100% found this document useful (1 vote)
4K views120 pages

GS Drishti Computer 2022 Ebook (PdfhubRebornNew)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
4K views120 pages

GS Drishti Computer 2022 Ebook (PdfhubRebornNew)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 120

Join @PdfhubRebornNew For More Exclusive Pdfs

@PdfHubRebornNew
© Publisher
Edition - First
Edition Year - 2022
Preface Index
Writer - SSGC There are two main objectives of
M.R.P.: 100/- Pictorial Presentation of various subjects
l Computer : An
Printed at - of General Studies. The First One - to Introduction 5-8
gain confidence in studying the entire s Computer & its Meaning s Computer's
Core Publishing Solution subjects in a short time. The Other One - Working System s Full Form of Computer
these facts should get imprinted on the s Structure of Computer s Five main
Contact : functions of computer s Characteristics of
brain of the readers. Consequently the
Computer s Working System of Computer
aspirants will be able to remember the
Sam-Samayik Architecture s Peripheral Devices s Areas
facts within no time in the / Applications of Computer s Definition
Ghatna Chakra examination hall. Our aim is that an s Data and their types s Basic Functions of
188A/128, Allenganj, Churchlane, aspirant should be able to solve at Computer
least two questions more from
Prayagraj (Allahabad) - 211002
each topic because of imbibing
l History of
Ph.: 0532-2465524, 2465525
this very effective pictorial Computer 9-24
Mob.: 9335140296 representation. s Evolution & Development of Computer
e-mail : [email protected] A good book is one that s Meaning, origin and innovation of
Website : ssgcp.com depicts and imbibe happiness. Abacus s Napier Bones Device
s Pascaline and Leibniz Calculator
e-shop Website : shop.ssgcp.com While presenting this subject
s Father of Computer s Hollerith Census
matter, it has been kept in mind Tabulator s ABC Computer s MARK-I
Copyright 2020, by Sam-Samayik that only the important and s EDVAC s ENIAC s UNIVAC-I
relevant facts should get a q Classification of Development of
Ghatna Chakra Private Limited. No
place in this presentation along Computer s Based on Working Technol-
Part of this publication may be with no factual error at all. ogy s Analog Computer s Examples of
reproduced or distributed in any Moreover only the Analog Computer s Examples of Analog
Signal q Digital Computer and its
form or by any means, electronic, Purvavalokan related facts
example s Hybrid Computer and its
have been incorporated here.
mechanical, photocopying, recording example s Computers classified on the
While presenting this book basis of size and work s Mini Computer
or otherwise or stored in database or before the readers, we have
and its use s Micro Computer and its use
retrieval system without the prior worked hard to assay all key s Personal Computer and its use and
written permission of publisher. facts with utmost accuracy. development s Workstation and its use
Undoubtedly, we are in a s Notebook Computer and its develop-
The program listings (if any) may ment s Use, Type, Part, Advantage and
position to say that there is 99.9
be entered stored and executed in a percent accuracy or above. This
Disadvantage of Tablet Computer
s Palmtop and Smartphone s Mainframe
computer system, but they may book is well designed, handy, Computer and its use s Super Computer
not be reproduced for publication. and appropriate for revision and its speed measurement and use s Best
at the eleventh hours of the five super computers s Exam Facts and
examination with appropriate Interesting Facts s Super Computer in
design elements and a sense of India q Computers Classified on the basis
originality. of Hardware Usage s First Generation
Writer Computer s Second Generation Computer
& Associates Despite all efforts to
s Third Generation Computer s Fourth
make this book very efficacious, if Generation Computer s Fifth Generation
any doubt arises regarding facts, Computer s Future Use s Next Generation
J. K. Jeet readers are always welcomed to Computer s Generation of Computer - At a
contact on our WHATSAPP glance
Shudhar Tiwari platform. You may WHATSAPP on
l Components of
Vicky Raj mobile number 8081655444. Your
doubts will be resolved within 72 hours Computer System
compulsorily.
25-52
Pictorial Representation 2 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Index
q Hardware & Software q Input Device Software and its types s Operating System,
s Man Data Input Device s Software Keyboard Language Translator and Device Driver
s Virtual Keyboard s On Screen Keyboard s Compiler, Assembler and Interpreter
s Hardware Keyboard s Parts of Keyboard q Difference between compiler and inter-
s Functions Keys s Special Purpose Keys preter s Types of Operating System
s Characteristics of Mouse s Mouse, Trackball, q Development based s Serial Operating
Joystick s Light Pen, Touch Screen s Source Data System, Batch Operating System s Embedded,
Input Device s Speech Recognition s Sound Network and Distributed Operating System
Card, Microphone, Video Camera, Digital s Multi Tasking and Multi Programming
Camera, Scanner q Source Data Automation Operating System s Open/Closed Source
s OCR, OMR, MICR, OBR, PCR s Storage Operating System s Some Popular Operating
Device and its types q Primary or Main System s Microsoft Windows NT q Unix, Linux
Memory s ROM, PROM, E-PROM, EE-PROM and Android Operating System s Application
q Temporary or Volatile Memory s RAM and Software (Special and General) s Example of
its characteristics s Cache Memory s Secondary General Application Software q Processing,
or Auxiliary Memory q Access Mode s Use and Spreadsheet, Presentation, Accounting and
Example of Sequential Access s Formulae of DTP Software q Database, Graphics and CAD
storage capacity of Magnetic Tape s Example of Software s Difference Between System Software
Direct Access s Magnetic Disk (Hard Disk, and Application Software s Utility Software
Floppy Disk) s Optical Disk and its Example q File Management Utility and Disk Manage-
s CD-ROM, CD-R/W, DVD, BD q Electronic ment Utility q Software Package and its Use,
Storage Device q Virtual Memory s Difference Example and Definition s Other Software -
between Primary and Secondary memory, Storage Retail Software, Freeware, Group ware, Share
Capacity and Access Time of Memory q Buffer ware, Firmware, Software License, Install,
Memory and its use q Spool/Spooling Uninstall Program s Bug and Debug q Syntax
q Selection of Computer Memory for use Error and Logic Error s Booting (Cold Boot and
q Flash Memory, Memory Card q Processing Worm Boot) s Algorithm with Kernel and
Device (CPU) and its structure s Computer's Example q Flowchart and Example
working system s Three parts of CPU q Flowchart Signs and Pseudo Code
s Register/Memory Unit and its Function
s Control Unit and Arithmetic Logic Unit
l Languages of Computer
s Factors affecting the speed of a CPU Programs 68-71
s Computer Clock, Word Length, Parallel
q Low Level Language (Machine and
Calculation s System Bus s Interaction between
Assembly Language) q High Level Language
CPU and other devices s Output Device
s Difference between Machine Language and
s Softcopy, classification of Monitor s LCD/TFT
Assembly Language q Fortran, Pascal, Cobol,
Monitor, Projector, Hardcopy, Printer and its
Comal, Logo Basic, Prolog, Algol, C and C++
classification s Printers by capacity, Single, Line,
s Java s C Sharp, Lisp
Page Printer q Printers by style s Impact Printer,
Dot Matrix Printer s Daisy Wheel Printer, Non- l Computer Network
Impact Printer s Thermal and Inkjet Printer
s Laser Printer and Speaker Icon s Measurement 72-87
of Motherboard and Computer System Perfor- q Advantage of Network, Protocol q Types of
mance s Throughput, Response Time and Turn Protocol (TCP, IP, UDP SMTP, HTTP, FTP,
Around Time IMAP) s Bandwidth, Broadband, RS-32, Server
l Computer Software s Node, Baud, Baseband q Methods of
Communication (Simplex and Duplex)
53-68 s Communication Media (Wave and Wire)
q Function, Use and Definition of Computer q Microwave, Radiowave, Satellite
Software q Types of software s System s Bluetooth, Infrared, Wi-Fi, Li-Fi s Other
wireless (WLL and WiMAX) s Twisted Pair

Pictorial Representation 3 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Index
Cable and Co-axial Cable s Fibre Optics Cable, fields s Social Networking Sites (Netiquette,
Ethernet Cable s Data Transmission Service Flame, Flash, Youtube, Acronyms, Facebook,
(Dial-up Line, Leased Line, GSM, DSL, ISDN, Twitter, Emoji) s Establishment year, Founder
CDMA) and Wireless Broadband q Synchro- and Current CEO of some Important Social
nous and Asynchronous Transmission Media.
q Multiplexing and its types (FDM, TDM,
WDM, CDM) q Switching Techniques
l www 104-111
(Circuit Switching, Message Switching and s www s Difference between internet and www
Packet Switching) q Classification of s Internet Protocol Address s Seven Layers of
Computer Network (PAN, LAN, WLAN, OSI model s Major Tips of OSI Model s Benefits
of Web applications s Used Languages on www
CAN, MAN, WAN) q Network Topology (Bus
(HTML, XHTML, XML, Java Script, PHP, SQL)
Topology, Ring Topology, Star Topology, Mesh
s Versions of IP Address (IPv4 and IPv6) s Types
Topology, Tree Topology, Hybrid Topology) q
of IP Address (Private and Public IP Address)
Internetworking Tools or Devices (Network
s Classes of IP Address (Class A, Class B, Class C,
Gateway, Bridge, Repeater, Router, Switch,
Class D, Class E) s Domain Name System
Hub) q Network Interface Card and
(Geographic & Non-geographic) s URL q Web
Backbone Network q Internet, Intranet and
Browser and its Example s Internet Explorer,
Extranet and Difference among them
Google Chrome, Mozilla, Firefox, UC Browser,
l What is Internet? Safari, Microsoft Edge, Opera, Lynx, Flock,
Netscape Navigator q Search Engine (Yahoo,
88-103 Google, Ask.com, Orkut) q How Search
q Development of Internet (1960 to 1995) Engine works s Crawling, Indexing, Ranking
s Who governs the Internet? (Domain Name and Retrieval s Examples of Search Engine
Register, ISOC, IAB, ICANN, IRTF, W3C and
IETF) q Used Protocols on Internet (TCP/IP, l Network and Data
SMTP, FTP, HTTP, Telnet, Gopher) s Two
versions of IP address (IPv4 and IPv6)
Security 112-119
s Network Security s Principles of Network
s Computer Network established by Government
Security (Authentication, Integrity, Confidential-
of India (National Knowledge Network), State
ity, Availability) s Computer Security s Cyber
Wide Area Network, Educational and Research
Space, Cyber Crime and Cyber Warfare s Ways to
Network, National Information Centre Network
prevent Cyber Crime s Spam and its types
s Uses of Internet s Internet in India s Internet of
s Cookies, Proxy Server and its Functions,
Things s E-mail and its benefit, loss and inventor
Firewall s Computer Virus and its effect, Rootkit,
s E-mail Service Provider s E-mail Address, User
Types of Virus (Program, Boot and Multi Partite
Name, Domain Name s Parts of an E-mail
Virus), Sub-Types of Computer Virus, Malware,
message (Header, Message Body, Enevelop)
Worm, Spyware, Hackers and Crackers s Trojan
s Address Book (Mailing List, Forwards, Drafts)
Horse and Adware s Time Bomb Virus, Password
s Elements and types of E-mail message s Benefit
Cracking s Scare Ware, Packet Sniffing
and Loss of web based and pop based e-mail
s Antivirus Software and Some Popular
s Security of e-mail message and internet
Antiviruses s Three bases of Internet Security
revolution s Telnet or Remote Login s Instant
(User Authentication), Access Control,
messaging s Whatsapp, Telegram, Wechat,
Cryptography) s User Identification (Username
Facebook, Messenger, Internet, Telephony
and Password) s Biometric Technique s Ways to
s Video Conference, Chatting (Text, Voice,
Protect Passwords
Video) s Usenet, Newsgroup, E-Publishing s E-
commerce (B2B, B2C, C2C) s Internet Protocol l A to Z (New way of
Television s Blog and Blogging and its types
s Use of Internet in Education, Medical and other Learning Letters) 120

Pictorial Representation 4 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Computer
Drishti An Introduction

Computer's
Working System

l Giving instructions to the computer


by the user through an input device.
l To store instructions in a storage device
by a computer.
l To process the instructions stored by CPU.
l To display the result obtained by
CPU to the output device.

Instructions

Input Storage Process Output

Storage Process
Charles Babbage 2 3
Father of Computer

Computer &
0 0 0
its Meaning
0 0 0 0 0 0 0 0 0 1 4
1 1111111111111111111111 1 1 1
0 Input Output
0 0 0 0 0 0 The meaning of the word
00000000000000000 0 0 0
1 1 1 1 1 1 1 1 1 1 1 1 1¯1 1 1 1 1 1 1 1 1 1 1 1 1
0 1
0 0000000000000000000000 0 0 0
1 1 1 1 1 1 1 1 1 1 1Computer Full Form of Computer
0 1111111111111 1 1 1
0 0 0 0 0 0 0 0 0 0 0 0¯0 0 0 0 0 0 0 0 0 0 0 0 0 0
1 1 1111111111111111111111 1 1 C Common
0 1
0 0 0 0 is derived from the English word
0000000000000000000 0 0 0 O Operating
1 1 1 1 1 1 1 1 1 1 1 1 1¯1 1 1 1 1 1 1 1 1 1 1 1 1
1
0 0 0000000000000000000000 0 0 M Machine
1 0
1 1 1 1 1 1 1 1 1 1Compute
1111111111111 1 1 1 P Purposely
0 0 0 0 0 0 0 0 0 0 0 0 0¯0 0 0 0 0 0 0 0 0 0 0 0 0
1 0 U Used for
1 1111111111111111111111 1 1 1
0 0 which means to calculate so it is called a
0 000000000000000000000 0 0 0 T Technological and
1 1 1 1 1 1 1 1 1 1 1 1 1¯1 1 1 1 1 1 1 1 1 1 1 1 1
0 1 E Educational
0 0000000000000000000000 0 0 0
1 1 1 1 1 1Computer
1 1 1 1 1 1 1 1 1 R Research
0

Pictorial Representation 5 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Structure of Computer

Memory unit is used Arithmetic Logic Unit


to store the instructions (ALU) is used to
given by the user perform mathematical
through input unit. Memory Unit (MU) operations on data and
to produce results.

Input Unit (IU) Control Unit (CU) Output Unit (OU)

The Control Unit


(manager of computer)
is used to inform other Output Unit (OU) is
Arithmetic Logic Unit (ALU)
devices about how to used to display the
follow any program. processed result.

Five
1 main functions 5
of computer

2 4
3

To accept data To display


or instructions To To process the results in the
store To control data as per the
by the input desired form by
data internal requirement of
unit the output unit.
operations of the user
computer

Fast/Speed Reliability

Accuracy Secrecy
Characteristics
of Computer
Memory Versatility

Agility Automatic Quick Decision

Pictorial Representation 6 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Working System of Computer Architecture

The process
Process of
l Process of Input, addition, of displaying
Output, resource subtraction, information
storage multiplication as results
l Process of start division,
It is used to and stop data after
logical and
store data l Scrutinizing and comparative processing
The process of controlling of above
and operations
entering data processes Output
and programs instructions Arithmetic Unit
into a computer Logic Unit
it
Control Un
Memory
Input Unit
Unit

l Input Example
l Devices connected
Peripheral externally to a computer. Device Mouse,
® ® ®
Devices l It is used for l Output Keyboard,
special purposes. Device Monitor, Printer

Areas/Applications
of Computer
Computer If Ø Computers are being used in
is made of hardware every field in the world
hardware and is the body of Ø In the field of education Ø In Railways
software. computer, software
is its soul.

School College Railways


Computer
Ø In Airlines Ø In Hospitals
We can feel We can
hardware by neither touch
seeing and touching software nor
hardware physically Airlines Hospitals
physically. see it.
Ø In Business such as Film Ø In Space
production Bank, etc.

Film City Bank Space

Pictorial Representation 7 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Definition
Computer is an automatic electronic machine used for various types of mathematical
and logical calculations. It takes input (instruction) from users and processes
(calculates) and provides output (result) accordingly.

Input Da Monitor, Printer, Result


ta
Loudspeaker p ut
Out = 599

501 + 209 – 111


CPU
(CU, ALU) es
s Basic Functions
oc of Computer
Pr

Accepting data as input,


RAM, ROM, CD, converting it into information
DVD, Harddisk ge
ora according to instructions, sto
ring
St data and information for
future use, processing
Mouse, Keyboard, information and releasing
Scanner, Camera, t it as output.
Joystick, Microphone n pu
I

Data and their types Ø Information

{ A disorganized collection of raw


facts and information without any
meaningful conclusion.
{ l Data is derived from the analysis and
compilation of data on the basis of utility.
l Data is a disorganized fact/data
¯ whereas information is an organized data.
¯ ¯
Numeric Alphanumeric
Data Data Ø Instruction
¯
l Instructions given to the computer to work.
From 0 to 9 Use of letters,
(total 10 numbers) numbers and symbols
Ø Program
¯ ¯ ¯
Used in performing Arithmetic operations l Set of instructions given to the computer.
arithmetic processes cannot be performed

¯ ¯ Ø Software
Example Example ¯
l Students' obtained marks l Students' address l A set of programs responsible for the successful
l Employees' salary implementation of various functions of the computer.

Pictorial Representation 8 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
History of Computer
3000 years ago
Evolution & Development of Computer

sago Anc
0 0 year China ient
Bab
0
ut 3 ­ ­ ylon
Abo ­
plac
year credit to e
­ ­ ­
­

Innovation

The world's first ¬ Machine ¾ Abacus ¾ Meaning ® Table or Tablet


calculator
½
Origin
¯
From Abacus or Abacone

Note

The History of computer starts from that time when man tried to calculate
very large numbers with the help of a device.
Today, we know it as Abacus.
It includes the Babylonian counting system, the Greek counting system, the
Roman counting system and the Indian counting sytem majorly.

Abacus 1617 A.D. Napier Bones Device

An ancient
calculator
Wires and spherical beads

­
Used to count
are used in it

the numbers
­

Ø It was made of ivory or wood and


­ metal in a set of rectangular rod.

Another Name Ø Manually operated calculation tool.


Gintara
Ø Invented
l By the Mathematician of Scotland,
John Napier Bones in 1617.
l A teaching assistant device used to teach
numbers to children at the primary level
Ø Use l For Multiplication and division

Pictorial Representation 9 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
1642-44 A.D. Gottfried von Leibniz developed a form of
Pascaline pacaline that enabled multiplication and
manufactured
division besides addition and subtraction which
by Blaise Pascal Another Name was called Leibniz calculator.
Pascaline Calculator Adding Machine
cylinder are used in
Wheels, gear and

Used only in addition


and subtraction
Leibniz
Calculator

Used to work on Its other parts are able Able to add, subtract,
the principle of manufactured in to move right multiply and divide
clock and odometer 1642-1644 and left. quickly.

1822 & 1833 A.D.

Born Inventions :
26 December, Analytical Engine,
1791 Difference Engine,
Computer
Place
London, Died :
England 18 October, 1879
London, England

Charles
Babbage
(Father of
Computer)

l In 1822 AD, Charles Babbage l In 1833 AD, Charles Babbage


built the Difference Engine which developed the powerful Analytical
had run on steam with shift and gear. Engine, which was a developed form
of the Difference Engine

l Analytical Engine became the base of modern computer,


hence Charles Babbage is called Father of Computer.

Pictorial Representation 10 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
1889 A.D.

Hollerith Census Tabulator

Ø Invention :
By American Mathematician Herman Hollerith

Ø Year in 1889

Ø Another Name -
Electromechanical Punchcard Machine

Ø Use - To process census data in less time.

Ø Machine operated by electricity

Ø Punchcard reader is used to read data stored on punchcard

Ø Credit goes to Herman Hollerith for the invention of the Punchcard in the form of memory.

1939-1942 1944
ABC Computer MARK-I

ABC is an The First Automatic


abbreviated form of
Electronic Digital
Atanasoff Berry
Computer Computer

Ø MARK-I was developed in collaboration


with IBM (International Business Machine) and
under the direction of Howard Aiken.

Ø The official name was Automatic


Sequence Controlled Calculator.

Ø Harvard University renamed it as


MARK-I.

Ø It was the world's first automated


electro-mechanical computer.

Ø It had 500 miles length wire and


Working on ABC was done between 1939-1942 more than 175000 connections.
and released in England by the scientists named
Ø It was capable of doing a multiplication in
John Atanasoff and Clifford Berry in 1942. 6 seconds and a division in 12 seconds.

Pictorial Representation 11 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
1944 1943-1946
EDVAC ENIAC

Development with Manufactured at the


the concept of Moore School of
Logical Design by Electrical Engineering
John Von Neumann. in Pennsylvania.
First general
purpose electronic
digital computer
with complete
turing.

