Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
53 views
33 pages
CSC Final Part-1
Uploaded by
Yahaya Sunday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save CSC Final Part-1 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
53 views
33 pages
CSC Final Part-1
Uploaded by
Yahaya Sunday
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save CSC Final Part-1 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save CSC Final Part-1 For Later
You are on page 1
/ 33
Search
Fullscreen
“INTRODUCTION TO THE INTERNET Internet is the : bene. types that belong to multiple networks, The Interne i a global communication system that links together thousands of indiviguay networks. It allows the exchange of information between {wo or more computers on a network. Thus intemet helps in the transfer of ‘messages through mail, chat, video & audio conference, etc. It has become mandatory for day-to-day acti ies: bills payment, online shopping and surfing, rutoring, working, communicating with peers, etc. Intemetis a group of computer systems related from all around the world. The Internet protocol suite is a framework defined through the Internet standards. Methods are divided right into a layered set of protocols on this architecture. The Internet gives a huge variety of statistics and communique offerings, which includes forums, databases, email, and hypertext. It is made of the neighbourhood to global personal, public networks connected through plenty of digital, wireless, and networking technologies 1.1 Working on the Internet The internet is a global computer network that connects various devices and sends a lot of information and media. It uses an Intemet Protocol (IP) and Transport Control Protocol (TCP)- based packet routing network. TCP and IP work together to ensure that data transmission across the intemet is consistent and dependable, regardless of the device or location, Data is delivered across the internet in the form of messages and packets. A message is a piece of data delivered over the internet, but before itis sent, itis broken down into smaller pieces known as packets IP is a set of rules that contro! how data is transmitted from one computer to another via the internet. The IP system receives further instructions on how the data should be transferred using @ numerical address (IP Address). The TCP is used with IP to ensure that data is transferred securely and reliably. This ensures that no packets are lost, that packets are reassembled in the correct order, and that no delay degrades data quality. 1.2 History of the Internet The ARPANET (later renamed the internet) established a successful link between the University of California Los Angeles and the Stanford Research Institute on October 29, 1969. Libraries automated and networked catalogs outside of ARPANET in the late 1960s, TCP/IP (Transmission Control Protocol and Internet Protocol) is established in the 1970s, allowing internet technology to mature. The development of these protocols aided in the standardization of how data was sent and received via the internet, NSFNET, the 56 Kbps backbone of the internet, was financed by the National Science Foundation in 1986. Because govermentmonies were being used to admin: - | dminister and maintain it, there were commercial restrictions in place at the time, 1991, a user-fri {nthe year 1991, a user-friendly intemes interface was developed. Delphi was the first national commercial online service to offer internet connectivity in July 1992, Later in May 1995, All reotnctions of Comercial Usage of the iniemet ate lifted. As a remult, the internet has been able to diversify and grow swiftly, Wi. was first introduced in 1997, The year is 1998, and Windows 98 is released. Smartphone use is widespread in 2007. The 4G network is launched in 2009. The internet is used by 3 billion people nowadays. By 2030, there are expected to be 755 billion intemet users and 500 billion devices linked to the internet. 1.3 Uses of the Internet, (i E-mail E-mail is an electronic message sent across a network from one computer user to one or more recipients. It refers to the intemet services in which messages are sent from and received by servers. Gi) Web Chat Web chat is an application that allows you to send and receive messages in real-time with others. By using Intemet chat software, the user can log on to specific websites and talk with a variety of other users online. Chat software is interactive software that allows users to enter comments in one window and receive responses from others who are using the same software in another window. Gil) World Wide Web ‘The World Wide Web is the Internet's most popular information exchange service. It provides users with access to a large number of documents that are linked together using hypertext or hyperlinks, (iv) E-commerce E-commerce refers to electronic business transactions made over the Internet. It encompasses a wide range of product and service-related online business activ (v) Internet Telephony The technique that converts analog speech impulses into digital signals and routes them through packet-switched networks of the internet is known as internet telephony,(vi) Video conferencing The term “video conferencing” . NB’ Tefers to the use of voice and images to communicate amongst users. (vii) Web Client The client (or user) side of the Intemet. The Web browser on the uuser’s computer or mobile device is referred to as a Web client. It could also apply to browser extensions and helper Software that improve the browser's ability to support specific site services. (viii) Web browser A web browser is a software program software that searches for, retrieves, and presentations ‘material which includes Web pages, photos, videos, and different files. The browser sends a request to the Webserver, which then transmits the statistics retumed to the browser, which Presents the findings on the laptop. Mozilla Firefox, Microsoft Edge, Google Chrome, and others are examples of internet browsers. (ix) Webpage ‘An intemet web page (additionally called a web page) is a report that may be regarded in an intemet browser on the World Wide Web. HTML (HyperText Markup Language) and CSS (Cascaded Style Sheet) are used to generate the primary shape of an intemet web page. An internet web page is generally a segment of an internet site that carries statistics in plenty of formats, which includes textual content in the shape of paragraphs, lists, tables, and so on, The home web page is the beginning or first web page of an internet site. It gives trendy statistics and connections to all the internet pages which are associated. Every intemet web page has its deal. This may be visible inside the deal with the bar. As a result, if we need to get admission to a selected internet web page, the deal needs to be placed inside the browser’s deal with bar. (x) Website ‘An internet site, in trendy, is a group of statistics approximately statistics prepared into many internet pages. An internet site is probably made for a sure motive, subject matter, or o provide a service. An intemet site (abbreviated as “website” or “site") is a group of online pages connected collectively through links and saved on an internet server. By clicking on links, a tourist can pass from one web page to the next. An internet site’s pages also are connected below one area call and proportion a not unusual place subject matter and template, (xi) Search Engine Search engines are websites that search on the internet on behalf of users and show a listing of results. More than actually written may be discovered on seek engines, You can be capable oflooking for different onli i tock 'end Galine content material which includes photographs, video content terial, books, an i: . . mat NeWs, in addition to gadgets and offerings, relying on the seek engine you are the use of. 1.4 Difference between Network and Internet ‘The number one distinction between a network and the intemet is that a network is made of computer systems that are bodily related and may be used as a personal laptop atthe same time as additionally sharing records. The Intemet, on the alternative hand, might be an era that connects those small and massive networks and creates a brand new in-intensity community. 