Sei sulla pagina 1di 58

CAM Lab & Viva 12847 MBA I Semester (2018-20)

An Assignment
On
CAD CAM LAB

Submitted in partial fulfillment for the award of the degree


Master of Business Administration
Chhattisgarh Swami Vivekanand Technical University, Durg (C.G)

Submitted by:
MANPREET KAUR NOTEY
MBA - Semester I
(Session: 2018-20)
Roll no.- 12847

Approved by: Guided by:


DR. MANOJ VERGHESE AARTI SAHU
Head of the Department (HOD)

Department of Management Studies


Rungta College of Engineering & Technology
Kohka, Kurud Road, Bhilai (C.G)

1|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)

CERTIFICATE

This is to certify that the work incorporated in the assignment of CAD CAM Lab is a work
carried out by Manpreet Kaur Notey bearing enrollment no.- BF3059 under my guidance
and supervision for the partial fulfilment for the award of Master of Business
Administration degree affiliated to Chhattisgarh Swami Vivekanand Technical University,
Bhilai (C.G), India.

In the best of my knowledge and belief the assignment

I. Embodies the work of the candidate herself


II. Has duly been completed
III. Is up to the desired standard, both in respect to content and language for external
viva.

Signature
Dr. Manoj Verghese
Head of the Department

2|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)

DECLARATION BY THE CANDIDATE

I, the undersigned, solemnly declare that the report of the thesis work entitled CAD CAM
Lab is based on my own work carried out during the course of my study under the
supervision of Ms. Aarti Sahu.

I assert that the statements made and conclusions drawn are an outcome of my research
work. I further declare that to the best of my knowledge and belief the report does not
contain any part of any work which has been submitted for the award of MBA degree or
any other degree/diploma/certificate in this University or any other University of India or
abroad.

(Signature)
Manpreet Kaur Notey
Enrollment no.- BF3059

3|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)

ACKNOWLEDGEMENT

Firstly, I would like to thank the almighty God, who bestowed upon me this
opportunity for working on this assignment and generated the capacity to
successfully complete the project.

I am extremely indebted to my project guide Ms. Aarti Sahu ma’am and Dr. Manoj
Verghese sir for their valuable suggestions and guidance, which ensured an in-
depth learning and understanding of the concepts. Their inputs from past
experiences and practical interpretation of the problem helped me a lot in
comprehending the requirements of the assignment. This ensured great learning
for me. They were always helpful & always able to take out some time off their
busy schedule to guide me in this project.

Lastly, I would like to thank my parents for their moral support, and my friends
from whom I received lots of suggestions that improved the quality of my work.

4|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)

TABLE OF CONTENTS

Topic Page no.

1. What are Peripheral devices and


their classification? Discuss
about Storage devices.

2. Explain about Operating


Systems and its types. Discuss
about Unix OS.

3. What is MS-Office? Discuss


about MS-word, MS-PowerPoint
& MS-Excel along with important
commands.

4. Discuss briefly about LAN


topology and protocols.

5. Write about application of


Computers in Business.

5|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)

1. What are Peripheral devices and their classification? Discuss about Storage
devices.

A peripheral device is an internal or external device that connects directly to a


computer but does not contribute to the computer's primary function, such as
computing. It helps end users access and use the functionalities of a computer.

A peripheral device provides input/output (I/O) functions for a computer and serves as
an auxiliary computer device without computing-intensive functionality. Peripheral
devices connect with a computer through several I/O interfaces, such as
communications (COM), Universal Serial Bus (USB) and serial ports.

Types of Peripheral Devices-

Peripheral devices are categorized as either an input device or an output device, and
some function as both.

Among these types of hardware are both internal peripheral devices and external
peripheral devices, either type of which might include input or output devices.

Internal Peripheral Devices-

Common internal peripheral devices you'll find in a computer include an optical disc
drive, a video card, and a hard drive.

In those examples, the disc drive is one instance of a device that's both an input and
an output device. It can not only be used by the computer to read information stored
on the disc (e.g. software, music, movies) but also to export data from the computer
to the disc (like when burning DVDs).

Network interface cards, USB expansion cards, and other internal devices that might
plug in to a PCI Express or other type of port, are all types of internal peripherals.

External Peripheral Devices-

Common external peripheral devices include devices like a mouse, keyboard, pen
tablet, external hard drive, printer, projector, speakers, webcam, flash drive, media
card readers, and microphone.

6|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Anything that you can connect to the outside of a computer, that typically doesn't
operate on its own, could be referred to as an external peripheral device.

Some devices are considered peripheral devices because they can be separated from
the primary function of the computer and can usually be removed rather easily. This
is especially true of external devices like printers, external hard drives, etc.

However, that isn't always true, so while some devices might be considered internal
on one system, they could just as easily be external peripheral devices on another.
The keyboard is one great example.

Examples of Input Devices:

• Keyboards
• Pointing Devices mouse, trackballs, joysticks, touchpads and light pens
• Source entry devices scanners, audio input devices, video input devices, digital
cameras.

Examples of Output Devices:

• Softcopy: - Monitor /Display Screens CRT and Flat Panel (LCD), EL and gas
plasma.
Monitor /Display Screen clarity:

Resolution refers to the number of dots displayed in the X (across) and Y (down) co-
ordinates expressed in terms of horizontal pixels X vertical pixels. Typical screens are
capable of displaying 640x480 dots.

Dot Pitch is the measurement of how close together the pixels, or phosphor dots, are that
make up an image.

The smaller the dot pitch, the crisper the image,0.31 or less provides a sharp image,
especially when displaying text.

Refresh rate is the vertical frequency, or the rate at which each pixel on a screen is re-
drawn. A low refresh rate results in an image that flickers, resulting in eye-strain.

7|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)

A refresh rate of 60Hz means the images is redrawn 60 times a second. Typical refresh
rates are 60Hz, 72Hz and 75Hz.

• Hardcopy Output: Printers


Impact Printers-

The general features of impact printers are-

i. uses force by applying hammer pins to strike the paper


ii. slow speed
iii. prints on most paper types
iv. transparencies not supported
v. multiple copies may be printed at once

Advantages: Less expensive, fast (some types), can make multiple copies with multipart
paper.

Disadvantages: Noisy! Prints lower quality in some types. Poor graphics or none at all.

Dot-Matrix and Daisy-Wheel-

Dot matrix printers form characters using row(s) of pins, 9, 18, or 24 which impact the
ribbon on top of the paper.

Daisy wheel printers use a spoked wheel with characters placed at the end of each spoke.
A print hammer is used to strike the desired character onto the ink ribbon and then the
paper.

Non-Impact Printers-

General features-

i. head does not make contact with the paper


ii. higher speed in characters per second is possible
iii. prints on most paper types but better quality obtained with better paper
iv. transparencies usually supported
v. uses ink spray or toner powder

8|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)

vi. offers superior quality and greater options (in terms of the number of fonts and
quality of graphic pictures)

Disadvantages: more expensive.

The three main types of non-impact printers are LaserJet, inkjet and thermal.

Characteristics of printers:

Speed: The speed of a printer is measured in: cps= characters per second, lpm= lines
per minute ppm= pages per minute. The faster the printing, the more expensive the
printer.

Resolution: A more numerical measure of print quality is printer resolution. Measured in


dots per inch (dpi), this determines how smooth a diagonal line the printer can produce.