ENIAC The EDVAC


inventors John was a binary serial Full Form – Able to be
Mauchly and computer with Electronic reprogrammed to solve
J. Presper Eckert additions, subtractions,
Numerical complete computing
multiplications, etc.
proposed the construction Integrator and problems.
and took time 864
of EDVAC in Aug., 1944, calculator.
microseconds with
which was later an average addition
delivered to the and 2900 microseconds Developed by American scientists
Valistic Research with an average. Jon Mauchly and J.Presper
Laboratory. multiplication Eckert in 1946.

Do you know?

Lady Ada Augusta An American


installed the first program in Dr. Von Neumann contributed
Analytical Engine, so she is the most in the development of
known as the world first programmer. She is modern computer. He is also credited with
also credited with the invention of the storing both data and instructions in a
Binary System. Binary System (0 and 1).

1954
UNIVAC-I
¯
¯ ¯ ¯ ¯
Full Form : Manufactured by Use Designed
Universal GEC The first commercial By John Mauchly
Automatic (General Electric computer UNIVAC-I and
Computer. Corporation) used for business and John Presper
in 1954. general purpose. Eckert.

Pictorial Representation 12 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(A)
Classification of Computers
Development of classified on the basis of
Computer Working Technology
Data storage capacity
Classification of too low Physical quantities
These
Computer like-pressure,
quantities are
continuously temperature,
(A)
Ø Based on Working Technology change over speed, length,
(1) width, electric
time.
(1) (3) Analog voltage, etc.
Computer
Analog Hybrid In this, the very cheap
Computer (2) Computer representation of
the data is done
Digital as a continuously Implemented
Computer changing quantity. on the principle
of analog signal.
Used in the field of science
(B) and engineering rather than
Ø Based on Size & Work using analog computers in
the home and office.
(1)
1
Mini
(2) Computer (3) 0

Micro Mainframe -1
Computer (4) Computer
Analog signal Analog computer
Super
Computer
Examples of Analog Computer
(C) ¯
¯ ¯ ¯ ¯
Ø Based on Hardware Usage
A Vehicle Voltmeter Petrol
(1) (2) simple speedo- pump
clock meter meter
First Second
Generation (3) Generation
Examples of Analog Signal
Third
(4) Generation (5) ¯
¯ ¯ ¯ ¯
Fourth Fifth
Generation Generation Air Earth Car's Spoken
blowing shaking speed Voice

Pictorial Representation 13 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(2) (3)
Digital Computer and its example Mixed form of Designed for
digital and analog special work

Digital form is used


Digital

Analog signal is
Hybrid

and processing
for calculation

used for input


Computer

and output
Computer
and its
example

Ø Electronic signal is used to


1
display data in it. 1
0
-1 0 1 2 3 4 5 6

Ø Binary digits (0 and 1) is used for calculation. Analog Signal Digital Signal

Ø Used to denote data in the form of Applications Examples


electronic pulse. l Airplane l Traffic control
l Petroleum l Ultrasound
Ø Nowadays, digital computers are prevalent exploration Machine
in the market. l Hospitals l Monitoring
l Large industries Machine
Ø Example l Medical Field
Smartphone, Tab, Laptop, PC, Calculator, etc.
Characteristics
l Flexible l Fast/Speed
l Accuracy l Diligence
l Automatic l Versatility
1

0 1 2 3 4 5 6
Digital Signal Hybrid Computer

(B)
Computers classified on the basis of Size and Work

First mini computer Larger in size and capacity than a micro


manufactured in 1965. computer and smaller than a mainframe. Manufactured by
DEC (Digital
Its size is almost equal (1) Equipment Corporation).
to that of a refrigerator.
Mini
Computer More than one
microprocessors are used.

Use
Multiple persons are capable of
In passenger reservation,
working at the same time.
company, research and office, etc.
Mini Computer

Pictorial Representation 14 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

It dev
sors elope
e r o p roces d firs 8, 16
d sinc Mi c it. IBM t by , 32
micro or 64 bit
Starte . sed in Com
pany.
1970 are u proce
are u sso
sed in rs
it.
VLSI (Very Large Scale Integration) and
ULSI (Ultra Large Scale Integration) reduce the size of
microprocessor and increase the efficiency manifold
Smartphone (2) Notebook Computer
or Laptop
Micro Computer
and its use
Palmtop Netbook computer
Many Forms
Tablet Computer Workstation
PC

or
Use

Personal Computer or Used in home, office, school,


Desktop Computer business, production, defence,
enterainment, medical fields etc.

(2a)
Personal Computer
and its use and
development
Used Hardware PC Manufacturer Company
- PC
Keyboard, Monitor, IBM, Lenovo, Apple,
CPU, Memory and Company, Zenith, HCL, HP,
other hardwares Hewlett-Packard, Intel, etc.

Operating System and Connections Used


l Ability to perform multiple tasks In the field of Business, Hospitals,
simultaneously by a multitasking Education, Home, Offices, Entertainment,
operating system. Data storage, Publication, Railways,
l Interconnection by internet with the Airlines, etc.
help of telephone or modem.

Development of PC
l Developed in 1981. Microprocessor 8080 is used.
l Increased storage capacity by installing a hard disk drive.
l Nomenclatured PC-XT (Personal Computer Extended Technology)
l Nomenclatured PC-AT (Personal Computer Advanced Technology)
PC made by new microprocessor 80286 in 1984.

Pictorial Representation 15 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(2b)
Workstation and its use

Workstations have more CAD, Animation,


power than PC for e-mail, Only single Data Analysis, Rendering,
Efficient in making video
web surfing and word person is able to and audio.
processing task. work at a time.

Ultra powerful PC built with Use


Typically more processing capacity, It is used
powered by a bigger storage, in the field of
Local Area Network better display. technical, scientific
applications, engineering,
connectivity and operated by building construction, study of
multiuser operating system. simulation, etc.

Ø Notebook sized computer.

Ø Used for carrying anywhere in the briefcase.

Ø All features of a PC are present.

Ø Due to being used in the Lap, it is also popular by the name laptop.

Ø Developed by Adam Osborne in 1981.

Keyboard, Touchpad, Development Internet


Harddisk, Flopy disk (2c) connectivity
Used Hardware

Connectivity

drive, CD/DVD drive, Notebook used with the


Foldable LCD monitors, help of Wifi
Computer
Chargeable batteries made by and
and its
lithium ion, nickel Bluetooth
development
cadmium and nickel metal
hydride, etc. Difference
between Notebook
and PC

Ø Nowadays, laptop computers are named as notebook computers.

Ø All the features of notebook are less than laptop's.

Ø Display screen in notebook is smaller than that of a laptop.

Ø The thickness and weight of the notebook is slightly


less than that of the laptop.

Pictorial Representation 16 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(2d)
Netbook

Features The word 'Netbook' Use


Ø Smaller size, smaller screen originated from 'Net' of Ø Used in connecting to the
Ø low weight, low prices, internet, surfing on www,
Internet and 'book' of
built in camera sending and receiving e-
Ø Microprocessor with Notebook. mails, using social media,
low capacity downloading or uploading
Ø Headphone and audio or video files,
microphone jacks viewing calendar, listening
Ø Two or three USB ports to music, writing and
Ø Slots for memory card posting blogs, making call
Netbook over VoIP etc.

Ø A small, portable computer.


Popular Producer Ø Used for wireless communication. Another Name
Asus, Acer, Sylvania, Ø Lash with easy connectivity Mini Laptop
Lenovo, Hewlett Packard (HP), to the internet.
Dell, MSI, Sony, Samsung

Uses
l Used in Education, Health, Marketing
l Useful in reading books/newspapers, browsing
the web, generating reports, collecting data,
conducting surveys, project planning, online
learning, day-planning, etc.
Types Parts
Slate Tablet, Mini Tablet, (2e) -Stylus (a type of touch
Gaming Tablet, Booklet, pen), screen, external body,
Business Tablet, Phablet, Tablet battery, operating system,
2-in-1 or Hybrid Computer power button, volume
button and back button and
application software.

Advantages Disadvantage
It is cheap for using in l All features of
hand, carrying anywhere, computer are unavailable.
using without keyboard, l Unable to shoot
mouse, etc. selfies or videos.
l Fewer features, higher prices.
l Risk of touchscreen breakage.

l The first sketch of the tablet was created by


Alan Kay of Xerox Company in 1971.
l Tablet is a mobile computing device.
l Bigger than a smartphone but smaller than a laptop.
l Another name – Tablet computer, Tab or tablet PC
and hand held computer.
l Keyboard and mouse are absented from it.
l All the works done through touchscreen or stylus pen.

Pictorial Representation 17 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(2f) (2g)
Palmtop Smartphone
This is a mobile phone

Ø Almost all the features of the computer are present.

Ø Touchscreen is used for input.


Ø Meaning - Computer working on Palm.
Ø Touchscreen is used for soft copy.
Ø Smaller in size.
Ø Features
Calling, Messaging, Media player, PDA (Personal
Ø Another Name - Mini Laptop.
Digital Assistant), GPS, Digital Camera, etc.

Ø Input by voice instead of kayboard.


Ø Company and Operating System
Google's Android and Apple's iOS.
Ø Used as a mobile phone in practice.

Ø Characteristics
Ø Use - Useful in company, passenger-
Touchscreen, Web browsing, Wi-Fi,
reservation, research, etc.
Applications, Motion Sensor, Mobile Payment.

Ø Very Large in size. Computer


Ø Too much storage capacity. (CPU)
Ø Faster data processing speed.
Ø Multiple users are able to work
at the same time.

(3)
Ø Increase Use
the processing Used in large
capacity of two Mainframe
companines,
or more Computer
microprocessors Railway
by connecting
and its use Reservation,
them together. Defense,
Ø 32 or 64 bit
Research,
microprocessor
is used. Operating System Spacealogy, etc.

Ø Time sharing and


multiprogramming operating
systems are used.

Pictorial Representation 18 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Ø Equipped with fast processing power, huge Ø Calculation of processing speed
storage capacity (memory) of super computer is done in FLOPS
(Floating Point Operations per
Ø Manufactured by aggregating thousands of
Second)
high-efficiency microprocessors, equipped with
Ø Meaning of Floating point is
modern technologies. Fractional Numbers.
Ø Multiprocessing and parallel processing are Ø Measurement of the speed of
used. current super computers – PetaFlops
Ø Processing done by individual processors by 15
l 1 PetaFlops = 10 Flops
breaking down complex processes into pieces.
Supercomputer Measurement of Processing Speed
(4)
Super Computer and its speed
measurement and use

Usage Best five Supercomputers


Ø In scientific and technical field, in research and Super Computer Country Speed
design, Ø In universities and automobiles, in defense
and military sector, Ø in petroleum exploration, Fugaku Japan 442 petaflops
seismic data analysis, Ø In flight simulation and
Summit U.S.A. 148.8 petaflops
space research, Ø Weather forecasting,
Nuclear test, Ø In astronomy and cosmology, Sierra U.S.A. 94.6 petaflops
computational chemistry, Ø In condensed matter
physics, geology and biology Ø In complex Sunway TaihuLight China 93 petaflops
financial or economic models, machine learning, etc. Selene U.S.A. 63.4 petaflops

Exam Facts
Ø The credit for the creation of the
world's first supercomputer goes to
'America'.
Ø Company – Cray Research Company.
Ø Stablished – by Seymour Cray.
Ø Father of Super Computer –
Seymour Cray (Father of Super Computer)
Super
Computer

Interesting Facts

Ø IBM Deep Blue Computer is Ø At present, the name of the


capable of thinking 200 million fastest running supercomputer in
chess tricks in 1 second. the world is Fugaku.

Ø It defeated the world champion Ø This is the fastest


of chess, Garry Kasparov. supercomputer built ever by
Japan.

Pictorial Representation 19 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Super Computer in India

Ø In 1986 NAL (National Ø Manufacture of PARAM series supercomputer was completed by


Aeronautical Laboratories) C-DAC (Centre for Development of Advanced Computing) Pune,
started the Flosolver project India.
to develop a computer for
CFDAE (Computational
Fluid Dynamic and Ø 'PARAM-8000' the first supercomputer developed by C-DAC was
Aerospace Engineering). built in 1991.

Ø Dr. Vijay Bhashkar, the director of C-DAC is credited for the


manufacturing of PARAM-8000.
Ø Development of ANUPAM
Series' super computer by Ø 'PARAM-10000' supercomputer was built by C-DAC Pune in 1998.
BARC (Bhabha Atomic
Research Centre) of
Mumbai. Ø 'PARAM Padma' supercomputer was built in 2003.

Ø PACE (Processor for Ø Its computing capacity is 1 Tera Flops (1 Tera = 1012) i.e. 10 trillion
Aerodynamic Computation calculations per second.
and Evaluation) Series' super
computer manufactured by
ANURAG (Advanced Ø The fastest supercomputer PARAM Yuva-II developed by C-DAC
Numerical Research and was built in 2013.
Analysis Group) Hyderabad.
Ø Computation capacity of PARAM Yuva-II is 524 Teraflops but at
present 529.4 Teraflops.

Ø It was built for DRDO Ø Such supercomputers are available only with seven countries of the
(Defence Research and world, America, Japan, China, Israel, Italy, Germany and India.
Development Organization).
(C)
Computers classified on the basis of Hardware Usage

Used Hardware Used Languages


Year time Ø Machine Language and Low Level
Ø This computer is made of vacuum
1946-1959 Language
tube which is also called valve.
Ø The first compiler was developed
Ø Punch Card and Paper Tape are used by Dr. Grace Hopper in 1952.
to store data and software.
(1)
Examples
Use First Generation Ø ENIAC, UNIVAC,
EDSAC, EDVAC and
Ø Mainly used for scientific Computer IBM's MARK-I
research and military work.
The thermionic valve, the
Drawbacks
first vacuum tube was patented and
Benefits Ø Maintenance in air-conditioned environment
invented by British engineer John
Ø Calculation time or due to more heat generated by the vacuum tube.
Ambrose Fleming in 1904. This
speed was in milliseconds Ø Bulky in size and consumes more energy.
–3
progress marked the birth of the era
Ø 1 ms = 10 or Ø Low storage capacity and slow speed.
of modern wireless electronics used
1/1000 sec. Ø More likely to be erroreous.
in the first generation of computers.

Pictorial Representation 20 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Operating System
Batch operating systems are used for key
roles in Industry and Business
Ø It is an Advantage
electronic device Ø Transistors are
made up of p and n (2) relatively light, small
types of
semiconductors.
Second Generation and used to
This arrangement Computer consume less
is called Transistor. (1959-1965) electricity
Ø These are made of Ø Calculation time or
Silicon (Si) speed is in
and microsecond
Germanium (Ge).
1 ms = 10–6 sec

Used Language
Ø Mnemonic code used in
Used Hardware
High Level Assembly Language.
Ø Use of Transistors instead of
Ø High Level Language such as COBOL
Vacuum Tube.
(Common Business Oriented Language) and
Ø Use of Magnetic Tape and
FORTRAN (Formula Translator) used in
Magnetic disk for storage.
software.

The Transistor was invented in 1947 by John Wardeen, William Shockley and Walter Bretton of Bell Laboratories.

Storage Device Use of Time Sharing Used Hardware


Operating System
Ø Increased storage Ø Use of integrated circuit
capacity of magnetic chip instead of transistor.
tapes and disks (3) Ø Use of SSI (Small Scale
Ø Use of RAM (Random Integration) and MSI
Access Memory) Third Generation (Medium Scale Integration)
Computer techniques.
Ø Keyboard and monitor
as input and output
Examples respectively.
1965-
Ø IBM-360, IBM-370/168 1971
PDP-11 Used Languages
(Personal Data Processor)
Honeywell-6000 Ø PL/1, PASCAL and BASIC
in High Level Language

Drawbacks Advantage

Ø Need of air conditioning to Ø Smaller in size than other previous computers.


maintain air condition Ø Calculation time and speed are in nanoseconds (ns)
–9
Ø Need of complex technology Ø 1 ns = 10 sec
for manufacturing IC. Ø Saving labour and time.

Pictorial Representation 21 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

The IC was Interesting Facts Due to the size


developed in 1959 of potato chips
by Made on the surface of silicon. This the integrated
Jack Kilby and technology was named Micro Electronics. circuit was
Robert Noyce. These chips are made of the semi- named chip.
conductor material Silicon (Si) or Germanium (Ge).

Used Languages Used Hardware


Ø Development and use of C Language in Ø Use of Microprocessor.
High Level Language. Ø By using LSI (Large Scale Integration)
Ø This simplified programming so that any and VLSI (Very Large Scale Integration)
program could be run on all computers. increased the efficiency of the microprocessor.

(4)
Advantage Used Operating
th
Ø Calculation time is in Four omputer System
C
Pico second (PS)
ration Ø Development and use
1 ps = 10–12 sec Gene -1980 of MS-DOS, Microsoft
Ø Development of very 1971 Windows and Apple
small and handheld Operating System
computers using (Apple OS)
microprocessor.

Ø M.E. Haff (Marcian Edward) Ø According to Moore's Law,


(Ted) Hoff developed the “Every year (approximately)
microprocessor in 1971. From this; the number of dense IC transistors
the PC (Personal Computer) was developed. will be doubled.
Ø Semiconductor memory replaced magnetic Ø ULSI is capable of manufacturing
tape and disk. RAM capacity increased. 10 million electronic devices on a single chip.

Used Processor Used Memory

Ø Development and use of microprocessor chip Ø Use of Magnetic Bubble


containing millions of electronic components Memory which increased the
(5) storage capacity
with ULSI (Ultra Large Scale Integration)
and SLSI
(Super Large Scale ge
anta
Integration) Fifth Generation A dv
t Computer Ø The speed of
rne computer processor was made
Inte
ed extremely fast by connecting two
Us Ø Use and
development of processors together and parallel processing.
Internet , email and Ø Resulting that, Portable PC
WWW (World Wide Web) and Desktop PC added the
in the networking fields. computer to almost every aspect of life.

Pictorial Representation 22 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Future Use
Ø Efforts to insert Artificial Intelligent
in the new computer are progressing
so that the computers can make their
own decisions.
Ø It is used in Voice Recognition
and Robotics.

Next Generation Computer

Quantum
Computer Ø DNA Computer
Preserving and processing the data by using
DNA or protein based biological material in
omplished due
l Energy in electric rays is acc place of Silicon and using copper salt will make
to the presence of elec tron s. possible the cheap construction of super
computers in future which is also called Bio
ted in the 0's and 1's Computer.
l These electrons are able to be coun
ing rapi dly in their orbitals
positions simultaneously by mov

of such computers
l By its use, the development Ø Chemical
is going on, which wil l be wor king faster than Computer
and faster.
human brain and will be smaller In this,
using
ry of matter whose chemical
l It will use the quantum theo properties
it (Quantum bit)
memory will be measured in Qub and
whereas in normal computer, concentration
memory is measured in bits. of the
substance to
be calculated
will be possible to built a
computer representing data by
different concentrations of
chemicals.

Ø Nano Computer
It is being envisaged to develop very small and large capacity
computers using nanotubes built at the nanoscale (1 ´ 10–9m)
diameter, in which the molecular structure of matter will be used.