1.5 Advantages of the Internet: (Iti the best source of a wide range of information. There is no better place to conduct research than the internet, i) Online gaming, talking, browsing, music, movies, dramas, and TV series are quickly becoming the most popular ways to pass the time. (Gi) Because there are hundreds of thousands of newsgroups and services that keep you updated with every tick of the clock, the Internet is a source of the most recent news. ») Because of virtual shops where you may buy anything you want and need without leaving your house, intemet shopping is becoming increasingly popular. Recently, virtual shops have been making lot of money. 1.6 Disadvantages of the Internet: (Spending too much time on the internet is hazardous for the young generation’s health and leads to obesity. Gi) Children who use the internet develop an addiction, which is quite dangerous. ii) Itis now quite easy to decipher someone's chat or email messages thanks to the hacking community. Gv) With the emergence of online businesses, virtual stores, and credit card usage, purchasing goods without going to the store has never been easier. 1.7 World Wide Web (WWW) The World Wide Web (WWW) or web is an internet-based service, which uses a common set of rules known as protocols, to distribute documents across the standard way. the Internet in a world Wide Web, which is also known as a Web, is a collection of websites or webpages stored on web servers and connected to local computers through the internet. These websites contain text pages, digital images, audio, videos, etc. Users can access the content of these sites fromany part of the world over the intemet using their deenvaibeleess sthuec hre atrsie cvaoml apnudtedriss,p laapy toofp tse, xct ealnl dp hmoendeisa, teot cy.o uTrh dee WvicWeW. , along with internet, The World Wide Web, Or ‘Web’ is a part of the Internet, The Web is viewed through web browser software such as Google Chrome, Intemet Explorer, Mozilla Firefox, cte-Using browsers one can access the digital libraries containing innumerable articles, journals, e-books, news, and tutorials stored in the form of web pages on computers around the world called web servers-Today thousands of web pages/websites are added to the WWW every hour. + The Web was invented in 1991 by Tim Berners-Lee while consulting at CERN (European Organization for Nuclear Research) in Switzerland. The Web is a distributed information system. © The Web contains multimedia. * Information on the Web is connected by hyperlinks.s2WR Difference between Internet and WWW The Internet is known as the “interconnection of computer networks”. The Internet is a massive network of networks. It connects millions of computers globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Intemet, Information that travels does so via a variety of languages known as protocols. over the Internet : ‘The World Wide Web, or “Web” for short, or simply Web, is a massive collection of digital pages to access information over the Internet. The Web uses the HTTP protocol, to transmit data and allows applications to communicate to exchange business logic. The Web also uses browsers, suchlainsk Iendte tron eeta cEhx polothreerr voira Firefox. to access web documents called Web pages that are hyperlinks, Web documents also contain graphics, sounds, text and video.:SOFTWARE SYSTEM Before computer can perform any task, it must read in a set of instructions called program that tells the computer what operations to perform. The instructions or program are prepared by computer professionals called programmers. The total set of programs or instructions that enable the computer system to perform operations effectively is referred to as software. Software also include the sets of instruction needed by the users which is called procedures. Software referred to the collection of computer programs, which control the general operation and mechanism of the system. Generally, software is also known as program. Therefore, software is a sequence of step by step set of coded instruction given to computer to perform a specific task or to solve a particular problem. The diagram is shown below; Software System software Application Software User Application ‘Application Software Packages Operating System Translator Editor Utility/Service Program Interpreter AssemblerSystem Software: these are programs that control and support the operation of the computer system. The system software help users to use the computer itself, System Software can be grouped into three major functional categories. 1) System management programs 2) System support programs 3) System development programs * System management programs: the system management programs manage the use of the hardware, software and data resources of the computer system during execution e.g. operating systems, database management systems, and data communications monitor * System support programs: the system support programs support operations management and users of a computer system by providing a variety of support like utilities, editors, libraries. * System development programs: the system development programs help users to develop programs and procedures e.g. Assemblers, compilers and interpreter. OPERATING SYSTEMS: Operating systems are programs that acts as an interface between machine hardware and users, thereby, providing the users with a set of facilities to simplify the design coding, debugging and maintenance of the user programs and at the same time, controlling the allocation of hardware resources to ensure efficient operations FUNCTIONS OF AN OPERATING SYSTEMS * It resolves conflicts or errors when they occur and using corrective routines when possible. © Protecting hardware, software and data from misuse. © Scheduling and loading programs in order to provide a continuous job processing sequence or to provide appropriate response to events etc. > The major aim of the operating system is to maximise the productivity of a computer system by operating it in most efficient manner as possible. It also reduces the amount of human intervention required during processing by a computer operator.Examples of operating systems are MS DOS, Windows 95, Windows 98, Windows millennium, windows 2000, windows XP, Windows Vista, Windows 7, windows 10, UNIX, XENIX, LINUS, NOVEL, etc. The group of programs that make up the operating system are also called the control, the monitor, and the supervisor. TRANSLATOR: A translator is a program that convert other programs into micro-computer language instructions codes that computer can executive. There are three types of translators 1. Assemblers 2. Compilers 