GS Drishti Computer 2022 Ebook (PdfhubRebornNew)
GS Drishti Computer 2022 Ebook (PdfhubRebornNew)
@PdfHubRebornNew
© Publisher
Edition - First
Edition Year - 2022
Preface Index
Writer - SSGC There are two main objectives of
M.R.P.: 100/- Pictorial Presentation of various subjects
l Computer : An
Printed at - of General Studies. The First One - to Introduction 5-8
gain confidence in studying the entire s Computer & its Meaning s Computer's
Core Publishing Solution subjects in a short time. The Other One - Working System s Full Form of Computer
these facts should get imprinted on the s Structure of Computer s Five main
Contact : functions of computer s Characteristics of
brain of the readers. Consequently the
Computer s Working System of Computer
aspirants will be able to remember the
Sam-Samayik Architecture s Peripheral Devices s Areas
facts within no time in the / Applications of Computer s Definition
Ghatna Chakra examination hall. Our aim is that an s Data and their types s Basic Functions of
188A/128, Allenganj, Churchlane, aspirant should be able to solve at Computer
least two questions more from
Prayagraj (Allahabad) - 211002
each topic because of imbibing
l History of
Ph.: 0532-2465524, 2465525
this very effective pictorial Computer 9-24
Mob.: 9335140296 representation. s Evolution & Development of Computer
e-mail : [email protected] A good book is one that s Meaning, origin and innovation of
Website : ssgcp.com depicts and imbibe happiness. Abacus s Napier Bones Device
s Pascaline and Leibniz Calculator
e-shop Website : shop.ssgcp.com While presenting this subject
s Father of Computer s Hollerith Census
matter, it has been kept in mind Tabulator s ABC Computer s MARK-I
Copyright 2020, by Sam-Samayik that only the important and s EDVAC s ENIAC s UNIVAC-I
relevant facts should get a q Classification of Development of
Ghatna Chakra Private Limited. No
place in this presentation along Computer s Based on Working Technol-
Part of this publication may be with no factual error at all. ogy s Analog Computer s Examples of
reproduced or distributed in any Moreover only the Analog Computer s Examples of Analog
Signal q Digital Computer and its
form or by any means, electronic, Purvavalokan related facts
example s Hybrid Computer and its
have been incorporated here.
mechanical, photocopying, recording example s Computers classified on the
While presenting this book basis of size and work s Mini Computer
or otherwise or stored in database or before the readers, we have
and its use s Micro Computer and its use
retrieval system without the prior worked hard to assay all key s Personal Computer and its use and
written permission of publisher. facts with utmost accuracy. development s Workstation and its use
Undoubtedly, we are in a s Notebook Computer and its develop-
The program listings (if any) may ment s Use, Type, Part, Advantage and
position to say that there is 99.9
be entered stored and executed in a percent accuracy or above. This
Disadvantage of Tablet Computer
s Palmtop and Smartphone s Mainframe
computer system, but they may book is well designed, handy, Computer and its use s Super Computer
not be reproduced for publication. and appropriate for revision and its speed measurement and use s Best
at the eleventh hours of the five super computers s Exam Facts and
examination with appropriate Interesting Facts s Super Computer in
design elements and a sense of India q Computers Classified on the basis
originality. of Hardware Usage s First Generation
Writer Computer s Second Generation Computer
& Associates Despite all efforts to
s Third Generation Computer s Fourth
make this book very efficacious, if Generation Computer s Fifth Generation
any doubt arises regarding facts, Computer s Future Use s Next Generation
J. K. Jeet readers are always welcomed to Computer s Generation of Computer - At a
contact on our WHATSAPP glance
Shudhar Tiwari platform. You may WHATSAPP on
l Components of
Vicky Raj mobile number 8081655444. Your
doubts will be resolved within 72 hours Computer System
compulsorily.
25-52
Pictorial Representation 2 GS Drishti Computer : An Introduction
Index
q Hardware & Software q Input Device Software and its types s Operating System,
s Man Data Input Device s Software Keyboard Language Translator and Device Driver
s Virtual Keyboard s On Screen Keyboard s Compiler, Assembler and Interpreter
s Hardware Keyboard s Parts of Keyboard q Difference between compiler and inter-
s Functions Keys s Special Purpose Keys preter s Types of Operating System
s Characteristics of Mouse s Mouse, Trackball, q Development based s Serial Operating
Joystick s Light Pen, Touch Screen s Source Data System, Batch Operating System s Embedded,
Input Device s Speech Recognition s Sound Network and Distributed Operating System
Card, Microphone, Video Camera, Digital s Multi Tasking and Multi Programming
Camera, Scanner q Source Data Automation Operating System s Open/Closed Source
s OCR, OMR, MICR, OBR, PCR s Storage Operating System s Some Popular Operating
Device and its types q Primary or Main System s Microsoft Windows NT q Unix, Linux
Memory s ROM, PROM, E-PROM, EE-PROM and Android Operating System s Application
q Temporary or Volatile Memory s RAM and Software (Special and General) s Example of
its characteristics s Cache Memory s Secondary General Application Software q Processing,
or Auxiliary Memory q Access Mode s Use and Spreadsheet, Presentation, Accounting and
Example of Sequential Access s Formulae of DTP Software q Database, Graphics and CAD
storage capacity of Magnetic Tape s Example of Software s Difference Between System Software
Direct Access s Magnetic Disk (Hard Disk, and Application Software s Utility Software
Floppy Disk) s Optical Disk and its Example q File Management Utility and Disk Manage-
s CD-ROM, CD-R/W, DVD, BD q Electronic ment Utility q Software Package and its Use,
Storage Device q Virtual Memory s Difference Example and Definition s Other Software -
between Primary and Secondary memory, Storage Retail Software, Freeware, Group ware, Share
Capacity and Access Time of Memory q Buffer ware, Firmware, Software License, Install,
Memory and its use q Spool/Spooling Uninstall Program s Bug and Debug q Syntax
q Selection of Computer Memory for use Error and Logic Error s Booting (Cold Boot and
q Flash Memory, Memory Card q Processing Worm Boot) s Algorithm with Kernel and
Device (CPU) and its structure s Computer's Example q Flowchart and Example
working system s Three parts of CPU q Flowchart Signs and Pseudo Code
s Register/Memory Unit and its Function
s Control Unit and Arithmetic Logic Unit
l Languages of Computer
s Factors affecting the speed of a CPU Programs 68-71
s Computer Clock, Word Length, Parallel
q Low Level Language (Machine and
Calculation s System Bus s Interaction between
Assembly Language) q High Level Language
CPU and other devices s Output Device
s Difference between Machine Language and
s Softcopy, classification of Monitor s LCD/TFT
Assembly Language q Fortran, Pascal, Cobol,
Monitor, Projector, Hardcopy, Printer and its
Comal, Logo Basic, Prolog, Algol, C and C++
classification s Printers by capacity, Single, Line,
s Java s C Sharp, Lisp
Page Printer q Printers by style s Impact Printer,
Dot Matrix Printer s Daisy Wheel Printer, Non- l Computer Network
Impact Printer s Thermal and Inkjet Printer
s Laser Printer and Speaker Icon s Measurement 72-87
of Motherboard and Computer System Perfor- q Advantage of Network, Protocol q Types of
mance s Throughput, Response Time and Turn Protocol (TCP, IP, UDP SMTP, HTTP, FTP,
Around Time IMAP) s Bandwidth, Broadband, RS-32, Server
l Computer Software s Node, Baud, Baseband q Methods of
Communication (Simplex and Duplex)
53-68 s Communication Media (Wave and Wire)
q Function, Use and Definition of Computer q Microwave, Radiowave, Satellite
Software q Types of software s System s Bluetooth, Infrared, Wi-Fi, Li-Fi s Other
wireless (WLL and WiMAX) s Twisted Pair
Index
Cable and Co-axial Cable s Fibre Optics Cable, fields s Social Networking Sites (Netiquette,
Ethernet Cable s Data Transmission Service Flame, Flash, Youtube, Acronyms, Facebook,
(Dial-up Line, Leased Line, GSM, DSL, ISDN, Twitter, Emoji) s Establishment year, Founder
CDMA) and Wireless Broadband q Synchro- and Current CEO of some Important Social
nous and Asynchronous Transmission Media.
