एक इंटरनेट के बारे में सबसे बड़ी बातें की है कि कोई भी वास्तव में इसे का मालिक है. यह एक वैश्विक नेटवर्क के संग्रह, दोनों बड़े और छोटे है. ये नेटवर्क कई अलग अलग तरीकों में एक साथ जोड़ने के लिए एकल इकाई है कि हम इंटरनेट के रूप में जानते हैं फार्म. वास्तव में, बहुत नाम परस्पर नेटवर्क के इस विचार से आता है.
1969 में अपनी शुरुआत के बाद से, इंटरनेट चार मेजबान कंप्यूटर सिस्टम से लाखों लोगों के दसियों के लिए हो गया है. हालांकि, सिर्फ इसलिए कि कोई भी इंटरनेट का मालिक है, यह नहीं है मतलब यह निगरानी नहीं है और अलग अलग तरीकों से बनाए रखा है. इंटरनेट सोसाइटी, 1992 में स्थापित एक गैर लाभ समूह, नीतियों और प्रोटोकॉल है कि हम कैसे उपयोग को परिभाषित करने और इंटरनेट के साथ बातचीत के गठन की देखरेख करते हैं.
इस अनुच्छेद में, आप इंटरनेट के बुनियादी आधारभूत संरचना के बारे में सीखना होगा. आप डोमेन नाम सर्वर, नेटवर्क का उपयोग अंक और अनिवार्य जरूरतों के बारे में सीखना होगा. लेकिन पहले आप के बारे में कैसे अपने कंप्यूटर दूसरों को जोड़ता है सीखना होगा.
इंटरनेट: कंप्यूटर नेटवर्क पदानुक्रम(ISP)
हर कंप्यूटर है कि इंटरनेट से जुड़ा हुआ है एक नेटवर्क का हिस्सा है, यहां तक कि अपने घर में एक है. उदाहरण के लिए, आप एक मॉडेम का उपयोग करें और एक स्थानीय नंबर डायल करने के लिए एक इंटरनेट सेवा प्रदाता (आईएसपी) से कनेक्ट कर सकते हैं. काम में, आप एक स्थानीय क्षेत्र नेटवर्क (लैन) का हिस्सा हो सकता है, लेकिन हो सकता है आप सबसे अधिक संभावना अभी भी एक आईएसपी है कि आपकी कंपनी के साथ अनुबंध किया है का उपयोग कर इंटरनेट से कनेक्ट. जब आप अपने ISP से कनेक्ट करने के लिए, आप अपने नेटवर्क का हिस्सा बन जाते हैं. आईएसपी तो एक कनेक्ट कर सकते हैंबड़ा नेटवर्क और उनके नेटवर्क का हिस्सा बन जाते हैं. इंटरनेट बस नेटवर्क्स का एक नेटवर्क है.
सबसे बड़ी संचार कंपनियों को अपने स्वयं के समर्पित विभिन्न क्षेत्रों को जोड़ने अनिवार्य जरूरतों है. प्रत्येक क्षेत्र में, कंपनी उपस्थिति (POP) के एक बिंदु है. पॉप के लिए स्थानीय उपयोगकर्ताओं को कंपनी के नेटवर्क का उपयोग करने के लिए, अक्सर एक स्थानीय फोन नंबर या समर्पित लाइन के माध्यम से एक जगह है. यहाँ अद्भुत बात यह है कि वहाँ कोई समग्र को नियंत्रित नेटवर्क है. इसके बजाय, वहाँ कई उच्च स्तरीय हैं नेटवर्क एक्सेस अंक या naps के माध्यम से एक दूसरे से कनेक्ट नेटवर्क.
इंटरनेट का नेटवर्क उदाहरण
यहाँ एक उदाहरण है. कल्पना कीजिए कि कंपनी एक बड़े आईएसपी है. प्रत्येक प्रमुख शहर, कंपनी, में एक पॉप है. प्रत्येक शहर में पॉप एक मोडेम का पूरा है कि आईएसपी ग्राहकों में डायल रैक है. कंपनी एक फोन कंपनी से फाइबर ऑप्टिक लाइनों पट्टों को एक साथ चबूतरे कनेक्ट (देखें उदाहरण के लिए, इस UUNET डाटा केंद्र कनेक्टिविटी नक्शा).