Pictorial Representation 23 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Generations of Computer - At a glance
First Second Third Fourth Fifth
Generation Generation Generation Generation Generation Generation
1946-1959 1959-1965 1965-1971 1971-1980 1980-till now
Hardware Vacuum Tube Transistor IC (Integrated Microprocessor ULSI (Ultra
Circuit), VLSI Large Scale
SSI (Very Integration)
(Small Scale Large Scale SLSI (Super
Integration), Integration) Large Scale
MSI Integration)
(Medium Scale Notebook,
Integration) Laptop,
Internet
Software Machine Assembly Standardization CUI Interface, Internet and
Language Language, of High Level UNIX and Multimedia
(0, 1 - Binary) Batch Language, C Language Software,
Operating Time Sharing Parallel
System Operating Processing
System

Memory Punch Card, Magnetic Tape, Increment in Semiconductor Cloud Memory,


Paper Tape Magnetic Disk, Magnetic Memory Optical Disk,
Magnetic Storage Large Storage
Memory Capacity Capacity

Calculation Milli Second Micro Second Nano Second Pico Second - -


Time (Speed) (ms) (ms) (ns) (ps)

Usage Scientific Scientific Personal Increment in Entertainment


and Defence and use of commercial by Internet
Research Commercial Computer production and and
Use personal use of Social Media
computer

Characteristics Electrical and Increment in Use of Developed Plug & Play


Mechanical Memory and Keyboard and ability to do
Machine Processing Monitor multiple tasks
Capacity simultaneously

Examples ENIAC, IBM-1401, IBM-360 IBM PC IBM


EDVAC, UNIVAC, PDP-11 Apple PC Notebook,
UNIVAC-I PDP-8 Pentium PC,
Super
Computer

Quality/Faults Expensive, Expensive, Relatively small Relatively cheap Very fast and
Larger size, Relatively and cheap, fast and fast, high- very short
Higher energy small and easy to use capacity, easy
consumption, and fast to use
Greater chance
of errors

Pictorial Representation 24 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Components of Computer System
(1) (2)
Hardware Software
It is a physical part, we can see and touch it. It We can see but can't touch it. It tells the
is divided into four parts, Input, Storage, computer what to do and how to do it. It is
Processing and Output devices. divided into three parts, System, Application
and Utility Software.
Monitor

Keyboard

Printer

Scanner

ve
n dri
Pe
Mouse

Cabinet
CD

(A)
Input Device
It is an electomechanical device. It makes the computer usable
by accepting data and instruction from the user.
Examples

Keyboard

(a)
Man Data
Input
Device { Point & Draw Device

Pick Device
Input
Device
Audio Input Device

(b)
Source Data
Input
Device { Video Input Device

Optical Input Device

Pictorial Representation 25 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Mouse Scanner
Point
& Draw Track Ball OCR
Device
Joy Stick OMR
Optical
Input
Device MICR
Light Pen
Pick OBR
Device
Touch Screen
PCR

Voice Recognition
Audio Video Video Camera
Input Sound Card Input
Device Device Digital Camera
Microphone

(a)
Man Data Input Device

(ii) (iv) (vi)


(i) Mouse (iii) Joy Stick (v) Touch Screen
Keyboard Track Ball Light Pen

(a)(i) Keyboard
¯
¯ ¯
(I) Software Keyboard (II) Hardware Keyboard
¯
¯ ¯
Virtual Keyboard On Screen Keyboard
l Virtual means pragmatic
l It is prepared by Software
Program
l Its image (virtual picture) is taken
down on a surface and then used to
enter data or instructions into the
computer by touching any of its
buttons. l An application software.
l Advantage – There is no chance of l Keyboard is visible on computer screen.
wear and tear and no need for l It is used by using mouse, touchscreen or other pointing devices.
cleaning as there are no any l It is a variant of virtual keyboard.
mechanical parts l It is used for inserting data into tablets and smartphones.

Pictorial Representation 26 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Function Keys

Cursor Movement Keys

Modifier Keys Arrows Keys Numerical Keypad

(a)(i)II
Hardware Keyboard

l A popular electromechanical input device.

l Used to enter alphanumeric data into the computer and give instructions to the computer.

l Most widely used 'QWERTY' keyboard with 104 buttons.

l Connection by PS-2 (Plug Station-2) Port of Keyboard and USB (Universal Serial Bus) port to the CPU.

l Connection by a wireless keyboard to a computer via Bluetooth.

Parts
of Special
Function Keyboard Purpose
Keys
Keys

Numerical Modifier
Key-pad Keys

Cursor
Movement
Keys

Page
Home
Down

Page
End Up

Pictorial Representation 27 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Parts of Keyboard

Function Keys Cursor


Movement Keys

Buttons are numbered from F1 to F12


at the top of the Keyboard.

Their functions depend on the software use.

Numerical Key-Pad Ø It is used to move the cursor


to the Right (®), Left (¬),
Up (­) and Down (¯).

Ø Pressing once, it is used to move


the cursor one place left or right, one
line up or down which is also called
Navigation Key.

Ø Buttons located on the right side of the Ø Home – It is used to move the cursor
keyboard, similar to the calculator. to the beginning of a line, Ctrl+Home to the
beginning of the current page or document.
Ø Used for fast filling of numerical data.
Ø End – End is used to move the cursor to
Ø In this, Numerical lock with the end of a line or end of page, ctrl + End
0 to 9, ., +, –, * to the end of the current page or document.
and / and enter bottons are present.

Ø Used to type Numbers when Ø Page Up – Moves the cursor to


Num Lock is on. the previous page of the document.

Ø When Num Lock is off, it is used for


Arrow key and End, Home, Page Up, Ø Page Down – Moves the cursor to the
Page Down, Insert and Delete functions. next page of the document.

Modifier Keys

Ø Able to manipulate Ø Shift, Ø Conveniently, Ø Change in


functions together with Alt (Alternate), their two keys are their functions
other keys without doing Ctrl (Control) located on both according to
any work by itself. and sides of the the software.
Windows Keys are keyboard.
the Modifier Keys.

Pictorial Representation 28 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Caps Lock Key


When the Caps Lock key is on or off,
the Caps Lock light turns on or off,
so that it is used to write English letters Shift Key
in capital letter/uppercase or If Caps Lock key
in small letter/lower case is on by pressing
Num Lock Key Another name for respectively. shift key or
When it is on, the Caps Lock and combination key with
green light at the right Num Lock is Toggle Key other keys of alphabet,
top of the keyboard then small letters
lights up, so the will be typed.
numeric keypad is If the Caps Lock key
used to type numbers is off, then capital letters
written on buttons. will be typed.
Special When there are
Purpose two symbols on a key,
Key pressing that key with
shift key will type the
above symbol.

Return / Enter
It is used to execute the instructions
Tab Key
given to the computer,
It is used to move the cursor
to send the typed data on the screen
by jumping to a certain distance which can be
to the computer, to start
covered by ruler.
a new paragraph or line in MS word. It is used to select one of the options
available in a dialog box.

Do you know?

l Cursor is a straight vertical


line displayed on the screen of
the monitor which keeps on
coming or blinking on the
screen.

l The next character to be


typed by the keyboard is
displayed in its place.

l Moves the cursor from one


place to another by the cursor
movement button on
keyboard or the mouse.

Pictorial Representation 29 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Space Bar Pause Key Back Space Key


The longest botton (key) It is used to resume It is used to delete the
located in the middle of the notification on character or space
bottom row of the keyboard. pressing any immediately
It is used to insert a space other key, to the left of
between letters and numbers similar the cursor and
while typing and to move to the scroll correct the
the cursor to the right by key/button. mistakes made
giving a space of one letter. while typing

Ctrl + Alt + Del Esc Delete / Del Key


These three keys are used or It is used to delete the
together to close the character or space
programs running in the
Escape Key located to the
computer. These are used It is used right of the cursor
to restart the computer to exit one by one.
when it hangs. the current
program

Print Screen Key Scroll Lock Key Insert Key


It is used to print It is used to It is used to overwrite
whatever stop and already stored data.
is seeing on the screen, resume For this, pressing the
store it in the photo information typing key with
clipboard coming insert key erases the
which can then on the digit or letter located
be pasted or computer immediately after the
edited in screen at cursor and new text is
another program, etc. one place. typed in its place.

Features of Mouse
Ú Ú
Left Button Right Button
l Located on the left side of l Located on the right side of
the mouse. the mouse.
l It is used to perform click, l According to the software, it
double click, point or drag. is used for some special
functions such as opening
Ú dialog box or menu box,
Centre Button viewing properties, etc.
l Another name
Scroll Button, Roller
Button or Wheel Button
l Used to scroll up and down a
document or web page.

Pictorial Representation 30 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(a)(ii)
Mouse
Ú Ú Ú Ú Ú
It is an electro Its importance It is used for selecting menu Mouse was There are two
mechanical increased with commands, moving icons (drag invented in or three buttons
pointing input the use of GUI & drop), resizing windows, 1964 by Dr. right, left and
device. (Graphical User starting programs, selecting Douglas centre exist on
Interface). options, etc. Engelbart. the mouse.

(a)(iv)
Joystick
i) (a)(v
(a)(ii ll It consists of a gear-
Lig )
a Thi ht P
ck B Aided shaped stick and a s ha
Tra nd- en
uter puter inpu held
mp click button on it, by t de
D-
C o Com s wri vice
poin
ting
CA A M – used a which video games, ting i s use
C g on c
ign
& urin ce of simulator training, o
draw mpute or
df
Des u fact la
d M a n
c e in p rs. robot control, etc. read ing pic screen
r
e i e
Aid ing de
v
m put ing ture ,
c o e works are performed bar s,
int op f th c
a po in lapt ition o by selecting any icon
Pho o d
to c es, etc
use s he
mo t h e po ving t ligh
ell a
nd
.
ges mo it or text. t ar
han r by ing e us
It c n t e o v in t ed
poi ut m his
mo
use
l w itho . dev
ice.
bal lace
ber its p
rub fro m
(a)(vi)
Touch Screen
Blue light rays move around the surface of this input device,
when one touches anyone of the options available on the screen with the finger,
the speed of the rays gets affected and records the position by which the computer starts
processing. It is used in ATM, Smartphone, Tablet,
Information Kiosk, etc.

(b) (b)(i)
Source Data Input Device Speech Recognition

(ii)
(i) Sound Card
Speech (iii)
Recognition Microphone Ø It is used to recognize the words spoken by
human and display them on computer screen after
(v)
converting them into text.
Digital
(iv) Camera Ø It is used to control the movements of
(vi) computers and other electronic devices by giving
Video Scanner
Camera verbal commands.
(vii) Ø In this system, a microphone converts voice
Source Data
into analog signal, again converts it into digital
Automation
data and then converts into text or command.

Pictorial Representation 31 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(b)(ii) (b)(v)
Sound Card Digital
Camera
internal expansion card
Ø It is an audio card,
t of an audio signal
that provides the outpu
r the control of a
from a computer unde
computer program.

(b)(iii)

Microphone or Mic
Ø A digital camera or a digicam in short,
taking a video or still photograph or
both in digital form, capable of
converting photodiode optical
Microphone information into electrical waves,
popularly recording images through an electronic
known as Mike image sensor and transmitting it to a
computer.
or Mic.

Ø Another name of digital cam is Web Cam.

It is used to convert audio signals Ø It is used in video conferencing,


into electrical waves. video chatting, web broadcasting, etc.

(b)(iv) (b)(vi)
Scanner
Video Camera

Ø This input device is capable of converting


texts, pictures and drawings into digital
images and storing them in memory.
Ø An electronic device capable of
capturing our picture which is Ø This scanner is skilled in converting a
then suitable for viewing as a document made on paper or picture into
movie. digital data based on the intensity of light
by placing a light beam on it.

Ø It is used in some special fields


like film, media, advertising, event Ø It is used to scan images, pictures, printed texts
management, wedding. and objects and convert them into digital images.

Pictorial Representation 32 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(b)(vii)
Source Data Automation
Its construction mainly for inserting input into logistics and personal computer system.

OCR OMR MICR OBR PCR

OCR OBR

Ø Full form of OCR is Ø Full form of OBR is


Optical Character Reader/Recognition. Optical Barcode Reader.

Ø Able to recognize and convert


scanned text documents into Ø Vertical and Parallel Lines (black bars)
processing text. of different widths and according to
interval among them contained
information.
Ø Able to make scanned
document editable.
Ø It contains complete information about a
product like price, quantity, country,
Ø OCR software is used in this device. company name, date of manufacture, etc.

OMR Ø It is used to read and recognize


various information of a product.
Ø Full form of OMR is
Optical Mark Reader / Recognition.

MICR
Ø This input device is capable of reading
special signs, symbols or marks and Ø MICR stands for
making them usable by the computer. Magnetic Ink Character Reader / Recognition.

Ø Its main function is to identify/


Ø Nowadays, special use in checking recognize Bank cheques.
the OMR sheet of objective answer
sheets (Multiple Choice Question). Ø It is used to read written letters
specially by computer with
special magnetic ink.

PCR Ø In this code, numbers from 0 to 9 and


four symbols (total 14 characters) are used.
Ø PCR stands for Punch Card Reader.

Ø Punch card is a hard and rigid paper Ø Its rapid use in cheques / drafts
card which is capable of storing data. issued by the Bank.

Ø Punch Card Reader machine is used to Ø Used to read Magnetic Code


read stored data in Punch Card. written on Bank Cheques.

Pictorial Representation 33 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(B)
Storage Device

It is a computer hardware. It is used to store, port or


extract data files and input instructions.
This device can hold and store both permanent and temporary
information.

Storage Device (Memory)


¯
¯ ¯
Primary or Secondary or
Main Memory Auxiliary Memory
¯ ¯
¯ ¯ ¯ ¯
Direct Sequential
Access Access
¯
Permanent Temporary Magnetic Tape
or or
Non-Volatile Volatile

¯ ¯
Floppy Hard
ROM Random Access Disk Disk
¯ ¯
¯ ¯ ¯ ¯ ¯
PROM EEPROM Cache RAM
¯
EPROM

¯ Magnetic
¯ ¯ Disk
Dynamic Static
RAM RAM Optical Electronic
Disk Storage
Device

Di
sk g
t Di Di ital V
ac ) sk er Zip
o mp D-R (D sat
VD ile Disk
C (C )
sk

Optical
Di

CD-
)

Disk
(BD

HDD
Ray

R/W

¯ ¯
e

Disk Winchester
l u

Flash Memory Memory Card


B

Pack Disk
CD-ROM (Pen drive) (Chip)

Pictorial Representation 34 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Ø Directly connected with Ø Stored data are destroyed when power


supply is turned off.
Central Processing Unit (CPU).
Ø Use of IC (Integrated Circuit) made of
Ø Fast speed, limited storage Silicon chip
Ø J.S. Kilby and Robert Noyce are credited
capacity and high price.
for its (IC) development.

Ø Divided into many


Ø Capable of storing the
smaller parts (Location or
Cell)
Primary data currently being
Ø 8, 16, 32 or 64 bit word
or processed by the CPU.
length capacity.
Main Ø It is faster and more
Ø Register, Cache Memory Memory expensive than secondary
memory.
ROM and RAM are its
examples.

Non-Volatile
Memory

ROM EE-PROM
The data stored l It is able to
in this store new
permanent PROM E-PROM programs by
memory are not removing
destroyed by l Full form is l It is able to (deleting) the
themselves and Programmable Read store new old programs by
can't be replaced Only Memory programs by high electric
them. It can only l It is programmed removing potential.
by optimized data by (deleting) old l Its use in
be read. Its full
special process. programs by research as flash.
name is Read
ultraviolet l Pen drive is its
Only Memory. l There are
rays. good example.
The information thousands of diodes
l Able to l Flash Memory
is able to remain present in it which are
store data has features of
in it even when capable of recording
even in both RAM and
the power supply the desired absence of ROM.
is turned off. information by fused power supply.
with high voltage.

Pictorial Representation 35 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Note

Ø The more bits of the word length in the memory, the higher will be the speed of data
transfer. Therefore, on increasing the word length in a machine, the speed increases.
It can be compared to a road. The wider the road, the higher the speed.

Temporary or Volatile Memory

Ø Temporary Memory is called main, volatile and Ø All data and information stored in it are
primary memory. destroyed when power supply is turned off.
Ø It is an internal memory of computer. That is why it is called volatile memory.
Ø It is directly accessed by the processor (CPU).
Ø It is faster than secondary memory.
Ø Computer can't run without primary memory.

Ø Full name Random Access


Ø Its full form ® Static Random Access Memory. Memory
STATIC

Ø Static means the data being stable in RAM.


Ø There is no need to keep on rewriting or refreshing it
repeatedly. Ø Other Names – Main
Memory, Primary Memory,
Ø Used as Volatile Memory
Temporary Memory, Volatile
Memory.

Ø It is a fast semiconductor
Characteristics of RAM memory made of microchip.

Ø Not to read (access)


Ø Its full form ® Dynamic Ramdom Access Memory. information sequentially
DYNAMIC

stored in it by the CPU but


Ø Dynamic means 'moving', it means always changing.
to read (access) randomly.
Ø There is a need to keep on rewriting and refreshing it
repeatedly.
Ø It is also used like a Volatile Memory. Ø All calculations are
performed in this memory.

Cache Memory

Extremely fast memory between Primary Memory (RAM) and CPU.

Cache Memory is fastest compared to RAM and Hard disk.

It is capable of storing frequently used data and instructions.

Increment in processor speed due to faster speed.

Pictorial Representation 36 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Its direct connection to the CPU.

The CPU doesn't use buses due to the Cache Memory.

It acts as a buffer between RAM and CPU.

Size of Cache Memory, from 256 KB to 4 MB.

A fastest memory.

It is located close to the CPU chip.

Used to speed-up the CPU.

Frequently used by the CPU.

Cache
CPU Memory RAM

Function of Cache Memory as


buffer between RAM and CPU

Secondary or Auxiliary Memory

Ø Secondary or Auxiliary Memory used as a backup memory.

Ø Other names are Permanent Memory and Non-volatile Memory.

Ø Slower and cheaper than Primary Memory.

Ø External memory as well as optical and magnetic memory.

Ø Able to store large amount of data.

Ø No effect on stored data due to power supply interruption.

Pictorial Representation 37 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Access Mode Formula for Magnetic Tape
Storage Capacity

1. The storage
Sequential capacity of Magnetic
Tape is multiplication of
density of the data
Access
record and length of
3. 2. the tape.
Random Direct

ß
ß Storage
Capacity

=
Example Example Example
of of of Data Density
Sequential Direct Random (Byte per inch)
Access Access Access ´
Tape Length

Magnetic Magnetic Disk, RAM


Tape Optical Disk
Magnetic Tape/Reel

Example and Application


of Sequential Access

Magnetic
Tape

Access Iron oxide Magnetic Tape


time
or
can be Another Use for
read, Name Data chromium
write Magnetic Back-up.
and reel. di-oxide
delete
layer
many
times. used. VCR (Video Cassette Recorder)

Pictorial Representation 38 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Examples of Direct Access
¯
¯ ¯ ¯
Magnetic Disk Optical Disk Electronic
¯ Storage Device
¯ ¯
Hard Disk Floppy Disk

Magnetic Disk Optical Disk

Ø Hard Disk
Ø It is a built-in round disk made of
polycarbonate plastic.
Ø One of its surfaces is coated with a
thin layer of Aluminium to convert light
and a laser beam is used to read or write
data on it. Hence, it is also called a Laser
Disk.

l First Feature
Micro pit on the surface of the disk is
l Permanent and Auxiliary Memory. called pits and flat area between the Pits
l Disk made of metal or plastic. is called Lands.
l Iron oxide layer is used.
l Read/write head used for reading or writing. l Second Feature
l Capable of storing huge amount of data. Pits represent the binary digit 0 or
off and Lands represent the binary
digit 1 or on.
Ø Floppy Disk
l Examples
® CD (Compact Disk)
® DVD (Digital Versatile Disk)
® BD (Blue Ray Disk)

l Benefits
® Less chance of data being erased or changed.
® More storage capacity at less cost.
® Easy to transfer data.
® Less chance of disk wear since the Read.
l Circular Disk contained in a
write Head does not have physical contact
plastic square floppy. with the disk.
l A layer of magnetic material used
on the disk.
l Protected by a plastic square shell. l Drawbacks
l Divided into tracks and sectors. High chance of disk damage
l Each sector has 512 bytes of storage capacity. due to dust, dirt, fingerprint, etc.

Pictorial Representation 39 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Optical Disk Spiral Track DVD
Disk Sectors Ø Full Name – Digital Versatile Disk
Ø Storage Capacity
l 4.7 GB (Single Side - Single Layer - Common)
l 8.5 GB (Single Side - Double Layer)
l 9.4 GB (Double Side - Single Layer)
l 17.08 GB (Double Side - Double Layer)
Ø Layering of 4 layers are possible.

Single track spirals to edge of disk

Example of Optical Disk


or
CD DVD
CD-ROM
or BD
Ø Full Form
l Compact Disk Read
Only Memory
Blue Ray Disk
Ø Usage
l For storing software, Ø Short Form
huge data, audio, video,
l BD
file and documents.
Ø Storage Capacity
Ø Diameter and Width l High storage capacity (25 GB - 50 GB)
l 120 mm and 1.2 mm.
Ø Access Technique
Ø Storage Capacity l Blue Violet Laser Rays.
l about 700 MB.

Ø Technique for Reading


l Infrared laser
beam used. Note

l The storage capacity of


single layer DVD is 4.7 GB.
CD-R
Ø Full Name l Compact Disk – Recordable l The storage capacity of
Ø Another Name
l WORM (Write Once Read Many) two layer DVD is 8.5 GB.

l In 50 GB storage space,
CD-RW 9 hours of High Definition
Ø Full Name l Compact Disk Re-writable Video (HDV) or 23 hours of
Ø Feature Standard Definition Video
l It can be read and written many times.
(SDV) is able to be stored.