q Multiplexing and its types (FDM, TDM,
WDM, CDM) q Switching Techniques
l www 104-111
(Circuit Switching, Message Switching and s www s Difference between internet and www
Packet Switching) q Classification of s Internet Protocol Address s Seven Layers of
Computer Network (PAN, LAN, WLAN, OSI model s Major Tips of OSI Model s Benefits
of Web applications s Used Languages on www
CAN, MAN, WAN) q Network Topology (Bus
(HTML, XHTML, XML, Java Script, PHP, SQL)
Topology, Ring Topology, Star Topology, Mesh
s Versions of IP Address (IPv4 and IPv6) s Types
Topology, Tree Topology, Hybrid Topology) q
of IP Address (Private and Public IP Address)
Internetworking Tools or Devices (Network
s Classes of IP Address (Class A, Class B, Class C,
Gateway, Bridge, Repeater, Router, Switch,
Class D, Class E) s Domain Name System
Hub) q Network Interface Card and
(Geographic & Non-geographic) s URL q Web
Backbone Network q Internet, Intranet and
Browser and its Example s Internet Explorer,
Extranet and Difference among them
Google Chrome, Mozilla, Firefox, UC Browser,
l What is Internet? Safari, Microsoft Edge, Opera, Lynx, Flock,
Netscape Navigator q Search Engine (Yahoo,
88-103 Google, Ask.com, Orkut) q How Search
q Development of Internet (1960 to 1995) Engine works s Crawling, Indexing, Ranking
s Who governs the Internet? (Domain Name and Retrieval s Examples of Search Engine
Register, ISOC, IAB, ICANN, IRTF, W3C and
IETF) q Used Protocols on Internet (TCP/IP, l Network and Data
SMTP, FTP, HTTP, Telnet, Gopher) s Two
versions of IP address (IPv4 and IPv6)
Security 112-119
s Network Security s Principles of Network
s Computer Network established by Government
Security (Authentication, Integrity, Confidential-
of India (National Knowledge Network), State
ity, Availability) s Computer Security s Cyber
Wide Area Network, Educational and Research
Space, Cyber Crime and Cyber Warfare s Ways to
Network, National Information Centre Network
prevent Cyber Crime s Spam and its types
s Uses of Internet s Internet in India s Internet of
s Cookies, Proxy Server and its Functions,
Things s E-mail and its benefit, loss and inventor
Firewall s Computer Virus and its effect, Rootkit,
s E-mail Service Provider s E-mail Address, User
Types of Virus (Program, Boot and Multi Partite
Name, Domain Name s Parts of an E-mail
Virus), Sub-Types of Computer Virus, Malware,
message (Header, Message Body, Enevelop)
Worm, Spyware, Hackers and Crackers s Trojan
s Address Book (Mailing List, Forwards, Drafts)
Horse and Adware s Time Bomb Virus, Password
s Elements and types of E-mail message s Benefit
Cracking s Scare Ware, Packet Sniffing
and Loss of web based and pop based e-mail
s Antivirus Software and Some Popular
s Security of e-mail message and internet
Antiviruses s Three bases of Internet Security
revolution s Telnet or Remote Login s Instant
(User Authentication), Access Control,
messaging s Whatsapp, Telegram, Wechat,
Cryptography) s User Identification (Username
Facebook, Messenger, Internet, Telephony
and Password) s Biometric Technique s Ways to
s Video Conference, Chatting (Text, Voice,
Protect Passwords
Video) s Usenet, Newsgroup, E-Publishing s E-
commerce (B2B, B2C, C2C) s Internet Protocol l A to Z (New way of
Television s Blog and Blogging and its types
s Use of Internet in Education, Medical and other Learning Letters) 120
Computer
Drishti An Introduction
Computer's
Working System
Instructions
Storage Process
Charles Babbage 2 3
Father of Computer
Computer &
0 0 0
its Meaning
0 0 0 0 0 0 0 0 0 1 4
1 1111111111111111111111 1 1 1
0 Input Output
0 0 0 0 0 0 The meaning of the word
00000000000000000 0 0 0
1 1 1 1 1 1 1 1 1 1 1 1 1¯1 1 1 1 1 1 1 1 1 1 1 1 1
0 1
0 0000000000000000000000 0 0 0
1 1 1 1 1 1 1 1 1 1 1Computer Full Form of Computer
0 1111111111111 1 1 1
0 0 0 0 0 0 0 0 0 0 0 0¯0 0 0 0 0 0 0 0 0 0 0 0 0 0
1 1 1111111111111111111111 1 1 C Common
0 1
0 0 0 0 is derived from the English word
0000000000000000000 0 0 0 O Operating
1 1 1 1 1 1 1 1 1 1 1 1 1¯1 1 1 1 1 1 1 1 1 1 1 1 1
1
0 0 0000000000000000000000 0 0 M Machine
1 0
1 1 1 1 1 1 1 1 1 1Compute
1111111111111 1 1 1 P Purposely
0 0 0 0 0 0 0 0 0 0 0 0 0¯0 0 0 0 0 0 0 0 0 0 0 0 0
1 0 U Used for
1 1111111111111111111111 1 1 1
0 0 which means to calculate so it is called a
0 000000000000000000000 0 0 0 T Technological and
1 1 1 1 1 1 1 1 1 1 1 1 1¯1 1 1 1 1 1 1 1 1 1 1 1 1
0 1 E Educational
0 0000000000000000000000 0 0 0
1 1 1 1 1 1Computer
1 1 1 1 1 1 1 1 1 R Research
0
Five
1 main functions 5
of computer
2 4
3
Fast/Speed Reliability
Accuracy Secrecy
Characteristics
of Computer
Memory Versatility
The process
Process of
l Process of Input, addition, of displaying
Output, resource subtraction, information
storage multiplication as results
l Process of start division,
It is used to and stop data after
logical and
store data l Scrutinizing and comparative processing
The process of controlling of above
and operations
entering data processes Output
and programs instructions Arithmetic Unit
into a computer Logic Unit
it
Control Un
Memory
Input Unit
Unit
l Input Example
l Devices connected
Peripheral externally to a computer. Device Mouse,
® ® ®
Devices l It is used for l Output Keyboard,
special purposes. Device Monitor, Printer
Areas/Applications
of Computer
Computer If Ø Computers are being used in
is made of hardware every field in the world
hardware and is the body of Ø In the field of education Ø In Railways
software. computer, software
is its soul.
¯ ¯ Ø Software
Example Example ¯
l Students' obtained marks l Students' address l A set of programs responsible for the successful
l Employees' salary implementation of various functions of the computer.
sago Anc
0 0 year China ient
Bab
0
ut 3 ylon
Abo
plac
year credit to e
Innovation
Note
The History of computer starts from that time when man tried to calculate
very large numbers with the help of a device.
Today, we know it as Abacus.
It includes the Babylonian counting system, the Greek counting system, the
Roman counting system and the Indian counting sytem majorly.
An ancient
calculator
Wires and spherical beads
Used to count
are used in it
the numbers
Used to work on Its other parts are able Able to add, subtract,
the principle of manufactured in to move right multiply and divide
clock and odometer 1642-1644 and left. quickly.
Born Inventions :
26 December, Analytical Engine,
1791 Difference Engine,
Computer
Place
London, Died :
England 18 October, 1879
London, England
Charles
Babbage
(Father of
Computer)
Ø Invention :
By American Mathematician Herman Hollerith
Ø Year in 1889
Ø Another Name -
Electromechanical Punchcard Machine
Ø Credit goes to Herman Hollerith for the invention of the Punchcard in the form of memory.
1939-1942 1944
ABC Computer MARK-I
Do you know?
1954
UNIVAC-I
¯
¯ ¯ ¯ ¯
Full Form : Manufactured by Use Designed
Universal GEC The first commercial By John Mauchly
Automatic (General Electric computer UNIVAC-I and
Computer. Corporation) used for business and John Presper
in 1954. general purpose. Eckert.
Micro Mainframe -1
Computer (4) Computer
Analog signal Analog computer
Super
Computer
Examples of Analog Computer
(C) ¯
¯ ¯ ¯ ¯
Ø Based on Hardware Usage
A Vehicle Voltmeter Petrol
(1) (2) simple speedo- pump
clock meter meter
First Second
Generation (3) Generation
Examples of Analog Signal
Third
(4) Generation (5) ¯
¯ ¯ ¯ ¯
Fourth Fifth
Generation Generation Air Earth Car's Spoken
blowing shaking speed Voice
Analog signal is
Hybrid
and processing
for calculation
and output
Computer
and its
example
Ø Binary digits (0 and 1) is used for calculation. Analog Signal Digital Signal
0 1 2 3 4 5 6
Digital Signal Hybrid Computer
(B)
Computers classified on the basis of Size and Work
Use
Multiple persons are capable of
In passenger reservation,
working at the same time.
company, research and office, etc.
Mini Computer
It dev
sors elope
e r o p roces d firs 8, 16
d sinc Mi c it. IBM t by , 32
micro or 64 bit
Starte . sed in Com
pany.
1970 are u proce
are u sso
sed in rs
it.
VLSI (Very Large Scale Integration) and
ULSI (Ultra Large Scale Integration) reduce the size of
microprocessor and increase the efficiency manifold
Smartphone (2) Notebook Computer
or Laptop
Micro Computer
and its use
Palmtop Netbook computer
Many Forms
Tablet Computer Workstation
PC
or
Use
(2a)
Personal Computer
and its use and
development
Used Hardware PC Manufacturer Company
- PC
Keyboard, Monitor, IBM, Lenovo, Apple,
CPU, Memory and Company, Zenith, HCL, HP,
other hardwares Hewlett-Packard, Intel, etc.
Development of PC
l Developed in 1981. Microprocessor 8080 is used.
l Increased storage capacity by installing a hard disk drive.
l Nomenclatured PC-XT (Personal Computer Extended Technology)
l Nomenclatured PC-AT (Personal Computer Advanced Technology)
PC made by new microprocessor 80286 in 1984.
Ø Due to being used in the Lap, it is also popular by the name laptop.
Connectivity
Uses
l Used in Education, Health, Marketing
l Useful in reading books/newspapers, browsing
the web, generating reports, collecting data,
conducting surveys, project planning, online
learning, day-planning, etc.
Types Parts
Slate Tablet, Mini Tablet, (2e) -Stylus (a type of touch
Gaming Tablet, Booklet, pen), screen, external body,
Business Tablet, Phablet, Tablet battery, operating system,
2-in-1 or Hybrid Computer power button, volume
button and back button and
application software.
Advantages Disadvantage
It is cheap for using in l All features of
hand, carrying anywhere, computer are unavailable.
using without keyboard, l Unable to shoot
mouse, etc. selfies or videos.
l Fewer features, higher prices.
l Risk of touchscreen breakage.
Ø Characteristics
Ø Use - Useful in company, passenger-
Touchscreen, Web browsing, Wi-Fi,
reservation, research, etc.
Applications, Motion Sensor, Mobile Payment.
(3)
Ø Increase Use
the processing Used in large
capacity of two Mainframe
companines,
or more Computer
microprocessors Railway
by connecting
and its use Reservation,
them together. Defense,
Ø 32 or 64 bit
Research,
microprocessor
is used. Operating System Spacealogy, etc.
Exam Facts
Ø The credit for the creation of the
world's first supercomputer goes to
'America'.
Ø Company – Cray Research Company.
Ø Stablished – by Seymour Cray.
Ø Father of Super Computer –
Seymour Cray (Father of Super Computer)
Super
Computer
Interesting Facts
Ø PACE (Processor for Ø Its computing capacity is 1 Tera Flops (1 Tera = 1012) i.e. 10 trillion
Aerodynamic Computation calculations per second.
and Evaluation) Series' super
computer manufactured by
ANURAG (Advanced Ø The fastest supercomputer PARAM Yuva-II developed by C-DAC
Numerical Research and was built in 2013.
Analysis Group) Hyderabad.
Ø Computation capacity of PARAM Yuva-II is 524 Teraflops but at
present 529.4 Teraflops.
Ø It was built for DRDO Ø Such supercomputers are available only with seven countries of the
(Defence Research and world, America, Japan, China, Israel, Italy, Germany and India.
Development Organization).
(C)
Computers classified on the basis of Hardware Usage
Used Language
Ø Mnemonic code used in
Used Hardware
High Level Assembly Language.