Meaning of Storage Devices

A storage device is any computing hardware that is used for storing, porting and extracting
data files and objects. It can hold and store information both temporarily and permanently,
and can be internal or external to a computer, server or any similar computing device. A
storage device may also be known as a storage medium or storage media.

Storage devices are one of the core components of any computing device. They store
virtually all the data and applications on a computer, except hardware firmware. They are
available in different form factors depending on the type of underlying device. For
example, a standard computer has multiple storage devices including RAM, cache, and

hard disk, as well as possibly having optical disk drives and externally connected USB
drives.

There are two different types of storage devices:

Primary storage devices: Generally smaller in size, these are designed to hold data
temporarily and are internal to the computer. They have the fastest data access speed
and include RAM and cache memory.

9|Page
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Secondary storage devices: These usually have large storage capacity, and they store
data permanently. They can be either internal or external to the computer, and they
include the hard disk, optical disk drive and USB storage device.

Examples of computer storage:

Magnetic storage devices-

Today, magnetic storage is one of the most common types of storage used with
computers. This technology found mostly on extremely large HDDs or hybrid hard drives.

• Floppy diskette

• Hard drive

• Magnetic strip

• Super Disk

• Tape cassette

• Zip diskette

Optical storage devices-

Another common storage is optical storage, which uses lasers and lights as its method of
reading and writing data.

• Blu-ray disc

• CD-ROM disc

• CD-R and CD-RW disc.

• DVD-R, DVD+R, DVD-RW, and DVD+RW disc.

Flash memory devices-

Flash memory has replaced most magnetic and optical media as it becomes cheaper
because it is the more efficient and reliable solution.

• USB flash drive, jump drive, or thumb drive.

10 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

• CF (CompactFlash)

• Memory card

• Sony Memory Stick

• SD card

Online and cloud

Storing data online and in cloud storage is becoming popular as people need to access
their data from more than one device.

• Cloud storage

• Network media

Paper storage

Early computers had no method of using any of the above technologies for storing
information and had to rely on paper. Today, these forms of storage are rarely used or
found. In the picture to the right is an example of a woman entering data to a punch card
using a punch card machine.

• OMR

• Punch card

11 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

2. Explain about Operating Systems and its types. Discuss about Unix OS.

An operating system (OS), in its most general sense, is software that allows a user to
run other applications on a computing device. While it is possible for a software
application to interface directly with hardware, the vast majority of applications are
written for an OS, which allows them to take advantage of common libraries and not
worry about specific hardware details.

The operating system manages a computer's hardware resources, including:

• Input devices such as a keyboard and mouse


• Output devices such as display monitors, printers and scanners
• Network devices such as modems, routers and network connections
• Storage devices such as internal and external drives

The OS also provides services to facilitate the efficient execution and management
of, and memory allocations for, any additional installed software application programs.

Some operating systems were developed in the 1950s, when computers could only
execute one program at a time. Later in the decade, computers included many
software programs, sometimes called libraries, which were linked together to create
the beginning of today's operating systems.

The OS consists of many components and features. Which features are defined as
part of the OS vary with each OS. However, the three most easily defined components
are:

Kernel: This provides basic-level control over all of the computer hardware devices.
Main roles include reading data from memory and writing data to memory, processing
execution orders, determining how data is received and sent by devices such as the
monitor, keyboard and mouse, and determining how to interpret data received from
networks.

User Interface: This component allows interaction with the user, which may occur
through graphical icons and a desktop or through a command line.

12 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Application Programming Interfaces: This component allows application developers


to write modular code.

The Operating System is a program with the following features −

• An operating system is a program that acts as an interface between the software


and the computer hardware.

• It is an integrated set of specialized programs used to manage overall resources


and operations of the computer.

• It is a specialized software that controls and monitors the execution of all other
programs that reside in the computer, including application programs and other
system software.

Objectives of Operating System

The objectives of the operating system are −

• To make the computer system convenient to use in an efficient manner.

• To hide the details of the hardware resources from the users.

• To provide users a convenient interface to use the computer system.

• To act as an intermediary between the hardware and its users, making it easier for
the users to access and use other resources.

13 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

• To manage the resources of a computer system.

• To keep track of who is using which resource, granting resource requests, and
mediating conflicting requests from different programs and users.

• To provide efficient and fair sharing of resources among users and programs.

Characteristics of Operating System

Here is a list of some of the most prominent characteristic features of Operating


Systems −

• Memory Management − Keeps track of the primary memory, i.e. what part of it is
in use by whom, what part is not in use, etc. and allocates the memory when a
process or program requests it.
• Processor Management − Allocates the processor (CPU) to a process and
deallocates the processor when it is no longer required.
• Device Management − Keeps track of all the devices. This is also called I/O
controller that decides which process gets the device, when, and for how much
time.
• File Management − Allocates and de-allocates the resources and decides who
gets the resources.
• Security − Prevents unauthorized access to programs and data by means of
passwords and other similar techniques.
• Job Accounting − Keeps track of time and resources used by various jobs and/or
users.
• Control Over System Performance − Records delays between the request for a
service and from the system.
• Interaction with the Operators − Interaction may take place via the console of the
computer in the form of instructions. The Operating System acknowledges the
same, does the corresponding action, and informs the operation by a display
screen.
• Error-detecting Aids − Production of dumps, traces, error messages, and other
debugging and error-detecting methods.

14 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

• Coordination Between Other Software and Users − Coordination and assignment


of compilers, interpreters, assemblers, and other software to the various users of
the computer systems.

Classification of Operating systems

• Multi-user: Allows two or more users to run programs at the same time. Some
operating systems permit hundreds or even thousands of concurrent users.
• Multiprocessing: Supports running a program on more than one CPU.
• Multitasking: Allows more than one program to run concurrently.
• Multithreading: Allows different parts of a single program to run concurrently.
• Real time: Responds to input instantly. General-purpose operating systems, such
as DOS and UNIX, are not real-time.

Most Popular Desktop Operating Systems

The three most popular types of operating systems for personal and business
computing include Linux, Windows and Mac.

Windows

Microsoft Windows is a family of operating systems for personal and business


computers. Windows dominates the personal computer world, offering a graphical
user interface (GUI), virtual memory management, multitasking, and support for many
peripheral devices.

Mac

Mac OS is the official name of the Apple Macintosh operating system. Mac OS
features a graphical user interface (GUI) that utilizes windows, icons, and all
applications that run on a Macintosh computer have a similar user interface.

Linux

Linux is a freely distributed open source operating system that runs on a number of
hardware platforms. The Linux kernel was developed mainly by Linus Torvalds and it
is based on Unix.

15 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Meaning of Unix Operating System

Unix is a portable, multitasking, multiuser, time-sharing operating system (OS)


originally developed in 1969 by a group of employees at AT&T. Unix was first
programmed in assembly language but was reprogrammed in C in 1973.

Unix has been ported to more machine families than any other operating system. As
a result, it has come to be identified with the concept of open systems. Unix operating
systems are widely used in PCs, servers and mobile devices. The Unix environment
was also an essential element in the development of the Internet and networking.