Pictorial Representation 40 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


m com It is
em p a
so sy or ute typ
ex ftw ste y m r sy e o
or ecu are m i ana ste f
pr te pr n w ge m's

removable
to another.
EE-PROM
(Pen Drive)

im d i og h m

In the form of

storage device.
Flash Memory

from one device


ar n t ram ich ent

Transferring data
Th y he s

Pictorial Presentation
th is s m m a
e e ys em a re
pu pro xe tem or in
t c c y.
ti
w m ng ss ti en e u
a l hic ain it w on ab
ar h a m en ith of les
ge u em ti ou a
r s o re t
m size er f ry ly i By
em a ee by n
or nd ls l w
y. fa ik h
be th ich
ste e
r c i s t
It om me he
e s
fre dep s u mo ize
of

41
e s end nli ry
Usage

pa s o mi
m t
Popular

em ce o n th ed.
M or f t e
pr er y. he

large programs to run.


Virtual Memory
oc its
a e -
Another name and Example

ev pro nd ss e Pos
c
e e i n xe s

It is not a physical memory of the


computer but a technology to allow
Electronic Storage Device

m n w ssin cre cut ible


em he g as io
n e n
@PdfHubRebornNew

re ory th spe s
du s e ed
ce ize ma D
d. is in e e
ta xec me
ke ut ri
t s io ts-
m o be mor n p Th
a e r e
op nag tter tim oce
er em me e ss
at
MMC
(Chip)

in ent mo due
g
Palmtop,

sy by ry
memory card
In the form of
Camera, PDA,
Memory Card

ste the
Smartphone, etc.

m
In Mobile, Digital
(Multimedia Card)

Join @PdfhubRebornNew For More Exclusive Pdfs


GS Drishti Computer : An Introduction
@PdfHubRebornNew
Difference between Primary and Secondary Memory
¯
¯ ¯ ¯

Primary/Main Memory Secondary/Auxiliary Memory

Inside the computer Place Mainly outside the computer

Permanent and Temporary Kinds Permanent

Limited Capacity Unlimited

Fast Speed Relatively slow

Low (nano second) Access Time More (Milli Second)

More Cost per bit Low

ROM Register Cache RAM Magnetic Optical


Memory

Memory Disk Disk

1m sec 1-2 ns 3-10 ns 11-60 ns 10-50 ms 100-200 ms


Access

(Micro (Nano (Milli


Time

Second) Second) Second)

4 to 8 200 32 KB to 16 MB to 160 GB to 700 MB to


Capacity
Storage

MB Byte 4 MB 4 GB 1600 GB 60 GB

Pictorial Presentation 42 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Buffer Memory

Usage

Ø To control the speed of data transfer


between sender and receiver.
Ø To optimize the data transfer
The data are
between devices of different size. stored
Creation of
buffer Ø To store the data is buffer before data temporarily
memory in in buffer
to be stored in RAM. before being
main
memory Example transferred
(RAM) in main
Ø While downloading audio / video
memory.
from internet it first loads 20% into
buffer then starts playing.

Full Form Used


Simultaneous as a
Peripheral buffer
Operation memory
On Line

Spool/
Spooling

A temporary Sending a
storage area document to a
where buffer with high
the data to be speed capacity
printed is stored for before printing, is
a period of time. called spooling.

Pictorial Presentation 43 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Selection of
Computer Memory for Usage

More More Low Slow

Semiconductor Memory
Register

Cache Memory

ROM / RAM
Storage Capacity

Access Time

Speed
Cost
Magnetic Disk

Optical Disk

Magnetic
Tape

Low Low More Fast

Memory Card
Note

Ø Selection of computer
memory is such a way –
Without slowing down the speed of data
processing, to achieve maximum
utility at low cost.

Flash Memory Ø Electronic Memory device like


small card of thin size

Ø Non-volatile memory is used to


write new data by removing old Ø Popular as Removable storage
data or programs by electricity
Ø Usage- Used in mobile phone,
Digital camera, VDA, Palmtop,
Ø Example -
Smartphone, etc.
EE-PROM, Pen Drive and Memory card

Pictorial Presentation 44 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
(C)
Processing Device Working System of Computer (CPU)

Information
Instructions
An electronic Secondary or

Result or
Data and
microchip Auxiliary
Important CPU is called Memory
part of Heart or Brain
computer of computer

Output Unit
Input Unit
system Primary or
Main Memory
Computer is Used to
unable to control, instruct
work without and process all
CPU tasks. Control Unit
Processing (CU)
Device
Another Part Able to
(CPU) transform data
CU, ALU and
into information Arithmetic
Memory
after processing Logic Unit
(Register) based on (ALU)
instructions.
CPU
Another name CPU Able to execute
(Central Processing the operating
Unit) or Processor system and other Parts/Components of CPU
­
or Microprocessor programs.
­

­
Memory Control
Unit Three Parts of Unit
or CPU
Memory Unit ­
Register
Arithmetic Logic Unit

Operational It is a high speed Data, Program,


Register A
electronic chip memory Instruction and last
L that is a part of CPU. results being currently
used by CPU are stored
Control Unit U
in Register.
To store all data instructions
To store final results before
going to output device.

for processing.

Register /
I/O Module Memory
Unit
and Its
Functions
I/O Device

To store the It is fastest memory in


Structure of
results between comparison to RAM.
CPU
processing.

Pictorial Representation 45 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Second important It is called Nerve
part of CPU. System of Computer.

Able to help ALU. Control It is connected to ALU


Unit and I/O device.
(CU)
Instructing and ­ Adjusting and
Controlling Harmonizing
Functions of Control Unit

­
l To processor (ALU)'s ­ l Among all the
functions or operations. softwares, hardwares and
their activities
l To input / output and other Storing
hardware like monitor, l Between Input /
printer, scanner, mouse, Fetching data from Output devices
keyboard, disk, etc. main memory and
storing them

Arithmetic
Logic Unit (ALU) Logical Unit
Arithmetic l Equal to (=)
Unit l Less than (<)
Ø The important part of CPU is ALU.
l Greater than (>)
l Addition (+) Ø The actual execution of
instructions and data are l Less than or equal to (<)
l Subtraction (–) processed by ALU. l Greater than or equal to (>)
l Multiplication (×) Ø It is used to l Less than or
perform arithmetic does not equal to (<¹)
l Division (÷) and logical calculations. l Greater than or does
1 Ø ALU is divided 2 not equal to (>¹)
into two parts.

Do you know? Computer


Register Cache Clock Internal External
¯ ¯
Ø AMD and Intel are two biggest ¯ Bus
¯ Bus
¯
Leading CPU manufacturing ¯
Memory
companies which make available their System Bus

own types of CPUs.

Factors affecting the


AMD Intel Pentium speed of a CPU
Athlon
Intel Celeron
AMD Intel Intel Xeon
Parallel Interaction
Intel Core 2 Duo Calculations between CPU
AMD and other
Duron Intel Atom Word Length
devices

Pictorial Representation 46 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
l Data processing speed
depends on its clock.

In the absence of power, l System Clock, a timing


the time of the computer device capable of
Computer
clock is remain reset by generating a pulse or
Clock
the CMOS. electric pulse to
(Complementary Metal synchronize processing.
Oxide Semi-conductor)
Battery.
l The sooner it generates
a clock pulse, the faster
the speed of data
processing.

Bus is used to send data, instruction,


and information to various devices of
ng th
Word Le the computer by the CPU.

Ø The number of digits (bit) to be taken by


computer for processing
Ø Increment in speed of computer due to System
increment in word length
Ø Its length is possible upto 8,16, 32 and 64
Bus
bits.
Ø 64 bit means the word length of computer Types
is 64 bit. Internal Bus External Bus
used to transmit used to transmit data
data to the internal to various external
device of the devices like
Multiple processors are able to motherboard. peripherals, ports
perform multiple operations expansion slots, etc.
simultaneously at a time.
Example
32 bit data can be exchanged simultaneously
parallel processing is

over a system bus of 32 bit width.


CPU is increased by
Working capacity of
Parallel processing.
parallel computing.
Another name of

Parallel
Calculations
etween CPU and other devices
Co-ordination b
Ø Generally, CPU is able to do fast
calculation.
Ø Negative impact on computer's speed due
Two or more processors to slowing down of other devices.
are used to solve a single Ø Positive impact on computer's speed due to
problem. speeding up of other devices.

Pictorial Representation 47 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Output Device w?
Ø Electromechanic Device Do you kno is measured
a co m p uter monitor
Ø Used to display the result processed by the
Ø The size
o f or, which
CPU. o n al le n g th of the monit
diag the size of a
Ø Able to display the result as hard copy or based on the in inches. Thus,
p re ss ed ide would
soft copy. is usually ex n g an d 9 inches w
2 inch es lo
Ø Example – Monitor, Printer, Projector, monitor is 1 .
Speaker, Plotter, etc. be 15 inches

(D)
Output Device
¯
¯ ¯
Soft Copy Hard Copy

(Which can be seen only) (Which can be both seen and touched)
¯ ¯
Display Unit or ¯ ¯
Monitor Printing Listening Unit
¯ Unit or Speaker
¯ ¯ ¯ ¯
Monochrome Gray-Scale Colour ¯ ¯
¯ ¯ Printer Plotter
¯ ¯
¯ ¯ ¯ ¯
¯
¯ ¯ ¯ Impact Non-Impact Drum Flat Bed
CRT LCD Projector Printer Printer
(Cathode (Liquid Crystal Display) / ¯
Ray TFT ¯ ¯
Tube) (Thin Film Transistor) / Dot Daisy ¯
LED Matrix Wheel ¯ ¯ ¯
(Light Emitting Diode) Inkjet Laser Thermal
¯
¯ ¯ Classification Monochrome Monitor
Vector CRT Rester CRT Ø Its display
¯ ¯ of Monitor
Three types of displayed with two
¯ monitor available colours
used in Hospitals based on its colour Ø One colour of the
background and
other one colour
Soft Copy of the visible object.
Ø Temporary output,

W which cannot be touched.


Ø It cannot be used without
hardware.
Gray Scale Monitor
Ø Monochrome is a
form of monitor.
Ø Multiple sheds
Colour Monitor
Ø Three colours (Red,
Green and Blue) are
Ø Available electronically in digital form. displayed by used in this.
Ø It is easy to change it. mixing black with Ø Displayed other
Ø The output presented by monitor and white colours. colours by RGB.
speaker are its examples.

Pictorial Representation 48 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

On the basis of technology, LCD/TFT


Monitors Monitor
are divided into three categories
Ø Full Form - Liquid Crystal
Display/Thin Film Transistor.
Ø Liquid crystal used between two layers.
Ø Thin, lightweight, less space and less
power consumption monitor.
Ø Used is Laptop, Tablet, Smartphone,
Electronic watch, Calculator, etc.
Ø Converted into TFT due to low image
clarity.
CRT r
ito
Mon

Projector
Ø It is an output device which is
Ø Full Form – Cathode Ray Tube used to show any type of image or
video on a white poster or wall.
Ø Another Name – VDU (Visual Display Unit)
Ø It was invented in 1895 by
Ø Available like a picture tube of a TV Lumiere Brothers, Auguste and
Louis.
Ø Phosphorus layer used on screen.

Ø Used in the emission of electron guns,


cathode rays and electron beam.

Focusing
Base System Y deflect
Phosphorus

Actual Physical Printed


Connector X deflect Paper Documents
Pins Electron
Gun Control
grid voltage

Ø When the electron beam hits the Hard


screen, the pixels start glowing by Copy
which picture or image are shown.
Text Printable
File File
Ø Two types are : Vector CRT and Rester CRT
Photograph,
Ø Both used in Hospitals Drawing

Pictorial Representation 49 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Printers by style
e r
Print
Impact Printer
ic
tron Ø Used to print by pressing on paper and
a n elec
t is e. ink ribbons, similar to a typewriter.
Ø I t d evic
u he Ø Used to print electromechanically by
outp put t
t o
sed n the striking on ribbon and paper.
Ø U y ed o Ø Single colour output available depending
sp l a ation
u t p ut di i n f orm on the colour of the ribbon.
o l
igita ics,
r e e n (d , G raph Ø Physical contact established among print
sc ges r.
Ima pape head, ribbon cartridge and paper during
like c. ) o n opy printing.
e x t s, et r t S oft C
T e Ø Effective printing on paper using ink
conv
e d to opy. ribbon.
Ø U
s
H a rd C
into Ø Examples –
Dot matrix and daisy wheel printer.

Classification of Printer Dot Matrix


¯ Printer
¯ ¯
According to Capacity According to Style
l Character or ¯
Single Printer ¯ ¯
l Line Printer Impact Printer Non-impact
l Page Printer l Dot Matrix Printer
l Daisy l Thermal
Wheel l Inkjet
l Laser

Printers by capacity Ø Able to print a single character at a time.

Ø Slow speed impact printer.

Ø A print head is used to move from


left to right and from right to left.

Ø Character or Single Printer Ø Carbon copy used in this printing.


Able to print a single character at a time.
Example Dot Matrix Printer
Ø Ink soaked ribbon used between
paper and print head.
Ø Line Printer
Ø The print head is fitted with hammers which
Able to print a complete line
strike the ribbon to bring out the character.
at a time.

Ø Used to making invoices, receipts, tickets, etc.


Ø Page Printer
Able to print a complete page
at a time. Ø Bad printing quality.

Pictorial Representation 50 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Ø In this, printing on
Daisy Wheel Printer paper by dots.

Ø The printing quality is very


clear due to the dots being very
small and close together.

Non-Impact Printer
Ø No physical contact between
Ø A character is present on each petal. print head, cartridge and paper.
Ø Ink powder used inside
Ø The wheel is rotated at high speed by a motor. the cartridge.
Ø Its printing is good. Ø Missing ribbon in this.
Ø Multiple carbon copy can be printed simultaneously. Ø Printing is done by
spraying ink by electrical or
Ø In this, a plastic wheel is used similar chemical method.
to the Daisy flower shape.
Ø Faster speed and less noise.
Ø When the correct letter position is
reached at the printing position, it is Ø Both black and colour printing is
struck with a small hammer. possible.

It is a digital printing process. Thermal In this, coated thermochromic


Printer heat sensitive paper used.

Printing done on thermochromic


Thermal print head used in printing. paper by the effect of heat.

Advantages Inkjet Printer Drawbacks


Ø Good Ø Higher cost per
printing page.
Ø It is a non-impact printer.
quality Ø Slower printing
Ø Less than laser printer.
initial cost Ø Print head with 300-500 small jet nozzles available in this. Ø For black and
Ø More colour printing,
reliable Ø Printing by ink dots (spray). different ink-
cartridge used.

Ø Spraying of ink droplets on the paper


with the effect of electric fields.

Ø In this, Ink bottle (colour and


monochrome cartridge) used.

Pictorial Representation 51 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Advantage Disadvantage
Ø Low printing cost with good quality. Ø More expensive equipment.

Ø High speed Ø It is able to


non-impact print high
printer. quality fast
Ø In this, speed characters
semiconductor and pictures.
laser beam, Ø Commonly
optical drum and changed used in desktop
ink toner are used. publishing.

Laser Printer

Mother Board
Ø It is the main Printed Circuit Board (PCB)
link to which all components are connected.
Ø Visible like printer
device. Ø Entire computers orgranized around it.
Ø Used to print vector
graphics. Ø CPU, RAM, ROM, HDD, etc. are connected on it.
Ø Plotter used
instead of toner. Ø Input unit, output unit, CD drive, sound
Ø Pen, pencil, card, video card, TV card, Graphics card,
marker or etc. are connected.
other writing
devices are used to Ø Expansion slots are available for future
draw continuous connections of hardware device.
lines on paper.
Backbone
of Computer
Speaker Icon Main Circuit
Board of Computer

Measurement of Computer System Performance


Ø Speaker is an
output device.
Ø Used to convert
electrical waves into
sound waves.
Ø Used to produce Response
a soft copy of the output Time
in the form of sound.
Ø There is an amplifier available in it.
Ø It is used to convert electronic
signals into sound wave. Turn
Throughput
Ø Headphone and earphone are its Around
examples. Time
Ø Nowadays, they are through
bluetooth.

Pictorial Representation 52 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Computer Software

l Used to indicate improved performance.

l The number of useful processing performed by the computer per unit time.
Throughput l Used to measure the performance of hard drive, RAM,
Internet and network connections.

l Depends on the type of processed work.

The time between the


This is the computer processing and the
time when the first response to be edited.
process is in the ready Response
state and is received by Time
the CPU for the first Response time should be
time. short for better
performance.

The time taken by The time between


the CPU to complete a
Turn the work given to the CPU
process or to fulfil
Around and the result obtained after
a request.
Time the process.

To tell the hardware l Controlling the


what to do, when to Functions Software Usage functions of computer
system.
do and how to do it,
l Co-ordinating with
etc. are its functions. hardware.
Definition l The scheduled task
done by the hardware.

l A systematic set of instructions, programs, rules and actions that we (users)


cannot touch.
l If hardware is its engine, the software is its fuel.
l Programs, applications and software are used to indicate the same thing.
Programmer

l A set of instructions l Computer software specialist prepares the code or


Program

prepared by the program to complete the assigned task, checks it, identifies
programmer to make a
computer perform a and fixes the bugs and consider the possibilities arising
definite and specific task. during the implementation (processing).

Pictorial Representation 53 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Types of Software

Note
System Application Executable Program
Software Software l The software that gives the desired
result by executing by the computer
processor (CPU).
l The extension name of this file is .exe
l To follow the instructions of the
Utility program are run, execute, process,
Software operate.

User
Users
Working implementation by
Application Software Application Software

Hardware Controlling By
Operating System
System Software

Hardware Hardware

Software
¯
¯ ¯ ¯
System Software Application Software Utility Software
¯ ¯ ¯
¯ ¯ ¯ Word Anti-virus
Operating Language Device Driver Processor Examples
System Translator Example Examples
Backup
Example Example Motherboard Spreadsheet
Windows Compiler, driver, Database program
Unix, Assembler, Keyboard Accounting File manager
Linux, Interpreter driver Pagemaker
Android, Printer driver Coreldraw
MAC OS Scanner driver Photoshop

Without it,
A set of programs designed to perform The sets of
the computer
It is the basic functions of a computer programs
is a lifeless are responsible
connected to system and make them functional.
machine. System for running the
Hardware computer,
Software
and Functions intermediate function Use controlling
Application between the computer and user, the used for tasks, managing
Software function of preparing background computer resources.
for application software. hardware.

Pictorial Representation 54 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
l Organized set of programs. Types of System Software l Used to guide,
l A link between the control, make usable
computer and the user. any device that can be
extremely connected to
a computer such as
Main Functions keyboard, mouse, printer
scanner, camera, etc.
l To transfer user commands to
hardware and results and
messages to the user.
l Providing interface for
communication with the user l Nowadays, various device
Operating Language Device
and the computer. drivers are already loaded into
Sytem Translator Driver operating system that the
l Managing hardware devices.
l Managing and maintaining computer configures the new
disk file systems. hardware accordingly.
l Supporting application programs. l Another name : Plug and
Play Device

l Source code is written by the programmer in a high level language which the computer is unable to
understand directly because the computer understands binary (0 and 1). For solving these types of
problems, language translator is used.

Assembler
Compiler Interpreter
l A language translator
l A language translator l Like a compiler,
program. program.
interpreter is also a
l Used to translate High l Used for assembling
language translator
Level Language (HLL) (converting) the program
program.
program into machine written in assembled
l Used to execute a
language. form or low level
program designed in a
l By translating the whole language into machine
program in one go, it is used high level language by
language.
to indicate all mistakes (bugs) converting them into
l Used to convert
in line order. machine language.
assembly language as
l Used to create an l Used to run or execute
mnemonic code into
executable program by each line of the program
binary code.
compiling the entire source by converting them into
program or source code into machine language line by
an object program. line.
Assembly Language
(Source Code)
¯
High Level Language Assembler High Level Language
¯ (Source Program)
¯
Compiler Machine Language (Object Code) ¯
¯ Interpreter
Object Program ¯
Important Facts Program Implementation

l Linux is also a powerful l Linux is available for free while l Limited usage of Linux
operating system like Windows. Windows is available for paid. compared to Windows.

Pictorial Representation 55 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Difference between Compiler and Interpreter

Sl. No. Compiler Interpreter

Able to translate the program line by line.


1. Able to translate entire programs together.

Used to display all errors together. Used to display another fault by correcting
2.
an error after displaying it.

Unable to execute progam by translating Able to execute programs by translating


3.
it into machine language. program into machine language.
4. Its output is an object of machine language. Its output is the result of software implementation.
5. Slow speed in removing the bugs. Quick in removing the bugs.
6. Less time in editing. More time in editing.

Types of Operating System

User Based Work Mode Based


Development
Based

Single User Graphical User Interface


Operating system In this operating system, Input
to computer through mouse and
In this
Multiuser Character or keyboard based on graphics
operating system, l As a graphics, all kinds of
Operating System Command User
only one person In this operating buttons, menus, etc
Interface – In this interface are present.
(user) is permissible system, more than one
persons (users) are operating system, a special l No need to
to act atonce.
permissible to act at type of command (only text) memorize
Example commands
once by creating an is used by typing to operate
MS DOS, account. l Commands
the computer. Need to be displayed as
Windows, 95, 98, etc Example –
Linux, Unix, etc. memories commanded. icon on
Example MS DOS monitor.

