Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
37 views
Computer
Uploaded by
Kar Thik
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Computer For Later
Download
Save
Save Computer For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
37 views
Computer
Uploaded by
Kar Thik
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Computer For Later
Carousel Previous
Carousel Next
Save
Save Computer For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 19
Search
Fullscreen
DATA COMMUNICATION AND NETWORKING The term communication means sending or receiving information. When we communicate, wwe share information or data, A communication system can be defined as the collection of hardware and software that facilitates intersystem, exchange of information between different devices. Data Communication lis the exchange of data between two devices using some form of transmission media, I. includes the transfer of data oF information and the method of preservation of data during the transfer process. Data is transferred from one place to another in the form of signals. There are three types of signals 1. Digital Signal In this signal, data is transmitted in electronic form, ie. binary digits (0 or 1). 2, Analog Signal In this signal, data is transmitted in the form of radiowaves like in telephone line, 3. Hybrid Signal These signals have properties ‘of both analog signal and digital signal Communication Channel ‘The communication channel refers to the direction of signal flow between two linked devices There are mainly three types of communication channel as follows 1, Simplex Channel In this channel, the flow of data is always in one direction, with no capability to support response in other direction. This communication is ‘unidirectional, Only one of the communicating devices transmits information and the other can only receive it eg. Radio, Television, Keyboard, ete, 2, Half Duplex Channel In this channel, the data can flow in both directions, but not at a same time, When one device transmits information, then other can only receive at that point of time. e.g. Walkie ~Talkie 3, Full Duplex Channel In this channel, the flow of data is in both directions at a time, ic. both stations can transmit and receive information simultaneously. ‘og, Wireless handset (mobile phone). Communication Media ‘Communication media of a network refer to the ‘vanismission media or the connecting media used in the network. It can be broadly defined as anything that can earry information from a source to destination. It zefers to the physical media through which communication signals can be transmitted from one point to another.Data Communication and Networking Transmission media can be divided into two broad categories Guided Media or Wired Technologies “The data signal in guided mea is bound by the cabling system that guides the data signal along a specific path I consist ofa cable composed of metals lke copper. tin or silver Basically, they ae divided int thre categories 1. Ethernet Cable or Twisted Pair Cable inthis cable, wites are wisted toether, which are surrounded by an insulating material and an outer Iyer called jacket, One ofthe wires is used to carry Signals tothe receiver and the othe used only asa ground reference, fe, Local area networks se twisted pair cable 2. Cocaxial Cable It caries te signal of higher frequency data communication tough the network. Ithas a single inner conductor that transmits electri signals and the outer conductor acts a @ ground and is ‘wrapped ina sheet of teflon or PVC: Coral cade is commonly sed in transporting multichannel television signals in cites, eg. Cable TV network copper Dieleorie comauctos Braid PVC sheath 3. Fibre Optic Cable It is made up of glass oor plastic and transmits signals in the form ‘of light from a source at one end to another. Optical fibres allow transmission over longer distance at higher bandwidth which is not affected by electromagnetic field. The speed of optical fibre is hundred of times faster than co-axial cables, 123 Protective coating Protective com ealing core lading Cacsing Unguided Media or Wireless Technologies Itis the transfer of information over a distance without the use of enhanced electrical conductors or wires. When the computers in a network are interconnected and data is transmitted through waves, then they are suid to be connected through tinguided media, Some commonly used unguided media of transmission ae 1. Radio wave Transmission When two terminals communicate by using radio frequencies then such type of communication is known as radio wave transmission. This transmission is also known as Radio Frequency (RE) transmission. These are omnidirectional Radio waves, particularly those waves that propage distances, e in the sky mode, can travel long 2. Microwave Transmission Microwaves are electromagnetic waves having frequencies range from 0.3 to 300 GHz. Microwaves are unidirectional, Microwaves have a higher frequency than that of radio waves. Microwave is one of the fastest media for data transmission over communication chanel. It is used in cellular network and television broadcasting. 