Thursday, November 26, 2015

INTRODUCTION TO THE MORAL & ETHICS

INTRODUCTION TO THE ETHICS

With the widespread usage of IT, Computers, Mobile phones, Internet and other components, there is an increase in misuse (cybercrime) as well. Internet is easy to use and low cost fastest mode of communication. Majority of the people are using it. Ethics identify what is wrong and what is right.

MORAL & ETHICS


Moral: - refers to generally accepted standards of right and wrong in the society. Parents’ guide their children to learn how to behave in the society. For example – do not lie, do not steal …etc. In the cyber world there are also such standard, for example – Do Not make use of pirated CD’s, Do Not use computer for wrong and illegal hacking, stealing of password etc. A set of moral principles which systematically link moral beliefs to each other is called as Moral Theory.

Ethics: - The parents’ guide child to identify what is wrong and what is right and select the right thing. This determination of right and wrong, and following the right behavior, using morals is called as ethics.

ETHICS-CULTURE & ETHICS FOR COMPUTER USERS

It depends on a person how to make appropriate use of any means. Constructive minded people make decent and appropriate use of their knowledge and technology; by thus helping society in most preferred way. Whereas, there can be also people who utilize their knowledge in destructive way for various reasons.

Internet is communication media which is easily accessible and open to all. The word “Cyber Ethics” refers to the code of responsible behavior, one has to demonstrate while using internet. In a way, it is the code of conduct which defines what is right and what is wrong. It can be also termed as “Netiquette” i.e. “Net Etiquette”. As a part of responsible computer user in the society, one shall use the system in ethical and lawful manner.

ETHICS FOR COMPUTER USER


Any ethical computer user should avoid:

1.      Software Piracy
2.      Unauthorized Access

Software Piracy: is nothing but copyright violation of software created originally by individual or institution. It includes stealing of codes/programs and other information illegally and creating the imitated copy by unauthorized means and utilizing this data either for own benefit or for profit making is a violation of copyright act. Piracy is possible in many forms and few most common are duplication of original license copy, distribution and usage of the same.

Types of software piracy include:

·         Borrowing and installing a copy of a software application from a person.
·         Installing more number of copies of the software than authorized number of license copies available.
·         Installing and selling unauthorized copies of software while purchasing new computers.
·         Duplicating and selling copyrighted programs.
·         Downloading software illegally from peer-to-peer network, internet auction or blogs.

Unauthorized written CDs/DVDs for music, various software and utilities etc. are the most commonly observed examples of piracy.

Unauthorized Access: means gaining access without user information. Attempting to get information (like e-mails, bank accounts, intellectual or any other personal and confidential information) from unauthorized person is known as accessing computer system illegally.

Examples of Unauthorized Access are:


·         Hacking Financial / Bank Account related information.
·         Stealing organizational / Intellectual Information.
·         Illegal monitoring of information owned by other users including mails and messaging.
·         Illegal Use / Break of login and password of other users.
·         Causing intentional irritation to other users by means of damaging software and important information.

Security Technologies are used to manage access and prevent unauthorized access. It includes:

·         Firewall
·         Intrusion Detection System (IDS)
·         Virus and Content Scanner
·         Patches and Hotfixes
·         Hardening Operating Systems and Applications



Unauthorized Access can be overcome by:


·         User Vigilance / Monitoring
·         Updating Installed software’s regularly with proper permissions and certifications.
·         Installing patches regularly, released by software companies.

INFORMATION SERVICES


The Ethics for Information Services:

·         Ensuring accuracy and authenticity
·         Properly designed database.
·         Information provided should be complete without doubt.
·         Providing proper security from unauthorized access.




CODE AND GUIDELINES OF ETHICS


Following are the key-points which user should follow as guidelines:

1.      Honesty: As a part of decent behavior (netiquette), user shall always demonstrate the truth while using internet.

2.      Respect: User should respect the privacy of the other users.

3.      Confidentiality: User should keep confidentiality while using internet and not share any information to anybody which will be breach and user should not try to get confidential data of other users.