Serial
Operating System Embedded
Operating System
Distributed
Operating System
Development Batch
Based Operating System
Open/Closed Source
Operating System Network
Multiprogramming Operating System
Operating System

Pictorial Representation 56 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Multi Processing Operating System

Real Time Operating System Time Sharing Operating System

Multi User Operating System

1
Serial Operating System
l In this, one by one tasks Job 1 Job 1
(Processes or jobs) are executed
serially.
Serial
Example
Job 2 Opera- Job 2 CPU
l MS DOS
ting
Drawbacks
System
l After completion of a process
(job), another are executed. Job n Job n
l Now, its use is negligible.

2
Batch Operating System
l In this, organizing similar tasks (processes or jobs) as a batch
and executing them in groups.
Example
l Payroll system, Bank statements.
Benefits
l All computer resources available for execution of jobs.
l Very little CPU idle time.
Loss
l Difficult to debug.
l If one job falls, the other job has to be stopped to wait for an
unknown amount of time.

Job 1

Job 1,
Similar Job 2 Batch 1
Job 3,

Similar Job 3 Batch Job 2,


Operating Job 4, Batch 2 CPU
Job 4 Sytem Job 5

Job 5

Job n Job n

Pictorial Representation 57 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

3
Embedded Device
Operating System Drivers
l Operating system to use
the processor located
inside an electronic device.
RTOS
l Present (stored) in ROM Embedded
(Real Time
(Read Only Memory). Firmware Operating
Operating
l Used in home System
Systems)
appliances like
microwave, washing
machine, DVD player, car
management system, Reference
traffic control, electronic Board Design
clock, etc.

4
Network Operating
System
Client 1 Client 2
l This operating system used
to run on a single server.
l Capable of managing data,
security, users, groups,
applications and other
networking tasks.
l On its private network,
access permission of sharing
files, printers, applications,
security and other functions.
Example
l Microsoft Windows Server 2003,
2008, UNIX, LINUX, Mac OSX, BSD File Server
Benefits
l Integration in new technology
and hardware system and centralized Client 3 Client 4
server security.
Loss
l Dependence on the central
location for expensive server,
more tasks.

5
Distributed CPU Disk CPU Disk CPU Disk
Operating System
l Capable of running various Memory Memory Memory
applications using multiple
processors and memories.
l Due to its use by many
users, its another name is
loosely coupled operating Distributed
system Operating
Benefit System
l When one system falls,
using the simplest of the other
systems are possible.
Loss
l Due to failure of the main CPU Disk CPU Disk
network, all communications stopped.
l Low availability due to being expensive. Memory Memory

Pictorial Representation 58 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

6
Multi Tasking Operating System
l Used to perform multiple tasks (more than one task).
l All the tasks can be edited simultaneously after the processor has given all the
running programs (tasks) for some time.
l Actually assigning time to different processes by the CPU.
l The tasks are completed so fast that the user feels that all the tasks are
happening simultaneously.

Real Time Operating


Multiprograming System
Operating System l Importance of giving results
l Capable of performing multiple in stipulated time frame.
jobs at the same time. l Used as data in another
Time sharing l Capable of doing a single process at a time program of a result of a
Operating program.
without executing multiple programs
l By delaying execution
System (processes or jobs) at the same time. of first program, the
l Used for giving l Some part of the main memory are execution of second
some time (slice allocated for each program. program and results are
time or quantum) to l More storage capacity of the main memory. likely to stop.
each user for sharing l Execution of another process when l Used in operation of
use of resources. satellites, controlling of
one process is busy. airplanes, nuclear furnaces,
l Using to create an Benefits scientific research, defence,
account of each user l Time utilization medical, railway reservation,
according to the permission. robotics, industrial control, etc .
Word Time Example l Linux
E-mail Sharing CPU
Operating
Tally System
Multi User Operating System
l Used in computer system connected to network.
l Various users able to do one program at same time.
Example
l Unix, Linux, Windows-7

Multiprogramming Operating System

Job 1 ® Job 1 idle Job 1 ®

Job 2 ® Job 2 idle Job 2 idle ®

Job 3 ® Job 3 idle Job 3 idle ® CPU

Job 4 ® Job 4 idle Job 4 idle ®

Job 5 ® Job 5 idle Job 5 idle ®

Pictorial Representation 59 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Open/Closed Source Operating System

l Kernel or source l The source


code of software is code of software is secret.
available to all.
l Anyone is unable
l Anyone able to use it by
changing it according to his to make changes in it.
needs. l Any user able to
l Completely independent Open Closed use it by
means no one has any Source Source
right on it. paying
OS OS defined fee.
l Free of cost.

Example Example
Linux, Google's Android OS Windows, Apple's iphone OS

Some Popular Operating Systems

l Single user Microsoft


operating system developed Windows NT
by Microsoft in 1981.
l Based on command prompt. l Built for use in computer networks equipped
with multi-processing, multi-user and time
sharing OS.
MS DOS l Use of graphical User Interface.

l Various features of network,


communication and data security are available.

l Users need to remember commands and syntax.

l It is a 16 bit operating system.

Microsoft Windows

l Windows 3.0 released in 1990 to l Based on Graphical User Interface (GUI).


address the shortcomings of DOS
l Used to work with pictures, graphs and letters.

l Windows 95, Windows 98, l Features of multi-tasking are inherent.


Windows Me (Millennium), l Useful for one program to another.
Windows-XP, Windows - Vista,
Windows-7, Windows-10, l All programs based on Windows
etc are its examples have almost the same functions.

Pictorial Representation 60 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
UNIX LINUX

l Developed by Linus Torvalds


l Developed by Ken Thompson in 1991.
and Dennis Ritchie of Bell
Laboratories in 1969.
l Free available open source software.

l Open software for modification


l First software built for network and by any programmer.
communication.

l Its Mascot is Tux-the Penguin.


l First operating system written in
High Level Language (C. Language)

More features available in Unix


than Windows Operating System.

Android Operating System

l Touchscreen mobile phone like


smartphone, tablet, etc. developed by
Google company.

l Using GUI (Graphical User Interface).

l Source code based on modified


versions of Linux and other open source
software.

Customized / Application General /


Special Packaged
Application Software Application

l Developed to fulfil l An organized set of programs designed l Developed to fulfil the


special needs of any to perform a specific task of a user general needs of a user /
user/institution / institution / organization.
organization. l Capable of handling the
l Useful in establishing coordination requirements of creating
l Developed over using between the system software and the user.
High Level Language documents / database,
managing them, drawing
l Example – Railway l Able to work only on the background images, making
reservation, flight set by the operating system. presentations, playing
control, weather games, etc.
analysis, inventory l Example – Microsoft
l System software operates in the Backend, while
control, payment the application software operates in the Frontend. Office, Media Player,
(payroll) etc. CAD/CAM, etc.

Pictorial Representation 61 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Examples of General Application Software

Processing
Software
l Used for Creating text document (Letter, Report,
Spreadsheet Books) Editing, Formatting, Checking grammar Desktop
Software spelling, Printing, etc.
Publishing
l Used to classify and l
analyze mathematical Abbreviation is
and statistical data in Presentation Accounting DTP.
the form of table (Row Software Package l Used in the
and Column. l Used for l Used in work and
l Facility to create presentation of various practice of
graphs and charts. information in the financial
publishing.
office, conference accounting,
l Used to create meeting, seminar, business l Used to
Ledger in Banks and etc. transactions enter and edit
Merchant l Example and general text data in a
establishments. MS Power Point, management. computer.
Presentation l Example
l Example l Example
Graphics, Libre Tally
MS Excel, Lotus, Smart Office Impress, etc. Microsoft
Suit, Open Office Calc, Publisher,
Libre Office Calc, Page Maker,
Apple Numbers, etc. Corel Draw,

Application
Software
Word Spreadsheet Presentation Database
Processing
Operating
System

MS DOS Word Lotus -- dBase


Star 1-2-3

Word Pad MS MS MS
MS Windows MS-Word Excel Power Point Access

K-Word K Spread K Presenter Star Base


Ab-Word Open Calc Star Impress Oracle
Linux Open Writer Star Calc
Star Writer

Pictorial Representation 62 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Graphics
Database Cad Software
Software Full Form
Software l Used to built, l Computer Aided Design
l Used to store, modify modify and print l Used in engineering and specific
and classify data. graph, image, design, creating three dimensional
Example drawing, etc. (3-dimensional) design of map,
Example modifying and process
l MS Access, Oracle, understanding, etc.
l Paint Shop Pro,
Libre Office, Base, SQL Adobe Photoshop, Example
Server, etc. etc. Auto CAD, Auto Desk,
etc.

Sr. No. System Software Application Software

1. Used to operate computer hardware. Used to do user's specific task.

Differenece
between
2. User interaction impossible User interaction possible due to
System
due to running in Backend. running in Frontend.
Software
and
3. Able to run independently. Application Unable to run independently. For being
Software capable, system software is needed.

4. Example - Compiler, Example - Word Processor, Web Browser,


Assembler, Interpreter, Media Player, Spreadsheet software,
Debugger, Driver, etc. Accounting Software, etc.

Utility Software

l A Computer Programming System


l Used to optimize, analyze, configure, maintain the computer, remove bugs,
increase security functions, increase efficiency, etc.

Advantage

l Increasing computer efficiency, adding special functions and features,


customizing settings like screen saver, protecting against viruses, spyware, malware,
managing memory providing passwords etc.

Pictorial Representation 63 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Types
¯
¯ ¯ ¯ ¯
File Management Utility Security Disk Management Utility Backup
¯ Programs ¯ and
¯ ¯ (Anti ¯ ¯ ¯ Recovery
File Data/File Virus Disk Disk Disk Utility
Manager Compressor Utility) Formatting Fragmentation Cleaner
In case, the memory disk gets damaged, it is possible to store it on another

File Management Utility


disk using the Backup and Recovery Utility to avoid the fear

Data/File Compression File Manager


used to compress file size which l Used to display file name, size,
takes less space in memory and type, date and time, etc
Backup and Recovery Utility

takes less time to transfer over l Used to View, Edit, Print, Move ,
the network. Example JPEG, Copy, Delete and Modify the Files
MP3, MPEG and Folders.
of loss of data.

Anti Virus
Utility Disk Cleaner
Software Utility is used to l Through this, it is possible to
disable viruses that cause increase the capacity of the memory
system failures disk by removing the impurities and
unnecessary programs and data.
Disk
Disk Formatting Management Disk Fragmentation
l Major functions like Utility l It enables faster disk speed by
checking all the sectors of recording all the files on the disk.
floppy, hard disk or optical disk, l Able to improve memory
identifying bad sectors, preparing management by arranging
address table and free space between different
optimizing OS, etc. stored files.

Software Package

Definition
l A group of software designed
for a specific purpose.

Another Name
l Software Suit Microsoft
l Integrated Software Office

Usage and Example


l MS office package manufactured
by Microsoft company for office use

Pictorial Representation 64 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Other Freeware
Retail l It is available for personal
Softwares
Software use without fee.
l Which is l Available for free on internet.
available for sale in l Its full rights (copyright)
the market and is available to manufacturer.
manufactured for
use by paying a l Only manufacturer has the
reasonable price. right to change the source code
not the user has.
l Unavailable for sale.
Groupware

A utility software
developed for
Share Ware general purpose at Firmware
l Mixed form of software or
Software the convenience of
software and hardware.
l Used for a specific period of individuals. l Saves the hardware and
time, without fee. Example replaces it.
l Fee required for use after Online Chat, l Stored in permanent electronic
ending of the trial period. memory at the time of
E-mail, Voice Mail,
l Free available manufacture.
News group, l Software written in ROM,
on internet. Video Conferencing. PROM is its example.

Software License Install/Uninstall program


l A legal document that l Install
grants the legal right to use and Copying any software
distribute the software subject to from secondary storage
certain conditions or unconditionally. media to hard disk
l Software piracy nomenclature to use, so that it is ready for use.
distribute, modify software without the l Uninstall
permission of the copyright holder. Removing software from hard disk.

Some important keywords related to Software


Bug & Debug
l The Error presents in program or software is bug and
the process of finding and repairing them is
debug nomenclatured.
l The software designed to bug and
debug is nomenclatured
Syntax debugger. Logic
Errors Errors
l Grammar mistakes in Two Types of l Errors arising
programming are during program
indicated by the name of Errors in the Program execution are
Syntax Error. indicated by the name
of Logic Errors.

Pictorial Representation 65 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Booting

Cold Boot l Automated process Worm Boot


nomenclatured booting from
l The process l The process when
starting the computer's power
the computer is
when an off button ON to ready for use.
already ON without
Major Functions
computer is turning off the power
l Loading a copy of the operating
turned on by supply get booted
system into main memory (RAM).
again.
pressing the l Checking the hardware and
l Ctrl+Alt+Delete
displaying the relevant information
power or start used for
on the screen.
button. Worm Boot.
Another name
l Boot Strap

Kernel
l The core point or part of the infrastructure of an operating system.
l Its main function is to establish a connection between software and hardware and
ensure the management items of equipment.
l Complete operating system based on the Kernel itself.
l Another Name – the source code of the software.

A set of
procedures designed
step by step to achieve
a desired result. l Able to
complete each
instruction in
l given time.
Its all Used to Small set l Each algorithm
instructions eventually
build of
must be Alogrithm terminates.
correct and ladders to instructions.
l At each
clear. solve the
completion, the
problems. desired result
must be achieved.
Logic required
to build a
program.

Example
Algorithm to print Step 4 : if A < 50 goto Step 2
all even numbers Step 1 : A = 2
Step 5 : if A > 50
from 1 to 50 Step 2 : Print A
Step 6 : Stop
Step 3 : A = A + 2

Pictorial Representation 66 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Flowchart

l Image conversion of algorithm (schematic representation).


l Used in the analysis, design, documentation or management of a process or program.
l Use of different pictures for different types of instructions.
l Easy to write programs and easy to correct mistakes.

Start

Input A, B

Example Yes
If
of a flowchart to A>B
show a larger or
smaller number in
Print A Greater
two No
numbers.
Print B Smaller

Stop

Example

Process 1

Start Decision Process 2 Action End

Process 3

l Use of flowcharts for simple process in designing and documentation of programs

l Its great contribution in visualizing what is going on in a process

Pictorial Representation 67 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Signs of Flowchart

The oval symbol used Start and the Used to represent logic or questions and their results
End the process. (Yes or No) one or more options possible on this.

Start / End Decision

The parallelogram used for Used to indicate the direction of the flow
input or output. from top to bottom or left to right.

Input / Output Flowline

Rectangular mark (rectangle) containing Used to link one page to another


processing instructions or formulas. or one mark to another.

Process Connectors

Pseudo Code

l A way of creating program logic to solve a problem or perform a task.


l The link between programming language and human language.
l Articles on programs and logic in concise and simple language without using symbols like flowchart.

1. Start
2. Input A, B
Example
Pseudo code to 3. Compare A and B
represent a larger
or smaller number 4. If A > B, Print A
in two numbers. 5. Else Print B
6. Stop

Pseudo Code

Computer Programming Languages


¯
¯ ¯
Low Level Language High Level Language
¯ ¯
¯ ¯ (Cobol, Basic, C, C++,
Machine Language Assembly Language Java, Logo, etc.)
(Middle Level Language)

Pictorial Representation 68 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Machine
Language

(First pro l Di
d gra R sad
e da n m eq va
g
ta stan e.
Generation l
M on for e uires ntag
n ins uc he t a a e
va er in . Language) tru h d typ ch ta diffe
Ad und ach speed cti iffi e o sk r
sy
o
t by ing m deb ons cult f m and ent
Ea able ocess l The only language of
ug by p y in ach dep
gin re
l cap t pr g pa und ine. ends
F a s computer is capable by , mod ring ersta
l of understanding. hu ify pro ndi
ma ing gr ng
l Language written in binary (0 and 1). n. , et ams
c ,
l Computer is an electronic circuit which only
able to sense ON (1) or OFF (0).
l Another name for machine language is machine code.
l Computer processor is able to understand directly and execute
machine language.
l No translation software is required for this.
l Very fast program execution speed.

Assembly
Language

y l Dis
g e e ver e i n
(Second I a
is s ts pro dvan
n ta uag uag han Generation l
va ng ng t t c t
Ad ly la ial la s in i l ma ower essin age
Language) l c
ang Pro hin ha g s t
b qu m rs. uag gra e la n th pee
s semcollo rogra uage. e erro e e d ms ngu at o d
A to p g v o r
l se r ite e lan remo is m l epe wri ag f
clo r to w chin and age ine Re
q ma nd o tten i e.
ass uir chi n th n t
sie ma find langu mach l Mnemonic code em em ne. e t his
Ea t o l y n ble ent yp
l y b a . composed of letters and eo
s
Ea ssemable t guag
h e har r for of se f
l A n numbers (pre-defined words) d w s e p a
l read la used for programming in this language.
are para rate
. te
Example
'ADD' to add 'SUB' to subtract, 'LD' to load data into memory, etc.
l Computer is unable to understand this language.
Therefore, a translator named assembler is used to translate
the mnemonic into binary language.
l Another name for a program written in an assembly
language is source program or source code.
l Capable of converting machine language to object program
by assembler software.

Assembly Language Machine Language


Assembler
(Source Code) (Object Code)

Pictorial Presentation 69 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Benefits

l The language used in colloquial l Use on different computers without any changes.
and writing (similar to human l Easy to write, read and understand instructions.
language) is more close. l Easy to create program, find errors and modify.
l Easy to understand by the user. l Closer to colloquial language
l Each high level language, set of so a few errors are possible.
predefined words and grammar
rules. High Level
l Computer is unable to Language
understand these languages. Third Generation
l A translator 'Interpreter' or Language
'Compiler' is needed to make it l Requires a different interpreter or
understandable by the computer. compiler for each language.
l Example – Cobol, FORTRAN,
Basic, C, C++, Java, etc. l Conversion into machine language before use.
l English language is used to l Its processing speed is slow compared to
write these languages. machine language and assembly language.

Loss

Do You Know?
l FORTRAN, the first high level language was created in 1954
by John Backus of the IBM Company,
but its commercial Version was released in 1957.

Difference between Machine Language


and Assembly Language
e.
n guag
la
ne
chi
ma
into gs.
n vert a n bein
o um
to c by h x.
bler
ta nd e s ynta
m s gua g
sse
un der an
an
a
sh l age.
es asy
to Engli langu
th e t i on
ir

E s era
qu

n n
tai d ge
Re

con se con
It Th
e

Machine Language Assembly Language


l Difficult to modify. l Very easy to modify.
l Very low risk of errors in its syntax.
l Higher risk of errors in its syntax.
l Platform Independent Language.
l Platform Dependent Language. l Easy to remember assembly
l Difficult to remember language commands
binary code for by humans.
humans.

Pictorial Presentation 70 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

FORTRAN Pascal COBOL


l Full form Formula l Developed in 1971 l Full form – Common
Translator by Pro Niklaus Wirth of Business Oriented Language
l High level Switzerland. l Its command and
Programming Language sentence structure are similar
l It is nomenclatured
to English.
based on Algebra. on Blaise Pascal. l It is divided into
l Standardization of l Used to clarify the paragraphs, divisions and
FORTRAN in 1966 by ANSI concept of sectors.
(American National programming in l Another variant
Standard Institute) (visual cobol) is an
Trainees. Object Oriented
l Used to solve
Programming Language.
mathematical formulas
easily.
Logo
l It is developed by
Seymour Papert of BASIC
COMAL America, Wallace l Full form – Beginner's All
l Full form – Common Feurzeig, Denial Babrow Purpose Symbolic
Algorithmic Language. and Cynthia Solomon. Instruction Code.
l Used to teach sketches l Development of the
l Language used for and graphs for young popular and simple
middle level students. children. language BASIC in 1964 by
professor John Kemeny
and Thomas Kurtz.
l Used for both business
Prolog ALGOL and mathematical
l Developed in l Full form – purposes.
France in 1972 by Algorithmic l Used to teach students
giving priority to logic Language how to write programs.
in solving problems. l Used for l Foundation stone for
l Used in artificial Algebraic other languages.
intelligence and logic calculations. l Example
programs. Quick Basic, Visual Basic

C and C++ C# - C Sharp


l Object Oriented
Java
Programming Languages. l It developed by James l Developed by Microsoft
l Closer to the English Language. Gosling of Sun for use in the internet
l Unix OS written in C Language. Microsystem l Standardized by the
l C Language was developed in l Developed mainly for European Computer
1971 by Dennis Ritchie in Bell use in the internet Manufacture Association
Laboratories and C++ was l Used in electronic (ECMA) and the
developed in 1980 by Bjarne products like Mobiles, International Standard
Stroustrup. TVs, Telephones, etc. Organization (ISO).