Unix was developed based on the philosophy that the power of the system comes
from the relationships among programs, rather than on the programs themselves. Unix
programs are written to do one thing well, and programs are written so that they work
together. As such, Unix developers espouse simplicity, portability and clarity in design.
In order to adhere to this philosophy, Unix systems are characterized by:

• The use of text files for data storage

• A hierarchical file system

• A large number of small programs, strung together through a command-line


interpreter

• Use of shell scripts

• The avoidance of captive user interfaces

Unix had a significant impact on other operating systems and can be credited (in whole
or in part) for the following:

• The use of high-level language in operating systems

• Hierarchical file systems

• Its syntax for regular expressions found widespread use

• Unix shell inspired many of the command line interpreters that followed

• C programming language became more ubiquitous

16 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

• Began the movement toward modularity and reusability in software engineering

• Helped contribute to the explosion of the Internet by making TCP/IP protocol more
widely available

• Contributed to the launch of the free software movement

Free Unix-like operating systems such as Linux and BSD now hold a large portion of
the market originally held by Unix.

The Unix operating system is a set of programs that act as a link between the
computer and the user.

The computer programs that allocate the system resources and coordinate all the
details of the computer's internals is called the operating system or the kernel.

Users communicate with the kernel through a program known as the shell. The shell
is a command line interpreter; it translates commands entered by the user and
converts them into a language that is understood by the kernel.

Unix Architecture

Here is a basic block diagram of a Unix system −

The main concept that unites all the versions of Unix is the following four basics −

• Kernel − The kernel is the heart of the operating system. It interacts with the
hardware and most of the tasks like memory management, task scheduling and
file management.

17 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

• Shell − The shell is the utility that processes your requests. When you type in a
command at your terminal, the shell interprets the command and calls the program
that you want. The shell uses standard syntax for all commands. C Shell, Bourne
Shell and Korn Shell are the most famous shells which are available with most of
the Unix variants.

• Commands and Utilities − There are various commands and utilities which you
can make use of in your day to day activities. cp, mv, cat and grep, etc. are few
examples of commands and utilities. There are over 250 standard commands plus
numerous others provided through 3rd party software. All the commands come
along with various options.

• Files and Directories − All the data of Unix is organized into files. All files are then
organized into directories. These directories are further organized into a tree-like
structure called the filesystem. The standard file system has, among others, the
following directories:

Directory Description

/ The root directory, where the whole tree starts

/bin Contains fundamental executables (i.e., binaries)


generally used by all users on the system
(e.g., chmod, cp, mv, grep, and tar)

/etc Contains local configuration files, subdirectories


containing configuration files for large software
packages (e.g., the X11 window system)

/lib Contains shared libraries needed to boot the system and


run the commands in the root file system

18 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Directory Description

/tmp Local scratch space for storing temporary files, which


may be deleted without notice

/usr/bin The primary directory for most executables used by


normal users on the system
(e.g., emacs, make, scp, sftp, ssh, and yum)

usr/lib Contains static and dynamic libraries, a few executables


that usually are not invoked directly, and subdirectories
for complex programs

Top 10 Unix Based Operating Systems

Source & License Initial Latest


OS Kernel
Model Release Release

Solaris Mixed open source /


11.3, Oct
Oracle closed source & 1992 Monolithic
2015
Corporation Various

Darwin
Open source &
Apple Inc & 17.3.0, Nov
mostly APSL with 2000 Hybrid
Open source 2017
proprietary drivers
community

AIX
Closed source &
IBM 1986 7.2, Oct 2015 Monolithic
proprietary
Corporation

19 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

HP-UX
11i v3 Update
Hewlett- Closed source &
1982 16, March Monolithic
Packard proprietary
2017
Company

FreeBSD
Open source &
The FreeBSD 1993 11.1, Jul 2015 Monolithic
FreeBSD license
Project

Modular
NetBSD
Open source & 2- 7.1.1 Dec Monolithic Any
The NetBSD 1993
clauseBSD license 2017 Kernel (Rump
Foundation
Kernel)

Xenix
Closed source &
Microsoft, 1980 2.3.4, 1989 Monolithic
proprietary
SCO…

IRIX
Closed source & 6.5.30, Aug
Silicon 1988 Monolithic
proprietary 2006
Graphics

Tru64
Digital Closed source & 5.1B-6, Oct
1992 Hybrid Kernel
Equipment proprietary 2010
Corporation

Closed
macOS source (with open
2001 10.13.2 Hybrid
Apple Inc source
components)

20 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

3. What is MS-Office? Discuss about MS-word, MS-PowerPoint & MS-Excel


along with important commands.

Microsoft Office is a suite of desktop productivity applications that is designed


specifically to be used for office or business use. It is a proprietary product of Microsoft
Corporation and was first released in 1990. Microsoft Office is available in 35 different
languages and is supported by Windows, Mac and most Linux variants. It mainly
consists of Word, Excel, PowerPoint, Access, OneNote, Outlook and Publisher
applications.

Microsoft Office was primarily created to automate the manual office work with a
collection of purpose-built applications.

Each of the applications in Microsoft Office serves as specific knowledge or office


domain such as:

1. Microsoft Word: Helps users in creating text documents.

2. Microsoft Excel: Creates simple to complex data/numerical spreadsheets.

3. Microsoft PowerPoint: Stand-alone application for creating professional


multimedia presentations.

4. Microsoft Access: Database management application.

5. Microsoft Publisher: Introductory application for creating and publishing marketing


materials.

6. Microsoft OneNote: Alternate to a paper notebook, it enables an user to neatly


organize their notes.

Besides desktop applications, Microsoft Office is available to use online or from cloud
under a lighter (Office Web Apps) and full (Office 365) version. As of 2013, Microsoft
Office 2013 is the latest version, available in 4 different variants including Office Home
Student 2013, Office Home Business 2013 and Office Professional 2 and the
online/cloud Office 365 Home Premium.

21 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Meaning of Microsoft Word

Microsoft Word is a widely used commercial word processor designed by Microsoft.


Microsoft Word is a component of the Microsoft Office suite of productivity software
but can also be purchased as a stand-alone product.

It was initially launched in 1983 and has since been revised numerous times. Microsoft
Word is available for both Windows and Macintosh operating systems.

Microsoft Word is often called simply Word or MS Word.

In 1981, Microsoft hired Charles Simonyi to develop a word-processing application.


The first version was released in 1983. It was not initially popular, owing to its radically
different look compared to WordPerfect, the leading word processor at that time.
However, Microsoft improved Word continually over the years, including a 1985
version that could run on a Mac. The second major release of Word, in 1987, included
an upgrade of major features in addition to new functionalities such as support for the
rich text format (RTF).

In 1995, with the release of Windows 95 and Office 95, which offered a bundled set of
office productivity software, sales of Microsoft Word increased significantly.

Microsoft Word offers several features to ease document creation and editing,
including:

• WYSIWYG (what-you-see-is-what-you-get) display: It ensures that everything


displayed on screen appears the same way when printed or moved to another
format or program.

• Spell check: Word features a built-in dictionary for spell checking; misspelled
words are marked with a red squiggly underline. Sometimes, Word auto-corrects
an obviously misspelled word or phrase.

• Text-level features such as bold, underline, italic and strike-through

• Page-level features such as indentation, paragraphing and justification

22 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

• External support: Word is compatible with many other programs, the most common
being the other members of the Office suite.

The default file format was .doc prior to the Microsoft Word 2007 version; in 2007,
.docx became the default file format.