कल्पना कीजिए कि कंपनी बी एक कॉर्पोरेट आईएसपी है. कंपनी बी प्रमुख शहरों में बड़ी इमारतें बनाता है और निगमों इन इमारतों में अपने इंटरनेट सर्वर मशीनों का पता लगाने. कंपनी बी इतनी बड़ी कंपनी है कि यह अपने भवनों के बीच अपनी अपनी फाइबर ऑप्टिक लाइनों चलाता है ताकि वे सब जुड़े रहते हैं.
इस व्यवस्था में, एक ग्राहकों को कंपनी के सभी एक दूसरे से बात करते हैं, कर सकते हैं और ग्राहकों की कंपनी बी सभी एक दूसरे से बात कर सकते हैं, लेकिन वहाँ है एक ग्राहकों और ग्राहकों बी कंपनी ताल्लुक रखना कंपनी के लिए कोई रास्ता नहीं है. इसलिए, कंपनी एक और कंपनी बी दोनों विभिन्न शहरों में naps से कनेक्ट करने के लिए सहमत हैं, और दोनों कंपनियों के बीच यातायात naps पर नेटवर्क के बीच बहती है.
असली इंटरनेट में विभिन्न शहरों में naps और इन बिंदुओं पर अलग - अलग नेटवर्क के बीच डाटा प्रवाह के बाइट्स के अरबों पर बड़े इंट रनेट प्रदाताओं आपस के दर्जनों. इंटरनेट विशाल कॉर्पोरेट नेटवर्क है कि एक दूसरे के साथ naps पर सभी पत्र - व्यवहार करना करने के लिए सहमत के एक संग्रह है. इस तरह, इंटरनेट पर हर कंप्यूटर के हर दूसरे से जोड़ता है.
एक इंटरनेट रूटर के फंक्शन
इन सभी नेटवर्क के naps, backbones है, और routers पर भरोसा करने के लिए एक दूसरे से बात. इस प्रक्रिया के बारे में अविश्वसनीय है क्या है कि एक संदेश एक कंप्यूटर को छोड़ कर सकते हैं और कई अलग अलग नेटवर्क के माध्यम से दुनिया भर में आधे रास्ते यात्रा और एक दूसरे के एक अंश में किसी अन्य कंप्यूटर पर पहुंचने!
routers जहां एक कंप्यूटर से दूसरे करने के लिए जानकारी भेजने के लिए निर्धारित है. Routers विशेष कंप्यूटर कि अपने संदेश भेजने और हर के उन कर रहे हैं अन्य इंटरनेट उपयोगकर्ता रास्ते के हजारों के साथ अपने गंतव्य के लिए तेजी से. एक रूटर दो अलग - अलग है, लेकिन संबंधित रोजगार, है:
यह सुनिश्चित करता है कि जानकारी है जहां यह आवश्यक नहीं है नहीं जाना है. के कनेक्शन clogging से डेटा की बड़ी मात्रा को रखने के लिए महत्वपूर्ण है, "निर्दोष पास खड़े थे."
यह यकीन है कि यह जानकारी इच्छित गंतव्य के लिए कर सकता है बनाता है.