3. Interpreters ASSEMBLERS: An assembler is a program that translates an assembly language Programs into a micro- computer language programs. An assembly is a low- level symbolic programming language which is very close to micro computer language. The assembly language has the following limitations. a) The difficulty in locating an error since even simple assembly programs are quite long. b) Writing assembly language programs requires considerable knowledge of the working computers. ¢) It is a micro-computer oriented. To overcome the problems associated with low level languages, other programming, languages have been developed which are even easier for Programmer, more sophisticated and closer to the languages of English and mathematics. These languages are called high level languages. The first high level languages to be developed are FORTRAN, ALGOL, COBOL. Others are BASIC, PASC ‘AL, CH FOXPRO, JAVA, PYTHON, ORACLE, etc. COMPILERS: A compiler is a program that translates a hi program into machine language. Compilers are named after the | E.g. COBOL compiler, FORTRAN compiler ete. igh-level language ‘anguage the change.INTERPRETER: An interpreter is a program that translates and execute each program statement one at a time unlike the compilers and assemblers. A program written in a high-level language is called the object-oriented program. SERVICE PROGRAMS: these are programs designed to perform repetitive forms and carry out standard routines that are common to most applications. Service programs are usually supplied by the computer manufacturer as part of its software library. There are three service programs which are usually supplied. Which includes; 1, The library with catalogues: This manages and maintains a directory of the programs that are stored in various libraries of the computer system. 2. Editor: Editor aids in changing programs easily and quickly. It enables users to create and change their programs by turning a terminal keyboard into a sophisticated typewriter or word processor. A good editor can locate symbols, correct them, add or delete texts and lines, read or print data. An editor operates either in command mode or in text mode. It starts with a command waiting for a command. The user types the desired command and ends the command with a special signal such as a RETURN key. In command mode, the editor interprets all statements as results. The editor carries out the command and then enters the text or input mode in which it interprets al] characters as text to be treated as instructed by the proceeding command. - Utility programs: utilities are group of miscellaneous programs that performs various house ~ keeping and file conversion. Other functions of utilities are; Performing sorting and merging operations on data that required information processing application. © Clearing primary storage. Loading programs. Recording the contents of primary storage onto an output device (memory dumping). * Converting a file of data from one storage medium to another such as from tape — to — disk. ¢ Editing output records, * Providing information about the current state of files, memory, users, and peripherals. wThe above functions are performed by the listed utility programs below; * Sort utilities «System status utilities «File maintenance utilities © Debuggers, dump utilities « Editors utilities etc APPLICATION SOFTWARE: These are programs designed to direct computers to perform specific jobs for the users. The programas are written to meet the needs of individual users. They may be supplied by the computer manufacturer but in some cases, the users write theirs. Examples of application programmes are; «A billing program to produce bills «A payroll program to produce pay checks «An inventory program to provide answers to inquire about the quantity on hand of each item in stock. Application software includes a variety of programs that are grouped into the following categories a) General application programs: A general-purpose application programs that can perform common jobs for the users from all application areas are; 1. Word processing (MS word) programs 2. Spreadsheet programs 3. Database management programs 4, Integrated programs 5. Graphics programs. These are popular microcomputer applications used at home, Educational sector, Business environment, Scientific and agricultural sector.eneral ledger programs for b) Business application programs ¢.g. & cash budgeting for finance accounting, sales analysis for marketing, ete. c) Scientifie applications programs ©: scientific analysis, onitoring computer software, experiment mi ‘AI) programs in education. engineering design jc, art, cinema etc. assisted instruction (C. 4) Game programs in entertainment e.g. mus Computer software, either system or application software can be sub- divided into two categories depending on whether it is developed by Jves or acquired from external sources. s which are programs acquired by users from orother users e.g. spreadsheets, graphic the types of users themse! 1, Software packages vendors, software house, packages, word processing packages etc are packages that are widely used. User. developed software which are programs developed by either programmers within the user organisation or by consultants or free programmers hired by the users organisation.HUMAN WARE SYSTEM Human ware refers to the people that work with the computer system. Below is the organisational chart of a computer firm; Data Processing Manager Operational team System development ' Chief ‘System Engineer System Analyst Programmers e ee Operator Data Entry Operator] .£.02 D.E03 Messenger/Cleaner Driver Security Guard Receptionist Cashier/Account Clerk Explanation: DPM: Data Processing Manager oversee all acti System Analyst: This person understudies an existing manual procedure with the aim of ascertaining whether it is cost effective for the manual procedure to be ities of the department. computerized or not Programmer: This is the person who writes a sequence of step by step set of coded instructions given to the computer to perform a specific task or to solve a particular problem. Chief Operator: This is the person who boots the computer system and makes ure that the printer is online and oversees all data entry operators. System Engineer: He takes care of any hardware or software problems whenever it arises. Data Entry Operator: They take care of all data entry in the computer roomCOMPUTER VIRUS ‘A computer virus is a malicious application or authored code used to perform destructive activity on a device or local network. The code’s malicious activity could damage the local file system, steal data, inlerupt services, download additional malware, or any other actions coded into the program by the ‘malware author. Many viruses pretend to be legitimate programs to trick users into executing them on their device, delivering the computer virus payload A computer viru is a type of computer program that, when executed, replicates itself by modifying other “computer programs and inserting its code. If this replication succeeds, the affected areas are then said to be “infected” with @ computer virus, a metaphor derived from biological viruses. A computer virus can be referred to as a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data, 1.1 Symptoms of Computer Virus Malware authors write code that is undetectable until the payload is delivered, However, like any software Program, bugs could present issues while