4.      Professionalism: User should maintain professional conduct and well-mannered approach.

5.      Responsibility: User should take ownership and responsibility of own data on Internet and also should ensure that it contains authenticity and truth.

6.      Communication: User should ensure decent and polite communication with others.

7.      Obeying the Law: User should strictly ensure to obey the law and demonstrate decent internet usage.

When computers first began to be used in society at large, the absence of ethical standards about their use and related issues caused some problems. However, as their use became widespread in every facet of our lives, discussions in computer ethics resulted in some kind of a consensus. Today, many of these rules have been formulated as laws, either national or international. Computer crimes and computer fraud are now common terms. There are laws against them, and everyone is responsible for knowing what constitutes computer crime and computer fraud.

The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. Here is our interpretation of them:

1.      Thoushalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files.




2.      Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical.

3.      Thou shalt not snoop around in other people's files: Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents. Text documents on the Internet may be protected by encryption.

4.      Thou shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it.

5.      Thou shalt not use a computer to bear false witness: The Internet can spread untruth as fast as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong.

6.      Thou shalt not use or copy software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format.

7.      Thou shalt not use other people's computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information.  You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical.

8.      Thou shalt not appropriate other people's intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.




9.      Thou shalt think about the social consequences of the program you write: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content from Internet websites to protect young children from harmful material. That law was struck down because it violated the free speech principles in that country's constitution. The discussion, of course, is going on.

10.  Thou shalt use a computer in ways that show consideration and respect: Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them.


Thursday, July 16, 2015

OPERATING SYSTEMS Question & Answers : Basic NETWORK Question & Answers

OPERATING SYSTEMS Question & Answers : Basic NETWORK Question & Answers: What is computer Network ? Computer network is a collection of interconnected computers, which are able...

