Adobe PageMaker is page laying or page composition (Desktop publishing) software that automates all the steps developing a printed document. Composition is the process of laying out text and graphics typography, line boxes pictures, drawing and colors on a page.
MS-Word helps you keep your documents, simple by organizing most formatting into 3 levels of related information: font, paragraph, and section. â€¢ Font formatting is any formatting that you can apply to as little as one characters, such as bold, underline, Time New Roman, etc. â€¢ Paragraph formatting is any formatting that you can apply to as little as one paragraph. Such as paragraph spacing before and after, line spacing, indents etc. â€¢ Section formatting can be thought of as page layout or document formatting, since this formatting applies to an entire document by default. Its named section because you insert a formatting mark called a section break in order to change settings for this type of formatting in only part of your document.
Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, software and data storage) operates. Examples of utility program are Antivirus, Achievers, Backup software, Clipboard managers, and data compression.
An operating system maintains a list of files called a directory for each disk. The main directory of the disk is called the root directory. The root directory is provided by the operating system and has a special name; for example, in DOS systems the root directory is called. The root directory is sometimes referred to simply as the root.
Redundancy allows a receiver to check whether received data was corrupted during transmission. So that he can request a retransmission. Redundancy is the concept of using extra bits for use in error detection. The redundant bits are added by sender and removed by the receiver. Instead of repeating the entire data stream, a shorted group of bits may be appended to the end of each unit. This technique is called redundant because the extra bits are redundant to the data : they are discarded as soon as the accuracy of the transmission has been determined.
The term bit is a portmanteau of binary digit. It is the basic unit of information in computing and digital communications. A bit can have only one of two values, and may therefore be physically implemented with a two-state device. These values are most commonly represented as either a 0 or
A computer icon refers to a small picture on a computer screen that represents a specific file, directory, window, option, program or application. Clicking on an item will start the associated application, program or open the associated file, directory or window.
The plotter is a computer printer for printing vector graphics. A plotter gives a hard copy of the output. It draws pictures on paper using a pen. Plotters are used to print designs of ships and machines, plans for buildings and so on.
Password is a set of secret characters or words utilized to gain access to a computer, web page, network resource or files. Password help ensure that computers or files can be accessed only by those who have been granted the right to view or access them. In this way, passwords provide confidentiality of computers or files from authorized access.
A modifier key is a special key on computer keyboard that temporarily modifies the normal action of another key when pressed together. Alt, Shift, Ctrl are modifier keys. â€¢ Shift- gives capital letters or to access the punctuation and other symbols on the number keys and other keys. eg. Shift + A gives output capital letter A. â€¢ Ctrl- Used in combination with other keys as shortcuts for menu commands, eg. Ctrl + S activates the save command. â€¢ Alt- Works as menu - command shortcuts. eg. Alt + F4 closes the active window on the desktop.
Secondary storage, sometimes called auxiliary or external storage, is non-volatile storage that is not under the direct control of a computer's central processing unit (CPU) or does not directly interact with an application. External hard drives, portable USB flash drives, CDs, DVDs and cloud backup are often used for secondary storage.
A firewall is a system designed to prevent unauthorised access to or from a private computer network. It acts as a barrier between a trusted network and an untrusted network. A firewall controls access to the resources of a network through a positive control model.
Nonvolatile storage refers to a storage device whose contents are preserved when its power is off. Storage using magnetic media (e.g. magnetic disks, magnetic tape or bubble memory ) is normally nonvolatile. Other examples of non-volatile storage are EEPROM, CD-ROM,paper tape and punched cards.