the virus runs, Signs that you have a computer virus include: © Popup windows, including ads (adware) or links to malicious websites ®) Your web browser home page changes, and you did not change it. (3) Outbound emails to your contact list or people on your contact list alert you to strange messages sent by your account. (™) The computer crashes often, runs out of memory with few active programs, or has @ blue screen of death in Windows. (© Slow computer performance even when running a few programs or the ‘computer was recently booted. (i) Unknown programs start when the computer boots or when You open specific programs. (i) Passwords change without your knowledge or your interaction on the account 1.2 Examples of Computer Virus The web contains millions of computer viruses, but only a few have gained Popularity and infect record rnumbers of machines. Some examples of widespread computer viruses inchude: «© Morris Worm «| Nimda « ILOVEYOU * SQL Slammer © Stuxnet© Cryo ocker + Conbicker + Tinba + Welelin © Nhlayer 19 How can your computer system get infected with Computer Virus? Kegandlees of whether you're cautious or not, you can get Computer viruses through typical activities like: (1) Sharing tui, files, or images with others (1) Viniting «spam site (11) Opening sparn email or # spam email attachment (1¥) Downloading fie games, toolbars, media players and other framework Utilities (©) Inlioducing standard software applications without altogether perusing license agreements 1.4 What does # computer virus do? Some computer virusen are customized to hurt your Computer by harming programs, erasing files, or reformatting the hard drive, Others just reproduce themselves or flood a System with traffic, making it difficult to play Out any web action, Indeed, even less unsafe computer viruses can essentially upset your Computer's performance, sapping computer memory and causing regular ‘Computer crashes, There are three itary ways that « computer virus may infect your system: (0) The primary way your computer may get infected is from the use of Temovable media, similar to a USH drive, Ifyou embed a USB drive into your system from a source unknown, it might contain a computer virus, Here and their hackers leave infected USB drives in people's ‘working environments, or open spots like bistros to propagate computer viruses, Those who generally share USI may likewise move files from an infected computer to one that isn't infected, (11) The second Way you could get infected with a computer virus is through a download from the web, When you download software or applications to your system, guarantee You do it from a high. ‘quality source that is trustworthy. For instance, Apple's App Store or Google Play Store. Abstain from downloading anything wilizing a pop-up or a site you don't have a clue about, (i) The thd way a virus could infect your computer is when you click on a ink op open an email ‘achiment in a spam email, At whatever point you get mail from a sender you don't have the foggient iden of trust, abstain from clicking on it, 1f somehow you do open it, don't click on any Jinks or open any attachments1.5 How to Know if your computer is infected? Various signs demonstrate how your computer may have become infected with a virus, © Right off the bat, is your computer hanging @ lot or has become slow? If your computer is taking ‘00 much time to load things then there’s a possibility that a virus has infected ‘your system. (©) Also, pay special mind to applications or projects that you dont remember downloading. Ifyou see an application or a program show up on your system that you don't recall downloading, practice caution and start taking necessary actions. Gi) Teis a smart thought to uninstall or delete any software you don't Tecognize and afterward run a Vinis scan using any computer security software to detect any potential dangers. Pop-ups that show up when your program is shut are a solid indication of a virus, So ifyou see any of these signs, make a quick move to delete the virus. Gv) Another sign that your computer may have a virus is if applications or Projects on your computer begin acting unusually. If your applications crash with no clear explanation, your computer may havea virus. (©) At lest, a virus may make your computer overheat. If this occurs, explore whether you have anti- Virus software or web security software. 1.6 Types of Computer Viruses Every virus has a payload that acts. The threat actor can code any malicious Activity into the virus payload, including simple, innocuous pranks that don't do any harm. While a few viruses have harmless payloads, ‘most of them cause damage to the system and its data, There are nine main virus types, some of which could be packaged with other malware to increase the chance of infection and damage. The nine major categories for viruses are: ! ( Boot Sector Virus Topping the list is the boot sector virus, This virus affects the MBR (Master boot record) ofa storage device in your system, Any sort of media can trigger this virus regardless if itis bootable or not. These Witwwes infect the storage device by infusing their piece of code inthe partition table of your hard disk Then it gets access to the main memory of your system when the computer starts, Booting issues, failure to find the hard disk, and precarious system performance are basic Problems that ‘may emerge after getting infected, Be that as it may, it has gotten uncommon since the decrease in floppies. Presentday operating systems accompany a built-in safeguard forthe boot sector that makes it hard to track down the MBR. Target: Any file once gets access to the primary memory Examples: Disk Killer, Form, Polyboot.B, Stone virus,How to protect: Ensure the disk you have is write-protected. Try not to start or restart Your computer with unknown external hard disks attached, (i) Web Scripting Virus ‘This scripting virus penetrates the browser security and perils hackers to inject client-side malicious Scripting into the site page. Web scripting viruses are easy to spread as compared to other viruses. A web Scripting Virus is a programming code written in the core of an application, controlling the elements and behavior of that application, A web scripting virus normally originates from webpage ads and so is widespread. Web scripting vinses can be appended to clickable media, for example, videos, images, or links. Target: Any web page Examples: JS.fornight, DDos How to protect: Use Windows MSRT, explore cookie security options, ‘ble scripts, or installl real-time protection software on your website. (ii) Browser Hijacker ‘A virus that can change the settings on your browser will ijack browser fevourites, the home page URL, your search preferences and redirect you to a malicious site. The site could be @ Phishing site or an adware age used to steal data or make money for the attacker, (iv) Memory Resident Virus infect all that are currently running on your system. Fundamentally, it allocates ‘memory, runs its code when any program is executed, and blocks original scripts. Target: Any file running on desktop Examples: CMJ, Meve, Randex How to protect: Install high-quality advanced antivirus (v) Direct Action Virus We have a direct action virus that rapidly penetrates the main memory, infects all Projects /filesifolder defined in the Autoexec-bat path, and afterward deletes itself. This virus can likewise ‘crush the data present in a hard disk or USB device