Important Commands in Microsoft Word:

File Document Keys-

S.N. KEYSTROKE ACTION


1 Ctrl+N Create New document
2 Ctrl+O Open document
3 Ctrl+W Close document Window
4 Ctrl+S Save document
5 F12 Save as
Ctrl+P, Ctrl + Shift +
6 Print document
F12
7 Ctrl+F2 Open Print preview
Switch between multiple
8 Ctrl+F6
Word documents
9 CTRL + F4 Close Current Document
10 Ctrl + F1 Open the Task Pane

Edit Document Keys-

S.N. KEYSTROKE ACTION


1 Ctrl+Z Undo the last action
2 Ctrl+Y Redo the last action
Copy selected text or
3 Ctrl+C
object
4 Ctrl+X Cut selected text or object

23 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Paste selected text or


5 Ctrl+V
object
Select All Text & Items in
6 Ctrl+A
Document
7 Ctrl+F Find a word
Find a word and Replace
8 Ctrl+H
with another word

Formatting Documents Keys-

S.N. KEYSTROKE ACTION

1 Ctrl+B Apply/remove Bold

2 Ctrl+I Apply/remove Italic

3 Ctrl+U Apply/remove Underline

Increases the highlighted


4 Ctrl + Shift + >; Ctrl + ]
text size

Ctrl + Shift + < ; Ctrl + Decreases the highlighted


5
[ text size

6 Ctrl+= Apply/remove subscript

7 Ctrl+Shift+= Apply/remove superscript

Left Align Selected Text or


8 Ctrl + L
Items

Right Align Selected Text


9 Ctrl+ R
or Items

Center Align Selected Text


10 Ctrl + E
or Items

24 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Justify Alignment of
11 Ctrl+ J
Selected Text or Items

Apply/remove Highlight
12 Ctrl+Alt+H
Text

change the case of letters


13 Shift + F3
of selected text

Change the font open front


14 Ctrl + Shift + F Ctrl + D
window

Function keys-

S.N. KEYSTROKE ACTION

1 F1 Open Help

2 F2 Rename the selected item

3 F3 Insert an auto text entry

Repeat the last action


4 F4
performed (Word 2000+)

Open the Find, Replace,


5 F5 and Go To window in
Microsoft Word.

elements in window or on
6 F6
the windows

Spellcheck and grammar


7 F7 check selected text or
document

8 F8 Extended a selection

25 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

9 F9 Update selected fields

To activate in the menu bar


10 F10
in the active program

11 F11 Go to next field

12 F12 Save As

Cursor Movement and Navigation Keys-

S.N. KEYSTROKE ACTION

1 Arrow Left ( <-) Move one character to Left

Move one character


2 Arrow Right ( ->)
to Right

3 Ctrl + Arrow Left Move one word to left.

4 Ctrl + Arrow Right Move one word to Right

5 Arrow Up Move Up One Line

6 Arrow Down Move Down One Line

7 Ctrl + Arrow Up Move Up One Paragraph

8 Ctrl + Arrow Up Move Up One Paragraph

9 Home Move to Beginning of a line

10 End Move to the End of a line

Moves the cursor to the


11 Ctrl + Home
beginning of the document

Moves the cursor to the


12 Ctrl + End
end of the document

26 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

13 Page Up Move Up one Screen

14 Page Down Move Down One Screen

15 Esc Cancel a Command

Delete one character to the


16 Delete
right of cursor

Delete one word to the right


17 Ctrl + Delete
of cursor

Delete one character to the


18 Backspace
left of cursor

Delete one word to the left


19 Ctrl + Backspace
of cursor

Text Selection Keys-

S.N. KEYSTROKE ACTION

selection one character to


1 Shift + Arrow Right
the Right

selection one character to


2 Shift + Arrow Left
the Left

Select everything between


3 Shift+ Home the cursor and the
beginning of the line

Select everything between


4 Shift+ End the cursor and the end of
the line

27 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Select everything between


5 Shift+ ctrl + Home the cursor and the
beginning of the document

Select everything between


6 Shift + Page Up the cursor and a Page
previous

Select everything between


7 Shift+ Page Down
the cursor and ta page after

Select everything between


8 Shift+ ctrl + End the cursor and the end of
the document

If double-clicking a word,
9 Double-click
selects the complete word.

Double-clicking anywhere
10 Double-click after text on a line will set a
tab stop.

Double-clicking anywhere
11 Double-click after text on a line will set a
tab stop.

Selects the line or


12 Triple-click paragraph of the text that
the mouse triple-clicked on

Zooms in and out of


13 Ctrl + Mouse wheel
document

28 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Meaning of Microsoft PowerPoint

Microsoft PowerPoint is a powerful presentation software developed by Microsoft. It is


a standard component of the company's Microsoft Office suite software, and is
bundled together with Word, Excel and other Office productivity tools. The program
uses slides to convey information rich in multimedia. The term "slide" refers to the
slide projector, which this software effectively replaces.

PowerPoint was developed by Dennis Austin and Thomas Rudkin at Forethought Inc.
It was supposed to be named Presenter, but the name was not adapted due to
trademark issues. It was renamed PowerPoint in 1987 as suggested by Robert
Gaskins. In August of 1987, Microsoft bought Forethought for $14 million and turned
it into its graphics business unit, where the company continued to develop the
software. The first iteration was launched together with Windows 3.0 in 1990. It only
allowed slide progression in one direction – forward – and the amount of customization
was fairly limited.

PowerPoint experienced a very significant change in PowerPoint 97, which added


predefined transition effects and allowed the user to time them appropriately so that
slides would transition automatically. This allowed a presenter to follow a predefined
progression and go on with the presentation without pausing to change or read the
slides. PowerPoint 2007 introduced the "ribbon" interface, marking a drastic change
from the previous interface style.

Important Commands in Microsoft PowerPoint

Function keys-

F1 Display Help or the Office Assistant

SHIFT+F1 Start context-sensitive Help

Select the text box (with text or an object


F2 selected inside the text box) or select the text
within a text box (with the text box selected)

29 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

ALT+F2 Carry out Save As command

ALT+SHIFT+F2 Carry out Save command (File menu)

SHIFT+F3 Change the case of letters

F4 Repeat the last action

SHIFT+F4 Repeat the last Find (Find Next)

CTRL+F4 Close the window

ALT+F4 Quit PowerPoint

ALT+SHIFT+F4 Quit PowerPoint

Carry out Slide Show command (View


F5
menu)

CTRL+F5 Restore the presentation window size

ALT+F5 Restore the program window size

F6 Move to the next pane

SHIFT+F6 Move to the previous pane

CTRL+F6 Move to the next presentation window

CTRL+SHIFT+F6 Move to the previous presentation window

F7 Carry out Spelling command (Tools menu)

Carry out Move command (presentation


CTRL+F7
Control menu)

Find next misspelling (Automatic Spell


ALT+F7
Checking enabled)

Carry out Size command (presentation


CTRL+F8
Control menu)

30 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

F10 Activate the menu bar

SHIFT+F10 Display a shortcut menu

CTRL+F10 Maximize the presentation window

ALT+F10 Maximize the program window

CTRL+SHIFT+F10 Activate the menu bar

ALT+F11 Display Visual Basic code

F12 Carry out Save As command (File menu)

SHIFT+F12 Carry out Save command (File menu)

CTRL+F12 Carry out Open command (File menu)

CTRL+SHIFT+F12 Carry out Print command (File menu)