LISP
l Developed in 1958-1960 by John McCarthy.
l Functional Programming Language used in the processing of
non-statistical data with artificial intelligence.

Pictorial Presentation 71 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Computer Network

A group
of two or more Used to send
independent text, audio and
computers connected video data from one
together by different computer to
means of another.
communication.

Capable of being connected The word 'network' means –


with or without wires. interconnection of a network.
Four things are needed to establish communication in a network.
1 2
Sender Medium
4 3

Receiver Protocol

Benefits Protocol
of Network

l Exchange of information l Meaning - Set of rules.


between different computers.

l Exchange of information with l A set of rules and


speed and accuracy. procedures designed to
facilitate
communication and data
l Data transmission in low cost. transfer by different
computers on a
network.
l Combined use of data, information and expensive device.

Pictorial Presentation 72 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Types of
Internet Protocol User Datagram
Protocol (IP) Protocol (UDP)
l Used to transfer data l Used in some parts as the
from one TCP protocol.
computer to another. l It does not have capacity like
l A type of TCP.
Computer l The name of small size data

Used to help data


Address. packets is
is the identity of
each computer.
The IP address

delivering to
destination.
datagram.

Used to l UDP is
include the index and unable to recover
receiver's IP address in each of the it on being lost of the
datagram during
packets when split into multiple packets transmission.
during transferring data l Used to work together with the
IP protocol.

Transmission
Control Protocol (TCP)
Simple Mail Transfer
l Internet Communication Protocol. Protocol (SMTP)
l Communication impossible without TCP.
l Used to allow connection
and data transfer l With it, POP3 (Post Office Protocol 3)
between two also used.
l Both used for the same task.
TCP/IP are most

devices.
recover it when

l Where SMTP is
packets are

important
protocol.
Used to

used to
lost.

send mails,
POP3
l Able to is
guarantee data also
delivery by used
arranging packets to
correctly. receive mails.
l Suitable to work
together with IP.

Hyper Text Transfer Protocol (HTTP)


l Created a set of rules to transfer web pages in www
(world wide web).
l Unable to transfer any kind of data over the web and
other client server without HTTP.
l On requesting any web page by the user,
its loading is possible by HTTP.

Pictorial Representation 73 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

File Transfer Internet Message


Protocol (FTP) Access Protocol (IMAP)

l Used to perfrom tasks l It is used to store the mail sent


like upload or download by the user on the mail server.
l This is helpful in accessing the mail
and transfer the files during login by entering the mail ID and
working on the website. Password by the user.

Miscellaneous
l The world's first WAN developed by the l NICNET (National Information
Centre's Network), the network
defense department of America is ARPANET
connecting each district of India.
(Advance Research Project Agency – Network). l SWIFT (Society for Worldwide
l Established WAN in India for education is Interbank Financial Telecommunications)
ERNET (Education and Research Network). is linking banks internationally.

Broad Band RS-232


l A communication l For transferring
d w i d th Serve
Ban e of highest medium in which a serial binary data or
l Am r
n g c y signal with a large signals over short a
used to chine
l Ra est frequen of bandwidth is distance by cable, a transfer
w e
and lo e at the tim available. and con
bl
availa transmissio n
n.
nsmission
standard used. node of trol any
l Tra l Used to connect net
data surement i spe ed is very fast. l Use work.
a modem, printer, providi ful in
l Me ertz. f l Ca pab le of mouse, etc. with the ng
H
g - S peed o pro vid ing DSL service various
e ani n r. serial port of the comput s to each
l M an s f e (D igi tal Su bsc riber
data tr of data Lin k), TV Ca ble, computer. er c
to the n onnected
eed etwork
l Sp sion is high Op tic al Fib er. .
is
transm bandwidth
when high.
is

Baud
l The unit of
Nodes measurement of
Baseband
l End point or the speed of data l The
terminal of various transmission. communication
computers l It is measured medium in which
connected to in bps-bits there is less
the network. per bandwidth
l Able to act second. available for
both sender data transfer
and The first l Another
receiver. name –
computer
Narrow
network Band.
which was
said Ethernet,
was
manufactured
in 1973.

Pictorial Representation 74 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Communication Methods

These methods or modes are used to describe the direction

Simplex

l One directional (unidirectional)


communication. Sender Receiver
l Able to send data but unable to receive
l Better performance than HDX One
and FDX. A B
l Keyboard, Monitor, TV, Radio, etc. Direction
are its examples.

Duplex

l Duplex communication
l A road on which system, a point-to-point system l Duplex
traffic can flow in consisting of two or more connected communication
both directions. parties or devices capable of system is able to do
communicating with each other in better performance
both directions. than Simplex.

Half / Semi Duplex Duplex Full Duplex


(HDX) (FDX)
l Both sides
able to communicate
with each other.
l Both sides may be able to
communicate with each other, but l Bidirectional communication possible.
not simultaneously. l Communication in both directions at the some time.
l Communication in one
l Better communication performance because
direction at a time.
double bandwidth usage is possible.
l Example
Walkie - Talkie l Example – Telephone Mobile.

either Receiver Two Way Receiver


Sender or receiving or Sender or Communi- or
A or sending B A cations B
Receiver Sender Receiver Sender
but not simultaneously
simultaneously

Pictorial Representation 75 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Communication
Media
Unguided Media Guided Media
or Wireless (Wave) or (Wired Cable)
Communication media able to act as
a channel to connect various
® Microwave computing devices so that they can Twisted Pair Cable ¬
communicate with each other.
® Radiowave
Co-axial Cable ¬
® Satellite
Microwave Fibre Optics Cable ¬
® Bluetooth
l Communication established by ultra - high
frequency (300 MHz to 300 GHz) Ethernet Cable ¬
® Infrared electromagnetic transmission.
l Electromagnetic waves with
wavelengths between 1 mm and 1 m used.
l No solid medium required.
l Use of short length parabolic antenna
Radio l A repeater used between Satellite
Wave 20-30 km.

l Those electromagnetic l Artificial satellite able to


waves whose wavelength is provide communication for phone
between 1 m (100 cm) to T.V., computer, etc.
100 km. C-band – 4-6 GHz,
Ku-band – 12-18 GHz,
l Available in both man-made and 1 GHz = 109 Hz
nature-made. l Established 36000 km from Earth's surface.

Bluetooth Infrared Wi-Fi Li-Fi


l Data transfer l Longer l Full Form – Wireless l Full Form – Light
over short wavelength than Fidelity. Fidelity.
distance electromagnetic l A device for l Wireless
(upto 100 meters) radiation. accessing the network technology providing
possible using l Invisible to the and internet with the high speed
radiowaves of human eye. help of radio waves. communication.
shorter l Approx. l Used to create a l Visible light
wavelengths. 1 millimeter LAN (Local Area communication i.e.
l Use of (300 GHz) to the red Network). capable of using LED
radiowaves edge of the visible l Capable of for sending data and
between 2.4 GHz spectrum upto connecting mobile photo diode for
to 2.8 GHz. 700 nanometers phones around the receiving.
(430 THz) access point (upto a
possible. distance of 100 meters)
by wireless.
WiM
WLL A
X
l Full Form –
l Full Form – Other Worldwide Interoperability for
Wireless Local Loop Wireless Microwave Access.
l Local wireless technology used to l Able to operate between 3.3 to 3.4 GHz.
provide telephone facility with large Techniques
l Used to create a wireless WAN with 1
bandwidth and high speed data Gbps broadband communication
transmission. speed.

Pictorial Representation 76 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Do You Know?
l The Fifth Generation or 5G or 5th Generation mobile phone service. Its speed is 4-5 gigabytes per second.
l Earlier, 4G (4th Generation) in which LTE (Long Term Evolution) and VoLTE
(Voice over Long Term Evolution) technology was used.

l Use of two copper Twisted Pair l Inequalities


wires with a maintenance of
roundness of 1 mm. Cable both wires through
l Used layers of which signals don't
plastic or teflon mix together.
insulators. l Data speed
l These two wires l Noise reduction in the cable. possible more than
are twisted and l Capable of being carried signal without 1 Mbps in range.
balanced. repeater over long distance (1 km).

Foil Twisted
Braided or Shields Pairs
Jacket Foil Shield

l Manufactured in Co-axial l Its bandwidth


cylindrical form as per possible upto 10
co-axial cable according Cable Mbps.
to its name. l Use of internet
l Four separate shields service along with
or lattice used around the watching TV
central solid conductor. l More usage in TV networks. broadcasts using cable
l Lottice covered with l Capable of carrying signals over long modem with it.
insulator. distance due to high bandwidth.

Insulator

Inner conductor
Outer conductor
Plastic cover (shield)

Pictorial Representation 77 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

l Capable of doing works


l Ultra thin Fibre Optics based on complete interior
fibre made of
glass or plastic Cable reflection of light.
l It has very low noise,
or silica which
high bandwidth, high speed
is useful to
and low signal loss.
transfer data by
l Time Division Multiplexing
using light l Photo Diode
used to convert light (TDM) and Wavelength
signals Division Multiplexing (WDM)
generated by back to signals.
techniques are used in this.
LED or Laser l In this, upto 300 Mbps data
Diode. transfer speed is possible.

Fibre Fibre
Coating Steel Strands
Copper Pipe

Central
Strength Element
(Core)
Cushion water-blocking
Layer barrier
Polyethylene Sheath

Ethernet Cable

l Often used in high speed l This cable is available


computer network. in several variants (Cat 3,
l Protocol for creating Cat 4, Cat 5 and Cat 6)
Local Area Network (LAN) l Able to work upto
l Ethernet card required 100 meters.
for connecting computers, l It is also able to grow
modems, routers, telephones, with the help of Network
etc. Bridge.

l Communication media is the medium used for the communication


of data from one computer to another or computer to terminal or
terminal to computer in any computer network,
Due to which the
sender and the receiver are not need to connect each other
by wires in above microwave, satellite or other wireless techniques.

Pictorial Representation 78 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Data
Transmission Service

Dial-up Line Leased Line


l Used to establish communication l Used in LAN through Private or
by dialing a number like a telephone. Leased Line or Dedicated Line to
l Another Name – Switched Line.
connect their branch offices by
l Connecting the modem to the
telephone line. large organizations (industries).
l Use of SLIP (Serial Line Internet Protocol) l Used for both Voice and Data.
and PPP (Point to Point Protocol). l Capacity depended on Baud or
bps-bits per second and distance.

GSM
l Full Form – Global System for Mobile
communication DSL
l Most prevalent standards for
mobile phone operation. l Full Form - Digital Subscriber Link.
l International Roaming facility available l Telephone line used for Digital Data
without changing the phone. Transmission.
l Done by GSM only at low cost through l Always connection of the computer to
SMS (Short Message Service). the network for this DSL Modem used.
l No need to dial to establish contact.
l ADSL – Asymmetrical Digital
ISDN Subscriber Link and SDSL –
Symmetrical Digital
l Full Form - Integrated Service Subscriber Link used for data
Digital Network.
communication.
l No need for modem due to digitally
data transmission.
l Transfer of voice, data and image
without noise.
l Talking is possible on phone even if CDMA
it is connected to the internet.
l Developed form of Dial-up Line.
l Full Form - Code Division
l Two channels of 64 Kbps (bearer lines) Multiple Access.
(total 128 Kbps) and delta channel of l Technology based on 3G (3rd Generation).
16 Kbps are used for commands l Used in mobile phone operation.
and data.

Wireless
Broad Band

l With the help of radio waves, the speed of data transfer is


possible without wire.
l Two technique Wi-Fi and WiMAX are used.

l Dial-up Line established and used like telephone line with the help of modem.

Pictorial Representation 79 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Synchronous Asynchronous
Transmission Transmission

l A method of data l In this method, it is


transfer that requires coordination not necessary to establish coordination
between the sender and the receiver between the sender and the receiver during
before the signals can be sent. the data transfer, but the data is always
l Example ready to be received.
l Voice exchange over telephone. l Example - e-mail, Forum, Letters,
l Video conferencing. Radio, Televisions.

wo or more analog or d
y w hich t igit
qu eb o n the same communicatio al sign
hni fully nm
edi als is
r tec ccess l em e n t th i s t echniq um ab
do su imp . le
o s ed to ue i
s mu to
u
eth vi ce ltip

se
e
m

le x
ed

nd
A

h er.
T
Multiplexing
&
Its Types

1. 2. 3. 4.
FDM TDM WDM CDM
(Frequency (Time (Wavelength (Code
Division Division Division Division
Multiplexing) Multiplexing) Multiplexing) Multiplexing)

Each signal is All signals Simultaneous Different data


transmitted by dividing broadcasted by transmission of optical signals transmitted
in the frequency dividing them on signals of different simultaneously at
within the main the basis of time wavelengths over a the same
communication slots. high-speed fibre optics frequency.
medium. cable.

Signal 1 Communication Channel Signal 1


(30 KHz) (30 KHz)
Channel 1 D
Signal 2 M E Signal 2
(40 KHz) U Channel 2 M (40 KHz)
X U
Channel 3 X
Signal 3 Signal 3
(50 KHz) (50 KHz)

MUX - Broadcasting signals on the communication channel.


DEMUX - Rebroadcasting from communication channel to signals.

Pictorial Representation 80 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
® Frequency Division Multiplexing (FDM)
® Analog ®
® Wavelength Division Multiplexing (WDM)
Multiplexing ®
® Synchronous TDM
® Digital ® Time Division Multiplexing (TDM) ®
® Asynchronous TDM

Switching
Technique
¯
¯ ¯ ¯
Circuit Switching Message Switching Packet Switching

¯ ¯ ¯ ¯
Space Division Time Division Virtual Circuit Datagram
Switches Switches Approach Approach

¯ ¯
Switched Virtual Permanent Virtual
Circuit (SVC) Circuit (PVC)

Source Address
Number Such a switching technique in which a
Size point to point physical connection is
Message Circuit established between two or more devices.
Switching (sender and receiver).
Destination Example - Telephone
Address
l Store-forward technique used.
Switching

l The messages sent by the computer are


Message

Switching
Source Address stored in network node.
techniques
Number are used to allow all l Message forwards to the next node when
Size computers connected to the communication channel is free (empty).
the network to share Example - e-mail
Message
the available
Destination communication
Address l This also based on store-forward technique.
channels l Transmitting information or data by
dividing them into packets.
Source Address l Source and Destination Address, number
Packet of packets, size, etc. are displayed on each packet.
Number
Switching l Different packets are likely to reach the
Size receiver at different times using different media.
Message l Finally converting the collected packets
back to the original information according
Destination
to the packet number.
Address

Pictorial Representation 81 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Classification of
Computer Network

1 2 3 4 5 6

PAN LAN WLAN CAN MAN WAN


(Personal (Local (Wireless (Campus (Metro- (Wide
Area Area LAN) Area politan Area
Network) Network) Network) Area Network)
Network)

l Computer l Extended l Wireless l Network l Used to l Network of


networks network of computer of connect computers
connected any office, network computers private or spread over
within building, in a located public a wide
the factory or small inside computers geographical
area, in many
jurisdiction university geographical any located countries,
of any campus small area. school, in any continents or in
person geographical l Moving college, big the whole world.
or areas. freely university, geographical l Telephone line,
entity (Approximately in organization area. Optical fibre,
(from 1 to 10 km). limited or (Approximately artificial
10 l Smaller size, area. any other 100 km radius). communication,
meters faster speed, l Example big l Example satellite are used
upto and fewer error Wi-Fi campus. Cable to make
100 l Full control l Its zone Television connection
between them.
meters). of owner or (range) Network. l Slow speed
organization. is possibility due
l Example 1 to 5 km. to more errors
Ethernet. l Example
Internet.

Pictorial Representation 82 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Bus Ring
Topology Topology
l All nodes of one cable l All nodes formed by
(Transmission Line) connected joining rings or loops
to each other. (two end points) to each other.
l Transmission to a particular l Each node is able to
address by dividing the data send and receive data from
into packets using the its nearest node.
Ethernet Protocol.

Network
Topology
Methods of
Interconnecting
different nodes or
terminals.

Star Topology Mesh Topology


l Making any one node l Each node connected to
each other.
Host or Central Hub, other l Used in building backbone networks.
nodes are connected to each l Each node is capable of sending
other by this Hub. its own data in addition to forwarding
l All nodes are able to data received from other nodes.
communicate through Host l If the number of machines
or Hub computers without is n, the number of
direct communication cables will be
with each other. n(n – 1).
2

Tree
Hybrid
Topology
l Characteristics of both Topology
star and bus topologies l A combination of
are present. two or more
l A host or hub like (other) topologies.
star topology and all nodes l It includes
like Bus topology Bus, Ring,
are connected Star, Mesh, etc.
by cable. topologies.

Pictorial Representation 83 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

l Less able needed.


l Easy to add a new node.
Benefit l In case of error in one computer, entire
computer is unaffected.
l Very cheap network.

Bus Topology l The entire network is affected


if there is a cable (transmission line) error.
l Each node requires special hardware. Loss
l Single node is able to transmit data
to a single node at a time.

l No need for Host or Central Hub.


l Communication through another route
Benefit
is possible if there is an error in cable.
l Able to work efficiently.
Ring
Topology
l Its speed depends on the number
and structure of computers connected
to the network.
l Entire network affected due to Loss
repeater's error.
l Requirement of complicated
software in operation.

l The rest of the network is unaffected

Benefit by a node or cable fault.


l Network unaffected by adding
a new node.
Star
Topology

l The entire network is affected


(failed) when a fault occurs in the Loss
central hub or host computer.

Pictorial Representation 84 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

l Easy to manage and maintain.


l Ease in fault finding and maintenance.
l If one node is damaged, the other network
Benefit is unaffected.
l Point-to-Point wiring for individual
segments (parts).
Tree Topology
l Difficult to wire and configure.
l If the backbone line breaks, the entire
Loss
segments are affected.
l Larger cabling required.

l Data transmission unaffected in case of


any node error.
l Transmission unaffected even by adding
Benefit a new node.
l Being a more secure protocol, it is possible
to transfer data secretly.

Mesh Topology
l Building and maintenance is expensive.
l More cables or wires required.
l Requires a large number of input/output Loss
ports to connect all the devices present
in the network.

l Able to handle traffic easily.


l Possible to modify if needed.
Benefit l Easy to find and troubleshoot errors.
l Useful in building large networks.
l Very reliable network.
Hybrid
Topology
l Very expensive network.
l Difficult Installation Process.
Loss
l Impact on network performance due to

damage to the Backbone (Host).

Pictorial Representation 85 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Do
You Know?
l
A mixer of different topologies
was used due to
their advantages and disadvantages of different
network topologies, which was
called Hybrid Network Topology.

Bridge
Network Gateway l Used to maintain data
l Used to connect two filtering, signal,
networks or traffic, etc.
LANs using different l Two ports incoming and
protocols. outgoing are
l Another Name available.
Protocol l Used to transmit data by
Converter. checking data packets and
destination
address.
Repeater Router
l Used to send weak l Used to filter
signals over a long distance data based on IP address.
before they are destroyed to a l Its function is to deliver
certain extent by replicating and the data to the specified address
re-generating. Internetworking by the shortest and
l Useful in modifying the data Tools or fastest route.
signal through communication l Used to transmit
medium and sending it back
Devices data in
to the communication right direction through
medium. routing table.

Switch Hub
l Used to connect l Many ports
network devices and available in it.
segments l Used to send
among each other. data packets
l Used in coming from
Data Link Layer of one port to
all other ports.
OSI model.
l It is a function of
l MAC- Passive Hub to provide
Media Access Control a route for data.
is able to transfer data l In addition to the route of
you have to the data monitoring is the function
destination by of the Intelligent Hub.
reading Address. l The function of the
l Procedure Switching Hub is to
like a transmit the packet by
bridge. identifying the
address.

Pictorial Representation 86 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
NIC - Backbone Network
Network Interface Card

l Hardware device made of l It is the part of network


printed circuit board without where multiple
which it is impossible for the local area networks are
computer to connect to the used to connect together.
network. l Possible for connection work,
l Presents in the expansion the LAN to the backbone
slot of the computer. via WAN.