attached to the system.This virus is capable of changing its location the root rectory of the hard disk. General on every execution making it hard to diagnose. It is found in ly, they don't erase system files however they affect the system's Performance prominently. Target: All com and.exe file extension Examples: Vi ‘enna virus, Win64.Rugrat How to protect: Use an antivirus scanner. This virus is not that difficult to diagnose and every single infected file can be restored successfully. (si) Polymorphic Virus ‘hemselves. The virus uses different algorithms and encryption keys every time they attack an application oF @ Program or duplicates itself. On account of various encryption keys, this virus tums out to be extremely Sard for the antivirus program to discover. This vinis is selfenerypted which makes it difficult t0 get detected by scanners. Target: The whole program in the directory Examples: Whale, SMEG motor, Simile, 1260 How to protect: Install high-quality advanced antivirus. (vii) File Infector Virus ‘To persist on a system, a threat actor uses file infector viruses to inject malicious code into critical files that run the Gperating system or important programs. When the system boots or the program runs, the virus is activated. G i) Multipartite Virus We have the multipartite virus. This virus infects and propagates in numerous manners relying upon the ‘operating system of your computer. It normally remains in the memory and affe cts the hard disk ‘When it gets into the system, the applications’ content is altered when infected, Y u Will start to observe Performance slack and the low availability of viral memory for client applications, Target: Boot sector Examples: Invader, Ghostball How to protect: Before reloading the data, make sure to clean the disk and boot Sector. Install @ high- uality advanced antivirus program and abstain from downloading att ‘chments from unknown email sources.Gx) Macro Virus A macro virus ig ‘Written in the macro Janguage and it runs automatically when the file is opened and can thout much of a stretch SpFead to different files as well It relies upon the application instead of the Operating system. Macro viruses are commonly covered up in files that are generally received vie emails. Programs like MS Word can permit embedding macro viruses in the documents. Target: Doc, PPS, mdb, XLs files Examples: Concept virus, Bablas, Melissa virus How to protect: Firstly, disable macros and never open emails from obscure sources, Also, Quality advanced antivirus that can identify the macro virus without any problem, install a high- (x) Companion Virus his virus was progressively well known during the MS-DOS time. Not at all like typical viruses, alter the current file? It duplicates a file with an altemate extension (ordinarily om) that nuns al éo they longside the real program. For instance, if you have a file with the name xyz.exe, the companion virus will make another hidden file named xyz.com. Also, when the system calls the file xyz, the com extension runs before the exe extension This virus affects your system's performance, for example, by deleting the files, Target: All .exe files Examples: Terrax.1096, Stator How to protect: Install « high-quality advanced antivirus program and abstain from down! attachments from unknown email sources. loading (xi) Overwrite Virus On the second slot, we have an extremely hazardous virus ie Overwrite vris. This virus has influenced a wide scope of operating systems such as Macintosh, Windows, Linux, and DOS. They essentially delete the data (mostly or totally) and supplant the existing code with the malicious code As the name suggests, the overwrite virus overurites the fle content by making no changes inthe size or type. It can be detected easily as the original program quits working. When the ile becomes infected, it can't be restored and all your data can be lost. ‘Target: Any content file Examples: Loveletter, Grog.377, Way, Grog.202/456 How to protect: The best way to dispose ofthis virus isto erase all the infected or potentially infected files, so i's smarter to always update your antivirus software, particularly if you're a Windows user.1.7 What causes computer viruses? useful resources, these programs 4? Computer viruses are standard programs; only instead of offering ne, you must initiate execution. remotely from another network but third-party software ly. The delivery of # mail. Another damage your device. For a threat actor to execute a virus on your machi ‘cious code through your browser Or computer. Moder browsers have defences against local machine code execution, some cases, an attacker can execute mali ities that allow viruses to run Tocall. ne common method is via a phishing ¢1 installed on the browser could have vulnerabil es to provide a legitimate program. It can be del computer virus can happen in several ways. 01 technique is hosting malware on a server that promis using macros or by injecting malicious code into legitimate s livered software files. 1.8 What does a computer virus do? vinas acts depends on how it’s coded. It could be something as simple as a prank that or itcould be sophisticated, leading to criminal activity and fraud. Many viruses Jers spread across a network environment to find other vulnerable hosts. A snue delivering a payload until it’s removed. Most antivirus vendors ‘The way a computer doesn’t cause any damage, only affect a local device, but oth virus that infects a host device will conti have smal removal programs that eliminate the virus. Polymorphic viruses make them difficult to remove payload could be stealing data, destroying data, or because they change their footprint consistently. The interrupting services on the network or the local device. 1.9 What is a computer worm? A computer worm is malware, just like a virus, but a worm takes a copy of itself and propagates it to other users, Worms can also deliver a payload and exhaust resources. For example, an email worm sends a copy of tselfto everyone on an infected user's email contact list. When it reaches recipient inboxes, anyone who runs the worm sends it to their contact list. Email worms exhaust storage space and spread very quickl ly across the internet, so they create issues differently than a virus.Ss 1 2. DIFFERENCE BETWEEN SYSTEM AND APPLICATION OFTWARE - Al Al opt do not instead they depend system software, the applic: . All ap] a. s Gi) Programmer is a person who Gii) Programming language is th . Operating System: It j I system software are written by computer manufacturers, whereas application software are written by individual or special software houses. I system software are responsible for ensuring effective, efficient, and timum utilization of all system resources, Whereas. application software on system softwares. In summary, without the ation software can not be used. I system software are useful to both the user and the hardware whereas plication software are useful to the user alone. S a system software which acts as an interface between the user and the hardware, Operating system examples are MS DOs, pc DOS, DOS, Windows 95, Windows 98, Windows ‘em software that translate Programs from one Programming language. E.p compiler and interpreter, Program can also be called software Writes a series of step by step set of ie computer to perform a specific task, medium of writing a sequence of step tion given to the computer to perform a machine language, high-level language Coded