Basic NETWORK Question & Answers

















What is computer Network ?
Computer network is a collection of interconnected computers, which are able to exchange information between each other. In other words, it is a collection of computers and peripheral devices connected by communication links that allows the network components to work together autonomously.
What is a protocol?
A Network protocol is a specialized electronic language that enables network computers to communicate. Different types of computers, using different operating systems, can communicate with each other, and share information as long as they follow the network protocols. A protocol suite is a set of related protocols that come from a single developer or source.
A protocol stack is a set of two or more protocols that work together, with each protocol covering a different aspect of data communications.
What is client server technology?
It is a network of shared or distributed computing in which the tasks and computing power are split between the servers and clients. The servers store and process data common to the users across the organization and these data can be accessed by any client.
In this networking requests are made by different clients to  the server. Server then process the request and provide the desired result to the client. All the information are stored with the server. Server acts like a database which extract the relevant information to the client. In this way it becomes fast and client becomes thin.
The client server architecture is versatile, supports GUI and has modular infrastructure. The technology is described as a cost reduction technology. It includes fourth generation languages, relational databases, distributing computing etc.
What are the basic elements of data communication system?
                1) Message - the data or information that is to be sent. It could be text, picture, etc.
                2) Sender - a device that transmits the message. It could be a computer, telephone, etc.
                3) Receiver - a device that receive the message. It could be the same components as sender.
                4) Medium - is the path through that the data is sent, wire, air, light, etc.
                5) Protocol - Set of rules and regulations that should be observed by the devices.
What are the components in data communication system?
5 Major components of data communication systems are :-
1. Message Message is the information to be communicated. The message may consist of text, numbers, pictures etc.
2. Sender Sender is a device that sends the message. Normally, computer is used as sender in data communication systems. It is also called source or transmitter.
3. Medium Medium is the physical path that connects sender and receiver. It is used to transmit data. The medium can be a copper wire, a fiber optic cable, microwaves etc.
4. Receiver Receiver is a device that receives message. It is also called sink. The receiver can be computer, printer, or another computer related device. It must be proficient of accommodating the message.
5. Protocol A protocol is a set of policies that administrates data communication. It represents an agreement between communication devices. Devices cannot communicate without protocol.
What is data communication?
Data communication refers to the exchange of data between a source and a receiver. Data communication is said to be local if communicating devices are in the same building or a similarly restricted geographical area.
The meanings of source and receiver are very simple. The device that transmits the data is known as source and the device that receives the transmitted data is known as receiver. Data communication aims at the transfer of data and maintenance of the data during the process but not the actual generation of the information at the source and receiver.
What does Distributed Network mean?
A distributed network is a type of computer network that is spread over different networks. This provides a single data communication network, which can be managed jointly or separately by each network. Besides shared communication within the network, a distributed network often also distributes processing.
What Is Distributed Computing?
What you need is a distributed computing system. A distributed system uses software to coordinate tasks that are performed on multiple computers simultaneously. The computers interact to achieve a common goal, and they interact by sending each other messages.
In the case of the software you developed, the actual calculations need to be broken up into separate elements that can be run on different computers. Some calculations may be entirely sequential, meaning that you can only go to step two after step one has been completed. However, some calculations may be able to run in parallel, meaning that you can break them up into elements, run them separately but at the same time, and then combine the results.
Advantages and Disadvantages of Different Network Topologies
Network topologies describe the ways in which the elements of a network are connected. They describe the physical and logical arrangement of network nodes. Let us look at the advantages different network topologies offer, and their shortfalls.
Advantages and Disadvantages of...
o   Bus Topology
o   Ring Topology
o   Mesh Topology
o   Star Topology
o   Tree Topology
o   Hybrid Topology
Bus Topology
Advantages
It is easy to set up, handle, and implement.
It is best-suited for small networks.
It costs very less.
Disadvantages
The cable length is limited. This limits the number of network nodes that can be connected.
This network topology can perform well only for a limited number of nodes. When the number of devices connected to the bus increases, the efficiency decreases.
It is suitable for networks with low traffic. High traffic increases load on the bus, and the network efficiency drops.
It is heavily dependent on the central bus. A fault in the bus leads to network failure.
It is not easy to isolate faults in the network nodes.
Each device on the network "sees" all the data being transmitted, thus posing a security risk.
Ring Topology
Advantages
The data being transmitted between two nodes passes through all the intermediate nodes. A central server is not required for the management of this topology.
The traffic is unidirectional and the data transmission is high-speed.
In comparison to a bus, a ring is better at handling load.
The adding or removing of network nodes is easy, as the process requires changing only two connections.
The configuration makes it easy to identify faults in network nodes.
In this topology, each node has the opportunity to transmit data. Thus, it is a very organized network topology.
It is less costly than a star topology.
Disadvantages
The failure of a single node in the network can cause the entire network to fail.
The movement or changes made to network nodes affect the entire network's performance.