Another Name l Bus used as Highway with


l Network adapter, Large Capacity,
Network Interface Controller, High Bandwidth, Very High Speed.
Ethernet of LAN card / adapter.
Its two types
l Internal Network Card
l External Network Card

Difference between
Intranet Internet, Intranet
l A network established
within a private or institutional and Extranet
office that uses TCP/IP,
Gateway, Firewall or coding to Internet
prevent unauthorized person l Used by everyone.
from access. l No Username and
l Example of Virtual Private Network. Password required.
l Security depends on
Internet user's device.
l World's l Public Network.
Extranet Largest
l Able to Network net
l All computers Intranet
use by users
other than are connected l Firewall dependent
members to the l User name and Password
and staff of the Global Network. is required by only one
organization within l Full Form - organization.
a private or Interconnected l Private Network.
institutional Network.
office like an intranet. Extranet
l Users need a special l By more than one
Username and Password organization.
to use it. l User name, Password is
required.
l Firewall dependent.
l Private network.

Pictorial Representation 87 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
l Abbreviation for l Global network used to establish
International Networking contact with each other by following
similar protocols.

l Network of Networks What l English word 'Internet' and


is in Hindi 'Antarjaal'.
Internet?
l The world's largest network l Useful in sharing Data, Text,
used to connect personal, Graph, Image, Audio, Video and
public, educational, business Documents from one computer to
and government networks. another in the blink of an eye.

Development of Internet

l Beginning of exploration work l Construction and commercial


1960 by Defense department of the US use of UUNET 1987
in this decade. (Unix to Unix Network)
l The initial name of internet was started.
ARPANET.

l The idea of establishing l Development of HTML


1962 Internet done by (Hyper Text Markup Language) 1989
Prof. J.C. Licklider. and Introduction of www
l Father of Internet is (world wide web) by
Prof. J.C. Licklider. Tim Berners-Lee.

l ARPA l The ARPANET


1967 (Advance Research ended and 1990
Project Agency) the Internet as the
started discussion network of
to build ARPANET. networks remained.

l Development of l GOPHER was developed


1969 ARPANET by Paul Linder and Mark McHill. 1991
by the Defense
l Development of Wide
department of the US.
Area Information Server.

l Science of TELNET and l Possible to send audio and video


1974 commercial use of ARPANET over the internet. 1992
possible. l Establishment of Internet society.
l Use of word 'Internet' l Development of www by
in place of ARPANET for the Tim Berners - Lee.
first time.
l Mosaic, the first Graphical Web
l Development Browser used on world wide web 1993
1982 of common was developed by Marc Andreessen.
TCP/IP l Free access of www.
for all Internet users. l Available by CERN - European
Organization for Nuclear Research.

Pictorial Representation 88 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
l Development of the Domain l Establishment of the World Wide
1984 Name Server System, the creation Web Consortium - W3C for the 1994
of JUNET development of various standards
(Japan University Network). and protocols of www.

l Development of NSFNET l Beginning of Internet service in


1986 (National Science Foundation India by Videsh Sanchar Nigam 1995
Network) and FREENET. Limited (VSNL)
on 15 August, 1995.

Domain Name
Registers
l Organization providing domain
names for internet use.
l Used to provide a uniqe domain name
to each individual or organization
on internet.
l It is determined by ICANN
or
ISOC ccTLD
(Internet Society) (Country Code IRTF (Internet
l Non-profitable Top Level Domain). Research Task Force)
international organization l An institution used to
formed in 1992 to develop promote the investigation
and educate standards, & research, improvement in
protocols and policies internet's activity
of Internet. in the future.
IAB W3C
(Internet (World
Architecture Wide Web
Board) Consortium)
l Rules l An
ICANN determined international IETF
(Internet by ISOC used organization (Internet
Corporation for the technical used to determine Engineering
for Assigned and engineering the standards for Task Force)
Names & development work the use of the l An
Numbers) required for the world wide web. institution
l Organization Internet. used to
established in promote
1998 to provide IP internet use
Address and Domain and develop their
Name and determine standards.
their standards.

Who Governs the Internet?

Internet Information System operated


by a combination of various service providers,
many institutions, corporations, government undertakings,
educational institutions, individual institutions.

Pictorial Representation 89 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

l Set of rules and standards used to enable errorless data exchange between
two or among more computers in any network.

l A set of rules and guidelines used for systematic and safe data transfer.

Protocols
used on Internet

TCP/IP HTTP
(Transmission (Hyper Text
Control Protocol / Two Transfer
Internet Protocol) versions of Protocol)
l TCP used to transmit l This protocol
data dividing it into IP Address used to
small packets l IPv4 Address transfer
l IP used to transmit Version 4 web pages
each packet by giving it a l IPv6 Address on www.
special address to destination. l Able to operate
Version 6
l TCP is used to the http used
resemble the packet before any
in the website on
correct orders at the web browser
destination.
SMTP FTP Telnet Gopher
(Simple Mail (File Transfer l This protocol l Protocol
Transfer Protocol) Protocol) is used to display software
l Protocol used to l Protocol used to data and files of used to
transfer email upload, download, local computer by search,
from the user's rename, move, copy, command line receive
computer to the delete large files interface on and display
server and again (Data, Text, local computer's documents
from the server Graph, Image, Audio monitor by executing from
to the & Video) on by Remote remote computer
client. server. computer. via internet.

Computer
Network established
National Knowledge by Government of Educational & Research
Network India Network
l Interconnection of educational l Network connecting
and knowledge-based main educational and
State Wide institutions among research institutions National
Area Network them by more together Information
l A network connecting than 1 Gbps established Centre Network
upto high speed capacity communication by l This NICNet network is
(2 Mbps) from the headquarters institutions. Government. useful in the development and
of the states and union territories of management of government
to the block level under e-governance India. websites connecting all states and
plan by Government of India. district headquarters in India.

Pictorial Representation 90 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Uses of Internet

Social Networking Sites


(Facebook, Twitter, Linkedin, Whatsapp,
E-mail Orkut, Instagram, Blog, Youtube)
in
te Log
rR emo Research & Education Learning,
net o Virtual Classroom
Tele
Video E-commerce
Conferencing

ing
Me ssag
tant Entertainment
Ins
News Group
Internet Telephony

tting Usenet
Cha

Online Banking Cashless Transaction

E-Business E-Governance

l Internet started in l A group of computers


India in the 80s. embedded in billions of
l Five major institutions in India were physical devices in use around
connected through ERNET - Education &
Research Network, later, it connected the world, which may establish
together to all the districts. communication.

Internet Internet of Things


in India - IoT

Headquarters in the country for administrative By transferring data to one another


convenience by National Informatics without human
Centre (NIC)
interventions along with being
l On August 15, 1995, Internet services
were launched in India by Videsh smart and fast by connecting
Sanchar Nigam Limited to the internet.
(VSNL).

Pictorial Representation 91 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
E-mail

l Full Form - Electronic Mail

l Popular means of sending or receiving messages

(letters) very fast on internet at low cost.

l Modern form of the traditional postal system.

l World's first e-mail was sent in 1971 by


l Able to send same messages to

l Exploitation, pornography and


l A cheap and fast way to send

l The easiest way to spread


Ray Tomlinson.
l Used to attach Text,

l Lack of affinity.
l Saving papers.

adverrtisements.

violent images.
multiple users.

or Video files.
Photo, Audio

non-desirable
Benefits

l Use of

the virus.
message.

Inventor Loss
l Ray Tomlinson
l Year - 1971
l First use of the @ symbol by Ray Tomlinson.

l It is mandatory for every


consumer to have an
e-mail address to get
the facility l Name of the
Gmail, of fixed memory
Yahoo, e-mail. Mail.com, provided by the e-mail
Outlook, ProtonMail, server to the e-mail account holder is
AOL, Hushmail Mail Box or Inbox.
Zoho l Each e-mail is able to save, delete, view,
edit, reply, forward.
E-mail l SMTP is used to send messages
by e-mail while POP-3
Service Provider (Post Office
Protocol Version - 3)
is used to
receive
messages.

Pictorial Representation 92 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
l To send an e-mail, an e-mail address is required which is made of a
user name and a domain name.

E-mail Address

Email @ domain
User Name @
l A name given by the user. l Its name
at symbol Password
l A user name can be used only
once on e-mail server. which is
able to Password
l Maximum 64 characters is possible. join in (again)
l Case sensitive means using e-mail
Capital and Small automa-
Letters. e o tically.
a m a b le t l Able
a in N r that is to
Strength
(Why?) Very weak (0/100)
Password
Generator
Dom the serv account. f
e
separate
of ail es o username
n ame de e-m the typ and
A v i l
l pro e to tel ge. domain
Abl pa Mailbox Quota : 250 MB
l web name.
Unlimited

Syntax
[username] @ [mysite].domainname.extension Create Account

Major websites
providing free
E-mail ccounts
64 255

www.gmail.com
www.yahoomail.com
Maximum Maximum www.hotmail.com
characters in characters in www.rediffmail.com
User Part Domain Part
[email protected] Letter from A to Z,
[email protected] digits from 0 to 9 and
[email protected] Special Symbols.
" "@example.org
rs
Exa
mp No space a r acte ss
les Ch addre
o in ail
add f an e e- m
ress -ma d in
il E-mail Address use

Pictorial Representation 93 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Most of the A program made for
new e-mail Microsoft Windows to
services are capable add e-mail functionality
of supporting Indic Header to MAPI - Messaging
Unicode, making it Application
possible to send Programming
e-mails in Hindi. 1. Interface.

Parts
of an
E-mail
Message
2. 3.

Message Body
Envelop

l l
The envelop Header contains
contained the address sender, receiver,
of the sender and route to
the receiver. inbox and various
l l authentication
Currently, it is used Message body, information.
in header only. a part of the
message that
is used to
compose
the message.

Important Facts

l On August 30, 1982 the US Government officially recognized Indian


American VA Shiva Ayyadurai as e-mail explorer.

l He created a computer program in 1978 named E-mail.

l Many options were present in this e-mail like Inbox, Outbox,


Folders, Memos, Attachments, etc.

Pictorial Representation 94 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Address Book

l Used to store e-mail addresses.


l No need to retype and remember the stored e-mail address.
l Able to select address in To, Cc, BCc box.

Mailing List Forward Drafts


l The e-mail addresses l To send received l Folder
of the recipients stored in this. e-mails to other used
l When a message is sent to it, e-mail addresses to save
the e-mail server is able to that are e-mail
send automatically linked messages
that message to all the automatically to send
addresses present in by FW. it later.
it.

Elements of an E-mail Message


From : Where the e-mail ID of the sender is mentioned.
To : Where the e-mail ID of the recipient is mentioned.
Cc : It is possible for the e-mail receiver to trace the information of the e-mail list.
BCc : E-mail list is secret or invisible, therefore it is impossible for the e-mail receiver to trace the e-mail list information.
Subject : The title of the e-mail message or the reason for writing the mail.
Salutations : Used to write words like dear, respected, hello, etc.
Main Body : The text or body content space of an e-mail message.
1. Introduction
2. Matter in detail
3. Conclusion
Closing : Closing statement
Attachments : Files attached to e-mail such as text, table, graphics, animation, audio or video.
Signature Line : User name, e-mail address, signature, phone number and other contact details.

Types of E-mail Web based e-mail is the only


way for some
commercial website company to provide
free e-mail to its users.

Web-based Pop based


E-mail E-mail l The only e-mail handled by the web
server is Pop based e-mail.

l The full form of POP is


Post Office Protocol.

Pictorial Representation 95 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Trial Copy – q ´
File Edit View Insert Format Tools Actions Help Reply
Send 01 l Received answer
of e-mail
To ...
Cc ...
BCc ... Important
Subject : Trial Copy E-mail Spam :
Facts
l Sending Junk Full Form
e-mail, Unsolicited CC : Carbon Copy
e-mail messages or BCc : Blind
advertisements. Carbon Copy
l Its main purpose is to
steal computer data.

Web Based
Available free Web Based e-mail Impossible to work
E-mail Account without internet connection.

Requires persistent internet


No extra cost Benefit Loss connection to create or read
any e-mail.
of of

Able to open and use its The website must also


account from anywhere. be opened.

Limited limit restriction on


E-mail security facility
size and number of files that can be
available.
sent as attachments.

POP based
e-mail
Able to generate mail even offline
(without internet connection). Able to open e-mail only
on computers
that are connected

Low internet data usage even Benefit Loss to the internet service
when connected to internet of of provider's server.
connection.

Capable of sending large Opening of e-mails


size files by attaching prohibited in other
them to other e-mails. countries, states, cities.

Pictorial Representation 96 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Security of an
E-mail

Avoid opening Avoid sending personal Avoid replying to Always logout while
suspicious e-mails or information to spam e-mail closing the e-mail
attachments. e-mail. messages. account.

Do not share e-mail password with anyone but keep it safe and change it from time to time.

Internet Revolution

Instant
Telnet Messaging
or
Remote
Login
l A form of online
chat that
l The facility of
using a remote computer enables instant
while sitting at your l live conversation
computer. Meaning between two or more
l For its use, the user must Telephone people on internet
have login Password l Network by sending a text
of the remote Used to message.
computer. provide
access data,
information and l In this, the message
resources located on a receiver is also able to
remote computer reply the
connected message immediately.
to the internet by a
local computer.
l It is useful in sending
Images, Audio, Video
Telnet Client Telnet Server files along with text.

Login Name l For this, Whatsapp,


& Telegram, IMO,
Password Facebook Messenger,
Yahoo Messenger,
Google Talk, WeChat,
Telnet Protocol Viber are used.

Pictorial Representation 97 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Whatsapp

l A type of sending and l First time, it launched in 2009.


receiving Instant Message l Able to chat in creating group.
mobile app. l Maximum number of group
l Useful for sharing location by members is 256.
Audio, Video, Image, l It was bought by
Contact and GPS the American
alongwith Text Message. company Facebook.

Free, cross-platform,
cloud-based, instant
messaging, video WeChat
calling and VoIP
service.

Instant messaging app to


Launched Launched send Text, Images, Video,
on August in October Audio, GPS, etc.
14, 2013
Telegram 2013 for
for iOS. Android.

Launched First time


in 2011.

Internet
Telephony
An instant Developed
messaging and as Facebook
software Chat Use of soft phone application software
application. in 2008.
Use of Mic and Long distance l
Headphone/ conversation A type
l Speaker for possible at of Internet
Facebook
Use of VoIP conversa- low service with
Messenger (Voice over tion. cost. the help of
Internet Protocol) which it is possible
for voice to make calls with the
The company transmission. help of internet even
revived in 2010 Useful for l without SIM card
and released as a chat and group Instead of ISP (Internet l
standalone chat. Service Provider), VoIP Able to work with the
iOS and Android Service Provider help of Internet
in August, 2011. used. protocol.

Pictorial Representation 98 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Video Conference Text Chatting

l Chatting is used to read and reply


messages through
recipient keyboard.

Chatting
With the help of Conversation between
computer and internet, two two or more people connected 3
to the internet through a
or more persons located at different
mic or keyboard.
places are able to communicate among
each other through live video and audio
medium as if they are sitting
together. 2

l Chatting used by
microphone and speaker.

l Modern communication technology, capable of


exchanging records and information running on a Voice Chatting
computer.

l Requires webcam, Monitor, television or


projector, microphone, speakers and internet. Video Chatting
l Face-to-Face chatting in the form of video
l Displayed by speaker and monitor by microphone over the internet with the help of a webcam.
and webcam converting sound and picture into
digital data and converting it into audio and
video signals. l For this the camera quality and internet speed
should be good and high.

Usenet Newsgroup E-Publishing

l Full Form - l A medium for l Storing the


Users network displaying article similar
l Oldest service of the thoughts, experiences, to book on the
internet comments or world wide web
l A facility that divides information digitally, so that a interested
the information stored on internet sites by a
person can view and
in the network into large number of
read it via
groups based interested
persons on a similar internet.
on a topic and is used to
exchange like an electronic and particular topic. l Addressing the book as
Discussion Forum. l An internet based e-book publishing
Example - Newsgroup Discussion Forum. in this way.

Pictorial Representation 99 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

1. B2B
(Business to Business)
l Electronic business
between two
companies.

2. B2C 3. C2C
(Business (Consumer to
to Consumer)
Consumer) l Business between
l Electronic two consumers.
l Buying business l Doing
E-Commerce l Example
and selling not between Online
only objects and OLX (Online orders by
company l Operating any
services but also eXchange) consumer,
and business/
establishing contact consumer. Like - eBay, paying price
with customers and occupation Amazon, and delivering
merchants, advertising by using Online products
products and completing Shopping. to consumer's
basic infrastructure, etc. internet home by the
are its major tasks. services. company is
possible.

l
Abbreviation
for Web Log.
l Posting contents on
Social Networking Site.
Internet Protocol Watching Live relay
l Idea, audio, video, photo, etc.
Television mentioned in the content.
l A system where
it is available Watching time
shifted
to broadcast television,
programmes at The Blog Blogger
watch them name is the
convenience. name
on computer of writing
and posting of content
using the internet. poster.
content is
l IPTv capable of Watching the program of blogging.
providing your choice through
VoD (Video on Demand) Another name
three types Online Diary
of facilities.
l RSS
(Really Simple Syndication)
format and Word Press
Software are used to
and publish blog.
Blog ing
g
Blog

Blogospherel Groups of all blogs located on the World Wide Web.

l Personal Blogging started in 1994 by Justin Hall, so he is called


father of Personal Blogging.

Pictorial Representation 100 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

l Ph
l A to Blog
In Personal Business / Corporate Blog
or

rt Blo
o
Micro Blog
Hobby,

g
It is used Combined Life Style /

Professional

l Multimedia
Blogging

Blogging
Personal
to write Types blog of
Fashion Blog

Blog
and of Business
post Blogs and Affiliate /
story, Personal

l
l V
Review Blog
idea and Blogs.

Food Blog
ideo
experience its Reverse Blog

Blog
own by bloggers. News / Travel Blog

Internet Internet
in in
Education Medical
Fields

ducting ital
l Con ment. y hosp
l Easanagement nsultation
govern rcial and line.
m cost co
comme ng exams on AT, l Lowreign doctors
banki - CAT, GM by fo g at home ords
l A s k , sittin atients' rec
C i v i l , Ban l P vailable.
SAT, y , e t c . easily a Help in new
Railwa l ons
l In inventi
Games
l In online
ility of urses overy
Justice and
l F a c
o r c o E a s y of disc of
gf l ty
Law
trainin ftware, ailabili
l In sales tax k e s o e b and av edical
li king, w y new m logy and
department networ logy, compan techno h manageme
nt.
l In Income Tax te c h n o c
ry, etc. resear
department secreta
l In agriculture
department
l In Aadhar Card, PAN of Live ernet is
Card, Computerization r r a n g ement ion, Fees, l U s e of int ir travelling,
l A es Admiss t, etc. e in a hone
l In voting and censusing Class , 3-D Projec us possibl velling, telep
rail t r a eo
l In meteorological Record ible by vario on, vid
Uses department is poss ities operati encing, file
of l In engineering univers at home. confer , web
sittin g sharing asting, etc.
Internet department broadc
lIn marketing and
in other communication
fields
Pictorial Representation 101 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Social Networking Sites

Netiquette
l Etiquette,
Netiquette or Internet +
etiquette.
l Expected and courteous
Flame behaviour used for Flash
l Use of undesirable exchanging information l Useful software
and derogatory parts by Video games.
during E-mail, Chatting,
by internet
users during e-mail, Video conferencing. l Software developed
chatting or by Macromedia company.
video conferencing. l Used to display, animation,
sound, interactivity, etc.
on web pages.
Youtube
l Video sharing
website/platform
powered
by Google Inc. Acronyms
l Used for uploading l Abbreviations prevalent
video, downloading, The in computer communication
viewing, sending by term during news groups,
e-mail, commenting, etc. e-mail or chatting
l Initiation of Youtube 'Social Network' As-
in 2005 by three was coined in ASAP - As soon as Possible
employees 1954 by
of the Pay Pal company - FYI - For Your Information
Chad Hurley, J.A. Barnes IMO - In My Opinion
Steve chan BTW - By the Way
and LOL - Laugh Out Loud
Javed Karim. TIA - Thanks in Advance

l
ne Wo ac
F
t t er orking .
tw rld eb i w ng
Ha sta orkin 's la ook Twal net bsite. loggi rt
g rg i
r r
M Mar vard ted i fre est S oc e we cro b sho 0
cC k Z C n e s so
oll uc oll 200 ite cia l fre s mi send ly 14 tly
u k e 4 t l a to ial ren s
l Ed m, D erbe ge s by hat U sed sed init cur riend
t f d f
Op C uard usti rg, A uden l l U ets o s an s to ,
era hri o S n M nd ts. e e r e r rs
l ted s H av os rew tw ract ract ishe rs. rm
u e c a a e
Us
e C by gh in, ovitz
r
Emoji ch 0 ch ill w llow he te
all d fo omp Face es , 2 8 w f o dt
ov r m any bo l Other name a nd ieve of
er ak . ok h S '.
u t
co pto keep he w ng f
i Inc Ac 'SM rnet
. Emoticon which is l e
m d
me mu ate, ing orld, iend
r Int
s ni cr s formated by Emotion + icon.
on sage ty, c eatin
lin s, ha g l Used to express emotions with
e g pla ttin
am yin g the help of letters and symbols
es. g
during e-mail and online chat.