इन दो नौकरियों के प्रदर्शन में, एक रूटर दो अलग - अलग कंप्यूटर नेटवर्क के साथ निपटने में अत्यंत उपयोगी है. यह दो नेटवर्क में मिलती है, एक दूसरे से जानकारी गुजर. यह भी एक दूसरे से नेटवर्क की सुरक्षा, अनावश्यक अन्य पर spilling से एक पर यातायात को रोकने. के बावजूद कितने नेटवर्क जुड़ी हुई हैं, बुनियादी और रूटर के आपरेशन समारोह ही रहता है. के बाद से इंटरनेट छोटे नेटवर्क के हजारों के दसियों के ऊपर बना एक विशाल नेटवर्क है, इसके उपयोग routers के एक परम आवश्यकता है. अधिक जानकारी के लिए पढ़ने के लिए, कैसे Routers कार्य.इंटरनेट बैकबोन
राष्ट्रीय विज्ञान फाउंडेशन (NSF) 1987 में पहली उच्च गति रीढ़ बनाया. NSFNet नामक, यह एक T1 लाइन है कि 170 छोटे नेटवर्क के साथ जुड़ा हुआ है और 1.544 एमबीपीएस (मिलियन बिट्स प्रति सेकंड) में संचालित किया गया था. आईबीएम, एमसीआई और मेरिट NSF के साथ काम करने के लिए रीढ़ की हड्डी बना सकते हैं और एक T3 रीढ़ (45 एमबीपीएस) अगले वर्ष विकसित.
Backbones आम तौर पर कर रहे हैं फाइबर ऑप्टिक ट्रंक लाइनों. ट्रंक लाइन एकाधिक फाइबर ऑप्टिक को बढ़ाने के लिए एक साथ संयुक्त केबलों
क्षमता. वाहक के लिए ऑप्टिकल फाइबर ऑप्टिक केबल OC नामित कर रहे हैं, जैसे OC-3, OC-12 या OC-48. एक लाइन OC-3 155 एमबीपीएस प्रसारण जबकि OC 48-+२,४८८ एमबीपीएस (2.488 Gbps) संचारित कर सकते हैं सक्षम है. एक ठेठ 56K मॉडेम 56,000 बीपीएस संचारण के लिए है कि तुलना करें और आप देख बस कितनी तेजी से एक आधुनिक रीढ़ है.
आज वहाँ कई कंपनियों है कि अपने स्वयं के उच्च क्षमता अनिवार्य जरूरतों संचालित है, और उन सभी को दुनिया भर के विभिन्न naps पर आपस में कर रहे हैं. इस रास्ते में, पर हर कोई
इंटरनेट, कोई बात नहीं वे कहाँ हैं और वे क्या कंपनी का उपयोग करें, इस ग्रह पर हर किसी से बात करने में सक्षम है. पूरे इंटरनेट एक विशाल कंपनियों के बीच विशाल समझौते के लिए स्वतंत्र रूप से पत्र - व्यवहार करना है.
इंटरने¤¨ेट प्रोटोकॉल: आईपी पते
इंटरनेट पर हर मशीन एक अद्वितीय पहचान संख्या, एक आईपी पता कहा जाता है. आईपी इंटरनेट प्रोटोकॉल, जो भाषा है कि कंप्यूटर के लिए इंटरनेट पर संवाद उपयोग के लिए खड़ा है है. जिस तरह से पूर्व निर्धारित है कि प्रोटोकॉल है
कोई है जो कि सेवा के साथ एक सेवा वार्ता का उपयोग करना चाहता है. "किसी को" एक व्यक्ति को हो सकता है, लेकिन अधिक बार यह एक वेब ब्राउज़र की तरह एक कंप्यूटर प्रोग्राम है.
एक विशिष्ट आईपी पता इस तरह दिखता है:
के लिए हमें मनुष्य को याद करने के लिए यह आसान बनाने के आईपी पते आमतौर पर ऊपर एक तरह बिंदीदार दशमलव संख्या के रूप में दशमलव स्वरूप में व्यक्त कर रहे हैं. लेकिन कंप्यूटर द्विआधारी के रूप में संवाद. द्विआधारी में एक ही आईपी पते प पर देखो:
एक आईपी पते में चार नंबर ओकटेट कहा जाता है, क्योंकि
वे एक आठ पदों है जब द्विआधारी रूप में देखा. यदि आप सभी पदों को एक साथ जोड़ने के लिए, आप 32 मिलता है, जो कारण है कि आईपी पते के 32 - बिट संख्या माना जाता है. के बाद से आठ पदों के प्रत्येक दो अलग अलग राज्यों (1 या शून्य) हो सकता है, ओकटेट प्रति संभव संयोजनों की कुल संख्या 28 या 256 है. तो प्रत्येक ओकटेट शून्य और 255 के बीच किसी भी मूल्य हो सकते हैं. चार ओकटेट कम्बाइन और आप 232 या एक संभव 4294967296 अनन्य मान मिलता है!
