0% found this document useful (0 votes)
24 views

Microsoft Office

The document provides a history of Microsoft Office from its initial release in 1990 through Office 2003. It details the original components of Office including Word, Excel, PowerPoint and their evolution. It also discusses newer additions like Outlook and common features across Office versions.

Uploaded by

Nabin Pradhan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Microsoft Office

The document provides a history of Microsoft Office from its initial release in 1990 through Office 2003. It details the original components of Office including Word, Excel, PowerPoint and their evolution. It also discusses newer additions like Outlook and common features across Office versions.

Uploaded by

Nabin Pradhan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

HISTORY OF CHAPTER

MICROSOFT OFFICE 3
Developer(s) Microsoft introducingthe mouse to alarge population of compute users.
Initial release Word 1.0 could be purchased with a bundled mouse.,
November 19, 1990; almost 22 years ago
was required. Following the precedents of Lisa Write and
though n¡ne
Stable release 2010 (14.0.6023.1000 SP1)/ June 28, 2011
MacWrite, Word for Macintosh attempted to add closex
Development status Active
Written in
WYSIWYG (What You See Is What You Get) features into ite
package. Word for Mac was released in 1985. Word for Mac wae
Operating system Microsoft Windows the first graphical version of Microsoft Word. Despite its buos i
Available in Over 35 languages became one of the most popular Mac applications.
Type Office suite Excel :Microsoft Excel is a spreadsheet program that
Microsoft Office is aproprietary commercial ofie suite of originally competed with the dominant ,but eventually outsold i.
inter-related desktop applications, servers and services for It is available for the Windows and Mac platforms. Microsof
the Microsoft Windows and Mac OS X operating systems, released the first version of Excel for the Mac in 1985, and the first
introduced by Microsoft in 1989. Initially a marketing term for a Windows version in November 1987.
bundled set of applications, the first version of Office Outlook: Microsoft Outlook (not to be confused
contained Microsoft Word, Microsoft Excel, and Microsoft with Outlook Express) is a personal information manager and e
PowerPoint. Over the years, Office applications have grown mail communication software. The replacement for Windows
substantially closer with shared features such as aommon spell Messaging, Microsoft Mail and Schedule+ starting in Ofice 97,
checker, OLE data integration and Microsoft Visual Basic for it includes an e-mail client, calendar, task
manager and address
Applications scripting language. Microsoft also positions Office book.
as a development platform for line-of-business software under On the Mac, Microsoft offered several versions of Outlook
the Office Business Applications brand.
in the late 1990s, but only for use with Microsoft Exchange Server.
The current versions are Office 2010 for Windows, released
on June l5, 2010; and Office 2011 for Mac OS X,
released October
PowerPoint : Micros oft PowerPoint is apopular
26.2010. presentation program for Windows and Mac. lt is used to
create slideshows and is composed oftext, graphics, movies and
COMPONENTS other objects which can be displayed on-screen and navigated
DESKTOP APPLICATIONS
through by the presenter or printed out on transparencies or slides.
Word : Microsoft Word is a word processor and was Other
desktop applications (Windows versions only)
previously considered the main program in Office. Its proprietary.
DOCformat is considered a standard, although Word 2007 can Microsoft Access database manager
also use a new XML-based, Microsoft Office-optimized format Microsoft InfoPath an application to design rich XML
called .D0CX. It is available for the Windows and Mac platforms. based forms
The first version of MS-Word, released in the autumn of 1983, Microsoft OneNote note-taking software for use with
was for the MS-DOSoperating system and had the distinction of both tablet and conventional PCs
Historyoff Microsoft Office
Mcrosoft Publisher
most/ Used for
designingdesktop publishing software Microseft Office XP: Micronoft
office XP(offce 2
TCng ards. business brochures,
Microsoft Office cards, Iabels,
newslet ers, andcalendats. Was feleased in conunction
iAjt
with Windowy XP and was 4
changes over ffice
management sofware
Picture
Manager postcards
basic photo upgrade with numer ous enhanccements
and