Keys for working with presentations-

CTRL+N Create a new presentation

CTRL+M Insert a new slide

CTRL+D Make a copy of the selected slide

CTRL+O Open a presentation

CTRL+W Close a presentation

CTRL+P Print a presentation

CTRL+S Save a presentation

F5 Run a presentation

ALT+F4 Quit PowerPoint

CTRL+F Find text, formatting, and special items

31 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Replace text, specific formatting, and


CTRL+H
special items

CTRL+K Insert a hyperlink

F7 Check spelling

ESC Cancel an action

CTRL+Z Undo an action

CTRL+Y Redo or repeat an action

F6 Switch to the next pane (clockwise)

Switch to the previous pane


SHIFT+F6
(counterclockwise)

Keys for browsing hyperlinks in a slide show-

TAB Go to the first or next hyperlink

SHIFT+TAB Go to the last or previous hyperlink

ENTER WHILE A HYPERLINK IS Perform the "mouse click" behavior of


SELECTED the selected hyperlink

SHIFT+ENTER WHILE A Perform the "mouse over" behavior of


HYPERLINK IS SELECTED the selected hyperlink

Keys for deleting and copying text and objects-


BACKSPACE Delete one character to the left
CTRL+BACKSPACE Delete one word to the left
DELETE Delete one character to the right
CTRL+DELETE Delete one word to the right
CTRL+X Cut selected object
CTRL+C Copy selected object
CTRL+V Paste cut or copied object
CTRL+Z Undo the last action

32 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Keys for moving around in text-


LEFT ARROW One character to the left
RIGHT ARROW One character to the right
UP ARROW One line up
DOWN ARROW One line down
CTRL+LEFT ARROW One word to the left
CTRL+RIGHT ARROW One word to the right
END To the end of a line
HOME To the beginning of a line
CTRL+UP ARROW Up one paragraph
CTRL+DOWN ARROW Down one paragraph
CTRL+END To the end of a text box
CTRL+HOME To the beginning of a text box
To the next title or body text placeholder
CTRL+ENTER
(see note)
SHIFT+F4 To repeat the last Find action
Keys for selecting text and objects-
SHIFT+RIGHT ARROW One character to the right
SHIFT+LEFT ARROW One character to the left
CTRL+SHIFT+RIGHT ARROW To the end of a word
CTRL+SHIFT+LEFT ARROW To the beginning of a word
SHIFT+UP ARROW One line up
SHIFT+DOWN ARROW One line down
An object (with text selected inside the
ESC
object)
TAB OR SHIFT+TAB UNTIL THE
An object (with an object selected)
OBJECT YOU WANT IS SELECTED
ENTER Text within an object
CTRL+A (IN THE SLIDE PANE) All objects
CTRL+A (IN SLIDE SORTER VIEW) All slides
CTRL+A (IN THE OUTLINE PANE) All text

33 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Change or resize the font-


CTRL+SHIFT+P Change the font size
CTRL+SHIFT+> Increase the font size
CTRL+SHIFT+< Decrease the font size
CTRL+SHIFT+F Change the font
Apply character formats-
Change the formatting of characters (Font
CTRL+T
command, Format menu)
SHIFT+F3 Change the case of letters
CTRL+B Apply bold formatting
CTRL+U Apply an underline
CTRL+I Apply italic formatting
Apply subscript formatting (automatic
CTRL+EQUAL SIGN
spacing)
Apply superscript formatting (automatic
CTRL+SHIFT+PLUS SIGN
spacing)
CTRL+SPACEBAR Remove manual character formatting
Copy text formats-
CTRL+SHIFT+C Copy formats
CTRL+SHIFT+V Paste formats
Align paragraphs-
CTRL+E Center a paragraph
CTRL+J Justify a paragraph
CTRL+L Left align a paragraph
CTRL+R Right align a paragraph

Slide show controls-


N, ENTER, PAGE DOWN, RIGHT Perform the next animation or advance to
ARROW, DOWN ARROW, OR the next slide

34 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

THE SPACEBAR (OR CLICK THE


MOUSE)
P, PAGE UP, LEFT ARROW, UP Perform the previous animation or return
ARROW, OR BACKSPACE to the previous slide
<NUMBER>+ENTER Go to slide <number>
Display a black screen, or return to the
B OR PERIOD
slide show from a black screen
Display a white screen, or return to the
W OR COMMA
slide show from a white screen
S OR PLUS SIGN Stop or restart an automatic slide show
ESC, CTRL+BREAK, OR
End a slide show
HYPHEN
E Erase on-screen annotations
H Go to next hidden slide
T Set new timings while rehearsing
O Use original timings while rehearsing
Use mouse-click to advance while
M
rehearsing
BOTH MOUSE BUTTONS FOR 2
Return to the first slide
SECONDS
Redisplay hidden pointer and/or change
CTRL+P
the pointer to a pen
Redisplay hidden pointer and/or change
CTRL+A
the pointer to an arrow
CTRL+H Hide the pointer and button immediately
CTRL+U Hide the pointer and button in 15 seconds
SHIFT+F10 (OR RIGHT-CLICK) Display the shortcut menu
TAB Go to the first or next hyperlink on a slide
Go to the last or previous hyperlink on a
SHIFT+TAB
slide

35 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

ENTER WHILE A HYPERLINK IS Perform the "mouse click" behavior of the


SELECTED selected hyperlink
SHIFT+ENTER WHILE A Perform the "mouse over" behavior of the
HYPERLINK IS SELECTED selected hyperlink

Meaning of Microsoft Excel

Microsoft Excel is a software program produced by Microsoft that allows users to


organize, format and calculate data with formulas using a spreadsheet system. This
software is part of the Microsoft Office suite and is compatible with other applications in
the Office suite.

Excel is a commercial spreadsheet application produced and distributed by Microsoft for


Microsoft Windows and Mac OS. It features the ability to perform basic calculations, use
graphing tools, create pivot tables and create macros. Excel has the same basic features
as all spreadsheet applications, which use a collection of cells arranged into rows and
columns to organize and manipulate data. They can also display data as charts,
histograms and line graphs.

Excel permits users to arrange data so as to view various factors from different
perspectives. Visual Basic is used for applications in Excel, allowing users to create a
variety of complex numerical methods. Programmers are given an option to code directly
using the Visual Basic Editor, including Windows for writing code, debugging and code
module organization.

Important Commands in Microsoft Excel:

Date/Time Functions

DATE (WS) Returns the serial date value for a date


DATE (VBA) Returns the current system date
Returns a date after which a certain time/date interval has been
DATEADD (VBA)
added

36 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Returns the difference between two date values, based on the


DATEDIF (WS)
interval specified
Returns the difference between two date values, based on the
DATEDIFF (VBA)
interval specified
DATEPART (VBA) Returns a specified part of a given date
DATESERIAL (VBA) Returns a date given a year, month, and day value
DATEVALUE (WS, VBA) Returns the serial number of a date
Returns the day of the month (a number from 1 to 31) given a
DAY (WS, VBA)
date value
DAYS (WS) Returns the number of days between 2 dates
Returns the number of days between two dates based on a 360-
DAYS360 (WS)
day year
Adds a specified number of months to a date and returns the
EDATE (WS)
result as a serial date
Calculates the last day of the month after adding a specified
EOMONTH (WS)
number of months to a date
FORMAT DATES (VBA) Takes a date expression and returns it as a formatted string
HOUR (WS, VBA) Returns the hours (a number from 0 to 23) from a time value
ISOWEEKNUM (WS) Returns the ISO week number for a date
MINUTE (WS, VBA) Returns the minutes (a number from 0 to 59) from a time value
MONTH (WS, VBA) Returns the month (a number from 1 to 12) given a date value
Returns a string representing the month given a number from 1
MONTHNAME (VBA)
to 12
Returns the number of work days between 2 dates, excluding
NETWORKDAYS (WS)
weekends and holidays
Returns the number of work days between 2 dates, excluding
NETWORKDAYS.INTL (WS)
weekends and holidays
NOW (WS, VBA) Returns the current system date and time
SECOND (WS) Returns the seconds (a number from 0 to 59) from a time value
Returns a decimal number given an hour, minute and second
TIME (WS)
value
TIMESERIAL (VBA) Returns a time given an hour, minute, and second value
TIMEVALUE (WS, VBA) Returns the serial number of a time