Ø Use of Transistors instead of
Ø High Level Language such as COBOL
Vacuum Tube.
(Common Business Oriented Language) and
Ø Use of Magnetic Tape and
FORTRAN (Formula Translator) used in
Magnetic disk for storage.
software.
The Transistor was invented in 1947 by John Wardeen, William Shockley and Walter Bretton of Bell Laboratories.
Drawbacks Advantage
(4)
Advantage Used Operating
th
Ø Calculation time is in Four omputer System
C
Pico second (PS)
ration Ø Development and use
1 ps = 10–12 sec Gene -1980 of MS-DOS, Microsoft
Ø Development of very 1971 Windows and Apple
small and handheld Operating System
computers using (Apple OS)
microprocessor.
Quantum
Computer Ø DNA Computer
Preserving and processing the data by using
DNA or protein based biological material in
omplished due
l Energy in electric rays is acc place of Silicon and using copper salt will make
to the presence of elec tron s. possible the cheap construction of super
computers in future which is also called Bio
ted in the 0's and 1's Computer.
l These electrons are able to be coun
ing rapi dly in their orbitals
positions simultaneously by mov
of such computers
l By its use, the development Ø Chemical
is going on, which wil l be wor king faster than Computer
and faster.
human brain and will be smaller In this,
using
ry of matter whose chemical
l It will use the quantum theo properties
it (Quantum bit)
memory will be measured in Qub and
whereas in normal computer, concentration
memory is measured in bits. of the
substance to
be calculated
will be possible to built a
computer representing data by
different concentrations of
chemicals.
Ø Nano Computer
It is being envisaged to develop very small and large capacity
computers using nanotubes built at the nanoscale (1 ´ 10–9m)
diameter, in which the molecular structure of matter will be used.
Quality/Faults Expensive, Expensive, Relatively small Relatively cheap Very fast and
Larger size, Relatively and cheap, fast and fast, high- very short
Higher energy small and easy to use capacity, easy
consumption, and fast to use
Greater chance
of errors
Keyboard
Printer
Scanner
ve
n dri
Pe
Mouse
Cabinet
CD
(A)
Input Device
It is an electomechanical device. It makes the computer usable
by accepting data and instruction from the user.
Examples
Keyboard
(a)
Man Data
Input
Device { Point & Draw Device
Pick Device
Input
Device
Audio Input Device
(b)
Source Data
Input
Device { Video Input Device
Voice Recognition
Audio Video Video Camera
Input Sound Card Input
Device Device Digital Camera
Microphone
(a)
Man Data Input Device
(a)(i) Keyboard
¯
¯ ¯
(I) Software Keyboard (II) Hardware Keyboard
¯
¯ ¯
Virtual Keyboard On Screen Keyboard
l Virtual means pragmatic
l It is prepared by Software
Program
l Its image (virtual picture) is taken
down on a surface and then used to
enter data or instructions into the
computer by touching any of its
buttons. l An application software.
l Advantage – There is no chance of l Keyboard is visible on computer screen.
wear and tear and no need for l It is used by using mouse, touchscreen or other pointing devices.
cleaning as there are no any l It is a variant of virtual keyboard.
mechanical parts l It is used for inserting data into tablets and smartphones.
(a)(i)II
Hardware Keyboard
l Used to enter alphanumeric data into the computer and give instructions to the computer.
l Connection by PS-2 (Plug Station-2) Port of Keyboard and USB (Universal Serial Bus) port to the CPU.
Parts
of Special
Function Keyboard Purpose
Keys
Keys
Numerical Modifier
Key-pad Keys
Cursor
Movement
Keys
Page
Home
Down
Page
End Up
Ø Buttons located on the right side of the Ø Home – It is used to move the cursor
keyboard, similar to the calculator. to the beginning of a line, Ctrl+Home to the
beginning of the current page or document.
Ø Used for fast filling of numerical data.
Ø End – End is used to move the cursor to
Ø In this, Numerical lock with the end of a line or end of page, ctrl + End
0 to 9, ., +, –, * to the end of the current page or document.
and / and enter bottons are present.
Modifier Keys
Return / Enter
It is used to execute the instructions
Tab Key
given to the computer,
It is used to move the cursor
to send the typed data on the screen
by jumping to a certain distance which can be
to the computer, to start
covered by ruler.
a new paragraph or line in MS word. It is used to select one of the options
available in a dialog box.
Do you know?
Features of Mouse
Ú Ú
Left Button Right Button
l Located on the left side of l Located on the right side of
the mouse. the mouse.
l It is used to perform click, l According to the software, it
double click, point or drag. is used for some special
functions such as opening
Ú dialog box or menu box,
Centre Button viewing properties, etc.
l Another name
Scroll Button, Roller
Button or Wheel Button
l Used to scroll up and down a
document or web page.
(a)(iv)
Joystick
i) (a)(v
(a)(ii ll It consists of a gear-
Lig )
a Thi ht P
ck B Aided shaped stick and a s ha
Tra nd- en
uter puter inpu held
mp click button on it, by t de
D-
C o Com s wri vice
poin
ting
CA A M – used a which video games, ting i s use
C g on c
ign
& urin ce of simulator training, o
draw mpute or
df
Des u fact la
d M a n
c e in p rs. robot control, etc. read ing pic screen
r
e i e
Aid ing de
v
m put ing ture ,
c o e works are performed bar s,
int op f th c
a po in lapt ition o by selecting any icon
Pho o d
to c es, etc
use s he
mo t h e po ving t ligh
ell a
nd
.
ges mo it or text. t ar
han r by ing e us
It c n t e o v in t ed
poi ut m his
mo
use
l w itho . dev
ice.
bal lace
ber its p
rub fro m
(a)(vi)
Touch Screen
Blue light rays move around the surface of this input device,
when one touches anyone of the options available on the screen with the finger,
the speed of the rays gets affected and records the position by which the computer starts
processing. It is used in ATM, Smartphone, Tablet,
Information Kiosk, etc.
(b) (b)(i)
Source Data Input Device Speech Recognition
(ii)
(i) Sound Card
Speech (iii)
Recognition Microphone Ø It is used to recognize the words spoken by
human and display them on computer screen after
(v)
converting them into text.
Digital
(iv) Camera Ø It is used to control the movements of
(vi) computers and other electronic devices by giving
Video Scanner
Camera verbal commands.
(vii) Ø In this system, a microphone converts voice
Source Data
into analog signal, again converts it into digital
Automation
data and then converts into text or command.
(b)(iii)
Microphone or Mic
Ø A digital camera or a digicam in short,
taking a video or still photograph or
both in digital form, capable of
converting photodiode optical
Microphone information into electrical waves,
popularly recording images through an electronic
known as Mike image sensor and transmitting it to a
computer.
or Mic.
(b)(iv) (b)(vi)
Scanner
Video Camera
OCR OBR
MICR
Ø This input device is capable of reading
special signs, symbols or marks and Ø MICR stands for
making them usable by the computer. Magnetic Ink Character Reader / Recognition.
Ø Punch card is a hard and rigid paper Ø Its rapid use in cheques / drafts
card which is capable of storing data. issued by the Bank.
¯ ¯
Floppy Hard
ROM Random Access Disk Disk
¯ ¯
¯ ¯ ¯ ¯ ¯
PROM EEPROM Cache RAM
¯
EPROM
¯ Magnetic
¯ ¯ Disk
Dynamic Static
RAM RAM Optical Electronic
Disk Storage
Device
Di
sk g
t Di Di ital V
ac ) sk er Zip
o mp D-R (D sat
VD ile Disk
C (C )
sk
Optical
Di
CD-
)
Disk
(BD
HDD
Ray
R/W
¯ ¯
e
Disk Winchester
l u
Pack Disk
CD-ROM (Pen drive) (Chip)
Non-Volatile
Memory
ROM EE-PROM
The data stored l It is able to
in this store new
permanent PROM E-PROM programs by
memory are not removing
destroyed by l Full form is l It is able to (deleting) the
themselves and Programmable Read store new old programs by
can't be replaced Only Memory programs by high electric
them. It can only l It is programmed removing potential.
by optimized data by (deleting) old l Its use in
be read. Its full
special process. programs by research as flash.
name is Read
ultraviolet l Pen drive is its
Only Memory. l There are
rays. good example.
The information thousands of diodes
l Able to l Flash Memory
is able to remain present in it which are
store data has features of
in it even when capable of recording
even in both RAM and
the power supply the desired absence of ROM.
is turned off. information by fused power supply.
with high voltage.
Ø The more bits of the word length in the memory, the higher will be the speed of data
transfer. Therefore, on increasing the word length in a machine, the speed increases.
It can be compared to a road. The wider the road, the higher the speed.
Ø Temporary Memory is called main, volatile and Ø All data and information stored in it are
primary memory. destroyed when power supply is turned off.
Ø It is an internal memory of computer. That is why it is called volatile memory.
Ø It is directly accessed by the processor (CPU).
Ø It is faster than secondary memory.
Ø Computer can't run without primary memory.
Ø It is a fast semiconductor
Characteristics of RAM memory made of microchip.
Cache Memory
A fastest memory.
Cache
CPU Memory RAM
1. The storage
Sequential capacity of Magnetic
Tape is multiplication of
density of the data
Access
record and length of
3. 2. the tape.
Random Direct
ß
ß Storage
Capacity
=
Example Example Example
of of of Data Density
Sequential Direct Random (Byte per inch)
Access Access Access ´
Tape Length
Magnetic
Tape
Ø Hard Disk
Ø It is a built-in round disk made of
polycarbonate plastic.
Ø One of its surfaces is coated with a
thin layer of Aluminium to convert light
and a laser beam is used to read or write
data on it. Hence, it is also called a Laser
Disk.
l First Feature
Micro pit on the surface of the disk is
l Permanent and Auxiliary Memory. called pits and flat area between the Pits
l Disk made of metal or plastic. is called Lands.
l Iron oxide layer is used.
l Read/write head used for reading or writing. l Second Feature
l Capable of storing huge amount of data. Pits represent the binary digit 0 or
off and Lands represent the binary
digit 1 or on.
Ø Floppy Disk
l Examples
® CD (Compact Disk)
® DVD (Digital Versatile Disk)
® BD (Blue Ray Disk)
l Benefits
® Less chance of data being erased or changed.
® More storage capacity at less cost.
® Easy to transfer data.