instruction given to th by step set of coded instruct specific task examples are and low-level language, Machine Language: Examples ae binary, Octal, Hexadecimal, ASCII, EBCDIC >. Low Level Language: ¢g. Assembly language ©. High Level Language: eg Basie COBOL, C+, Visual Disadvantage of low-level language; ( Machine tc. not potable (i) hard to leam or undersog fine dependent (i) i, An Assembler is translators which cor written in low level language to machine i. A compiler isa tansletor which convenes : high language to machine language. Compa” re ames ea Fo Tanguage they change. Eg COBOL! compiten Fat! compiler etc, idk » FORTRAN ik An interpreters 9 translator which conyers ae ctf om low-level language or high-loet’ aoa wren crt or change programs nguage,tor is a system software which can allow you to type your programs even without the compiler on a system in other to be run on another tem where the right compiler resides, » Utility or service programs are programs which render useful services to both the user and the hardware e.g. antivirus programs like: MacAfee, Dr Solomon, MSAY. A computer virus is a program which interferes with the smooth running of the computer system and can cause the breakdown ofa program or the computer system. APPLICATION SOFTWARE 1, User Application Software are programs written by individuals to solve user specific (related) problems. 2. Application packages are programs usually written by special software houses in a more generalized form whith can be used by many users or organizations to solve related problems, E.g. (1) Ms-word, (2)Word Perfect, (3)Word Star, (4)Professional Writer, (5)Corel Word perfect, (6)PageMaker, (7)CorelDraw, (8)Print Artist, (9)Instant Artist, (10)Jet Setter, (11)Publisher, (12)Lotus 1,2 3, (13)Ms-Excel, (14)SPSS. 1 —5 are word processing application packages 6 - 11 are desktop publishing application packages 12 ~ 14 are spreadsheet application packages The effectiveness with which information is generated and communicated determines the rate of progress of a society and the fulfillment of its people. In a world of accelerated accumulation of human knowledge, technological improvement, and human races thrust to improve its work and personal environment, there is only one constant (change). No one can accurately predict what inventions will make our world and life better, but one can be assured that change will continue at an accelerated pace. Improved systems and procedures will be required in order to cope with these changes. The computer becomes inevitable to keep with the rapidly changing environment. Necessity has inspired the development of information and data processing techniques in order to produce the required information as economically and quickly as possible, This makes computer an inevitable tool for the modem world work environment. Introduction to. data processing: Data processing is the activities which involve the transformation of raw data into a more meaningful and useful form called information. Data processing can be carried out in a number of ways which are: (i) manual (ii) Blectromechanical ‘ii) Electronicall etn an goes oP, data and information are different e.g. an average, But in a close loop, data and information are the same e.g, textile industry, age 23yrs. For the purpose of this course we shall concentrate on the electronic method and the device used (i.e. computer).ability to ‘accommodate More than one person at a time. They are Popular with small and medium scale business organizations, (ii) Micro-Computer: Js a small compact computer system whose Processing. Capabilities resides in a micro processor. These are also called the personal Computers (PC). They are the smallest cheapest computer systems There is a wide range of them. They Personal in nature j, are 1. they can accommodate only one person work: ing (4) Based on Purpose: @) General Purpose computers: These are computers that are capable of storing vari ties of programs and are capable of performing Varieties of operations, (i) Dedicated or Special Purpose Computers: These’ are computer dedicated to performing a specific task (©) Based on Main Mey ‘mory Design: ©) Fixed-Word-Length Computer: They have limited or non-expandable memory capacity, Gi) Variable-Word-Length Computers: these have exp: capacity to accommodate as many digits as possible. CHARACTERISTICS OF COMPUTERS + Speed Accuracy and Precision Efficiency Versatility Large Storage Capacity Stock keeping Less supervision Reliability COMPUTER SOFTWARE Definition of software or program Definition of programmer Definition of programming = Definition of programming langudge TYPES OF SOFTWARE @ System Software: These are often YY manufacturers to facilitate usage of equipment, control of basic Jobs like storing and retrieving information, maintaining data Security, keeping track of ‘computer time, translating programs to the machine language, etc, andable memory Ser ayawne Supplied by 1s(ii) * FORTRAN: Fi (elication Software: They enable Computer systems to do wh rs require, ey are written by individual users (or their solve Particu} roblems in their Organization, They Special com uter languages (ic. High Vocabularies), Programming Languages; The program, IF PROGRAM ING LANGUAGE Machine La “ns . nguage: Early Computers can only understand codes in binary (0 or 1); The machines each had its own instructions, dependent), Tt was ditt kat Agents) 1 are written in level language with rules ang tedium by which a programmer write a (machine Pé cult to remember the languages, They were tedious, time Consuming and €ven prone to errors, Low Level (or Ascem bly) Language: To overeom Strings of t they are being translated execution slower compared to when Program w1 machine codes are executed, Examples are: BASIC: Beginners All Purpose Symbolic Instruction Code developed at Dartmouth College USA in 1964, ormula Translator age use in artific LOGO: A program that was developed from lisp for smal children, LOGO is a Greek word ‘Mmeani Papett ing “To reason” developed by Seymour PASCAL: Named after Blaise Pascal a 19-year-old French Philosopher who built one of the 1 mechanical adding Machine, beginner should Start leaming Programming through any selected high level languages, Such as Basic, FORTRAN, PASCAL, COBOL, ete, They are called high Jevel language because they look Ij English instructions which are easy for a beginner TRANSLATOR: is a program that translate a given source Program into its corresponding object Program, ial intelligencelation of your program ALGORITHM OR PSEUDOCODE ‘TYPES OF TRANSLATOR 1, Assembler: * Assembler: The process of converti language to machine language. ii, Assembly time: The time it takes an assembler to conver from low-level] language to machine language. 2. Compiler: i. Compilation: The Process of converting a program writer from high ,, level language to machine language. ii, Compile time: The time it takes compiler to translate program from high leve] language to machine language 3. Interpreter: .