Pictorial Representation 102 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Facebook
Some Important Social Media Foundation Year, Founders and Current CEOs

Name - Facebook
Establishment Year - 2004
1 Founder - Mark Zuckerberg,
Eduardo Saverin, Andrew McCollum,
Dustin Moskovitz, Chris Hughes.
Current CEO - Mark Zuckerberg

Name - Twitter
2 Establishment Year - 2006
l Able to open Homepage as soon as Founder - Jack Dorsey
you type www.facebook.com Current CEO - Parag Agrawal
on web browser.
l To create an account on it, user above
13 years of age must have an e-mail ID. Name - Youtube
Establishment Year - February 14, 2005
3 Founder - Chad Hurley,
Steve Chan, Javed Karim
Current CEO - Susan Wojcicki

Name - Instagram
Establishment Year - 2010
4 Founder - Kevin Systrom, Mike Krieger
Current CEO - Kevin Systrom (Earlier),
Adam Mosseri (since 2021)

Name - Whatsapp
5 Establishment Year - February 24, 2009
Founder - Jan Koum and Brian Acton
Current CEO - Will Cathcart
l Twitter started in 2006
by
Jack Dorsey, Biz Stone,
Evan Williams, Name - Linkedin
Noach Glass. 6 Establishment Year - May 5, 2003
Founder - Reid Hoffman and his friends
Current CEO - Ryan Roslansky

Name - Quora
Establishment Year - June, 2009
7 Founder - Adam D'Angelo,
Charlie Cheever

YouTube Current CEO - Adam D' Angelo

Name - Telegram
8 Establishment Year - March, 2013
Founder - Pavel Durov, Nikolai Durov
Current CEO - Pavel Durov

l In February 2005, Youtube created by three


PayPal employees (Chad Hurley, Steve Chan Name - Pinterest
and Javed Karim), was bought by Google in 9 Establishment Year - 2010
Founder - Paul Sciarra, Evan Sharp,
November, 2006 for
US$ 1.65 billion. Ben Silbermann
Current CEO - Ben Silbermann

Pictorial Representation 103 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Convert It is capable of working with the help of


internet HTML, HTTP, web server and
to web browser.
HTTP Information
Highway A repository of information available in the
form of links. Because of this, all the
computers in the world are connected
WWW to each other.
Use of (World Another
name
Wide Web) A group of documents associated with
Hypertext.
W3 Inclusion of Text, Image,
Hyper Sound, Video, etc. in Documents.
Text or
Document Web
First use of www by Tim Berners-Lee in
Connected
1989 at CERN Laboratory.
to each other
with the help of

Difference
Use of TCP / IP protocol by internet between Fees payable to ISP for internet usage while
while use of HTTP Protocol by www. Internet free facility is available though www.
and
www

Internet
Protocol Adress f
l A dress o
unique numeric address to e s a m e IP Ad
to b s.
ossible mputer uter by
identify each device (computer, server, printer, l Imp any two co to each comp
smartphone) connected to internet. ess er).
i n i n g IP addr rvice Provid
a e
l Obt P (Internet S
IS

Pictorial Representation 104 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Seven Layers of OSI Model

The seventh number layer (the highest layer)


provides the interface between
the actual application Data
and other layers as it presents closet
to the end user.

Application Layer
Responsibility of the Host

The sixth number layer is used for


encryption and decryption of data Data
for data compression.
(Host Layer)

Presentation Layer
The fifth number layer is used to
retransmit by availing a session
between two devices Data
when an error occurs in
data transmission.

Session Layer
The fourth number layer
is used to
transmit data packets Segments
by communication
between two computers.

Transport Layer
Sender
The third number layer
is used to transport
packet - group from source to Packets
Receiver destination by switching and routing
techniques.

Network Layer
of the Network
(Media Layer)
Responsibility

It is the second layer with two sub-layers


MAC (Media Access Control) and
LLC (Logic Link Control) Frames
used to decode and encode data packets.

Data Link Layer

The lowest layer of the OSI model


responsible for electrical connection Bits
such as voltage, data rates, etc.

Physical Layer

Pictorial Representation 105 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Key Tips for the OSI Model
Ø There is a reference Ø Full form of OSI
model for Open System Interconnection.
communication between
two users. Ø Each layer is not dependent on
the other layer but the
Ø How data are sent and received transmission of data must be
in the network, used to describe. done among each other.

Benefits of
Web Applications

l Giving access to l Accessing the web


more than one users application through various
to the same platforms like desktop,
version of the application. laptop or
mobile.
l No need to install multiple web
applications. l Very little access to internal memory.

Hyper Link Hyper Text


An arrangement l Linked text by
HTML Texts, Graphics,
to link text or l Full Form - Hyper Text Markup Language Images, Animations.
icons displayed l Combined software language of HyperLink and l Moving the mouse
by hyper text. Hyper Text which is used to prepare web pages. pointer over it,
l Able to be used by converts to a hand
all browsers. symbol (J).

X-HTML Java Script


l Full Form - l Scripting software language
Extensible Hyper developed by Sun Microsystems
Text Markup Language. company in which there is less
l A type of Software Language. Languages need to write instructions
l It contains the features of used on (codes).
XML and HTML www l Used in creating
languages. Web Pages.

XML PHP
l Full Form - Extensible Markup l Full Form - Personal Home Page.
Language. l Software language used in
l Language used to create web pages. development of Dynamic web pages.
l Its main function is to store data l The PHP language developed
and transfer it to another computer. in 1994 by Rasmus Lerdorf.

Pictorial Representation 106 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Used for Development of IPv6
IP Address due to the increasing
number of users.

Use of Use of
32 bit 128 bit
number number
Divided for for Divided by
by three dots (.) address address seven colons (:)

Four sets Eight sets


of numbers of four hexadecimal
from 0 to 255 digits
Example
Example 2001:0db8:85a3:
173.225.0.14 0000:0000:8a2e:
0370:7334

Abbreviation Abbreviation
IPv4 IPv6

Internet Protocol Internet Protocol


Version 4 Version 6
Versions of
IP Address

ddress
Private IP A
Types of
Used to assign and protect IP Address Able to assign network
network routers of private Router by ISP and connect
home or office. to the Internet.

Class A Class B

l Used for large networks l Used for medium size network


l First part (8 bit) for
Classes l First two parts (16 bit) for
network of network
l Last three parts (24 bit) IP l Last two parts (16 bit) for
for Host Part Address Host Part
l Range - 1 to 127 l Range - 128 to 191

Pictorial Representation 107 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Class C Class D Class E

l Used for small size networks l It is l IP address ranging from 240.0.0.0


l First three parts (24 bit) for network reserved for to 255.255.255.255 included
l Last part (8 bit) for Host Part Multicasting l Yet undefined
Application
l Range - 192 to 223 l Reserved for future use
l Range - l Range - 240 to 245
224 to 239

l Last part of domain name


separated by dot (.) which
The way to convert a digital is used to indicate organization
IP address or country.
to a binary IP address,
through which a
country / company / firm
is possible to
1 l Two types of domain names
1. Geographic Domain -
Another Name -
country code Top
identify on internet.
Level Domain (ccTLD)
Example - .in - India
.uk - United Kingdom
.us - United States of America
.au - Australia

4
Domain Name
System - DNS 2
l Domain Name,
Not case
sensitive.
That is to type in any l Non-Geographic Domain :
Another Name - Generic Domain or
capital or small letters
Top Level Domain (TLD)

3
but got the same results. Example - .info - information
Example .co - company | .int - international
google.com or .gov - government | .org - organization
GOOGLE.COM .mil - military | .net - networking
yahoo.com or YAHOO.COM .com - commercial | .edu - educational
hotmail.com or
HOTMAIL.COM

Pictorial Representation 108 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
A URL contains the following five things :- Example

ftp://info.apple.com/design.html
1. Name of Protocol 1 2 3 4
http://www.google.com/html/index.html
2. Colon and two Slashes (://) 1 2 3 4 5
l l
3. Name of the Server Used in Each
typing into website
web browser's contains its
4. Directory Path address bar. own separate
URL of any web
5. Name of File page.
l A
Its main function is to specialized
find and obtain the address of any
desired information. website or web page
on www.
URL
l Full Form - Uniform Pay special attention during
Resource URL typing capital and small
Locator letters because of
l case sensitive.
Possibility l
of words, Use
numbers of space URL Top Level
or in URL is ¯ Domain
punctuation impossible. Subdomain
¯ (TLD)
signs
in it.
http:// www . google . com
¯ ¯
Hyper Text Domain
Transfer (name)
Protocol

Internet Mozilla
Explorer Firefox
Web Browser

Google
Chrome
UC Browser

Example Example
Microsoft Conqueror
Edge
Opera
Lynx Opera Safari
Mini

Pictorial Representation 109 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

l A software
l Proficient in accessing program or application. l Able to run
web pages on internet l Used for finding websites, animated contents.
l Able to find and display accessing them, l Able to handle Text,
any types of websites. reading content, Images,
l Able to follow accessing, Links, Audio and
Hyperlink. etc. Video.

Internet Explorer Google Chrome


l Developed by Microsoft l Developed by the Google
corporation in 1995. company in september, 2008.
l Installed in windows OS. l Popular for safety provisions
and high speed capability.
l Developed for Mac, Linux,
Android, iphone after
Windows OS.
Mozilla FireFox
l Developed first time in 2002
by Mozilla Foundation and
Mozilla Corporation. UC Browser
l Free browser for l Developed in
Windows, Linux and April 2004
Macintosh. by China mobile company
UC Web.

Safari
l Developed on January 7, Microsoft Edge
2003 by Apple Corporation. l Developed on
l Installed in Macintosh OS April 29, 2015 by
and useful for iphone Microsoft Corporation.
and ipad.

Opera
l Opera was developed Lynx
in 1995, l Developed as
is available in more than 40 Hyper Text Browser
languages. in 1992
by a group of University
of Kansas students.

Flock
l A closed web browser based
on Google Chrome which
is suitable for integrating
Netscape Navigator
Facebook, Twitter l Web browser popular in
and Youtube. the 1990s which was developed
l Flock was developed in by Netscape
2005 by Inc. Communication
Corporation.

Pictorial Representation 110 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Search Engine

Yahoo Ask.com

Google

l Use of the search engine to search the Orkut


desired information in the search box by Alta Vista
the relevant keyword or phase by typing the
URL such as www.google.com in the address
box of the search engine.

l A computer program (search engine)


is capable of locating the desired
information from the information
How Search Engine Works? stored in a computer.

Able to search based on Title,


The search engine succeeds in working
Keywords, Texts, Phases of Page.
through the following three phases:-

1 2

Crawling Indexing

It searches (scans) the l Use of


article on a website database to
with the help of store crawled
crawler data.
or spider by using
the keywords l The function
(articles) of the
typed by the user. database is to Ask.com Google Bing Yahoo
When the information store
is received, indexing copy of scanned
is returned. web Excite DuckDuckGo AOL
If information page by crawler.
is not received, the Examples of Search Engine
Lycos Baidu
crawler scans on l The work of
going ranking
to next page by the and retrieval Yandex Wolfram Alpha Chacha.com
link starts
of another web page. after indexing. Excite currently closed (since 31 Aug., 2021)

3 l After indexing, many websites (Top 10) displayed on user's screen.


Ranking & l User can open any of the displayed websites by clicking
Retrieval as per his wish.

Pictorial Representation 111 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Network and Data Security
Network Security
Protecting a network from Unauthorized Access, Data Loss, Virus,
Hacking, Data Theft, Misuse and Risk.

Network Monitoring Network security


is must to protect
data.

Anti-Virus

Principles
Authentication of Confidentiality
By identifying the Network Security Confidentiality
person or party, required from
the authorized
unauthorized access
person is able to
to the transaction
access
information of personal or
secured by business related
User's Name and communication
Password. and information.

In y
co I te i lit
rre ac nclu gr
an sha ctn cur sion ity ai lab ble
ssi ation
d t re ess ac
h d y of Av o
P rm ity son
or
ac e re bet of i and o b i l r
ce ce w nfo
ssi iv ee inf aila d pe
ble er n s rma v
a riz y. e
by whi end tion o rt
an ch er a uth pa
yo is r
ne no fo
. t

Pictorial Representation 112 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
l Protecting against theft
of user's name and l Protecting data from
password. unauthorized access.
Computer
Security
l Avoiding unnecessary l Preventing the
changes and destruction execution of a
of data. software program.

Cyber Crime
l Illegal act or offence
committed through internet or
Cyber Space online medium. Cyber Warfare
l Computer l Internet is its biggest tool. l Stealing, destroying
l Harming computers, or damaging personal,
communication network
networks or data.
Example
l Sending a secret and sensitive
spread around the world
number of e-mails. data, intercepting
and the store of communication, etc.
l Using the network
information spread by a country (nation)
on unauthorized access.
around it. l Obtaining and causing by
harm to personal and entering another
secret information. country's computer
l Displaying viruses, economic network.
crimes, illegal and anti-social facts
and pictures.

l The use of the word Ways to prevent


'Cyber Space' Cyber Crime
l Using Antivirus, Firewall,
for the first time in the book
Proxy Server.
'Neuromancer' l Keep Login ID and Password
written in 1984 safe and keep changing it at times.
by William Gibson an l Keeping a backup copy of the
author of science fiction. data and converting it
into a secret code
(encrypted form) to send and receive.

l Meaning - l Functions -
Unsolicited / Irrelevent Spam By creating Fake Accounts on
e-mail Whatsapp, Blog, E-mail, Twitter,
or Facebook, Website, etc, stealing
message. Client's information
through false links and missing
it for bad purposes.

Types of Spams

Bulk Clickbait Malicious Undesired Fraud


Message Links Content Reviews

Pictorial Representation 113 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Cookies
The software used to send the summarized data to the user's browser
when using a website with the help of a web browser.
Used to work behind the scene without informing the user.
Used to make internet use easy.
Some cookies are able to eliminate the secrecy of user's personal information.

Proxy Server
l A type of computer router that is used to transfer data
between clients and servers, prevents attacks on private network, and
acts as filters between clients and servers.

Functions of
Proxy Server
l Restrict unsolicited web pages or
websites, control Malware and Virus, maintain server's privacy, etc.

Unauthorized Traffic is rejected

Firewall ect nd Internet


p rot ers a ts
to us en Inbound
s ed ized lem cess. Traffic
U or s e ac
th u k Authorized
n au ero or
u ang netw ted Traffic Passes
d m
o c o rrec licy
fr f it po
s i b le i to the ssible.
os ng impo
ry p rdi
Ent acco erwise
oth are
w a r e , softw
s har d
Used a or both.

Used to protect against


viruses, worms, hackers,
trojans, malwares, etc.

Ab
chec le to ac
k ta
thro ing inc s gate
ugh om by
and user's ing dat
pass n a
wor ame
d.

Pictorial Representation 114 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Computer Virus

l Virus effect
A small harmful on Computer
(malicious) program l Re-booting
computer automatically.
is used to create and l Slow down the speed of working.
spread its own copy itself, delete data, l Frequent hanging.
corrupt, alter, slow down speed, l Files getting corrupted.
reduce disk capacity, l Unusual wrong page
opening on web browser.
stop running software, etc. by
l Messaging wrong information
entering the computer. of memory status
and size.

Virus

Medium to enter virus into


Whom does virus computer
not affect Internet, E-mail, Game, Software
l Write Protect
Memory Memory Device -
l Compressed CD, DVD,
Data File Pen Drive,
BD, Floppy, etc.

Rootkit
l Most dangerous form of malware.
l Collection of installed applications, not a part of malware.
l Able to free the rootkit's creator (hacker) to do anything at the operating system level.
l It contains the ability to control the system without the user's command.
l Difficult to detect it in the system.
l It has more power over the system than other applications.
l Once installed in the user's system, the creator (hacker) is able to control
the system remotely, run its own file, change the system configuration etc.

Pictorial Representation 115 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
Sub-Types of
Computer Virus
Program
Over-write Virus
Virus
Macro Virus
1.
Resident Virus

Polymorphic Virus

Types File Infector Virus


of Virus
Cavity Virus

2. 3. CMOS Virus

Boot Multi Partite Companion Virus


Virus Virus Encrypt Virus

Rabbit Virus

Virus
spreading rapidly by
Malware copying itself in the free
space of computer
memory.

Worm

High
possibility to be crash
infected memory
by worm.

Malicious virus software The worm automatically


capable of tampering spreads and runs in computer
and damaging programs system.
by entering the system without Firewalls and other network
the knowledge of the user. systems are very effective
Example to stop them but not
Spyware, Worm, Trojan, etc. completely.

Pictorial Representation 116 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

l A malicious l
software program The use of spyware
by
some companies
l Used to steal e-mails, and organizations to
user's names, monitor
passwords by the activities of their
entering into computer employees.
as a spy against
computer user
Spyware
(without permission)
and give it to the person
or group sending
malware.

Hackers and Crackers

Hackers Crackers
Trojan Horse
A person tampering Used to break in
with data or network security, l Virus that harms
software by steal password
entering a and commit the user by running
network for illegal acts. on the background
pecuniary gain.
of the computer, posing
as a game, utility, etc.
The purpose of Another name of
hacker's is to Cracker l Virus used to
expose the flaws Black steal data by acting
in the network Hat
system. Hacker Hacker. as a spy.
used for crime or
pecuniary gain.

l It is a malicious software. l Another name - Advertisement


Supported Software.
l Used to collect data on user's
computer and serve appropriate l Able to make
advertisements. money for the creator
by generating on screen
l Able to send browser to advertisements within
unsafe sites. browser.
Adware

Pictorial Representation 117 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

Time
Bomb Virus
l Software to be
run (effective) on a given
date or time or event.
Another name - Logic Bomb due to run
on a logic (condition)
Example
"Happy Birthday"
"Jerusalem Virus"
"13th Friday"
Password Scare Ware
Cracking l Virus program that
l With the help of the enters the computer as soon as
password cracker program, the user downloads it when
by detecting the coded password the hacker is tampted to
in the encrypted form and download free antivirus
using it for illegal and or
authorized free software.
actions. Packet
Sniffing
l Recording and
misusing data packets
by
identifying them before
reaching the
destination.

Antivirus Software

AVG Advantage
Such software A program used to check
Norton McAfee a software.
programs
designed to identify, e-mail or internet file, destroy/
delete it when a virus is detected,
Symantec

detect, prevent, destroy


Defender

Some notify the user immediately


malicious programs
Bit

such as viruses, Popular when a virus is active, etc.


malware, trojan horse, Antiviruses Disadvantage
worm, etc. Capable of reducing computer
present in the speed by being busy checking
Kaspersky AVAST before a software, program or file
software.
Panda or starts.
Bull Guard

Pictorial Representation 118 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew

User Cryptography
Three Bases of Original data always
Authentication Internet Security available to
Authenticity authorized
checkup person from the
by possibility of data theft
verification of
Access Control
and data leak by
user's l Ensuring availability encryption (change data
Login ID, of data or information through to secret code) and
Password, user's finger print, decryption (change
Secret code, voice recognition, from code to normal
etc. electronic card, etc. data) method.

User Identification

User Name
Ways to Protect Passwords
and Password l The following methods are
l A confidential digital presented to avoid
the high possibility
code capable
of password
of restricting unauthorized
leaking by fraud or
user access to data, repeated attempts
information or programs. (Trial and Error Method)
l Used to allow access to on the Network.
computer data
or networks only to
authorized users.
Using a mixed form of Change and
letters, numbers and remember the
special symbols and password at
Biometric keeping the regular intervals.
length large.
Technique
l Technique to establish the
identity of the user
by using
the parts of the user such as
Finger Prints, Retina
and Iris,
Facial Pattern,
Voice, etc.
Not to share
password with anyone
and not to write
Using a mixture it anywhere.
of capital and
small letters.

Pictorial Representation 119 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs


@PdfHubRebornNew
A to Z
(New Way of Learning Letters)

D : Digital Versatile
A : Android B : Bluetooth C : Computer Disk (DVD)

E : E-mail F : Floppy Disk G : Google H : Hard Disk

I : Internet J : Joystick K : Keyboard L : Laser

N : Network Interface O : Optical Character


M : Microsoft Card Reader (OCR) P : Printer

Q : QR Code R : RAM S : Scanner T : Trackball

U : USB V : Virus W : Windows X : Xerox Machine

Y : Yahoo Z : ZIP Drive

Pictorial Representation 120 GS Drishti Computer : An Introduction

Join @PdfhubRebornNew For More Exclusive Pdfs

You might also like