Photoshop Elements). (similar to


Mode feature. whch allows
Google's Picasa or Adobe ' 2000. Office XP introducedthe Safe
other wtse tai
(ommon teatures applications such as (Outlook to hoct when it m1ght
either repair or bypass
Safe Mode enables (Office to detect and
registry or a taity
Most versions of Microsoft Office the source ofthe problen,such as a corrupted
later)usetheir own widget set and do not(including Ofice 97 and add-in. Smart tag is a technology
introduced with Office XP Sotme
exactly match the native activity. such as helping with
opcratingsystem. This is most apparent in Smart tags operate based on user
Microsoft Office XP with the products.
and2003, where the standard menus were replaced with a typing errOrs. These smart tags are suppl1ed
colored custom smart tags could
flatlooking.
shadowed menu style.
Both Windows and Office and are not programmable. In Office XP.
Microsoft Office XP includes
usc Service Packs to update software. work only in Word and Excel,
capabilities, as well
integrated voice command and text dictation
Supported Operating SYstems XP is the last version to
as handwriting recognition. Office to
4.0. It was the first version
Microsoft supports Office for the Windows and Mac Support Windows 98, ME and NT
anti-piracy measure. which
platforms. Beginning with Mac Office 4.2, the Mac and Windows require Product Activation as an
versionss ofOffice share the same file format. attracted widespread controversy.
Consequently, any
Macwith Office 4.2 or later can read documents created with MicrosoftOffice 2003: Microsoft Ofice
2003 was released
their
Ofice 4.2 for Windows or later, and vice-versa. Visual Basic for in 2003. It featured a new logo. Two new applications made
InfoPath and OneNote. It is the
Applications support was dropped in Microsoft Ofice 2008 for debut in Office 2003: Microsoft
style icons. Outlook 2003 provides
Mac but was restored in Microsoft Office for Mac 2011 first version to use Windows XP
including Kerberos
improved functjonality in many areas, Mode, and an
There is no mention of supportfor other operating systems, authentication, RPC over HTTP, Cached Exchange
although Microsoft Office Mobile, which Supports Windoive
the more
improved junk mail filter. 2003 is the last
Office version to
available for
popular features of Microsoft Office, is support Windows 2000.
Mobile. CrossOver, a Windows compatibility layer by Code Microsoft Office 2007: Microsoft
Office 2007 was released
Linux
Weavers, makes it possible to run Microsoft Office on the new graphical user
for Microsoft Office in 2007. Ofice 200T's new features include a
platform. Doing so, hOwever, requires a license interface called the Fluent User
Interface, replacing the menus
Crossover. since its
for Windows, as well as a license for and toolbars that have been
the cornerstone of Office
new XML
as the Ribbon;
Microsoft Office 97:Microsoft Office 97, was a major inception with a tabbed toolbar, known of
new features and Open XML; and the inclusion
milestone release. It included hundreds of based file formats called Ofice
paradigm in which application.
improvements, introduced.command bars, a Groove, a collaborative software
made more similar in capability and
visual Otice 2010was tinalized
menus and toolbars were Microsoft Office 2010: Microsoft
Language Systems and on June
design. Office 97 alsofeatured Natural version of Officeto April 15, 2010, and was made available to consumers
on backstage
was the first ofOftice 2010 include the
grammar checking. Office 97 15, 2010. The main features protected
tools, a customizable ribbon,
include the Office Assistant. file menu, new collaboration in 32-
Office 2000 introduced This is the first version to ship
Microsoft Office 2000: Microsoft view and anavigation pane. which
options were hidden from
the 2010 also features a newlogo,
where little-used and 64-bits. Microsoft Office slightly
adaptive mnenus, around digital except in gold, and with a
securityfeature, built is similar to the 2007 logo, released on
user. It also introduced a newv 2000 for Office 2010 was
threat of macro viruses.
Office modified shape. Service Pack l
Signatures, to diminish the
(written in VBA 6) that were digitally June28, 2011.
automatically trusts macros designated as
authors who have been previously
Signed from version to support
Windows 95.
last
trusted. Office 2000 is the
CHAPTER
NETWORKING AND INTERNET
4
Iatroduction
Anetwork can be defincd as a group of exchange data.
computers and other devices some ways so as to be able to
Each of the devices on the network can be connccted in
thought of as a node; cach node has a unique address.
Addresses are numeric quantities that are casv for comnuters to work with. but not for
Example: 204.160.241.98
humans to rem
Some networks also provide names that humans can more casily
remember than numbers.
Example: www.javasoft.com, corresponding to the above numeric address.