Data sent from one node to another has to pass through all the intermediate nodes. This makes the transmission slower in comparison to that in a star topology. The transmission speed drops with an increase in the number of nodes.
There is heavy dependency on the wire connecting the network nodes in the ring.
Mesh Topology
Advantages
The arrangement of the network nodes is such that it is possible to transmit data from one node to many other nodes at the same time.
The failure of a single node does not cause the entire network to fail as there are alternate paths for data transmission.
It can handle heavy traffic, as there are dedicated paths between any two network nodes.
Point-to-point contact between every pair of nodes, makes it easy to identify faults.
Disadvantages
The arrangement wherein every network node is connected to every other node of the network, many connections serve no major purpose. This leads to redundancy of many network connections.
A lot of cabling is required. Thus, the costs incurred in setup and maintenance are high.
Owing to its complexity, the administration of a mesh network is difficult.
Star Topology
Advantages
Due to its centralized nature, the topology offers simplicity of operation.
It also achieves isolation of each device in the network.
Adding or removing network nodes is easy, and can be done without affecting the entire network.
Due to the centralized nature, it is easy to detect faults in the network devices.
As the analysis of traffic is easy, the topology poses lesser security risk.
Data packets do not have to pass through many nodes, like in the case of a ring network. Thus, with the use of a high-capacity central hub, traffic load can be handled at fairly decent speeds.
Disadvantages
Network operation depends on the functioning of the central hub. Hence, central hub failure leads to failure of the entire network.
Also, the number of nodes that can be added, depends on the capacity of the central hub.
The setup cost is quite high.
Tree Topology
Imagine a hierarchy of network nodes, with the root node serving client nodes, that in turn serve other lower-level nodes. The top-level node is mostly a mainframe computer while other nodes in the hierarchy are mini or microcomputers. In this arrangement, the node at each level could be forming a star network with the nodes it serves. In this case, the structure combines star and bus topologies and inherits their advantages and disadvantages.
Advantages
The tree topology is useful in cases where a star or bus cannot be implemented individually. It is most-suited in networking multiple departments of a university or corporation, where each unit (star segment) functions separately, and is also connected with the main node (root node).
The advantages of centralization that are achieved in a star topology are inherited by the individual star segments in a tree network.
Each star segment gets a dedicated link from the central bus. Thus, failing of one segment does not affect the rest of the network.
Fault identification is easy.
The network can be expanded by the addition of secondary nodes. Thus, scalability is achieved.
Disadvantages
As multiple segments are connected to a central bus, the network depends heavily on the bus. Its failure affects the entire network.
Owing to its size and complexity, maintenance is not easy and costs are high. Also, configuration is difficult in comparison to that in other topologies.
Though it is scalable, the number of nodes that can be added depends on the capacity of the central bus and on the cable type.
Hybrid Topology
A hybrid topology combines two or more topologies and is meant to reap their advantages. Obviously, the advantages and disadvantages of a hybrid topology are a combination of the merits and demerits of the topologies used to structure it.
Go through types of network topologies for a detailed description of the various network topologies in use today.
What Is Server ?
Servers are physically like other computers where their hardware configuration is specifically optimized to make them most appropriate for their role. In many servers the hardware installed is alike the hardware of any other normal computer but the software run in the server is far more different form the software that are installed in other computers.  Additional processing, storage capacity and memory are commonly configured in the network servers to improve its capacity to handle clients – other computers on the network.
The underlying hardware or software for a system that drives the server is called a server platform. Instead of operating system, the term server platform is used.
What is Client ?
A client is a computer that retrieves information from or uses resources provided by the server or main computer. Many corporate networks are comprised of a client computer at each of the employees' desks. Each of these computers connects to a central server or mainframe, which allows processing to be done on the client side instead of the server side and reduces the processing requirements of the server.
Client is also another name for a software program used to connect to a server.
DIFFERENT TYPES OF NETWORKS
o   Local Area Network (LAN)
o   Metropolitan Area Network (MAN)
o   Wide Area Network (WAN)
Local Area Network (LAN)
A LAN is a network that is used for communicating among computer devices, usually within an office building or home.4
• LAN’s enable the sharing of resources such as files or hardware devices that may be needed by multiple users
• Is limited in size, typically spanning a few hundred meters, and no more than a mile.
• Is fast, with speeds from 10 Mbps to 10 Gbps
• Requires little wiring, typically a single cable connecting to each device
• Has lower cost compared to MAN’s or WAN’s
• LAN’s can be either wired or wireless. Twisted pair, coax or fiber optic cable can be used in wired LAN’s.
• Every LAN uses a protocol – a set of rules that governs how packets are configured and transmitted.
• Nodes in a LAN are linked together with a certain topology. These topologies include:
– Bus
– Ring
– Star
• LANs are capable of very high transmission rates (100sMb/s to Gb/s).
Metropolitan Area Network (MAN)
A metropolitan area network (MAN) is a large computer network that usually spans a city or a large campus.
• A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities.
• A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organizations.
A MAN often acts as a high speed network to allow sharing of regional resources.
• A MAN typically covers an area of between 5 and 50 km diameter.
• Examples of MAN: Telephone company network that provides a high speed DSL to customers and cable TV network.
Wide Area Network (WAN)
WAN covers a large geographic area such as country, continent or even whole of the world.
• A WAN is two or more LANs connected together. The LANs can be many miles apart.
• To cover great distances, WANs may transmit data over leased high-speed phone lines or wireless links such as satellites.
• Multiple LANs can be connected together using devices such as bridges, routers, or gateways, which enable them to share data.