® Less chance of disk wear since the Read.
l Circular Disk contained in a
write Head does not have physical contact
plastic square floppy. with the disk.
l A layer of magnetic material used
on the disk.
l Protected by a plastic square shell. l Drawbacks
l Divided into tracks and sectors. High chance of disk damage
l Each sector has 512 bytes of storage capacity. due to dust, dirt, fingerprint, etc.
l In 50 GB storage space,
CD-RW 9 hours of High Definition
Ø Full Name l Compact Disk Re-writable Video (HDV) or 23 hours of
Ø Feature Standard Definition Video
l It can be read and written many times.
(SDV) is able to be stored.
removable
to another.
EE-PROM
(Pen Drive)
im d i og h m
In the form of
storage device.
Flash Memory
Transferring data
Th y he s
Pictorial Presentation
th is s m m a
e e ys em a re
pu pro xe tem or in
t c c y.
ti
w m ng ss ti en e u
a l hic ain it w on ab
ar h a m en ith of les
ge u em ti ou a
r s o re t
m size er f ry ly i By
em a ee by n
or nd ls l w
y. fa ik h
be th ich
ste e
r c i s t
It om me he
e s
fre dep s u mo ize
of
41
e s end nli ry
Usage
pa s o mi
m t
Popular
em ce o n th ed.
M or f t e
pr er y. he
ev pro nd ss e Pos
c
e e i n xe s
re ory th spe s
du s e ed
ce ize ma D
d. is in e e
ta xec me
ke ut ri
t s io ts-
m o be mor n p Th
a e r e
op nag tter tim oce
er em me e ss
at
MMC
(Chip)
in ent mo due
g
Palmtop,
sy by ry
memory card
In the form of
Camera, PDA,
Memory Card
ste the
Smartphone, etc.
m
In Mobile, Digital
(Multimedia Card)
MB Byte 4 MB 4 GB 1600 GB 60 GB
Usage
Spool/
Spooling
A temporary Sending a
storage area document to a
where buffer with high
the data to be speed capacity
printed is stored for before printing, is
a period of time. called spooling.
Semiconductor Memory
Register
Cache Memory
ROM / RAM
Storage Capacity
Access Time
Speed
Cost
Magnetic Disk
Optical Disk
Magnetic
Tape
Memory Card
Note
Ø Selection of computer
memory is such a way –
Without slowing down the speed of data
processing, to achieve maximum
utility at low cost.
Information
Instructions
An electronic Secondary or
Result or
Data and
microchip Auxiliary
Important CPU is called Memory
part of Heart or Brain
computer of computer
Output Unit
Input Unit
system Primary or
Main Memory
Computer is Used to
unable to control, instruct
work without and process all
CPU tasks. Control Unit
Processing (CU)
Device
Another Part Able to
(CPU) transform data
CU, ALU and
into information Arithmetic
Memory
after processing Logic Unit
(Register) based on (ALU)
instructions.
CPU
Another name CPU Able to execute
(Central Processing the operating
Unit) or Processor system and other Parts/Components of CPU
or Microprocessor programs.
Memory Control
Unit Three Parts of Unit
or CPU
Memory Unit
Register
Arithmetic Logic Unit
for processing.
Register /
I/O Module Memory
Unit
and Its
Functions
I/O Device
l To processor (ALU)'s l Among all the
functions or operations. softwares, hardwares and
their activities
l To input / output and other Storing
hardware like monitor, l Between Input /
printer, scanner, mouse, Fetching data from Output devices
keyboard, disk, etc. main memory and
storing them
Arithmetic
Logic Unit (ALU) Logical Unit
Arithmetic l Equal to (=)
Unit l Less than (<)
Ø The important part of CPU is ALU.
l Greater than (>)
l Addition (+) Ø The actual execution of
instructions and data are l Less than or equal to (<)
l Subtraction (–) processed by ALU. l Greater than or equal to (>)
l Multiplication (×) Ø It is used to l Less than or
perform arithmetic does not equal to (<¹)
l Division (÷) and logical calculations. l Greater than or does
1 Ø ALU is divided 2 not equal to (>¹)
into two parts.
Parallel
Calculations
etween CPU and other devices
Co-ordination b
Ø Generally, CPU is able to do fast
calculation.
Ø Negative impact on computer's speed due
Two or more processors to slowing down of other devices.
are used to solve a single Ø Positive impact on computer's speed due to
problem. speeding up of other devices.
Output Device w?
Ø Electromechanic Device Do you kno is measured
a co m p uter monitor
Ø Used to display the result processed by the
Ø The size
o f or, which
CPU. o n al le n g th of the monit
diag the size of a
Ø Able to display the result as hard copy or based on the in inches. Thus,
p re ss ed ide would
soft copy. is usually ex n g an d 9 inches w
2 inch es lo
Ø Example – Monitor, Printer, Projector, monitor is 1 .
Speaker, Plotter, etc. be 15 inches
(D)
Output Device
¯
¯ ¯
Soft Copy Hard Copy
(Which can be seen only) (Which can be both seen and touched)
¯ ¯
Display Unit or ¯ ¯
Monitor Printing Listening Unit
¯ Unit or Speaker
¯ ¯ ¯ ¯
Monochrome Gray-Scale Colour ¯ ¯
¯ ¯ Printer Plotter
¯ ¯
¯ ¯ ¯ ¯
¯
¯ ¯ ¯ Impact Non-Impact Drum Flat Bed
CRT LCD Projector Printer Printer
(Cathode (Liquid Crystal Display) / ¯
Ray TFT ¯ ¯
Tube) (Thin Film Transistor) / Dot Daisy ¯
LED Matrix Wheel ¯ ¯ ¯
(Light Emitting Diode) Inkjet Laser Thermal
¯
¯ ¯ Classification Monochrome Monitor
Vector CRT Rester CRT Ø Its display
¯ ¯ of Monitor
Three types of displayed with two
¯ monitor available colours
used in Hospitals based on its colour Ø One colour of the
background and
other one colour
Soft Copy of the visible object.
Ø Temporary output,
Projector
Ø It is an output device which is
Ø Full Form – Cathode Ray Tube used to show any type of image or
video on a white poster or wall.
Ø Another Name – VDU (Visual Display Unit)
Ø It was invented in 1895 by
Ø Available like a picture tube of a TV Lumiere Brothers, Auguste and
Louis.
Ø Phosphorus layer used on screen.
Focusing
Base System Y deflect
Phosphorus
Non-Impact Printer
Ø No physical contact between
Ø A character is present on each petal. print head, cartridge and paper.
Ø Ink powder used inside
Ø The wheel is rotated at high speed by a motor. the cartridge.
Ø Its printing is good. Ø Missing ribbon in this.
Ø Multiple carbon copy can be printed simultaneously. Ø Printing is done by
spraying ink by electrical or
Ø In this, a plastic wheel is used similar chemical method.
to the Daisy flower shape.
Ø Faster speed and less noise.
Ø When the correct letter position is
reached at the printing position, it is Ø Both black and colour printing is
struck with a small hammer. possible.
Laser Printer
Mother Board
Ø It is the main Printed Circuit Board (PCB)
link to which all components are connected.
Ø Visible like printer
device. Ø Entire computers orgranized around it.
Ø Used to print vector
graphics. Ø CPU, RAM, ROM, HDD, etc. are connected on it.
Ø Plotter used
instead of toner. Ø Input unit, output unit, CD drive, sound
Ø Pen, pencil, card, video card, TV card, Graphics card,
marker or etc. are connected.
other writing
devices are used to Ø Expansion slots are available for future
draw continuous connections of hardware device.
lines on paper.
Backbone
of Computer
Speaker Icon Main Circuit
Board of Computer
l The number of useful processing performed by the computer per unit time.
Throughput l Used to measure the performance of hard drive, RAM,
Internet and network connections.
prepared by the program to complete the assigned task, checks it, identifies
programmer to make a
computer perform a and fixes the bugs and consider the possibilities arising
definite and specific task. during the implementation (processing).
Note
System Application Executable Program
Software Software l The software that gives the desired
result by executing by the computer
processor (CPU).
l The extension name of this file is .exe
l To follow the instructions of the
Utility program are run, execute, process,
Software operate.
User
Users
Working implementation by
Application Software Application Software
Hardware Controlling By
Operating System
System Software
Hardware Hardware
Software
¯
¯ ¯ ¯
System Software Application Software Utility Software
¯ ¯ ¯
¯ ¯ ¯ Word Anti-virus
Operating Language Device Driver Processor Examples
System Translator Example Examples
Backup
Example Example Motherboard Spreadsheet
Windows Compiler, driver, Database program
Unix, Assembler, Keyboard Accounting File manager
Linux, Interpreter driver Pagemaker
Android, Printer driver Coreldraw
MAC OS Scanner driver Photoshop
Without it,
A set of programs designed to perform The sets of
the computer
It is the basic functions of a computer programs
is a lifeless are responsible
connected to system and make them functional.
machine. System for running the
Hardware computer,
Software
and Functions intermediate function Use controlling
Application between the computer and user, the used for tasks, managing
Software function of preparing background computer resources.
for application software. hardware.
l Source code is written by the programmer in a high level language which the computer is unable to
understand directly because the computer understands binary (0 and 1). For solving these types of
problems, language translator is used.
Assembler
Compiler Interpreter
l A language translator
l A language translator l Like a compiler,
program. program.
interpreter is also a
l Used to translate High l Used for assembling
language translator
Level Language (HLL) (converting) the program
program.
program into machine written in assembled
l Used to execute a
language. form or low level
program designed in a
l By translating the whole language into machine
program in one go, it is used high level language by
language.
to indicate all mistakes (bugs) converting them into
l Used to convert
in line order. machine language.
assembly language as
l Used to create an l Used to run or execute
mnemonic code into
executable program by each line of the program
binary code.
compiling the entire source by converting them into
program or source code into machine language line by
an object program. line.
Assembly Language
(Source Code)
¯
High Level Language Assembler High Level Language
¯ (Source Program)
¯
Compiler Machine Language (Object Code) ¯
¯ Interpreter
Object Program ¯
Important Facts Program Implementation
l Linux is also a powerful l Linux is available for free while l Limited usage of Linux
operating system like Windows. Windows is available for paid. compared to Windows.
Used to display all errors together. Used to display another fault by correcting
2.
an error after displaying it.