37 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

TODAY (WS) Returns the current system date


Returns a number representing the day of the week, given a date
WEEKDAY (WS, VBA)
value
Returns a string representing the day of the week given a
WEEKDAYNAME (VBA)
number from 1 to 7
WEEKNUM (WS) Returns the week number for a date
Adds a specified number of work days to a date and returns the
WORKDAY (WS)
result as a serial date
Adds a specified number of work days to a date and returns the
WORKDAY.INTL (WS)
result as a serial date (customizable weekends)
Returns a four-digit year (a number from 1900 to 9999) given a
YEAR (WS, VBA)
date value
YEARFRAC (WS) Returns the number of days between 2 dates as a year fraction

Math/Trig Functions

ABS (WS, VBA) Returns the absolute value of a number


ACOS (WS) Returns the arccosine (in radians) of a number
ACOSH (WS) Returns the inverse hyperbolic cosine of a number
Apply functions such AVERAGE, SUM, COUNT, MAX or MIN and
AGGREGATE (WS)
ignore errors or hidden rows
ASIN (WS) Returns the arcsine (in radians) of a number
ASINH (WS) Returns the inverse hyperbolic sine of a number
ATAN (WS) Returns the arctangent (in radians) of a number
ATAN2 (WS) Returns the arctangent (in radians) of (x,y) coordinates
ATANH (WS) Returns the inverse hyperbolic tangent of a number
ATN (VBA) Returns the arctangent of a number
CEILING (WS) Returns a number rounded up based on a multiple of significance
Returns a number rounded up to the nearest integer or to the
CEILING.PRECISE (WS)
nearest multiple of significance
COMBIN (WS) Returns the number of combinations for a specified number of items
Returns the number of combinations for a specified number of items
COMBINA (WS)
and includes repetitions

38 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

COS (WS, VBA) Returns the cosine of an angle


COSH (WS) Returns the hyperbolic cosine of a number
DEGREES (WS) Converts radians into degrees
EVEN (WS) Rounds a number up to the nearest even integer
EXP (WS, VBA) Returns e raised to the nth power
FACT (WS) Returns the factorial of a number
FIX (VBA) Returns the integer portion of a number
FLOOR (WS) Returns a number rounded down based on a multiple of significance
FORMAT
Takes a numeric expression and returns it as a formatted string
NUMBERS (VBA)
INT (WS, VBA) Returns the integer portion of a number
LN (WS) Returns the natural logarithm of a number
LOG (WS) Returns the logarithm of a number to a specified base
LOG (VBA) Returns the natural logarithm of a number
LOG10 (WS) Returns the base-10 logarithm of a number
MDETERM (WS) Returns the matrix determinant of an array
MINVERSE (WS) Returns the inverse matrix for a given matrix
MMULT (WS) Returns the matrix product of two arrays
MOD (WS) Returns the remainder after a number is divided by a divisor
ODD (WS) Rounds a number up to the nearest odd integer
PI (WS) Returns the mathematical constant called pi
POWER (WS) Returns the result of a number raised to a given power
PRODUCT (WS) Multiplies the numbers and returns the product
RADIANS (WS) Converts degrees into radians
Returns a random number that is greater than or equal to 0 and less
RAND (WS)
than 1
RANDBETWEEN (WS) Returns a random number that is between a bottom and top range
Used to change the seed value used by the random number
RANDOMIZE (VBA)
generator for the RND function
RND (VBA) Used to generate a random number (integer value)
ROMAN (WS) Converts a number to roman numeral

39 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

ROUND (WS) Returns a number rounded to a specified number of digits


ROUND (VBA) Returns a number rounded to a specified number of digits
ROUNDDOWN (WS) Returns a number rounded down to a specified number of digits
ROUNDUP (WS) Returns a number rounded up to a specified number of digits
SGN (VBA) Returns the sign of a number
SIGN (WS) Returns the sign of a number
SIN (WS, VBA) Returns the sine of an angle
SINH (WS) Returns the hyperbolic sine of a number
SQR (VBA) Returns the square root of a number
SQRT (WS) Returns the square root of a number
SUBTOTAL (WS) Returns the subtotal of the numbers in a column in a list or database
SUM (WS) Adds all numbers in a range of cells
SUMIF (WS) Adds all numbers in a range of cells based on one criteria
Adds all numbers in a range of cells, based on a single or multiple
SUMIFS (WS)
criterion
Multiplies the corresponding items in the arrays and returns the sum
SUMPRODUCT (WS)
of the results
SUMSQ (WS) Returns the sum of the squares of a series of values
SUMX2MY2 (WS) Returns the sum of the difference of squares between two arrays
SUMX2PY2 (WS) Returns the sum of the squares of corresponding items in the arrays
Returns the sum of the squares of the differences between
SUMXMY2 (WS)
corresponding items in the arrays
TAN (WS, VBA) Returns the tangent of an angle
TANH (WS) Returns the hyperbolic tangent of a number
TRUNC (WS) Returns a number truncated to a specified number of digits

Statistical Functions

Returns the average of the absolute deviations of the numbers


AVEDEV (WS)
provided
AVERAGE (WS) Returns the average of the numbers provided

40 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Returns the average of the numbers provided and treats TRUE as 1


AVERAGEA (WS)
and FALSE as 0
Returns the average of all numbers in a range of cells, based on a
AVERAGEIF (WS)
given criteria
Returns the average of all numbers in a range of cells, based on
AVERAGEIFS (WS)
multiple criteria
BETA.DIST (WS) Returns the beta distribution
Returns the inverse of the cumulative beta probability density
BETA.INV (WS)
function
BETADIST (WS) Returns the cumulative beta probability density function
Returns the inverse of the cumulative beta probability density
BETAINV (WS)
function
BINOM.DIST (WS) Returns the individual term binomial distribution probability
Returns the smallest value for which the cumulative binomial
BINOM.INV (WS)
distribution is greater than or equal to a criterion
BINOMDIST (WS) Returns the individual term binomial distribution probability
CHIDIST (WS) Returns the one-tailed probability of the chi-squared distribution
Returns the inverse of the one-tailed probability of the chi-squared
CHIINV (WS)
distribution
CHITEST (WS) Returns the value from the chi-squared distribution
Counts the number of cells that contain numbers as well as the
COUNT (WS)
number of arguments that contain numbers
Counts the number of cells that are not empty as well as the number
COUNTA (WS)
of value arguments provided
COUNTBLANK (WS) Counts the number of empty cells in a range
COUNTIF (WS) Counts the number of cells in a range, that meets a given criteria
Counts the number of cells in a range, that meets a single or multiple
COUNTIFS (WS)
criteria
Returns the covariance, the average of the products of deviations for
COVAR (WS)
two data sets
Returns a prediction of a future value based on existing values
FORECAST (WS)
provided
Returns how often values occur within a set of data. It returns a
FREQUENCY (WS)
vertical array of numbers