NIC addrl NIC addr2 NIC addrN

Addressing
Internet address
Consists of 4 bytes separated by periods
Example: 136.102.233.49
The R first bytes (R= 1,2,3) correspond to the network address;
The remaining H bytes (H =3,2,1) are used for the host machine.
Inter NICRegister:Organization in charge of the allocation of the address ranges corresponding to networks.
Criteria considered:
Geographical area (country) Organization, enterprise
Host
Department
DomainMnemonic
Name System
textual(DNS)
addresses are provided to facilitate the manipulation of internet addresses.
numeric Internet addresses.
DNS servers are responsible for translating mnemonic textual Internet addresses into hard
Ports
An IP address identifies a host machine on the Internet.
host 'machine.
An IP port willidentify a specific application running on an Internet
Aport is identified by a number, the port number. 4 ports are allowed.
The number of ports is not functionally limited, in contrast to serial communications where only
specific applications.
There are some port numbers which are dedicated for
D-54 Networking and Internes
Applieations Port numlers
HTTP 80
FTP 20 and 21

Gopher 70
SMTP (e-mil) |25
POP3 (e-nail) 110
Tenet
Finger 79

Data Transmission
In modern networks, data are transferred using packet switching.
Messages are broken into units called packets, and sent from one computer to the other.
At the destination, data are extracted from one or more packets and used to reconstruct the original message.
Each packet has a maximum size, and consists of a header and a data arca.
The header contains the addresses of the source and destination computers and sequencing information necessary to reassembe
the message at the destination.
packet
header data
1001..101 00010000111...000000110001100
Iypes of Networks
There are two principle kinds of networks:Wide Area Networks (WANS) and Local Area Networks (LANS).
WANS
Cover cities, countries, and continents.
Based on packet switching technology
LANS
Examples of WAN technology: Asynchronous Transfer Mode (ATM), Integrated Services Digital Netvwork (ISDN)
Cover buildings or a set of closely related buildings.
Examples of LANtechnology: Ethernet, Token Ring. and Fibber Distributed Data Interconnect (FDDI).
Ethernet LANS: based on a bus topology and broadcast communication
Token ring LANs: based on ring topology
FDDILANs: use optical fibbers and an improved token ring mechanism based on two rings flowing in opposite directions.

Shared
bus

(a) Ethernet LAN

Ring Dual ring

(b) Token Ring LAN (c) FDDI LAN


NetworkingandI Internet D-55

Network connectiity type


Speed Trans mission time for 10 Mbytes
Telephone) dial-up modem 14.4 Kbps 90min
ISDN modem
56/ 128 Kbps 45/12min
Tlconnection
L.54 Mbps 50
Ethemet
10 Mbps 9%
Token nng
4/16 Mbps
Fast Ethemet
100 Mbps
FDDI
100 Mbps
Gigabit Ethemet
|1Gbps
ATM
|25Mbps/2.4Gbs
Iaterconnection
as a
Networks of low capacity may be connected together via a backbone network which is a network of high capacity such
EDDI network, a WAN network etc.
IANS and WANs can be interconnected via Tl or T3digital leased lines.
following devices:
According to the protocols involved, networks interconnection is one or several of the
achieved using
Bridge: a computer or device that links two similar LANS based on the same protocol.
protocols.
Router: a communication computer that connects different fynes of networks using.different
B-router or Bridge/Router:a single device that combines both the functions ofbridge and router.
using direct and systematic translation between protocO.
Gateway: a network device that connects two different svstems
Vancouver branch

Toronto branch

Gateway
Token Ring LAN
Ethernet LAN Router
Relay
ATM
T1line

NY headquaters Bridge/Route

Router
Bridge/Router
Bridge

Ethernet

Token Ring LAN


10
D-56 Networking and Internet
Network Topology Dlagram
The specitication ofthe network topology diagramt requires the definition of the characteristics andentities underlying the network

Geographical locations of the diferent comDonents or subnets involved in the network.