Serial
Operating System Embedded
Operating System
Distributed
Operating System
Development Batch
Based Operating System
Open/Closed Source
Operating System Network
Multiprogramming Operating System
Operating System
1
Serial Operating System
l In this, one by one tasks Job 1 Job 1
(Processes or jobs) are executed
serially.
Serial
Example
Job 2 Opera- Job 2 CPU
l MS DOS
ting
Drawbacks
System
l After completion of a process
(job), another are executed. Job n Job n
l Now, its use is negligible.
2
Batch Operating System
l In this, organizing similar tasks (processes or jobs) as a batch
and executing them in groups.
Example
l Payroll system, Bank statements.
Benefits
l All computer resources available for execution of jobs.
l Very little CPU idle time.
Loss
l Difficult to debug.
l If one job falls, the other job has to be stopped to wait for an
unknown amount of time.
Job 1
Job 1,
Similar Job 2 Batch 1
Job 3,
Job 5
Job n Job n
3
Embedded Device
Operating System Drivers
l Operating system to use
the processor located
inside an electronic device.
RTOS
l Present (stored) in ROM Embedded
(Real Time
(Read Only Memory). Firmware Operating
Operating
l Used in home System
Systems)
appliances like
microwave, washing
machine, DVD player, car
management system, Reference
traffic control, electronic Board Design
clock, etc.
4
Network Operating
System
Client 1 Client 2
l This operating system used
to run on a single server.
l Capable of managing data,
security, users, groups,
applications and other
networking tasks.
l On its private network,
access permission of sharing
files, printers, applications,
security and other functions.
Example
l Microsoft Windows Server 2003,
2008, UNIX, LINUX, Mac OSX, BSD File Server
Benefits
l Integration in new technology
and hardware system and centralized Client 3 Client 4
server security.
Loss
l Dependence on the central
location for expensive server,
more tasks.
5
Distributed CPU Disk CPU Disk CPU Disk
Operating System
l Capable of running various Memory Memory Memory
applications using multiple
processors and memories.
l Due to its use by many
users, its another name is
loosely coupled operating Distributed
system Operating
Benefit System
l When one system falls,
using the simplest of the other
systems are possible.
Loss
l Due to failure of the main CPU Disk CPU Disk
network, all communications stopped.
l Low availability due to being expensive. Memory Memory
6
Multi Tasking Operating System
l Used to perform multiple tasks (more than one task).
l All the tasks can be edited simultaneously after the processor has given all the
running programs (tasks) for some time.
l Actually assigning time to different processes by the CPU.
l The tasks are completed so fast that the user feels that all the tasks are
happening simultaneously.
Example Example
Linux, Google's Android OS Windows, Apple's iphone OS
Microsoft Windows
Processing
Software
l Used for Creating text document (Letter, Report,
Spreadsheet Books) Editing, Formatting, Checking grammar Desktop
Software spelling, Printing, etc.
Publishing
l Used to classify and l
analyze mathematical Abbreviation is
and statistical data in Presentation Accounting DTP.
the form of table (Row Software Package l Used in the
and Column. l Used for l Used in work and
l Facility to create presentation of various practice of
graphs and charts. information in the financial
publishing.
office, conference accounting,
l Used to create meeting, seminar, business l Used to
Ledger in Banks and etc. transactions enter and edit
Merchant l Example and general text data in a
establishments. MS Power Point, management. computer.
Presentation l Example
l Example l Example
Graphics, Libre Tally
MS Excel, Lotus, Smart Office Impress, etc. Microsoft
Suit, Open Office Calc, Publisher,
Libre Office Calc, Page Maker,
Apple Numbers, etc. Corel Draw,
Application
Software
Word Spreadsheet Presentation Database
Processing
Operating
System
Word Pad MS MS MS
MS Windows MS-Word Excel Power Point Access
Graphics
Database Cad Software
Software Full Form
Software l Used to built, l Computer Aided Design
l Used to store, modify modify and print l Used in engineering and specific
and classify data. graph, image, design, creating three dimensional
Example drawing, etc. (3-dimensional) design of map,
Example modifying and process
l MS Access, Oracle, understanding, etc.
l Paint Shop Pro,
Libre Office, Base, SQL Adobe Photoshop, Example
Server, etc. etc. Auto CAD, Auto Desk,
etc.
Differenece
between
2. User interaction impossible User interaction possible due to
System
due to running in Backend. running in Frontend.
Software
and
3. Able to run independently. Application Unable to run independently. For being
Software capable, system software is needed.
Utility Software
Advantage
takes less time to transfer over l Used to View, Edit, Print, Move ,
the network. Example JPEG, Copy, Delete and Modify the Files
MP3, MPEG and Folders.
of loss of data.
Anti Virus
Utility Disk Cleaner
Software Utility is used to l Through this, it is possible to
disable viruses that cause increase the capacity of the memory
system failures disk by removing the impurities and
unnecessary programs and data.
Disk
Disk Formatting Management Disk Fragmentation
l Major functions like Utility l It enables faster disk speed by
checking all the sectors of recording all the files on the disk.
floppy, hard disk or optical disk, l Able to improve memory
identifying bad sectors, preparing management by arranging
address table and free space between different
optimizing OS, etc. stored files.
Software Package
Definition
l A group of software designed
for a specific purpose.
Another Name
l Software Suit Microsoft
l Integrated Software Office
Other Freeware
Retail l It is available for personal
Softwares
Software use without fee.
l Which is l Available for free on internet.
available for sale in l Its full rights (copyright)
the market and is available to manufacturer.
manufactured for
use by paying a l Only manufacturer has the
reasonable price. right to change the source code
not the user has.
l Unavailable for sale.
Groupware
A utility software
developed for
Share Ware general purpose at Firmware
l Mixed form of software or
Software the convenience of
software and hardware.
l Used for a specific period of individuals. l Saves the hardware and
time, without fee. Example replaces it.
l Fee required for use after Online Chat, l Stored in permanent electronic
ending of the trial period. memory at the time of
E-mail, Voice Mail,
l Free available manufacture.
News group, l Software written in ROM,
on internet. Video Conferencing. PROM is its example.
Booting
Kernel
l The core point or part of the infrastructure of an operating system.
l Its main function is to establish a connection between software and hardware and
ensure the management items of equipment.
l Complete operating system based on the Kernel itself.
l Another Name – the source code of the software.
A set of
procedures designed
step by step to achieve
a desired result. l Able to
complete each
instruction in
l given time.
Its all Used to Small set l Each algorithm
instructions eventually
build of
must be Alogrithm terminates.
correct and ladders to instructions.
l At each
clear. solve the
completion, the
problems. desired result
must be achieved.
Logic required
to build a
program.
Example
Algorithm to print Step 4 : if A < 50 goto Step 2
all even numbers Step 1 : A = 2
Step 5 : if A > 50
from 1 to 50 Step 2 : Print A
Step 6 : Stop
Step 3 : A = A + 2
Start
Input A, B
Example Yes
If
of a flowchart to A>B
show a larger or
smaller number in
Print A Greater
two No
numbers.
Print B Smaller
Stop
Example
Process 1
Process 3
The oval symbol used Start and the Used to represent logic or questions and their results
End the process. (Yes or No) one or more options possible on this.
The parallelogram used for Used to indicate the direction of the flow
input or output. from top to bottom or left to right.
Process Connectors
Pseudo Code
1. Start
2. Input A, B
Example
Pseudo code to 3. Compare A and B
represent a larger
or smaller number 4. If A > B, Print A
in two numbers. 5. Else Print B
6. Stop
Pseudo Code
Machine
Language
(First pro l Di
d gra R sad
e da n m eq va
g
ta stan e.
Generation l
M on for e uires ntag
n ins uc he t a a e
va er in . Language) tru h d typ ch ta diffe
Ad und ach speed cti iffi e o sk r
sy
o
t by ing m deb ons cult f m and ent
Ea able ocess l The only language of
ug by p y in ach dep
gin re
l cap t pr g pa und ine. ends
F a s computer is capable by , mod ring ersta
l of understanding. hu ify pro ndi
ma ing gr ng
l Language written in binary (0 and 1). n. , et ams
c ,
l Computer is an electronic circuit which only
able to sense ON (1) or OFF (0).
l Another name for machine language is machine code.
l Computer processor is able to understand directly and execute
machine language.
l No translation software is required for this.
l Very fast program execution speed.
Assembly
Language
y l Dis
g e e ver e i n
(Second I a
is s ts pro dvan
n ta uag uag han Generation l
va ng ng t t c t
Ad ly la ial la s in i l ma ower essin age
Language) l c
ang Pro hin ha g s t
b qu m rs. uag gra e la n th pee
s semcollo rogra uage. e erro e e d ms ngu at o d
A to p g v o r
l se r ite e lan remo is m l epe wri ag f
clo r to w chin and age ine Re
q ma nd o tten i e.
ass uir chi n th n t
sie ma find langu mach l Mnemonic code em em ne. e t his
Ea t o l y n ble ent yp
l y b a . composed of letters and eo
s
Ea ssemable t guag
h e har r for of se f
l A n numbers (pre-defined words) d w s e p a
l read la used for programming in this language.
are para rate
. te
Example
'ADD' to add 'SUB' to subtract, 'LD' to load data into memory, etc.
l Computer is unable to understand this language.
Therefore, a translator named assembler is used to translate
the mnemonic into binary language.
l Another name for a program written in an assembly
language is source program or source code.
l Capable of converting machine language to object program
by assembler software.
Benefits
l The language used in colloquial l Use on different computers without any changes.
and writing (similar to human l Easy to write, read and understand instructions.
language) is more close. l Easy to create program, find errors and modify.
l Easy to understand by the user. l Closer to colloquial language
l Each high level language, set of so a few errors are possible.
predefined words and grammar
rules. High Level
l Computer is unable to Language
understand these languages. Third Generation
l A translator 'Interpreter' or Language
'Compiler' is needed to make it l Requires a different interpreter or
understandable by the computer. compiler for each language.
l Example – Cobol, FORTRAN,
Basic, C, C++, Java, etc. l Conversion into machine language before use.
l English language is used to l Its processing speed is slow compared to
write these languages. machine language and assembly language.
Loss
Do You Know?
l FORTRAN, the first high level language was created in 1954
by John Backus of the IBM Company,
but its commercial Version was released in 1957.