बाहर लगभग 4.3 अरब
संभव संयोजनों, कुछ मान विशिष्ट IP पते के रूप में उपयोग से प्रतिबंधित कर रहे हैं. उदाहरण के लिए, आईपी पता 0.0.0.0 डिफ़ॉल्ट नेटवर्क के लिए आरक्षित है और 255.255.255.255 पते प्रसारण के ल�¤²िए इस्तेमाल किया जाता है.
ओकटेट एक बस संख्या अलग के अलावा अन्य उद्देश्य की सेवा. वे आईपी पते के वर्गों है कि एक विशेष रूप से व्यापार, सरकार या अन्य आकार और जरूरत पर आधारित इकाई को सौंपा जा सकता बनाने के लिए उपयोग किया जाता है. ओकटेट दो वर्गों में विभाजित कर रहे हैं नेट और होस्ट.
Units of a typical computer
Every computer has a certain architecture. It consists of various components. The basic function of this component is to interconnected to form a specific system. The given figure explain the basic structure of a computers.
There are three main basic units in a typical computer are as follow:-----
- 1.Input unit.
- 2.System unit.
- 3.Output Unit.
Input Device
It is a kind of device that is connected to CPU(Central Processing Unit).This device is used to give all instructions and command to the computer for performing different kind of activity.There is a Control unit that take all the command and instruction from a user and send it to the CPU where it is processed as situation needs. Keyboard is the most common Input Unit. Other Input Units are as follow :-----
- 1.Mouse
- 2.Light Pen
- 3.Trackball
- 4.Disks
- 5.Joystick
- 6.Scanner
- 7.Microphone
System unit
System unit is a place where all the command and data are store and processed after receiving all data from some input device. It consists of two parts are as follow:-----
- 1.Central Processing Unit
- 2.Memory Unit
Central Processing Unit
It is also known as CPU. It is a place where all the data and instruction are processed. For this reason it is also known as the brain and heart of a computer system. It is divided into two basic units these are:------
- 1.Control Unit
- 2.Logic and Arithmetic Unit
This is a very important unit as in the respect of function. It function is to control and Coordinates the total activities of all the parts and units of a computer system. There is a list of some of the function perform by Control unit are as follow------
- 1.It brings all the instruction, Command and data from main memory.
- 2.Interpret all type of instruction.
- 3.It controls the movement of data from the main memory and into the main memory.
- 4.Input and Output device is also control by Control unit.
- 5.It is responsible for whole management of a computer system.
Logic and Arithmetic unit
All arithmetic calculation like addition , subtraction , multiplication and division are perform in this unit. It unit is also known as ALU. A typical ALU Consist of a part that is electronic circuitry and by this ALU perform all type of arithmetic calculation. For logical operation it has a Logic circuitry. It give result in two form whether TRUE or FALSE. It receives all the necessary command from the Control unit to perform all the operation that is discuss earlier.
Memory Unit
This unit is also known as storage device as name suggested. It is a place where all the data and instruction are store that are given by user side. Computer use Bytes , Bits and words to measure the memory of a computer .A Bit is represented as 0 or 1. 0 or 1 is a binary digit. A Byte is a type of sequence and is always measure in a sequence of 8 and word is measure in a sequence of 16 bits or 2 bytes.
The memory of a computer is divided into three parts are as follow:-----
- 1.Main Memory
- 2.Cache memory
- 3.Secondary memory
Main memory
Main memory is a place that store all the data received through the input devices. The storage is temporary and all the data are erased when we switched off the power and that why it is known as a primary memory.
The capacity in the term of storage is measured in megabytes and gigabytes. The two most commonly primary memory is RAM Or ROM
Secondary Memory
Secondary memory is also known as a permanent memory. The capacity is very high as it store a large amount of data for a longer period of time. This memory is connected to the CPU. Magnetic material is used to made a Secondary memory. Some of the well known secondary memory are as follow -----
- 1.Magnetic Disk
- 2.Magnetic tape
- 3.Magnetic Drum
Cache Memory
This type of memory is placed in between the CPU and the main memory. We can access all the data at a higher speed when we compare to a main memory. The user like us are not able to access this type of memory. During the execution of any program the data and instruction are stored in that memory.