Description of the LAN topology
Desctiption of the WAN topology
Description of the network connectors such as routers, bridges, repeaters, and gateways.
Protocols :
Dehne the rules that govern the communications between two computers connected to the network.
Koes: addressing and routing of messages, error detection and recovery, sequence and flow controls etc.
the messages exchanged, and the
A Protocol specification consists of the smtax, which defnes the kinds and formats of
semantic, which specifies the action taken by each entity when specific events occur.
Example: HTTP protocol for communication between web browsers and servers.
Request For Comments (RFC): specifications ofthe protocols involved in Internet Communications.
Example: sample of RFC 821 describing communications between SMTP server and client.
S: MAIL FROM: [email protected]
R: 250 OK

S: RCPT TO: Jack(@Beta. ARPA

R: 250OK
S: DATA

R: 354 Beginning of mail; ending by <CRLF,<CRLF>


S: Blah blah blah

S: ...etc.

S:<CRLº<CRL>
R: 250 OK

Protocols are designed based on a layered architecture such as the OSI reference model.
Each entity at a layer n communicates only with entities at layer n-1.
The data exchanged, known as Protocol Data Unit (PDU), goes back and forth through the layers, each layer adds or removes
its own header and vice-versa. Therefore a layer n PDU may become a layer n-1 data.

nth layer 4 ngh layer


(n-1 th lay¢r (h-1)th layer

Network
Networking.and Internet D-57

ProtocolLayers:
The 0Sl(Open Systems lnterconnection) Data Model
ISO standard for
computer networks design and
Involves at least 7 layers, ench playing aspecificfunctioning
role applications are communicating over the net
Duringthe sending when
process, cach layer (fromtop to down) will addda specific header to the raw data
Ar the reception, headers are eliminated
conversely until
Ithe data arrived to the receiving application

OSILayers :

Application layer
(applications connected to the network)

Presentation layer
(provides standard data representations for applications)
Session layer
(manages sessions among applications)
Transport layer
(provides end-to-end errors detection and correction)

Network layer
(handles connection to the network by the higher layers)

Data-link layer
(provides safe communication of data over the physical network)
Physical layer
(defines the physical characteristics of the network)

transmission etc.
data; consists ofelectronic circuits for data
Physical layer:ensures a safe and efficient travel of layer.
under the form of packets and their interpretation at the physical
Data link layer: in charge of data encapsulation
transmission from a source Ato a destinationB.
Network layer: in charge of packets
packetsfrom a source Ato a destination B.
Iransport layer: in charge ofthe delivery of
management of network access.
Session layer: in charge of the
transmitted to applications, data compressing decompressing, encrypting etc
Presentation layer: determines the format ofthe data Java, Word etc.
which are used by the end-user, such as
Application layer: contains the applications
The TCP/P Model
application, transport, internet and network.
Consists of only4 layers:
Networking and Internat
D-58

Layers
Application layer
(applications and processes running on the network)

Transport layer
(provides cnd-t0-cnd data delivery services)

Internet layer
(makes datagrams and handles data routing)

Network layer
(provides routines allowing access to the physical network)
Network layer
Provides the same functionality as the phvsical. the data link and network layers in the OSI model.
Mapping between IP addreses and network physical addresses.
Encapsulation oflP datagrams, e.g packets, in format understandable by the network.
Internet layer
Lies at the heart ofTCP/IP.
Based on the Internet Protocol (IP), which provides the frame for transmitting data from place Ato place .
Transport layer
Based on two main protocols: TCP (Transnission Control Protocol) and UDP (User Datagram protocol)
Application Layer
Combines the functions of the OSI application, presentation, and session layers.
Protocols involved in this layer: HTTP, FTP, SMTP etc.
4. Networks Interconnection/Internet

Concept of Network Interconnection


First implemented in the Defense Advanced Research Project Agency Network (Arpanet), in 1966 in USA.
Consists of connecting several computer networks based on diferent protocols.
Requires the definition of acommon interconnection protocol on top the local protocols.
The Internet Protocol (IP) plays this role, by defining unique addresses for a network and a host machine.