41 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Returns the predicted exponential growth based on existing values


GROWTH (WS)
provided
Returns the y-axis intersection point of a line using x-axis values and
INTERCEPT (WS)
y-axis values
LARGE (WS) Returns the nth largest value from a set of values
Uses the least squares method to calculate the statistics for a straight
LINEST (WS)
line and returns an array describing that line
MAX (WS) Returns the largest value from the numbers provided
Returns the largest value from the values provided (numbers, text
MAXA (WS)
and logical values)
MEDIAN (WS) Returns the median of the numbers provided
MIN (WS) Returns the smallest value from the numbers provided
Returns the smallest value from the values provided (numbers, text
MINA (WS)
and logical values)
MODE (WS) Returns most frequently occurring number
MODE.MULT (WS) Returns a vertical array of the most frequently occurring numbers
MODE.SNGL (WS) Returns most frequently occurring number
PERCENTILE (WS) Returns the nth percentile from a set of values
PERCENTRANK (WS) Returns the nth percentile from a set of values
PERMUT (WS) Returns the number of permutations for a specified number of items
QUARTILE (WS) Returns the quartile from a set of values
RANK (WS) Returns the rank of a number within a set of numbers
Returns the slope of a regression line based on the data points
SLOPE (WS)
identified by known_y_values and known_x_values
SMALL (WS) Returns the nth smallest value from a set of values
Returns the standard deviation of a population based on a sample of
STDEV (WS)
numbers
Returns the standard deviation of a population based on a sample of
STDEVA (WS)
numbers, text, and logical values
Returns the standard deviation of a population based on an entire
STDEVP (WS)
population of numbers
Returns the standard deviation of a population based on an entire
STDEVPA (WS)
population of numbers, text, and logical values

42 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

VAR (WS) Returns the variance of a population based on a sample of numbers


Returns the variance of a population based on a sample of numbers,
VARA (WS)
text, and logical values
Returns the variance of a population based on an entire population
VARP (WS)
of numbers
Returns the variance of a population based on an entire population
VARPA (WS)
of number

43 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

4. Discuss briefly about LAN topology and protocols.

Network topology refers to the physical or logical layout of a network. It defines the
way different nodes are placed and interconnected with each other. Alternately,
network topology may describe how the data is transferred between these nodes.

There are two types of network topologies: physical and logical. Physical topology
emphasizes the physical layout of the connected devices and nodes, while the logical
topology focuses on the pattern of data transfer between network nodes.

AN physical topology defines the geographical arrangement of networking devices.


Topologies are driven fundamentally by two network connection types:

A point-to-point connection is a direct link between two devices. For example, when
you attach your computer to a printer, you have created a point-to-point link. In
networking terms, most of the today’s point-to-point connections are associated with
modems and PSTN (Public Switched Telephone Network) communications because
only two devices share point-to-point connections, it defeats the purpose of a shared
network.

44 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

A multipoint connection, on the other hand, is a link between three or more devices.
Historically, multipoint connections were used to attach central CPUs to distributed
dumb terminals.

In today’s LAN environments, multipoint connections link many network devices in


various configurations.

The major topologies of LAN are:

1. Bus Topology

2. Ring Topology

3. Star Topology

4. Mesh Topology

5. Cellular Topology

6. Hybrid Topology

Bus Topology

The physical bus topology is the simplest and most widely used of the network
designs. It consists of one continuous length of cabling (trunk) and a terminating
resistor (terminator) at each end. The data communications message travels along
the bus in both directions until it is picked up by a workstation or server NIC.

If the message is missed or not recognized, it reaches the end of the cabling and
dissipates at the terminator. All nodes in the bus topology have equal access to the trunk

45 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

– no discriminating here. This is accomplished using short drop cables or direct T-


connectors.

This design is easy to install because the backbone trunk traverses the LAN as one
cable segment. This minimizes the amount of transmission media required. Also, the
number of devices and length of the trunk can be easily expanded.

Advantages of Bus Topology:

1. It uses established standards and it is relatively easy to install.

2. Requires fewer media than other topologies.

Disadvantages of Bus Topology:

1. The bus networks are difficult to reconfigure, especially when the acceptable
number of connections or maximum distances have been reached.

2. They are also difficult to troubleshoot because everything happens on a single


media segment. This can have dangerous consequences because any break in
the cabling brings the network to its knees.

Ring Topology

As its name implies, the physical ring topology is a circular loop of point-to-point links.
Each device connects directly or indirectly to the ring through an interface device or
drop cable. Messages travel around the ring from node to node in very organized
manner. Each workstation checks the messages for a matching destination address.

46 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

If the address doesn’t match, the node simply regenerates the message and sends it
on its way. If the address matches, the node accepts the message and sends a reply
to the originating sender. Initially, ring topologies are moderately simple to install;
however, they require more media than bus systems because the loop must be
closed.

Once your ring has been installed, it’s a bit more difficult to reconfigure. Ring segments
must be divided or replaced every time they’re changed. Moreover, any break in the
loop can affect all devices on the network.

Advantages of Ring Topology:

1. They are very easy to troubleshoot because each device incorporates a repeater.

2. A special internal feature called becoming, allows the troubled workstation to


identify themselves quickly.

Disadvantages of Ring Topology:

1. It is considerably difficult to install and reconfigure ring topology.

2. Media failure on unidirectional or single loop causes complete network failure.

Star Topology

The Physical star topology uses a central controlling hub with dedicated legs pointing
in all directions – like points of a star. Each network devices have a dedicated point-
to-point link to the central hub. This strategy prevents troublesome collisions and
keeps the line of communication open and free of traffic.

47 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Star topologies are somewhat difficult to install because each device gets its own
dedicated segment. Obviously, they require a great deal of cabling. This design
provides an excellent platform for reconfiguration and troubleshooting.

Changes to the network are as simple as plugging another segment into the hub. In
addition, a break in the LAN is easy to isolate and doesn’t affect the rest of the network.

Advantages of Star Topology:

1. Relatively easy to configure.

2. Easy to troubleshoot.

3. Media faults are automatically isolated to the failed segment.

Disadvantages of Star Topology:

1. Requires more cable than most topologies.

2. Moderately difficult to install.’

Mesh Topology

The mesh topology is the only true point-to-point design. It uses a dedicated link
between every device on the network. This design is not very practical because of its
excessive waste of transmission media. This topology is difficult to install and
reconfigure.

48 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Moreover, as the number of devices increases geometrically, the speed of


communication also become slow. ATM (Asynchronous Transfer Mode) and switched
Hubs are the example of high-speed Mesh implementation.

Advantages of Mesh Topology:

1. Easy to troubleshoot because each link is independent of all others.

2. You can easily identify faults and isolate the affected links. Because of the high
number of redundant paths, multiple links can fail before the failure affects any
network device.

Disadvantages of Mesh Topology:

1. It is difficult to install and reconfigure especially as the number of devices


increases.

Cellular Topology

A cellular topology combines wireless point-to-point and multipoint designs to divide


a geographic area into cells. Each cell represents the portion of the total network area
in which a specific connection operates. Devices within the cell communicate with a
central station or hub. Hubs are then interconnected to route data between cells.