Output Unit
This unit is used to display a result which is obtain after the execution of any program or instruction that we feed it to computer with the help of Input device. The most commonly output device is monitor. Other Output devices are as follow --------
- 1.Printer
- 2.Plasma Display
- 3.Plotter
- 4.LCD display
- 5.Speaker
- 6.Disks
- 7.Printers
Definition of a computer.
Computer is also define as a electronic device that is used for the processing of information that we feed in a computer.Computer is a word that is formed from a latin word compute it means that to calculate.
How it process
Suppose that we feed data in a computer it accept all the data from our side and then store it in its temporary memory and then process it and give us a desire result as possible.
For what computer is used
1)---- Storage of large amount of data ---- computer have the ability to store a large amount of data in their permananent memory known as hard disk.All store data are remain for future until we give a delete comand to stored data.
2)---- It act as a Input and Output machine --- It function is to receive the data and instruction given by any of the user of that computer and then process it and return desire result to specified user.
3)----- Processing on data ---- It means that it process all the input data.Processing of data means performing the desired operation such as addition , subtraction , multiplication ,division and other arithmetic operations as well as logical operations on the input data.
Properties of a computer
4)----Very high speed ----- processing of data is very fast it take only a few part of second. It is capable of performing large amount of instruction per second.
5)-----Accuracy ----- It is always accurate in respect of result but you have to feed a correct input data for accurate result.Right way of processing a input data is also known as accuracy of a computer.
6)------Reliability ---- It nature is to give a consistent results every time you process a data.
7)------Versatility ----- Main role of computer is versatile.It i9s used for various purpose like calculations , processing , computer games , music , video, teaching ,etc.
8)------Diligence ----- The most important function of a computer it never tired. It can be used for longer period without any disturbance.
Generation of computers
The computer we use today is not develop in a day or two it takes a longer period of times in respect of years to give a computer that we usetoday.It takes generation to generation to delop.There are five generation of computer are as follows :---
These five generation of computer are further divided into two types these are:---
1)---- Non Electronic Generation
2)---- Electronic Generation
1------Non Electronic Generation is also known as the Zero(0) generation computer.
Example:---
Abacus , Differential engine.
2--------Electronic generation start from 1946 onward.It classified into five generations.
First Generation Computers
In this generation vaccum tube is used.In this generation there is a limitation of primary memory and use magnetic drums as in the form of secondary memory.For input and output operations it uses a punched card and a magnetic tape.
Examples :----
ENIAC , UNIVAC .
Second Generation of computers
In this generation it use a transistors.It has better primary memory as we compare to first generation of computer. It sustain a higher reliability.In this generation it use a programming language such as Pascal , AlGOL and others.
Examples :-----
IBM 1401 , GE635.
Third Generation of computers
In this generation it use a Integrated Circuits.Integrated circits contain many transistors in a single chip of silicon.It has better memory as compare to both the generation it use a semiconducductor as memory.It sustain better reliability as compare to second generation of computer.From third generation it give the facility of airline reservation , banking services as well as give weather report.
Examples:----
CYBER 175,IBM system/360.
Fourth generation of computers.
In this generation it use a LSI (large scale Integration) and VLSI(Very Large scale integration).It has larger capacity in respect of storage.From that generation a new concept was introduce that change the way of living that is networking.
Examples:----
IBM 3033 , Hp 3000.
Fifth generation of computers
This is the generation which give the definition of a super computer.In this generation it consist of a SLSI(Super large Scale Integration).From that generation it evelop all the major function of computer that we use today such as CD-Rom was introduced in that generation.
Examples:-----
Param 10000 , CRAY machine .
Introduction
MS-DOS OR DOS stand for Microsoft Disk Operating System or Disk Operating System. It is for the single user system. Not more that it is also called a system software. It is found on a hard disk. DOS is loaded in the Ram when we open the computer. Ram is also called a main memory of a computer.
