F1. Or, right-click a tab
and select Unpin the Ribbon from the ,WDOLFV &WUO,
x To Redo or Repeat: Click the
contextual menu. 8QGHUOLQH &WUO8
Redo button on the Quick
x To Change Program Settings: Click the 2SHQ)RUPDW&HOOV &WUO6KLIW
Access Toolbar, or press Ctrl + Y.
File tab and select Options. 'LDORJ%R[ )
x To Close a Workbook: Click the
x To Use Zoom: Click and drag the zoom 6HOHFW$OO &WUO$
Close button, or press Ctrl +
slider to the left or right. Or, click the 6HOHFWHQWLUHURZ 6KLIW6SDFH
W.
Zoom Out and Zoom In buttons on
x To Get Help: Press F1 to open the 6HOHFWHQWLUHFROXPQ &WUO6SDFH
the slider.
Help window. Type your question
x To Change Views: Click a View button in +LGHVHOHFWHGURZV &WUO
and press Enter. +LGHVHOHFWHG &WUO
the status bar. Or, click the View tab and
select a view. FROXPQV
x To Paste Data: Place the insertion point where you want to paste and click x To Copy Formatting with the Format Painter:Select the cell(s) with the
formatting you want to copy and click the Format Painter button in the
the Paste button in the Clipboard group on the Home tab. Clipboard group on the Home tab. Then, select the cell(s) you want to apply
x To Preview an Item Before Pasting: Place the insertion point where you the copied formatting to.
want to paste, click the Paste button list arrow in the Clipboard group on the x To Apply a Cell Style:Select the cell(s) you want to apply a cell style to.
Home tab, and hold the mouse over the paste option to preview. Click the Cell Styles button in the Styles group of the Home tab on the
x To Paste Special: Select the destination cell(s), click the Paste button list Ribbon and select a style from the gallery.
arrow in the Clipboard group on the Home tab, and select Paste Special. x To Format a Cell Range as a Table: Select the cells you want to apply table
Select an option and click OK. formatting to. Click the Format as Table button in the Styles group of the
x To Copy Using Auto Fill: Point to the fill handle at the bottom-right corner of Home tab on the Ribbon and select a table format from the gallery.
the selected cell(s), then drag to the destination cell(s). x To Apply a Document Theme: Click the Page Layout tab on the Ribbon,
x To Complete a Series Using AutoFill: Select the cells that define the series. click the Themes button in the Themes group, and select a theme from the
Click and drag the fill handle to complete the series. gallery.
x To Move or Copy Cells Using Drag and Drop: Select the cell(s) you want to x To Apply Conditional Formatting: Select the cells to which you want to
move or copy, position the pointer over any border of the selected cell(s), then apply conditional formatting. Click the Conditional Formatting button in the
drag to the destination cells. To copy, hold down Ctrl key while dragging. Styles group of the Home tab. Select the formatting scheme you wish to use,
then set the conditions in the dialog box.
x To Insert a Column or Row: Right-click to the right of the column, or below
the row you want to insert. Select Insert from the contextual menu, or click the x To Adjust Column Width or Row Height: Drag the right border of the
Insert button in the Cells group on the Home tab. column header, or the bottom border of the row header. Double-click the
border to AutoFit the column or row according to its contents.
x To Delete a Column or Row: Select the row or column heading(s). Right-
click and select Delete from the contextual menu, or click the Delete button
in the Cells group on the Home tab.
:RUNERRN0DQDJHPHQW
x To Insert a New Worksheet: Click the Insert Worksheet button next to
x To Insert a Comment: Select the cell where you want to insert a comment the sheet tabs at the bottom of the program screen. Or, press Shift + F11.
and click the Review tab on the Ribbon. Click the New Comment button in
the Comments group. Type a comment and click outside the comment box. x To Delete a Worksheet: Select the sheet you want to delete, click the Delete
button in the Cells group on the Home tab, and select Delete Sheet. Or,
right-click the sheet tab and select Delete from the contextual menu.
)RUPXODVDQG)XQFWLRQV
x To Rename a Worksheet: Double-click the sheet tab, enter a new name for
x To Total a Cell Range: Click the cell where you want to insert the total and the worksheet, and press Enter.
click the Sum button in the Editing group on the Home tab. Verify the
selected cell range and click the Sum button again. x To Change a Worksheet’s Tab Color: Right-click the sheet tab, select Tab
Color, and choose the color you want to apply.
x To Enter a Formula: Select the cell where you want to insert the formula.
Type = and enter the formula using values, cell references, operators, and x To Move or Copy a Worksheet: Click and drag a tab to move a worksheet.
functions. Press Enter when you’re finished. Hold down the Ctrl key while clicking and dragging to copy the worksheet.
x To Insert a Function: Select the cell where you want to enter the function x To Split a Window: Click the View tab and click the Split button in the
Window group. Or, press Alt + WS (one at a time).
and click the Insert Function button on the Formula Bar.
x To Freeze Panes: Place the cell pointer where you want to freeze the
x To Reference a Cell in a Formula: Type the cell reference (for example, B5) window, click the View tab on the Ribbon, click the Freeze Panes button in
in the formula or click the cell you want to reference.
the Window group, and select an option from the list.
x To Create an Absolute Cell Reference: Precede the cell references with a $ x To Select a Print Area: Select the cell range you want to print, click the Page
sign or press F4 after selecting cell(s) to make it absolute.