-Dry-running — waking ‘up when brain is sharp to look a program i, Debugging — correction of erors Types of Errors Syntax Error: - Not following the rule of a Programming language i.e, ‘Wrong usage of literals or strings which also include errors in spelling and grammars. > Logical Error: ~ not casy to trace, (¢.g. in a formula) it is error due to Wrong output. The program will RUN quite alright but wrong. the result will be ~ Semantic Error: -is a logical error due to ‘wrong logical statement + Run Time Error: - due to unexpected halt of a Program during execution MAJOR STEPS IN WRITING A GOOD PROGRAM: The major steps in writing a good program are: designing, testing. Designing ~ Entails writing an algorithm or Pseudocode and drawing the flow chart. ing @ program from low-level t a program coding and Testing — involves dry * An Algorithm is the logical Statement of f steps in the procedure for the Solution ofa given problem from the beginning to the ova (i.e. algorithm is aprocedure ofall the steps involved for solving a problem), Exercise 1: Write an algorithm of the activities of am undergraduate Exercise 2: Let a, b, and c be given posity, € nos. Derive an algorithm to decide whether of not they can form the sid ls of @ triangle. If they can then compute the area of the triangle, Exercise 3: Given a set of n — number to calculate the average of the number Assignment Xt, Xa, +++ Xm: Detive an algorithm rs,an algorithm © “fined asthe diogrammatic or pictorial representation < S0M€ specia} flow chart symbols and showing the Yan arrow gy ol. Used to represent the Beginning and Eng Of flowchart ie. to Start and to Ste Used to represent Where data is read | and results or Output displayed Name= Assignment or Process Symbo | out Used to represent the portion where decision js Carri out me especially with the IF Statement Kite or Polygon shape = Name= Decision box or Symbol ee Used to join or conncet @ flowchart Small circle shape= Oo on the seme pope Name= On-Page Connector Symbol Pag 6 Used to join or connect a flowchart OFF-PAGE shape= ee on another page Name= Off Page Connector Symbo] t Used to show the direction of flow Arrow< ina flowchart ie. Up, Down, Left Name= Arrow Symbol <~ 1 | orRight z Used to Tepresent a Subroutine ie, a | Rectangle shape ps 2 ines = Part of a program that can stand on its own of hay. complet. Symbol Zt plete Name= Predefined Process Sym flowchart of its own, “Desk checking: Explain this in the class‘A) () BAstc pp, GRAM R Using for 4, ts 10 REM pasic TATROS To CAL ULATE Ne FIRST 100 00D INTEGERS USING MENT 30 SUM = 0 50 Suni O20! STEP 50 SUM su 60 NEXT] 70 PRINT “THE guy OF THE FIRST 199 ODD INTEGERS IS =", SUM 80 END (4) () Corresponding Flowchart; FORI=1T0201 STEP2 SUM = SUM +1 t NEXTI tBASIC CHARACTER grpg CONSTANT & VARIABLE Numeric Characters; a cia runt, Are numbers or any combination of characters which is A Constant: is a value which re It may be with or without a deci character of a no. if the sign is o} There are basically 2 typ (ji) real constant. NB: The mi Constant includes the exponential e.g, 0.006 = 6 « 103 A Variable: Is an item which can change its value or take any other value within program execution, Hence, the need for a variable to be referenced bya symbolic name. (ic. identifier). A name is a symbolic representation which may be integer or real valued. Variable name has to be formed by a programmer. The variable formed by a programmer is called a variable name. Another name for variable is data name or an identifier. The assignment of names to a variable that appears in a program is entirely at the discretion of the programmer but must be guided by the following rules: Note: In BASIC language there are restrictions in the way in which a programmer composes his or her variable names: RULES GOVERNING FORMATION OF VARIABLE NAMES (A variable name must start with an alphabetic character and may be followed by a sequence of number or alphabets or combination of both. (i) A variable name must not be more than 40 characters long, (iii) Embedded space is not allowed in between variable name. (iv) Certain words are reserved words and are not allowed as variable names e.g. goto, CLS, REM, DIM, Close, etc. (v) Special characters are not allowed in between variable name. TYPES OF VARIABLES ; We have 2 major types of variables in BASIC; oe (a) Numeric Variables: Contain digits 0 ~ 9 and the decimal point. They can . yther character except numbers. Sein varble: This type of variables can contain any sequence of (b) String variable: This (7 otion of both characters Eg. MH 14 Room ic, alphabet or combinati . Eg. Bm reap variable name has a suffix ($) e.g. LAMS ADDRESSS Th following ‘are some acceptable variable names. 1, MOTO, J47KA, while 14,5A is not acceptable as variable name because it does not start with alphabetic ‘character and also it has a special character included 3MAJL and (LXIMZ7). ‘mains fixed throughout the program execution, imal point. The sign “4” or “-" may be the first mitted, then it is assumed that the no is Positive, es of constants namely; (i) integer constant and 2uAt*2, AND (A-B) (A+B) (A-B) *(44B) Rules for Writing BASIC IN EXPRE TWo operators YPRESSIO' must-not occur together X/-Y is wrong in BASIC the nt and — are not allowed ‘gether. The comect way is to present i - Parenthesis cannot be used for multiplication ©. (A-B) (A+B) is Wrong, in BASIC. The correct Way is to write it as (A-B) * (A+B) Multiplication symbols ‘must not be left out e.g. XY or X.Y ig wrong in the correct Way is X*y_ EVALUATION OF EXPRESSIONS In the evaluation of expressions where some expressions contain two or There Operators, the computer must follow the following order in evaluating the expression; @ ~~ First, €xponentiation is evaluated Gi) Secondly multiplies which they occur, i, * ate of the same level med in the order in which they occur. NB: If Parentheses are involved, then any value in the bracket must be cvaluted first regardless of the sequential order enumerated above Exercise 6 Write the following Mathematical or ari ithmetical ox, €xpression and show the order. of execution in each case, (sy CHARACTERISTICS OF A GOOD PROGRAM (GEMsIcFU) i Generality 2. Efficiency 3. Modularity 4. Simplicity 5. Integrity 6. Clarity 7. Finite 8 Unambiguous Pression in BASIC 22THE READ/DATA STATEMENT eral format This is @ command used in entering data into the computer. The Bena is S/NO Read Variable List SiNo DATA — CONSTANT LIST ; The read statement must always go with data statement. The te statement list the variable names to be read, while the data Sac ist ak Values associated with those variables. The computer does not display 2ny question mark here but the conimand is executed. Exercise 7 Write a program to read 4 numbers and compute their sum. Solution 10 REM the use of READ/DATA statement 20 READABCD 30 LET SM = A+B+C+D 40 PRINT SM 50 DATA 4,5,7,8 60 END Exercise Repeat the above program and compute the sum, average and product using Read/data Statement. THE “REM” STATEMENT The most common way to introduce remarks or comments into a basic program is to make use of the REM (Remark) statement. The general format is SINO “REM” COMMENT REM statement can be inserted anywhere in a basic program. They are non executable statement for the computer. However, they enable a programmer to provide a program heading; to identify important variable and to distinguish the major logical segment of a program. TRANSFER OF CONTROL STATEMENT The execution of all computer program are usually taken sequentially ie execution is taken line by line. In some situations, however, the sequential execution order may be violated. The program may be forced to go out of th sequential execution steps to another point of the program either conditionally or unconditionally. THE “GOTO” STATEMENT This is an unconditional transfer of control statement, It is called unconditi 1 q ional because