Functions of DOS are as follows:---
1):-- It function is to organization of hardware components with software.
2):--It function is to load and execute a program that is done by user on that computer.
3):-- It function is to organize the file on the disk in a orderly way.
Booting
Booting is also known as the process of loading DOS into the main memory that is Ram. When we start a computer and try to boot it from the hard disk. The display of the computer display different messages such as follow below : ---
C:\> ___________________Cursor.
C:\> ___________________Current Disk.
C:\> ___________________Root Directories.
C:\> ___________________Prompt required to show the directory.
Directory
Every Directory holds a files and subdirectories. In each of the disk there is a at least one directory. This directory is known as the main directory or the root directory. The directory name must contain a 1-8 charaters.
Examples:----
- 1.Com
- 2.The
- 3.Sit
You get a directory name that has some meaning.
File
Files hold a different type of program and different type of data. Each of the file is known by his file name. These type of file are maintain by using of various directory.
File Name
The name of the file must contain a 1 to 8 character in nature. It is represented by using a 1 to 3 character.File name is mandatory where as the extension name is not much mandatory.if we want to give extension name we must use a dot.
Such as :---
Chandan.abc
Chandan is a file name and abc is a extension name whereas file name and extension name is separated by a dot.
Maths
This is a type of a file name without using the extension name.
Some of the important DOS commands:---
1):---C:\> dir
This type of command is used to show all the names of files and a subdirectories. It show the following type of things are as follow:--
- 1.Name of File
- 2.Extension Name
- 3.Number of the Bytes
- 4.It gives the Right Date and time of the creation of the Files or Directiories.
When a directory contain a large number of files and subdirectories then it is good to scroll over your computer screen for a better reading.
2):-- C:\> dir/p
This is a type of command which is used to give page wise display of a files and a subdirectories in a specific directory. It show the following type of things are as follow:--
- 1.Name of File
- 2.Extension Name
- 3.Number of the Bytes
- 4.It gives the Right Date and time of the creation of the Files or Directiories.
We use any of the key while we try to move from one page to another.
C:\> dir /w
This type of command is used to show 5 names in one line of all the files and subdirectories present in a specified directory. It shows following are as follow:--
- 1.Name of File
- 2.Extension Name
C:\> dir /ad
It is used to display all the name of the subdirectories contained in a specific directory.
C:\> ver
This command is used to see a version of the MS-DOS that you use on your system.
D (root directory) ----------------- Chandan (directory) ------------------physic(sub-directories) dl.bcd
D (root directory) ----------------- Chandan (directory) ------------------math(sub-directories) mark.bcd
D is a type of root directory.
Chandan is a sub-directory of a root directory of D and root directory for physic and math.
Physic and math is a sub-directories of a chandan directory and a sub-directories of a root directory of D.
dl.bcd and mark.bcd is a file present in the specific sub-directories physic and math.
How to make a directory:----
C:\> md chnadan
Command which is used to make a directory is md.
Chandan is used as name of the directory.
How to delete a file:---
C:\chandan\physic> del dl.bcd
Or
C:\chandan\math> erase mark.bcd
In this section we use a del or erase command to delete a file from directory or sub-directories.
How to remove a directory:---
C:\chandan\physic> cd ------------------------- 1st process(It remove file and sub directories)
C:\chandan> rd physic -------------------------2nd process(It remove directory).
We use rd command to remove a directory.To remove the directory first of all we have to remove all the sub directories and file that is present in that directory after that we are able to remove a directory.
How to remove all the file that is present in a directory physic :-----
C:\chandan> cd physic
C:\chandan\ physic>
C:\chandan\ physic> del**
How to remove a directory physic and math :-----
C:\chandan\physic> cd………
C:\chandan> rd physic
C:\chandan> cd………
C:\> rd chandan
C:\>
By apply this process you are able to delete all the directory.
How to move from a C drive to other drive on your computer:---
C:\> a :
We can use a command a: to move from C drive to other drive.
a : \ >
It indicate that we are in a other drive.