E s era
qu
n n
tai d ge
Re
con se con
It Th
e
LISP
l Developed in 1958-1960 by John McCarthy.
l Functional Programming Language used in the processing of
non-statistical data with artificial intelligence.
A group
of two or more Used to send
independent text, audio and
computers connected video data from one
together by different computer to
means of another.
communication.
Receiver Protocol
Benefits Protocol
of Network
delivering to
destination.
datagram.
Used to l UDP is
include the index and unable to recover
receiver's IP address in each of the it on being lost of the
datagram during
packets when split into multiple packets transmission.
during transferring data l Used to work together with the
IP protocol.
Transmission
Control Protocol (TCP)
Simple Mail Transfer
l Internet Communication Protocol. Protocol (SMTP)
l Communication impossible without TCP.
l Used to allow connection
and data transfer l With it, POP3 (Post Office Protocol 3)
between two also used.
l Both used for the same task.
TCP/IP are most
devices.
recover it when
l Where SMTP is
packets are
important
protocol.
Used to
used to
lost.
send mails,
POP3
l Able to is
guarantee data also
delivery by used
arranging packets to
correctly. receive mails.
l Suitable to work
together with IP.
Miscellaneous
l The world's first WAN developed by the l NICNET (National Information
Centre's Network), the network
defense department of America is ARPANET
connecting each district of India.
(Advance Research Project Agency – Network). l SWIFT (Society for Worldwide
l Established WAN in India for education is Interbank Financial Telecommunications)
ERNET (Education and Research Network). is linking banks internationally.
Baud
l The unit of
Nodes measurement of
Baseband
l End point or the speed of data l The
terminal of various transmission. communication
computers l It is measured medium in which
connected to in bps-bits there is less
the network. per bandwidth
l Able to act second. available for
both sender data transfer
and The first l Another
receiver. name –
computer
Narrow
network Band.
which was
said Ethernet,
was
manufactured
in 1973.
Simplex
Duplex
l Duplex communication
l A road on which system, a point-to-point system l Duplex
traffic can flow in consisting of two or more connected communication
both directions. parties or devices capable of system is able to do
communicating with each other in better performance
both directions. than Simplex.
Foil Twisted
Braided or Shields Pairs
Jacket Foil Shield
Insulator
Inner conductor
Outer conductor
Plastic cover (shield)
Fibre Fibre
Coating Steel Strands
Copper Pipe
Central
Strength Element
(Core)
Cushion water-blocking
Layer barrier
Polyethylene Sheath
Ethernet Cable
Data
Transmission Service
GSM
l Full Form – Global System for Mobile
communication DSL
l Most prevalent standards for
mobile phone operation. l Full Form - Digital Subscriber Link.
l International Roaming facility available l Telephone line used for Digital Data
without changing the phone. Transmission.
l Done by GSM only at low cost through l Always connection of the computer to
SMS (Short Message Service). the network for this DSL Modem used.
l No need to dial to establish contact.
l ADSL – Asymmetrical Digital
ISDN Subscriber Link and SDSL –
Symmetrical Digital
l Full Form - Integrated Service Subscriber Link used for data
Digital Network.
communication.
l No need for modem due to digitally
data transmission.
l Transfer of voice, data and image
without noise.
l Talking is possible on phone even if CDMA
it is connected to the internet.
l Developed form of Dial-up Line.
l Full Form - Code Division
l Two channels of 64 Kbps (bearer lines) Multiple Access.
(total 128 Kbps) and delta channel of l Technology based on 3G (3rd Generation).
16 Kbps are used for commands l Used in mobile phone operation.
and data.
Wireless
Broad Band
l Dial-up Line established and used like telephone line with the help of modem.
Synchronous Asynchronous
Transmission Transmission
wo or more analog or d
y w hich t igit
qu eb o n the same communicatio al sign
hni fully nm
edi als is
r tec ccess l em e n t th i s t echniq um ab
do su imp . le
o s ed to ue i
s mu to
u
eth vi ce ltip
se
e
m
le x
ed
nd
A
h er.
T
Multiplexing
&
Its Types
1. 2. 3. 4.
FDM TDM WDM CDM
(Frequency (Time (Wavelength (Code
Division Division Division Division
Multiplexing) Multiplexing) Multiplexing) Multiplexing)
Switching
Technique
¯
¯ ¯ ¯
Circuit Switching Message Switching Packet Switching
¯ ¯ ¯ ¯
Space Division Time Division Virtual Circuit Datagram
Switches Switches Approach Approach
¯ ¯
Switched Virtual Permanent Virtual
Circuit (SVC) Circuit (PVC)
Source Address
Number Such a switching technique in which a
Size point to point physical connection is
Message Circuit established between two or more devices.
Switching (sender and receiver).
Destination Example - Telephone
Address
l Store-forward technique used.
Switching
Switching
Source Address stored in network node.
techniques
Number are used to allow all l Message forwards to the next node when
Size computers connected to the communication channel is free (empty).
the network to share Example - e-mail
Message
the available
Destination communication
Address l This also based on store-forward technique.
channels l Transmitting information or data by
dividing them into packets.
Source Address l Source and Destination Address, number
Packet of packets, size, etc. are displayed on each packet.
Number
Switching l Different packets are likely to reach the
Size receiver at different times using different media.
Message l Finally converting the collected packets
back to the original information according
Destination
to the packet number.
Address
1 2 3 4 5 6
Bus Ring
Topology Topology
l All nodes of one cable l All nodes formed by
(Transmission Line) connected joining rings or loops
to each other. (two end points) to each other.
l Transmission to a particular l Each node is able to
address by dividing the data send and receive data from
into packets using the its nearest node.
Ethernet Protocol.
Network
Topology
Methods of
Interconnecting
different nodes or
terminals.
Tree
Hybrid
Topology
l Characteristics of both Topology
star and bus topologies l A combination of
are present. two or more
l A host or hub like (other) topologies.
star topology and all nodes l It includes
like Bus topology Bus, Ring,
are connected Star, Mesh, etc.
by cable. topologies.
Mesh Topology
l Building and maintenance is expensive.
l More cables or wires required.
l Requires a large number of input/output Loss
ports to connect all the devices present
in the network.
Do
You Know?
l
A mixer of different topologies
was used due to
their advantages and disadvantages of different
network topologies, which was
called Hybrid Network Topology.
Bridge
Network Gateway l Used to maintain data
l Used to connect two filtering, signal,
networks or traffic, etc.
LANs using different l Two ports incoming and
protocols. outgoing are
l Another Name available.
Protocol l Used to transmit data by
Converter. checking data packets and
destination
address.
Repeater Router
l Used to send weak l Used to filter
signals over a long distance data based on IP address.
before they are destroyed to a l Its function is to deliver
certain extent by replicating and the data to the specified address
re-generating. Internetworking by the shortest and
l Useful in modifying the data Tools or fastest route.
signal through communication l Used to transmit
medium and sending it back
Devices data in
to the communication right direction through
medium. routing table.
Switch Hub
l Used to connect l Many ports
network devices and available in it.
segments l Used to send
among each other. data packets
l Used in coming from
Data Link Layer of one port to
all other ports.
OSI model.
l It is a function of
l MAC- Passive Hub to provide
Media Access Control a route for data.
is able to transfer data l In addition to the route of
you have to the data monitoring is the function
destination by of the Intelligent Hub.
reading Address. l The function of the
l Procedure Switching Hub is to
like a transmit the packet by
bridge. identifying the
address.
Difference between
Intranet Internet, Intranet
l A network established
within a private or institutional and Extranet
office that uses TCP/IP,
Gateway, Firewall or coding to Internet
prevent unauthorized person l Used by everyone.
from access. l No Username and
l Example of Virtual Private Network. Password required.
l Security depends on
Internet user's device.
l World's l Public Network.
Extranet Largest
l Able to Network net
l All computers Intranet
use by users
other than are connected l Firewall dependent
members to the l User name and Password
and staff of the Global Network. is required by only one
organization within l Full Form - organization.
a private or Interconnected l Private Network.
institutional Network.
office like an intranet. Extranet
l Users need a special l By more than one
Username and Password organization.
to use it. l User name, Password is
required.
l Firewall dependent.
l Private network.
Development of Internet
Domain Name
Registers
l Organization providing domain
names for internet use.
l Used to provide a uniqe domain name
to each individual or organization
on internet.
l It is determined by ICANN
or
ISOC ccTLD
(Internet Society) (Country Code IRTF (Internet
l Non-profitable Top Level Domain). Research Task Force)
international organization l An institution used to
formed in 1992 to develop promote the investigation
and educate standards, & research, improvement in
protocols and policies internet's activity
of Internet. in the future.
IAB W3C
(Internet (World
Architecture Wide Web
Board) Consortium)
l Rules l An
ICANN determined international IETF
(Internet by ISOC used organization (Internet
Corporation for the technical used to determine Engineering
for Assigned and engineering the standards for Task Force)
Names & development work the use of the l An
Numbers) required for the world wide web. institution
l Organization Internet. used to
established in promote
1998 to provide IP internet use
Address and Domain and develop their
Name and determine standards.
their standards.
l Set of rules and standards used to enable errorless data exchange between
two or among more computers in any network.
l A set of rules and guidelines used for systematic and safe data transfer.
Protocols
used on Internet
TCP/IP HTTP
(Transmission (Hyper Text
Control Protocol / Two Transfer
Internet Protocol) versions of Protocol)
l TCP used to transmit l This protocol
data dividing it into IP Address used to
small packets l IPv4 Address transfer
l IP used to transmit Version 4 web pages
each packet by giving it a l IPv6 Address on www.
special address to destination. l Able to operate
Version 6
l TCP is used to the http used
resemble the packet before any
in the website on
correct orders at the web browser
destination.
SMTP FTP Telnet Gopher
(Simple Mail (File Transfer l This protocol l Protocol
Transfer Protocol) Protocol) is used to display software
l Protocol used to l Protocol used to data and files of used to
transfer email upload, download, local computer by search,
from the user's rename, move, copy, command line receive
computer to the delete large files interface on and display
server and again (Data, Text, local computer's documents
from the server Graph, Image, Audio monitor by executing from
to the & Video) on by Remote remote computer
client. server. computer. via internet.