when the execution step reaches the “GOTO” line, it automaticel , atically a4goes out of the sequential steps to the line no that is placed after the “GOTO™ ‘atement. The general format is S/No “GOTO” n Where n is the statement no to which control is transferr Exercise }OLETA=2 20 PRINT A; 30LETA=A+4 40 GOTO 20 S0END ed to: Explain what this program does THE JF - THEN STATEMENT 1OLETA=1 20 PRINT A, 30LETA=A+4 40 IF A = 53 THEN GOTO 60 50 GOTO 20 60 END THE DIM STATEMENT The DIM (DIMENSION) array is a group of eg. 20 DIMA A (50, 100), B (100) [5 4 6 7] [1 by 4] matrix ts \"“ by 1) matrix numbers having rows and column 6 7 LOOPING e.g. FOR - NEXT STATEMENT the general format is FOR 1=1 TON STEP K NEXTI Where step is omitted, it is assumed to have an increment of 1 but when more than | the step will be used. 10 SUM=0 20 FORI=1 TO 10 30 SUM = SUM +1 40 NEXTI 50 PRINT SUM 60END Write a program in BASIC to sum all the even numbers between 1 t0 2000 25NUMBER SysTEny Our ‘ancient parents count in Tens. That is 10 by 10, that is why base 10 is widely used in number system, Binary = base 2 Octal’ base § Decimal = base 19 Hexadecimal = base 16 O—15 are the first 16 int DECIMAL OCTAL__| HEXADECIMAL | 9 7 0 J 1 1 2 Pi 2 3 0011 3 3 i 4 0100 4 4 | 5 0101 5 5 | 6 0110 6 | 6 | 7 on 7 7 | 8 1000 10 8 9 100 ul 9 10 1010 12 A | WW 1011 13 B 12 1100 14 c 13 1101 15 D 14 M100 16 E 15 nu 17 F Conversion from base 10 to base 2 in number system, base 10 is hot written whereas all offer bases must be written €.2 10, 10, 10s 10r¢ Convert 23 in base 10 to base2 8 23 iW 5 NNNNAD PRrazT el yee eat 2 1 0 23 = 101112CONVERSION FROM BAS! SE2 Convert 101112 10 base 10 Tor MONT, = 1x24Ox 2444 241+ 1D =16+04+44244 =23 Assignment 3% J. Convert 11101210 base 10 ~ sy ov 2 Convert 6010 tobase? 60, base 2 =7 |! ov Examples: Conversion from base 10 to base 2 ¢.2 4010 2 [40 2 |20 R 0 2 |10 R 0 2 |5 R 0 2 |2 R 1 > |1 R oO g '0 RR 1 = 1010002 Conversion from base 10 to base 8 ¢.¢ 4010 3 [40 i 3 |5 R 0 j g |o R 5 = 50s Convert 50s to base 10 , Q 505 5x8!+0x8 [ace al 40+0 aA \ - = 40, ee EIN Convert 9010 to base $ and convert the answer back to base 10. \ ¢ | f % Conversion from base 10 to base 16 ‘ oft 10,0 to base 16 convert 70;0 ew 16 | 70 7 16 | 4 R 6 0 R 4 W0= 4616 30Convert 46), to base 16 16 [a6 Wl2 R wy oy 7 E 4610 = 2E yg Convert 2E16 to base 10 2x16'+ Ex 16° 324+14x)] = 4610 Conversion from binary to octal Convert 101113 to octal 10111, 1x 24+0x 234 PXPHIx2 41x20 164+0+442+ 2310 Then Convert 23,9 to octal (base 8) 8 23 8 2 R 7 0 R 2 2310 = 275 Convert 2319 to base 2 2 23 2 {il R 1 2 75 Rol 2/2 R 1 2 1 R 0 o Rol 23 = 101112 Addition of Binary Numbers . (a) 10112 +1102 = loop (b) 110102 + 101112 = S I) pve | 31
You might also like
Web Design Note Good Quality Notes
PDF
No ratings yet
Web Design Note Good Quality Notes
145 pages
Third Term Yr 8 Lesson Notes
PDF
No ratings yet
Third Term Yr 8 Lesson Notes
31 pages
Internet Presentation
PDF
No ratings yet
Internet Presentation
25 pages
Fundamentals of Internet
PDF
No ratings yet
Fundamentals of Internet
17 pages
Nme Unit III
PDF
No ratings yet
Nme Unit III
93 pages
Ict Unit 1-1
PDF
No ratings yet
Ict Unit 1-1
8 pages
Web Design Note Good Quality Notes
PDF
No ratings yet
Web Design Note Good Quality Notes
145 pages
Ch-1-08 (Comp) - The Internet - Computer Security
PDF
No ratings yet
Ch-1-08 (Comp) - The Internet - Computer Security
41 pages
Ch-08 (Comp) - The Internet - Computer Security
PDF
No ratings yet
Ch-08 (Comp) - The Internet - Computer Security
35 pages
Internet & World Wide Web
PDF
No ratings yet
Internet & World Wide Web
33 pages
Internet and Web Technology by Hemant Banjare
PDF
No ratings yet
Internet and Web Technology by Hemant Banjare
145 pages
Web Design Note Good Quality Notes
PDF
No ratings yet
Web Design Note Good Quality Notes
145 pages
Internet and WWW
PDF
No ratings yet
Internet and WWW
27 pages
Unit1 HTML Nep
PDF
No ratings yet
Unit1 HTML Nep
75 pages
Comp 1 Module 4
PDF
No ratings yet
Comp 1 Module 4
11 pages
Third Term Computer Studies For G8
PDF
No ratings yet
Third Term Computer Studies For G8
27 pages
ICT 1st Semester Notes
PDF
No ratings yet
ICT 1st Semester Notes
36 pages
Unit Internet-1
PDF
100% (1)
Unit Internet-1
23 pages
LECTURE 01 Internet Basics
PDF
No ratings yet
LECTURE 01 Internet Basics
34 pages
7 Internet
PDF
No ratings yet
7 Internet
22 pages
Internet Basics
PDF
No ratings yet
Internet Basics
22 pages
Virtual Slides For Education Day XL 1
PDF
No ratings yet
Virtual Slides For Education Day XL 1
83 pages
CSC028 - Session - 01 Updated
PDF
No ratings yet
CSC028 - Session - 01 Updated
11 pages
CSC028 Session 01
PDF
No ratings yet
CSC028 Session 01
9 pages
YEAR 8 - 3RD TERM Internet and Email Edited
PDF
No ratings yet
YEAR 8 - 3RD TERM Internet and Email Edited
4 pages
Ict 10 Quarter 1 Lesson 1
PDF
No ratings yet
Ict 10 Quarter 1 Lesson 1
7 pages
Internet
PDF
No ratings yet
Internet
28 pages
INTERNET
PDF
No ratings yet
INTERNET
4 pages
Internet and Hisory
PDF
No ratings yet
Internet and Hisory
3 pages
Fundamentals of Internet
PDF
No ratings yet
Fundamentals of Internet
9 pages
Internet and Browsing
PDF
No ratings yet
Internet and Browsing
21 pages
Unit 3 23aug
PDF
No ratings yet
Unit 3 23aug
85 pages
Computer Studies Notes
PDF
No ratings yet
Computer Studies Notes
24 pages
CPT 112 - Introduction To The Internet
PDF
No ratings yet
CPT 112 - Introduction To The Internet
10 pages
Web-Unit 1
PDF
No ratings yet
Web-Unit 1
124 pages
Internet Administration
PDF
No ratings yet
Internet Administration
6 pages
Web Programming Unit 1
PDF
No ratings yet
Web Programming Unit 1
83 pages
Applications of Internet: Computer Networks Internet Protocol Suite
PDF
No ratings yet
Applications of Internet: Computer Networks Internet Protocol Suite
4 pages
Internet Introduction
PDF
No ratings yet
Internet Introduction
8 pages
INTERNET
PDF
No ratings yet
INTERNET
6 pages
Web Programming
PDF
No ratings yet
Web Programming
22 pages
Unit 1 (Basic)
PDF
No ratings yet
Unit 1 (Basic)
23 pages
Internet and Web Technologies - Notes X2023 April-1
PDF
No ratings yet
Internet and Web Technologies - Notes X2023 April-1
90 pages
Unit 5
PDF
No ratings yet
Unit 5
29 pages
Unit No 3 (Introduction To Internet)
PDF
No ratings yet
Unit No 3 (Introduction To Internet)
22 pages
Acessing Internet Pres1
PDF
No ratings yet
Acessing Internet Pres1
25 pages
The Internet
PDF
No ratings yet
The Internet
2 pages
Unit 1 Ip
PDF
No ratings yet
Unit 1 Ip
15 pages
Web-Technology UNIT-1 Complete
PDF
No ratings yet
Web-Technology UNIT-1 Complete
35 pages
Unit 7 The Internet: Start-Up 1. Answer The Questions
PDF
No ratings yet
Unit 7 The Internet: Start-Up 1. Answer The Questions
11 pages
School of Social Science Assignment of M.B.A. (1 Sem) : Jay Banjara
PDF
No ratings yet
School of Social Science Assignment of M.B.A. (1 Sem) : Jay Banjara
29 pages
Internet (UNIT 4) partII
PDF
No ratings yet
Internet (UNIT 4) partII
25 pages
1.1 Introduction To Internet
PDF
No ratings yet
1.1 Introduction To Internet
11 pages
CF Unit-5 Basics of Internet and Web
PDF
No ratings yet
CF Unit-5 Basics of Internet and Web
17 pages
Understanding Internet World: Ensure Success
PDF
No ratings yet
Understanding Internet World: Ensure Success
9 pages
Internet and WWW
PDF
No ratings yet
Internet and WWW
3 pages
Web Development Using HTML
PDF
No ratings yet
Web Development Using HTML
80 pages
Internet: 1. What Is Internet. Describe It
PDF
No ratings yet
Internet: 1. What Is Internet. Describe It
4 pages