We use the reverse case while you want to move from other drive to a C drive.
a:\> c:
Here we use a c: command which is used to move from other drive to C drive.
By clicking on the icon such as MS_DOS prompt we can go to DOS prompt.It will appear just like this as below:-----
C:\>
There are some command use in C- programming to make save , compile , run ,and see a result of you programme:------
- 1.F2 - This key is used to save a program written by you.
- 2.F3 - This key is used to open a program that is save by use in your previous session.
- 3.F9 - This key is used compile your program written by you.
- 4.Ctrl F9 - This key is used to run the program written by you.
- 5.Alt F5 – This key is used to see the result of your executed program.
- 6.Alt X – This key is use to came out from the TC editor section.
Windows operating system
It is also known as the GUI (graphical user interface).This type of operating system is a user friendly operating system. It is different from the DOS operating system because there is no need to remember any kind of command to run your computer because all the thing will be display on the computer screen itself that why is known as user friendly operating system. Till now there are various kinds of windows operating system release. Today we use a window 7 operating system. It does not develop to a that much it takes a lots of period and many form of window operating system pass in that period.
Different components of the windows operating system are as follows:--------
In this section we take a simple window operating system for a example.
TITLE BAR
The top most part of the any windows operating system is called a title bar as indicate above.The following thing it can display these are:----
- 1.Window Name
- 2.Minimize button , maximize button and Close button as show below figure.These all buttons are on the right hand side of windows.
1. Minimize button is used to minimize the window which you open.
2. Maximize button is used to maximize the minimize window.
3. The close button is used to completely close the window.
MENU BAR
Menu bar is a part of the window display just below the title bar.It contain a lot of option such as FILE , Edit , View , Insert , Format , Help , Tools , Window. For using each of the option you have to pull down each of the option down ward.
STANDARD TOOL BAR
This option is display below the menu bar. It contain a number of icons s in figure.When you create any document this option play very important role without this you are not able to make a document.
FORMATTING TOOL BAR
This option is display just below the standard tool bar and this portion contain a lots of command for your document in the form of a buttons.
Suppose that there is no tool for formatting and even there is not a standard tool bar you have to choose a view option from the menu command and dragging down ward a menu is open on the side of the window use that as a standard and formatting tool bar.
STATUS BAR
It function is to display the total number of item are present in the windows.It also display the total memory are taken by that item.
MOUSE AND KEYBOARD
When you work on the window then you need a mouse and keyboard to give a instruction to the window. Among the both of the mouse and keyboard mouse is better for windows operating system.
Basic function of mouse are as follow:-----
- 1.It move on the pad and as we move it also move on the computer screen.
- 2.When the mouse curser is pointing on any of the icon we click it to open an application.
- 3.If you are in a hurry then you press right mouse twice to immediate open an application or folder.
INTRODUCTION
One day when you go to market and you find a lacking of cash in your pocket,What you do in thatsuitation.The only way is to go to ATM(Automated teller machine) take your bank atm card and insert your card into the card reader of atm machine and by following some certain rules you got a cash in your pocket and you continue your shopping.
Lets comes to know that how this ATM machine works and make you ready for shopping without lacking of cash.
Difference between ATM card and check card
Today most of the banks start giving a check card which is also known as credit debit card to their customers. This check card are different from the ATM cards.
First of all the check cards are known as debit cards because by seeing the process of work done by debit card.This check card deducts cash from your savings bank account for your purchase done in a store or other place while ATM card gives you a cash for your purchasing done by you.The second difference is that ATM card is only use in a ATM machine and very fews store too but check card are use in all most of all the shop where credit card are accepted.
However some hotel and and some car services centre they uses a credit card only because the use of the credit card are easy and free from the risk when we compare to the check card or the debit card.
How Do ATMs Work
ATM is a type of a data terminal.It has two input and four output devices. When we connect ATM then it communicate through a host processor. The host processor is a type of a analogous to an ISP or internet service provider that is a path through which all the ATM of different bank networks become available to the bank customer who have ATM card.