Computer
Network established
National Knowledge by Government of Educational & Research
Network India Network
l Interconnection of educational l Network connecting
and knowledge-based main educational and
State Wide institutions among research institutions National
Area Network them by more together Information
l A network connecting than 1 Gbps established Centre Network
upto high speed capacity communication by l This NICNet network is
(2 Mbps) from the headquarters institutions. Government. useful in the development and
of the states and union territories of management of government
to the block level under e-governance India. websites connecting all states and
plan by Government of India. district headquarters in India.
ing
Me ssag
tant Entertainment
Ins
News Group
Internet Telephony
tting Usenet
Cha
E-Business E-Governance
l Lack of affinity.
l Saving papers.
adverrtisements.
violent images.
multiple users.
or Video files.
Photo, Audio
non-desirable
Benefits
l Use of
the virus.
message.
Inventor Loss
l Ray Tomlinson
l Year - 1971
l First use of the @ symbol by Ray Tomlinson.
E-mail Address
Email @ domain
User Name @
l A name given by the user. l Its name
at symbol Password
l A user name can be used only
once on e-mail server. which is
able to Password
l Maximum 64 characters is possible. join in (again)
l Case sensitive means using e-mail
Capital and Small automa-
Letters. e o tically.
a m a b le t l Able
a in N r that is to
Strength
(Why?) Very weak (0/100)
Password
Generator
Dom the serv account. f
e
separate
of ail es o username
n ame de e-m the typ and
A v i l
l pro e to tel ge. domain
Abl pa Mailbox Quota : 250 MB
l web name.
Unlimited
Syntax
[username] @ [mysite].domainname.extension Create Account
Major websites
providing free
E-mail ccounts
64 255
www.gmail.com
www.yahoomail.com
Maximum Maximum www.hotmail.com
characters in characters in www.rediffmail.com
User Part Domain Part
[email protected] Letter from A to Z,
[email protected] digits from 0 to 9 and
[email protected] Special Symbols.
" "@example.org
rs
Exa
mp No space a r acte ss
les Ch addre
o in ail
add f an e e- m
ress -ma d in
il E-mail Address use
Parts
of an
E-mail
Message
2. 3.
Message Body
Envelop
l l
The envelop Header contains
contained the address sender, receiver,
of the sender and route to
the receiver. inbox and various
l l authentication
Currently, it is used Message body, information.
in header only. a part of the
message that
is used to
compose
the message.
Important Facts
Web Based
Available free Web Based e-mail Impossible to work
E-mail Account without internet connection.
POP based
e-mail
Able to generate mail even offline
(without internet connection). Able to open e-mail only
on computers
that are connected
Low internet data usage even Benefit Loss to the internet service
when connected to internet of of provider's server.
connection.
Security of an
E-mail
Avoid opening Avoid sending personal Avoid replying to Always logout while
suspicious e-mails or information to spam e-mail closing the e-mail
attachments. e-mail. messages. account.
Do not share e-mail password with anyone but keep it safe and change it from time to time.
Internet Revolution
Instant
Telnet Messaging
or
Remote
Login
l A form of online
chat that
l The facility of
using a remote computer enables instant
while sitting at your l live conversation
computer. Meaning between two or more
l For its use, the user must Telephone people on internet
have login Password l Network by sending a text
of the remote Used to message.
computer. provide
access data,
information and l In this, the message
resources located on a receiver is also able to
remote computer reply the
connected message immediately.
to the internet by a
local computer.
l It is useful in sending
Images, Audio, Video
Telnet Client Telnet Server files along with text.
Free, cross-platform,
cloud-based, instant
messaging, video WeChat
calling and VoIP
service.
Internet
Telephony
An instant Developed
messaging and as Facebook
software Chat Use of soft phone application software
application. in 2008.
Use of Mic and Long distance l
Headphone/ conversation A type
l Speaker for possible at of Internet
Facebook
Use of VoIP conversa- low service with
Messenger (Voice over tion. cost. the help of
Internet Protocol) which it is possible
for voice to make calls with the
The company transmission. help of internet even
revived in 2010 Useful for l without SIM card
and released as a chat and group Instead of ISP (Internet l
standalone chat. Service Provider), VoIP Able to work with the
iOS and Android Service Provider help of Internet
in August, 2011. used. protocol.
Chatting
With the help of Conversation between
computer and internet, two two or more people connected 3
to the internet through a
or more persons located at different
mic or keyboard.
places are able to communicate among
each other through live video and audio
medium as if they are sitting
together. 2
l Chatting used by
microphone and speaker.
1. B2B
(Business to Business)
l Electronic business
between two
companies.
2. B2C 3. C2C
(Business (Consumer to
to Consumer)
Consumer) l Business between
l Electronic two consumers.
l Buying business l Doing
E-Commerce l Example
and selling not between Online
only objects and OLX (Online orders by
company l Operating any
services but also eXchange) consumer,
and business/
establishing contact consumer. Like - eBay, paying price
with customers and occupation Amazon, and delivering
merchants, advertising by using Online products
products and completing Shopping. to consumer's
basic infrastructure, etc. internet home by the
are its major tasks. services. company is
possible.
l
Abbreviation
for Web Log.
l Posting contents on
Social Networking Site.
Internet Protocol Watching Live relay
l Idea, audio, video, photo, etc.
Television mentioned in the content.
l A system where
it is available Watching time
shifted
to broadcast television,
programmes at The Blog Blogger
watch them name is the
convenience. name
on computer of writing
and posting of content
using the internet. poster.
content is
l IPTv capable of Watching the program of blogging.
providing your choice through
VoD (Video on Demand) Another name
three types Online Diary
of facilities.
l RSS
(Really Simple Syndication)
format and Word Press
Software are used to
and publish blog.
Blog ing
g
Blog
l Ph
l A to Blog
In Personal Business / Corporate Blog
or
rt Blo
o
Micro Blog
Hobby,
g
It is used Combined Life Style /
Professional
l Multimedia
Blogging
Blogging
Personal
to write Types blog of
Fashion Blog
Blog
and of Business
post Blogs and Affiliate /
story, Personal
l
l V
Review Blog
idea and Blogs.
Food Blog
ideo
experience its Reverse Blog
Blog
own by bloggers. News / Travel Blog
Internet Internet
in in
Education Medical
Fields
ducting ital
l Con ment. y hosp
l Easanagement nsultation
govern rcial and line.
m cost co
comme ng exams on AT, l Lowreign doctors
banki - CAT, GM by fo g at home ords
l A s k , sittin atients' rec
C i v i l , Ban l P vailable.
SAT, y , e t c . easily a Help in new
Railwa l ons
l In inventi
Games
l In online
ility of urses overy
Justice and
l F a c
o r c o E a s y of disc of
gf l ty
Law
trainin ftware, ailabili
l In sales tax k e s o e b and av edical
li king, w y new m logy and
department networ logy, compan techno h manageme
nt.
l In Income Tax te c h n o c
ry, etc. resear
department secreta
l In agriculture
department
l In Aadhar Card, PAN of Live ernet is
Card, Computerization r r a n g ement ion, Fees, l U s e of int ir travelling,
l A es Admiss t, etc. e in a hone
l In voting and censusing Class , 3-D Projec us possibl velling, telep
rail t r a eo
l In meteorological Record ible by vario on, vid
Uses department is poss ities operati encing, file
of l In engineering univers at home. confer , web
sittin g sharing asting, etc.
Internet department broadc
lIn marketing and
in other communication
fields
Pictorial Representation 101 GS Drishti Computer : An Introduction
Netiquette
l Etiquette,
Netiquette or Internet +
etiquette.
l Expected and courteous
Flame behaviour used for Flash
l Use of undesirable exchanging information l Useful software
and derogatory parts by Video games.
during E-mail, Chatting,
by internet
users during e-mail, Video conferencing. l Software developed
chatting or by Macromedia company.
video conferencing. l Used to display, animation,
sound, interactivity, etc.
on web pages.
Youtube
l Video sharing
website/platform
powered
by Google Inc. Acronyms
l Used for uploading l Abbreviations prevalent
video, downloading, The in computer communication
viewing, sending by term during news groups,
e-mail, commenting, etc. e-mail or chatting
l Initiation of Youtube 'Social Network' As-
in 2005 by three was coined in ASAP - As soon as Possible
employees 1954 by
of the Pay Pal company - FYI - For Your Information
Chad Hurley, J.A. Barnes IMO - In My Opinion
Steve chan BTW - By the Way
and LOL - Laugh Out Loud
Javed Karim. TIA - Thanks in Advance
l
ne Wo ac
F
t t er orking .
tw rld eb i w ng
Ha sta orkin 's la ook Twal net bsite. loggi rt
g rg i
r r
M Mar vard ted i fre est S oc e we cro b sho 0
cC k Z C n e s so
oll uc oll 200 ite cia l fre s mi send ly 14 tly
u k e 4 t l a to ial ren s
l Ed m, D erbe ge s by hat U sed sed init cur riend
t f d f
Op C uard usti rg, A uden l l U ets o s an s to ,
era hri o S n M nd ts. e e r e r rs
l ted s H av os rew tw ract ract ishe rs. rm
u e c a a e
Us
e C by gh in, ovitz
r
Emoji ch 0 ch ill w llow he te
all d fo omp Face es , 2 8 w f o dt
ov r m any bo l Other name a nd ieve of
er ak . ok h S '.
u t
co pto keep he w ng f
i Inc Ac 'SM rnet
. Emoticon which is l e
m d
me mu ate, ing orld, iend
r Int
s ni cr s formated by Emotion + icon.
on sage ty, c eatin
lin s, ha g l Used to express emotions with
e g pla ttin
am yin g the help of letters and symbols
es. g
during e-mail and online chat.
Name - Facebook
Establishment Year - 2004
1 Founder - Mark Zuckerberg,
Eduardo Saverin, Andrew McCollum,
Dustin Moskovitz, Chris Hughes.