Layout tab on the Ribbon, click the Print Area button in the Page Setup
x To Use Several Operators or Cell Ranges: Enclose the part of a formula group, and select Set Print Area.
you want to calculate first in parentheses. x To Adjust Page Margins, Orientation, Size, and Breaks: Click the Page
Layout tab on the Ribbon and use the commands in the Page Setup group,
&KDUWV or click the Dialog Box Launcher in the Page Setup group to open the
Page Setup dialog box.
x To Create a Chart: Select the cell range that contains the data you want to
chart and click the Insert tab on the Ribbon. Click a chart type button in the x To Protect or Share a Workbook: Click the Review tab on the Ribbon and
Charts group and select the chart you want to use from the list. use the commands in the Changes group.
x To Insert a Sparkline: Select the cell range that contains the data you want to x To Recover Autosaved Versions: Click the File tab on the Ribbon and
select Info. Select an autosaved version from the Versions list. Or, click the
chart and click the Insert tab on the Ribbon. Select the sparkline you want to
Manage Versions button and select Recover Unsaved Workbooks.
insert from the Sparkline group. Select the cell or cell range where you want to
add the sparkline and click OK.
)RU3HUVRQDO8VH2QO\ &XVWRP*XLGH
&RQWDFW8VDWLQIR#FXVWRPJXLGHFRPIRURUJDQL]DWLRQDOXVH
tĞŚŽƉĞLJŽƵĞŶũŽLJƚŚŝƐĨƌĞĞƋƵŝĐŬƌĞĨĞƌĞŶĐĞ͊WůĞĂƐĞƌĞǀŝĞǁŽƵƌ
ŽƚŚĞƌƚƌĂŝŶŝŶŐƉƌŽĚƵĐƚƐ͖ƐĞĞƚŚĞƐĂŵƉůĞƐďĞůŽǁ͘
WůĞĂƐĞŽŶƚĂĐƚƵƐĨŽƌĂ&ƌĞĞdƌŝĂů͊
ϲϭϮ͘ϴϳϭ͘ϱϬϬϰͮŝŶĨŽΛĐƵƐƚŽŵŐƵŝĚĞ͘ĐŽŵ
!"#$%&'#()$*%&("("+,-%.)$%/0111*-2('34
KĨĨŝĐĞϮϬϭϲĨŽƌtŝŶĚŽǁƐ KĨĨŝĐĞϯϲϱ KƉĞƌĂƚŝŶŐ^LJƐƚĞŵƐ
džĐĞůϮϬϭϲ KŶĞƌŝǀĞĨŽƌƵƐŝŶĞƐƐ tŝŶĚŽǁƐϭϬ
KƵƚůŽŽŬϮϬϭϲ ^ŬLJƉĞĨŽƌƵƐŝŶĞƐƐ tŝŶĚŽǁƐϴ
WŽǁĞƌWŽŝŶƚϮϬϭϲ tŝŶĚŽǁƐϳ
KĨĨŝĐĞϮϬϭϯ
tŽƌĚϮϬϭϲ ŽŵƉƵƚĞƌĂƐŝĐƐ
džĐĞůϮϬϭϯ
DĂĐK^
KĨĨŝĐĞϮϬϭϲĨŽƌDĂĐ KŶĞEŽƚĞϮϬϭϯ
džĐĞůϮϬϭϲ KƵƚůŽŽŬϮϬϭϯ ůƐŽǀĂŝůĂďůĞ
KƵƚůŽŽŬϮϬϭϲ WŽǁĞƌWŽŝŶƚϮϬϭϯ ^ŽĨƚ^ŬŝůůƐŽƵƌƐĞƐ
WŽǁĞƌWŽŝŶƚϮϬϭϲ ^ŚĂƌĞWŽŝŶƚϮϬϭϯ ^ƉĂŶŝƐŚĚŝƚŝŽŶƐ
tŽƌĚϮϬϭϲ tŽƌĚϮϬϭϯ
5&'67-8%3$!"'98:$34
!"#$%&'#()$*8#-%(&93 783#-;(<&=9$7-8%3$>&%$
!"#$%&'(Ǧ)&#*%+&+&,-+#$.+#"Ǧ(+/"'#0#)*+%1(#$%# A$=-*+#"#*%+&+&,<%#"*+%1(-$"&-"BC"')&"
*"2*"%#"#$""34"*+"&2")50(+&,%2#0%1()5#-%*"6 +#5)*=)0DE*%+&+&,<%&0%1(F4*%2#+2"5+1"(F%&'
789:;Ǧ2)<4%#+.1"5)*=)0*>;7? +&(#*02#)*,0+'"(-+#$0&1+<+#"'4*+&#+&,*+,$#(?
@+"-7%<41" @+"-7%<41"
!"#$%&'#()$?33$33;$"#3 @8('AB$,$%$"'$3
G)-<02$')=)0*0("*(*"%11=H&)-DI220*%#"1= G%&'=J2$"%#($""#(K-+#$($)*#20#(F#+4(F%&'
<"%(0*"(H+11(-+#$*"%1+(#+2()5#-%*"(+<01%#+)&(6 #*+2H(6L*""5)*4"*()&%10("?
789:;Ǧ2)<4%#+.1"5)*=)0*>;7? @+"-7%<41"(
@+"-7%<41"
.)$%C01117-;2&"($3B$9D-"783#-;E8(:$
Ì
° Ë
° Ë
µ ¶
² ³
±
¯ °
¬
°
Ë
° Ë
¸
ʹ
° ¸
Ä Å
½ ¾
± »
º
¶
° ¸
µ ¶
± ² ³
¯ °
¬
«
Ì
° Ë
´
ã
ä
Ì
° Ë
ã ä
Å
ã
Ð Å
7
p
å
ä
ã
µ ¶