49 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

The cellular topology relies on the location of wireless media hubs. Cellular networks
exhibit interesting characteristics since this topology do not depend on cables.
Troubleshooting is easy because each hub interacts independently with each device.
A cellular installation depends on the accessibility hub locations.

Advantages of Cellular Topology:

1. It is relatively easy to install.

2. It does not require media reconfiguration when adding or removing users.

3. Fault isolation and troubleshooting is fairly simple.

Disadvantages of Cellular Topology:

1. All devices using a particular hub are affected by a hub failure.

Hybrid Topology

By modifying or combining some of the characteristics of the ‘pure’ network topologies,


a more useful result may be obtained. These combinations are called hybrid
topologies. Some of the hybrid topologies are:

1. Tree network

50 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

2. Star-Ring or interconnected

LAN Protocols

LAN protocols are distinguished by their capability to efficiently deliver data over
shorter distances, such as a few hundred feet, through various mediums, such as
copper cabling. Different protocols exist for different purposes and exist in different
"layers" of the "Open Systems Interconnect," or OSI, model. Typically, when using the
word "LAN" to describe a protocol, the intent is to describe lower level, or physical,
layers. Some of the most common LAN protocols are "Ethernet," "Token Ring" and
"Fiber Distributed Data Interface," or "FDDI."

"Ethernet" is by far the most common type of LAN protocol. It is found in homes and
offices throughout the world and is recognizable by its common "CAT5" copper cable
medium. It uses a switch or hub to which all systems connect to exchange data.

"Token Ring" is an older LAN technology that is not prevalent anymore. The basic
premise of "Token Ring" is a single "token" is passed from system to system, or
through a hub, and only the intended recipient reads the token.

51 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

"FDDI" defines how LAN traffic is transmitted over fiber cabling. Fiber cabling is used
when longer distances, usually between floors or buildings, are required, or where
heightened security is required.

Wireless LAN Protocols

Wireless LANs, sometimes referred to as "WLAN" or "Wi-Fi," are becoming


increasingly prevalent. They operate essentially the same as a traditional LAN, but
use wireless signals between antennas as the medium, rather than cabling. Most of
the wireless protocols in use today are based on the 802.11 standard and are
differentiated by the letter appearing after the number. The four main protocols are
"802.11a," "802.11b," "802.11g" and "802.11n."

"802.11a" is designed to carry data over shorter distances at higher speeds of up to


54 megabits per second, or Mbps. "802.11b" does the opposite, operating at lower
speeds of up to only 11 Mbps but with higher reliability at longer distances and with
more obstructing objects in the environment.

"802.11g" combines the best of the previous two protocols, operating at up to 54 Mbps
over longer distances. "802.11n" is the latest wireless protocol to be released. It can
operate at speeds of greater than 150 Mbps over longer distances than the other
protocols.

52 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

4. Write about application of Computers in Business.

Application of computers in various dimensions of business-

Business

A computer has high speed of calculation, diligence, accuracy, reliability, or versatility


which has made it an integrated part in all business organizations.

Computer is used in business organizations for −

• Payroll calculations

• Budgeting

• Sales analysis

• Financial forecasting

• Managing employee database

• Maintenance of stocks, etc.

Banking

Today, banking is almost totally dependent on computers.

Banks provide the following facilities −

• Online accounting facility, which includes checking current balance, making


deposits and overdrafts, checking interest charges, shares, and trustee records.

• ATM machines which are completely automated are making it even easier for
customers to deal with banks.

Insurance

Insurance companies are keeping all records up-to-date with the help of computers.
Insurance companies, finance houses, and stock broking firms are widely using
computers for their concerns.

53 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Insurance companies are maintaining a database of all clients with information


showing −

• Procedure to continue with policies

• Starting date of the policies

• Next due installment of a policy

• Maturity date

• Interests due

• Survival benefits

• Bonus

Education

The computer helps in providing a lot of facilities in the education system.

• The computer provides a tool in the education system known as CBE (Computer
Based Education).

• CBE involves control, delivery, and evaluation of learning.

• Computer education is rapidly increasing the graph of number of computer


students.

• There are a number of methods in which educational institutions can use a


computer to educate the students.

• It is used to prepare a database about performance of a student and analysis is


carried out on this basis.

Marketing

In marketing, uses of the computer are following −

• Advertising − With computers, advertising professionals create art and graphics,


write and revise copy, and print and disseminate ads with the goal of selling more
products.

54 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

• Home Shopping − Home shopping has been made possible through the use of
computerized catalogues that provide access to product information and permit
direct entry of orders to be filled by the customers.

Healthcare

Computers have become an important part in hospitals, labs, and dispensaries. They
are being used in hospitals to keep the record of patients and medicines. It is also
used in scanning and diagnosing different diseases. ECG, EEG, ultrasounds and CT
scans, etc. are also done by computerized machines.

Following are some major fields of health care in which computers are used.

• Diagnostic System − Computers are used to collect data and identify the cause
of illness.

• Lab-diagnostic System − All tests can be done and the reports are prepared by
computer.

• Patient Monitoring System − These are used to check the patient's signs for
abnormality such as in Cardiac Arrest, ECG, etc.

• Pharma Information System − Computer is used to check drug labels, expiry


dates, harmful side effects, etc.

• Surgery − Nowadays, computers are also used in performing surgery.

Engineering Design

Computers are widely used for Engineering purpose.

One of the major areas is CAD (Computer Aided Design) that provides creation and
modification of images. Some of the fields are −

• Structural Engineering − Requires stress and strain analysis for design of ships,
buildings, budgets, airplanes, etc.

• Industrial Engineering − Computers deal with design, implementation, and


improvement of integrated systems of people, materials, and equipment.

55 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

• Architectural Engineering − Computers help in planning towns, designing


buildings, determining a range of buildings on a site using both 2D and 3D
drawings.

Military

Computers are largely used in defense. Modern tanks, missiles, weapons, etc. Military
also employs computerized control systems. Some military areas where a computer
has been used are −

• Missile Control

• Military Communication

• Military Operation and Planning

• Smart Weapons

Communication

Communication is a way to convey a message, an idea, a picture, or speech that is


received and understood clearly and correctly by the person for whom it is meant.
Some main areas in this category are −

• E-mail

• Chatting

• Usenet

• FTP

• Telnet

• Video-conferencing

Government

Computers play an important role in government services. Some major fields in this
category are −

• Budgets

56 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

• Sales tax department

• Income tax department

• Computation of male/female ratio

• Computerization of voters’ lists

• Computerization of PAN card

• Weather forecasting

57 | P a g e
CAM Lab & Viva 12847 MBA I Semester (2018-20)

Conclusion

In conclusion, computers are becoming very important everywhere. Computers are a very
essential thing in our life. During the past 10 years, the use of computers in education has
increased dramatically and a wide range of educational computer programs are now
widely available for individual and classroom use. More companies are using them,
records are being stored in computer files, and stores are taking their business online to
sell to a broader audience. All of these are possible because of Computer Engineering. If
some very important changes are made in the curriculum, more students will be attracted
to the major allowing it to flourish even more. If students have the ability to learn what
they need to know about computers, they can go on into the job market and, hopefully,
become very successful. There will always be a rising need for people who can work with
technology, make it better, and even invent new tools to work with it.

58 | P a g e

Potrebbero piacerti anche