FTP Telnet SMTP SNMP

TCP/UDP

IP

Ethernet Arpanet Token ring


Networking.and Internet

PI

IP

P4 P3

Internet Protocol (P)


Overview
The IP protocol provides two main functionality:
Decomposition of the initial information 1low into packets of standardized size, and reassembling at the destination.
Routing of a packet through successive networks. from the source machine to the destination identified by its IP address.
Transmitted packets are not guaranteed to be delivered (datagram protocol).
The IP protocol does not request for connection (connectionless) before sending data and does not make any error detection.
Functions
Decompose the initial data (to be sent) into datagrams.
Each datagram willhave a header including, the IP address and the port number of the destination.
netwok and to an IP service
Datagrams are then sent to selected gateways, e.g IP routers, connected at the same time to the local
provider network.
Datagrams are transferred from gateways to gateways until they arrived at their final destination.

packetl

Sender

packet2 Receiver

Routers
D-60
Networklng and Internet
Structure of an IP packet functionality and limitations.
the frame header. define the IP protocol's
Ihe nelds at the beginning of thepacket., called of these address fields).
bits for each
32 bits are allocated for encoding source and destination addresses (32
information such as the total packet length in bytes.
Ihe remainder ofthe header (16 bits) encodes various
Hence an IP packet can be a maximum of 64Kb long.
10 12 16 20 24

Header
Chccksum
Source address
Destination address
Options
Data
Transmission Control Protocol (TCP)
Overview
TCP provides by using IP packets a basic service that does guarantee safe delivery:
error detection
safe data transmission
assurance that data are received in the correct order
Before sending data, TCP requires that the computers communicating establish a connection (connection-oriented protocol)
TCP Server
Çlient
SYN
SYN_ACK
ACK

DATA
DAIA

FIN

ACK
DATA
FIN
ACK

TCP provides support for sending and receiving arbitrary amounts of data as one big stream ofbyte data (IP is limited to 64Kb).
TCP does so by breaking up the data stream intoseparate IP packets.
Packets are numbered, and reassembled on arrival, using sequence and sequence acknowiedge numbers.
TCP also improves the capability of IP by specifying port numbers.
There are 65,536 different TCP ports (sockets) through which every TCP/IP machine can talk.
Structure of aTCP packet
0 2 4 12 20

Source port
Destination port
Sequence No.
Sequence Ack. No.
Misc. header
Data
Networking.and Internet D-61

User Datagram Protocol (UDP)


Overview
Datagram protocol also built on top
ofIP.
Has the same packet-size limit (64Kb) as IP, but allows for port number specification.
Provides also 65,536 different ports.
Hence. every machine has two sets of 65,536 ports: one for TCP and
the other for UD.
Connectionless protocol, without any error detection facility.
Provides only support for data transmission from one end to the other, withoutany further verification.
The main interest of UDP is that since it does not make further verification, it is very tast.
Useful for sending small size data in arepetitive way such as time information.
InternetApplication Protocols
applications of same nature:
On top ofTCP/IP, several services have been developed in orderto homogenize connected to the Internet.
two machines
FTP(File Transfer Protocol) allowsthe transfer of collection of filesbetween
mode.
Telnet (Terminal Protocol) allows a user to connect to a remote host in terminal (newsgroups) organized
around
constitution of communication groups
NNTP (Network News Transfer Protocol) allows the
specifictopics.
a basic service for electronic mails.
SMTP (Simple MailTransfer Protocol) defines network.
(Simple Network Management Protocol) allows the management of the
SNMP
SNMP
SMTP
Telnet
FTP
TCP/UDP

IP

Token ring
|Arpanet
Ethernet

You might also like