• The world's most popular WAN is the Internet.

OPERATING SYSTEMS Question & Answers : Basic question and answers of Operating System's

OPERATING SYSTEMS Question & Answers : Basic question and answers of Operating System's: What is Operating System's ? A computer's operating system is one of the most important "parts" of the computer. Almost ...

Basic question and answers of Operating System's

What is Operating System's ?
A computer's operating system is one of the most important "parts" of the computer. Almost every type of computer, including cellular telephones, needs an operating system in order to operate properly. When one turns on a computer, the operating system tells the computer what to do by controlling the system resources such as the processor, memory, disk space, etc. The operating system allows the user to work on the computer without having to know all the details about how the hardware works.
When choosing an operating system for a business, the primary considerations should be the hardware platform used, the number of users and attendant system security requirements, the ease of administration, the adaptability toward different uses, and the different applications that will be employed.
Operating System have the Following Characteristics:-
1) Operating System is a Collection of Programs those are Responsible for the Execution of other Programs.
2) Operating System is that which Responsible is for Controlling all the Input and Output Devices those are connected to the System.
3) Operating System is that which Responsible is for Running all the Application Software’s.
4) Operating System is that which Provides Scheduling to the Various Processes Means Allocates the Memory to various Process those Wants to Execute.
5) Operating System is that which provides the Communication between the user and the System.
6) Operating System is Stored into the BIOS Means in the Basic Input and Output System means when a user Starts his System then this will Read all the instructions those are Necessary for Executing the System Means for Running the Operating System, Operating System Must be Loaded into the Computer For this, this will use the Floppy or Hard Disks Which Stores the Operating System.