Current CEO - Mark Zuckerberg
Name - Twitter
2 Establishment Year - 2006
l Able to open Homepage as soon as Founder - Jack Dorsey
you type www.facebook.com Current CEO - Parag Agrawal
on web browser.
l To create an account on it, user above
13 years of age must have an e-mail ID. Name - Youtube
Establishment Year - February 14, 2005
3 Founder - Chad Hurley,
Steve Chan, Javed Karim
Current CEO - Susan Wojcicki
Name - Instagram
Establishment Year - 2010
4 Founder - Kevin Systrom, Mike Krieger
Current CEO - Kevin Systrom (Earlier),
Adam Mosseri (since 2021)
Name - Whatsapp
5 Establishment Year - February 24, 2009
Founder - Jan Koum and Brian Acton
Current CEO - Will Cathcart
l Twitter started in 2006
by
Jack Dorsey, Biz Stone,
Evan Williams, Name - Linkedin
Noach Glass. 6 Establishment Year - May 5, 2003
Founder - Reid Hoffman and his friends
Current CEO - Ryan Roslansky
Name - Quora
Establishment Year - June, 2009
7 Founder - Adam D'Angelo,
Charlie Cheever
Name - Telegram
8 Establishment Year - March, 2013
Founder - Pavel Durov, Nikolai Durov
Current CEO - Pavel Durov
Difference
Use of TCP / IP protocol by internet between Fees payable to ISP for internet usage while
while use of HTTP Protocol by www. Internet free facility is available though www.
and
www
Internet
Protocol Adress f
l A dress o
unique numeric address to e s a m e IP Ad
to b s.
ossible mputer uter by
identify each device (computer, server, printer, l Imp any two co to each comp
smartphone) connected to internet. ess er).
i n i n g IP addr rvice Provid
a e
l Obt P (Internet S
IS
Application Layer
Responsibility of the Host
Presentation Layer
The fifth number layer is used to
retransmit by availing a session
between two devices Data
when an error occurs in
data transmission.
Session Layer
The fourth number layer
is used to
transmit data packets Segments
by communication
between two computers.
Transport Layer
Sender
The third number layer
is used to transport
packet - group from source to Packets
Receiver destination by switching and routing
techniques.
Network Layer
of the Network
(Media Layer)
Responsibility
Physical Layer
Benefits of
Web Applications
XML PHP
l Full Form - Extensible Markup l Full Form - Personal Home Page.
Language. l Software language used in
l Language used to create web pages. development of Dynamic web pages.
l Its main function is to store data l The PHP language developed
and transfer it to another computer. in 1994 by Rasmus Lerdorf.
Use of Use of
32 bit 128 bit
number number
Divided for for Divided by
by three dots (.) address address seven colons (:)
Abbreviation Abbreviation
IPv4 IPv6
ddress
Private IP A
Types of
Used to assign and protect IP Address Able to assign network
network routers of private Router by ISP and connect
home or office. to the Internet.
Class A Class B
4
Domain Name
System - DNS 2
l Domain Name,
Not case
sensitive.
That is to type in any l Non-Geographic Domain :
Another Name - Generic Domain or
capital or small letters
Top Level Domain (TLD)
3
but got the same results. Example - .info - information
Example .co - company | .int - international
google.com or .gov - government | .org - organization
GOOGLE.COM .mil - military | .net - networking
yahoo.com or YAHOO.COM .com - commercial | .edu - educational
hotmail.com or
HOTMAIL.COM
ftp://info.apple.com/design.html
1. Name of Protocol 1 2 3 4
http://www.google.com/html/index.html
2. Colon and two Slashes (://) 1 2 3 4 5
l l
3. Name of the Server Used in Each
typing into website
web browser's contains its
4. Directory Path address bar. own separate
URL of any web
5. Name of File page.
l A
Its main function is to specialized
find and obtain the address of any
desired information. website or web page
on www.
URL
l Full Form - Uniform Pay special attention during
Resource URL typing capital and small
Locator letters because of
l case sensitive.
Possibility l
of words, Use
numbers of space URL Top Level
or in URL is ¯ Domain
punctuation impossible. Subdomain
¯ (TLD)
signs
in it.
http:// www . google . com
¯ ¯
Hyper Text Domain
Transfer (name)
Protocol
Internet Mozilla
Explorer Firefox
Web Browser
Google
Chrome
UC Browser
Example Example
Microsoft Conqueror
Edge
Opera
Lynx Opera Safari
Mini
l A software
l Proficient in accessing program or application. l Able to run
web pages on internet l Used for finding websites, animated contents.
l Able to find and display accessing them, l Able to handle Text,
any types of websites. reading content, Images,
l Able to follow accessing, Links, Audio and
Hyperlink. etc. Video.
Safari
l Developed on January 7, Microsoft Edge
2003 by Apple Corporation. l Developed on
l Installed in Macintosh OS April 29, 2015 by
and useful for iphone Microsoft Corporation.
and ipad.
Opera
l Opera was developed Lynx
in 1995, l Developed as
is available in more than 40 Hyper Text Browser
languages. in 1992
by a group of University
of Kansas students.
Flock
l A closed web browser based
on Google Chrome which
is suitable for integrating
Netscape Navigator
Facebook, Twitter l Web browser popular in
and Youtube. the 1990s which was developed
l Flock was developed in by Netscape
2005 by Inc. Communication
Corporation.
Yahoo Ask.com
1 2
Crawling Indexing
Anti-Virus
Principles
Authentication of Confidentiality
By identifying the Network Security Confidentiality
person or party, required from
the authorized
unauthorized access
person is able to
to the transaction
access
information of personal or
secured by business related
User's Name and communication
Password. and information.
In y
co I te i lit
rre ac nclu gr
an sha ctn cur sion ity ai lab ble
ssi ation
d t re ess ac
h d y of Av o
P rm ity son
or
ac e re bet of i and o b i l r
ce ce w nfo
ssi iv ee inf aila d pe
ble er n s rma v
a riz y. e
by whi end tion o rt
an ch er a uth pa
yo is r
ne no fo
. t
Cyber Crime
l Illegal act or offence
committed through internet or
Cyber Space online medium. Cyber Warfare
l Computer l Internet is its biggest tool. l Stealing, destroying
l Harming computers, or damaging personal,
communication network
networks or data.
Example
l Sending a secret and sensitive
spread around the world
number of e-mails. data, intercepting
and the store of communication, etc.
l Using the network
information spread by a country (nation)
on unauthorized access.
around it. l Obtaining and causing by
harm to personal and entering another
secret information. country's computer
l Displaying viruses, economic network.
crimes, illegal and anti-social facts
and pictures.
l Meaning - l Functions -
Unsolicited / Irrelevent Spam By creating Fake Accounts on
e-mail Whatsapp, Blog, E-mail, Twitter,
or Facebook, Website, etc, stealing
message. Client's information
through false links and missing
it for bad purposes.
Types of Spams
Proxy Server
l A type of computer router that is used to transfer data
between clients and servers, prevents attacks on private network, and
acts as filters between clients and servers.
Functions of
Proxy Server
l Restrict unsolicited web pages or
websites, control Malware and Virus, maintain server's privacy, etc.
Ab
chec le to ac
k ta
thro ing inc s gate
ugh om by
and user's ing dat
pass n a
wor ame
d.
l Virus effect
A small harmful on Computer
(malicious) program l Re-booting
computer automatically.
is used to create and l Slow down the speed of working.
spread its own copy itself, delete data, l Frequent hanging.
corrupt, alter, slow down speed, l Files getting corrupted.
reduce disk capacity, l Unusual wrong page
opening on web browser.
stop running software, etc. by
l Messaging wrong information
entering the computer. of memory status
and size.
Virus
Rootkit
l Most dangerous form of malware.
l Collection of installed applications, not a part of malware.
l Able to free the rootkit's creator (hacker) to do anything at the operating system level.
l It contains the ability to control the system without the user's command.
l Difficult to detect it in the system.
l It has more power over the system than other applications.
l Once installed in the user's system, the creator (hacker) is able to control
the system remotely, run its own file, change the system configuration etc.
Polymorphic Virus
2. 3. CMOS Virus
Rabbit Virus
Virus
spreading rapidly by
Malware copying itself in the free
space of computer
memory.
Worm
High
possibility to be crash
infected memory
by worm.
l A malicious l
software program The use of spyware
by
some companies
l Used to steal e-mails, and organizations to
user's names, monitor
passwords by the activities of their
entering into computer employees.
as a spy against
computer user
Spyware
(without permission)
and give it to the person
or group sending
malware.
Hackers Crackers
Trojan Horse
A person tampering Used to break in
with data or network security, l Virus that harms
software by steal password
entering a and commit the user by running
network for illegal acts. on the background
pecuniary gain.
of the computer, posing
as a game, utility, etc.
The purpose of Another name of
hacker's is to Cracker l Virus used to
expose the flaws Black steal data by acting
in the network Hat
system. Hacker Hacker. as a spy.
used for crime or
pecuniary gain.
Time
Bomb Virus
l Software to be
run (effective) on a given
date or time or event.
Another name - Logic Bomb due to run
on a logic (condition)
Example
"Happy Birthday"
"Jerusalem Virus"
"13th Friday"
Password Scare Ware
Cracking l Virus program that
l With the help of the enters the computer as soon as
password cracker program, the user downloads it when
by detecting the coded password the hacker is tampted to
in the encrypted form and download free antivirus
using it for illegal and or
authorized free software.
actions. Packet
Sniffing
l Recording and
misusing data packets
by
identifying them before
reaching the
destination.
Antivirus Software
AVG Advantage
Such software A program used to check
Norton McAfee a software.
programs
designed to identify, e-mail or internet file, destroy/
delete it when a virus is detected,
Symantec
User Cryptography
Three Bases of Original data always
Authentication Internet Security available to
Authenticity authorized
checkup person from the
by possibility of data theft
verification of
Access Control
and data leak by
user's l Ensuring availability encryption (change data
Login ID, of data or information through to secret code) and
Password, user's finger print, decryption (change
Secret code, voice recognition, from code to normal
etc. electronic card, etc. data) method.
User Identification
User Name
Ways to Protect Passwords
and Password l The following methods are
l A confidential digital presented to avoid
the high possibility
code capable
of password
of restricting unauthorized
leaking by fraud or
user access to data, repeated attempts
information or programs. (Trial and Error Method)
l Used to allow access to on the Network.
computer data
or networks only to
authorized users.
Using a mixed form of Change and
letters, numbers and remember the
special symbols and password at
Biometric keeping the regular intervals.
length large.
Technique
l Technique to establish the
identity of the user
by using
the parts of the user such as
Finger Prints, Retina
and Iris,
Facial Pattern,
Voice, etc.
Not to share
password with anyone
and not to write
Using a mixture it anywhere.
of capital and
small letters.
D : Digital Versatile
A : Android B : Bluetooth C : Computer Disk (DVD)