Today most of the host processors either support leased-line or dial-up machines.That connect directly to the host processor with the help of a four-wire, point-to-point, dedicated telephone line is known as a leased-line machine whereas those connect to the host processor with the help of normal phone line with the help of ISP is known as Dial-up Machine.
Some of the independent service provider or a financial institution or a bank are own a host processor.
Parts of the Machine
As we know that a ATM machine has a two input devices these are card reader and a keypad:-
- Card reader –The function of the card reader is to captures your account information that is stored on the back side of your ATM that is a magnetic strip.Now the host processor uses this information to complete your transcation to the bank that you associate.
- Keypad – The function of the keypad is that it can be uses to select type of transaction,amount of your cash and it also used to type your personal pin on the ATM machine screen.
There are four type of output devices these are speaker, display Screen, receipt printer and cash dispenser.
- Speaker – It function is to provides the customer with a audio feedback when a customer press a key.
- Display screen – It function is to give the direction to the customer that include stet by step process of the transaction. Leased-line machines use a monochrome or the color CRT display whereas Dial-up machines use a monochrome or the color LCD display.
- Receipt printer – It function is to provides the customers a paper receipt of the transaction made by him.
- Cash dispenser – It function is to give a cash after transaction is complete.This is also known as the heart of an ATM.
Sensing of Bills
In a cash dispenser there is a mechanism that is known as cash-dispensing mechanism.It has an electric eye that function is to count each bill. After the counting of the bill all the information of a particular transaction is recorded in a journal. Now the information that is stored in a journal is printed out by a receipt printer and the copy of that transaction is stored in a hard disc of a machine for a two years.When the customer having any dispute about any of the transaction he or she take out the printout and then contact to the host processor.The host processor is responsible for resolving all the dispute that is created during the transaction.
The cash-dispensing mechanism has a sensor along with the electric eye that count the bills it function is to evaluates the thickness of each bill. In a case of two bill struck each other and try to come out then it make a direction of that two bill that stuck each other to the reject bin.
Machine also record the numbers of the reject bill for future.When the ratio is high it indicate that there is a problem in a dispenser mechanism.
Settlement Funds
When a customer go to the ATM and perform ATM transaction, Then there is a need of specific information with the help of card reader and the keypad. Now the ATM carry this information to the host processor, which carry the transaction request to the customer’s bank. When we request a cash then the host processor makes an electronic fund transfer that take place from the customer's bank account and carry to the host processor's account. When the funds are successfully transfer to the host processor's bank account then the host processor sends an approval code that help to give cash to the customer through the cash dispenser. That why when you request for a cash then the money moves electronically from your bank account to the host's account and you got a cash in your hand.
ATM Security
For security of your ATM you must keep your personal identification number (PIN) and other information secure and safe.There are lot of thing keep in your mind while you go to ATM machine.
Step for keeping your pin secret:-
- Do not write your ATM PIN on any of the paper. Try to keep your ATM pin in your mind .IF necessary keep your pin in a safe place not in your wallet or purse.
- Try to create your pin such that you may easily remember. Always change you ATM pin with a regular interval.
- Does not give a telephone number and birth date and house number as your ATM pin.
Tip for safe usage of ATM:-
- First of all keep your ATM in a purse and wallets and try to keep away from scratch and bent.
- Not to take out your ATM card outside the ATM room. You may attach by other person too .
- You always try to Stand directly in front of the ATM keypad when you are typing your personal PIN.
- When your transaction is complete you must take your receipt, your card and money.
- If you come ATM by your bike or car you keep this closer to the ATM so that you easily go from there in a safe way.
- Do not leave your car running while using a walk-up ATM. Take your keys with you and lock the doors before your transaction.
- If you find something wrong in a ATM machine then you cancel your transaction and go to the bank and ask this for your problem to the bank authority.
More Articles …
Subcategories
Web Hosting
Web Hosting is a service offered by web hosting providers to the individuals and organizations to make their websites accessible on the internet. Depending on the requirement, one can avail different types of web hosting such as shared hosting, dedicated hosting, virtual private hosting, cloud hosting etc.
Page 21 of 193