TYPES OF OPERATING SYSTEMS
Most simple, single-function computers (such as in microwave ovens with digital keypads) do not require an operating system. In fact, trying to implement an operating system in these computers would be overkill. On the other hand, all personal desktop and laptop computers and servers do require an operating system. While there are hundreds of operating systems available, the most popular by far are the Microsoft Windows family of operating systems, the Macintosh operating system, and the Unix family of operating systems.
There are four general types of operating systems. Their use depends on the type of computer and the type of applications that will be run on those computers.
Real-time operating systems (RTOS) are used to control machinery, scientific instruments, and industrial systems. In general, the user does not have much control over the functions performed by the RTOS.
Single-user, single task operating systems allow one user to do one thing at a time. And example of a single-user, single task operating system is the operating system used by personal digital assistants (PDAs), also known as handheld computers.
Single-user, multi-tasking operating systems allow a single user to simultaneously run multiple applications on their computer. This is the type of operating system found on most personal desktop and laptop computers. The Windows (Microsoft) and Macintosh (Apple) platforms are the most popular single-user, multi-tasking operating systems.
Multi-user operating systems allow multiple users to simultaneously use the resources on a single computer. Unix is an example of a multi-user operating system.
What is the basic difference between different operating systems?
DOS (Disk Operating System)
gained a reputation by supporting operating systems developed by IBM and Windows. DOS was prominent in the industry up until support was terminated for Windows ME. Though it's not as sophisticated as modern systems, DOS offers many advantages to the user. This system is very stable and rarely endures crashes. It can display content on an arcade monitor without the aid of special hardware and the use of batch files offer a high degree of customization. While the system is still used, DOS has become more difficult to manage as support is limited.
Linux
The Linux operating system is developed on a kernel based on Unix. It is known as one of the most secure platforms, yet Linux is often viewed as more complex. Linux is the result of an open-source project, allowing users and developers to access the source code for free. Because it requires less hardware, Linux is capable of providing exceptional performance even on a smaller hard disk. Large communities of users exist for this system, constantly contributing to the code and making improvements. The server-based concept of Linux has resulted in fewer home users and a lack of multimedia support for the system.
Mac OS X
Mac OS X is Apple's trademark operating system software for their line of Macintosh computers. The system was based in part on Unix and mimics it's format with the administrative controls. Mac OS X software requires a low level of maintenance with fewer occurrences of computers worms, viruses and spyware. The Apple operating system does have some disadvantages, primarily in regard to software and hardware compatibility.
Windows
The Microsoft Windows operating system is the most popular choice and currently has a stronghold over the market. This platform has made significant advancements from version 1.0 all the way to the new Vista system. The Windows system is highly compatible, feature-rich and has a much larger selection of software applications. Unlike the Linux kernel, Windows is proprietary software and tends to be more expensive than others. Despite widespread usage, Windows has been heavily associated with the term "insecure" as a number of security vulnerabilities have made it the most targeted system. Frequently exploited by hackers and malicious code writers, it is recommended that any Windows operating system with internet access be protected by some form of security software. Although the XP version is still popular among users, support for this system will conclude in 2009 as more emphasis will be placed on developing the Vista series.
What is MS-DOS?
Short for Microsoft Disk operating system, MS-DOS is a non-graphical command line operating system derived from 86-DOS that was created for IBM compatible computers. MS-DOS originally written by Tim Paterson and introduced by Microsoft in August 1981 and was last updated in 1994 when MS-DOS 6.22 was released. MS-DOS allows the user to navigate, open, and otherwise manipulate files on their computer from a command line instead of a GUI like Windows.
What is Android?
Android is the name of the mobile operating system made by American company; Google. It most commonly comes installed on a variety of smart phones and tablets from a host of manufacturers offering users access to Google’s own services like Search, YouTube, Maps, Gmail and more.
This means you can easily look for information on the web, watch videos, search for directions and write emails on your phone, just as you would on your computer, but there’s more to Android than these simple examples.
Difference Between Application Software And System Software
Operating System is the System Software that makes the Computer work. We can say that an Operating System (OS) is Software that acts as an interface between you and the hardware. It not only contains drivers used to speak the hardware's language, but also offers you a very specific graphical user interface (GUI) to control the computer.
An OS can also act as an interface (from the hardware) to the other software. A complex OS like Windows or Linux or Mac OS offers the services of an OS, but also has applications built in. Solitaire, Paint, Messenger, etc. are all applications.
Application software is the software that you install onto your Operating System. It consists of the programs that actually let you do things with your computer. These Applications are written to run under the various Operating Systems.
These include things like your word processing programs, spread sheets, email clients, web browser, games, etc. Many programs, such as most of the Microsoft Office suite of programs, are written in both Mac and Windows versions, but you still have to have the right version for your OS.
For example - Tally for Accounting, MS-Word for Word Processing etc.
So, the Operating system of a Computer is the Software that allows the Computer work. It provides the framework under which the Applications run. An operating system is the type of Computer system you have such as Window XP or Window 95, 98, Mac, etc.
The Applications are the Software that actually allows the user to do something with the Computer. Without the applications, all you can do is change settings and navigate among the folders. You can purchase its CD from a software company or download from a software company’s web site.
History of MS-DOS
MS-DOS (Microsoft Disk Operating System) is a single-user, single-tasking computer operating system that uses a command line interface. In spite of its very small size and relative simplicity, it is one of the most successful operating systems that has been developed to date.
Some of the most common commands are as follows (corresponding commands on Unix-like operating systems are shown in parenthesis):
CD - changes the current directory
COPY - copies a file
DEL - deletes a file
DIR - lists directory contents
EDIT - starts an editor to create or edit plain text files
FORMAT - formats a disk to accept DOS files
HELP - displays information about a command
MKDIR - creates a new directory
RD - removes a directory
REN - renames a file
TYPE - displays contents of a file on the screen

Write the definition of WordPad ?
WordPad is a word processor for creating, editing, and printing the documents.

Write the definition of Notepad?
Notepad is a very basic generic text editor included with Microsoft Windows that enables someone to open and read plain text files. if the file contains special formatting or is not a plain text file, Notepad will not be able to be read its contents.
WORDWRAP :
Word Wrap is used for wrapping the writing documents within the documents area. if you work without wraping, your text documents go on up to the end of the workspace horizontally in one line still, the line will never break till enter button should be pressed.