4. Infrared Wave Transmission Infrared waves are the high frequency waves used for short-range ‘communication, These waves do not pass through the solid-objects, They are mainly used in TV remote, wireless speakers. 4, Satellite Communication The communication across longer distances can be provided by combining radio frequency transmission with satellites. It works over a long distance and fast communication, It is used for communication to ships, vehicles, planes and handheld terminals,124 — Tit-Bits * Bluetooth is a wireless tochnology used for ‘exchanging data over short distances to create a Personal Area Network (PAN), = Bandwidth determines tho data wansfor rato \whicn is measured in Cycle Per Second (CPS) or Herz (2) = Throughput isthe amount of data that is actualy transmitted detwean the two camputers Its specilied in bts per second (bps). Giga bits per second (Gops) is the fastest speed unit per data transmission Computer Network tis collection of two or more computers, which are connected together to share information and resources. Computer network isa combination of hardware and software that allows communication between computers over a network. Note ARPANET stands for Advanced Research Projects va the rst network developed Benefits of Network Some of the benefits of network are discussed below 1, File Sharing Networking of computer helps the users to share data files. 2. Hardware Sharing, Users can share devices such as printers, scanners, CD-ROM drives, hard drives, etc, in a computer network, 3. Application Sharing Applications can be shared over the network and this allows implementation of client/server applications. 4, User Communication This allows users to ‘communicate using E-mail, newsgroups, video conferencing within the network. Types of Computer Network Computer network is broadly classified into various types as follows Local Area Network (LAN) LAN is a small and single-site network. It connects network devices over a relatively short distance tis a system in which computers are interconnected and the geographical area such as Learn, Revise & Pra -¢ ~ Computer Awareness hhome, office, buildings, school may be within a building to 1 kim, On most LANs, cables are used to connect the computers. LANS are typically owned, controlled and managed by a single person of organisation, They also use certain specific connectivity technologies, primarily Ethernet and Token Ring LAN provides a sharing of peripherals in an ‘flicient or effective way. Wide Area Network (WAN) WAN is a geographically dispersed collection of LANs, A WAN like the Internet spans most of the world, A network device called a router connects LANs to a WAN, Like the Internet, most WANS are not owned by any one organisation, but rather exist under collective or distributed ownership and management. WANs use technology like ATM, Frame Relay and X.25 for connectivity. Metropolitan Area Network (MAN) It isa data network designed for a town or city. It ‘connects an area larger than a LAN, but smaller than a WAN, Is main purpose is to share hardware and software resources by the various users. Cable TV network is an example of metropolitan area network. The computers in a MAN are connected using co-axial cables or fibre optic cables. Personal Area Network (PAN) PAN refers to a small network of communication These are used in a few limited range, which isin reachability of individual person. Few examples of PAN are Bluetooth, wireless USB, Z-wave and ZigBee. Server isa system tha responds to requests ‘across a computer network o provide a network service. lt can be run on a dedicated comouter. It Js one of the most powertu and typical comput File Server isa type of computer used on network that proves access fo files. t allows users to share programs and data over LAN network Protocols ae the sot of rules used by a network fer cammunication, It's mainly used to connec al! the computers fo the network,Data Communication and Networking Network Devices These devices are required to amplify the signal to restore the original strength of signal and to provide an interface to connect multiple computers in a network. There are many types of network devices used in networking. Some of them are described below 1, Repeater Repeaters have two ports and can connect two segments of a LAN, It amplifies the signals when they are transported over a long distance so that the signal can be as strong as the original signal, A repeater boosts the signal back to its correct level. 2. Hub Itis like a repeater with multiple ports used to connect the network channels. It acts asa centralised connection to several ‘computers with the central node or server. ‘When a hub receives a packet of data at one of its ports from a network channel, it transmits the packet to all ofits ports to all other network channel, 3. Gateway It is an interconnecting device, which joins two different network protocols together. They are also known as protocol ‘converters, It accepts packet formatted for one protocol and converts the formatted packet into another protocol. ‘The gateway is a node in a network which serves as a proxy server and a firewall system and prevents the unauthorised access 4. Switch It is a small hardware device that joins multiple computers together within one LAN. It helps to reduce overall network traffic Switch forwards a data packet to a specific route by establishing a temporary connection between the source and the destination, There isa vast difference between a switch and a hub. A hub forwards each incoming packet (data) to all the hub ports, while a switch forwards each incoming packet to the specified recipient. 5. Router It isa hardware device which is designed to take incoming packets, analyse packets, moving and converting packets to the 125 another network interface, dropping the packets, directing packets to the appropriate locations, ete 6, Bridge It serves a similar function as switches. A bridge filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments, Traditional bridges support one network boundary, whereas switches usually offer four or more hardware ports. Switches are sometimes called multiport bridges. 7, Modem It is a device that converts digital signal to analog signal (modulator) at the sender’s end and converts back analog signal to digital signal (demodulator) at the receiver's end, in order to make communication possible via telephone lines. A Modem is always placed between a telephone line and a computer, Network Topology The term ‘topology’ refers to the way a network is lad out, either physically or logically. Topology can be referred as the geometric arrangement of a computer system Each computer system in a topology is known as node The most commonly used topology are described beiow 1. Bus Topology Itis such that there isa single line to which all nodes are connected, Itis wasuelly sed when a network installation is sual, simple or teaporury. In bus topology, til the mefwork componcats are connected vith a same (single) kine 2, Star Topology In this network topology, the peripheral nodes are connected toa central node, which rebroadcasts al transmissions received from any peripheral node to all peripheral nodes across the network, A star network can be expanded by placing another star hub. 3, Ring or Circular Topology This topology is used in high-performance networks where lange bandwidth is necessary. “The protocols used lo implement ring topology are Token Ring and Fiber126 Distributed Data Interface (FDI). In ing topology, data is transmitted in the form of ‘Token over a network 4. Mesh Topology It is also known as completely interconnected topology. In rmesh topology, every node has a dedicated point-to-point link to every ather node. ‘Tree Topology This is a network topology in which nodes are arranged as a tree, The function of the central node in this topology may be distributed. Its basic structure is like an inverted tree, where the root acts as a server. It allows more devices to be attached to a single hub, Models of Computer Networking There are mainly two models of computer networking as follows 1. Peer-to-Peer Network It is also known as P2P network. This computer network relies on computing power at the edges of a connection rather than in the network itself, P2P network is used for sharing content like audio, video, data or anything in digital format In P2P connection, a couple of computers is connected via a Universal Serial Bus (USB) to transfer files, In peer-to-peer networking, each or every computer may be worked as server or client. 2. Client-Server Network The model of interaction between two application programs in which a program at one end (client) requests a service from a program atthe other end (server) It is a network architecture which separates the client from the server. It is scalable architecture, where one computer works as server and others as client. ere, client acts as the active device and server behaves as passively, Learn, Revise & Pra -e ~ Computer Awareness OSI Model Open System Interconnection (OSI) is a standard reference model for communication between two end users in a network, In 1983, the International Standards Organisation (ISO) published a document called Basie Reference Model for Open System Interconnection, which visualises network protocols as a seven layered model OStis a layered feamework for the design of network system that allows communication betw all types of computer system. It is mainly consists of seven layers across a network Seven Layers of OSI Model and their Functions Name ofthe Layer Functions plication Layer Retransfezring flee of informatio [User Interface] login, password checking, packet ‘iltering te I works a a translating layer, Le encryption or decryption, Presentation Layer [Data formating] Session layer To manage and synchronise [Establish and conversation between to systems ‘moins, Tteontrols logging ON and OFF, connection) user identification, billing and session management, 1 decides whether transmission should be parallel of single path, itiplesing, splitting or ntng the data, to break data into smaller units for efficient Inanaling, packet filtering Routing of the signals, divide the outgoing message into packets, to Transport Layer [Transmission Control Protocol (FCP) accurate data Network Layer [Internet Protocol (P)roaters} act as network controller for routing data Data Link La mehronisation, error det [Media Access and eorrection, To assemble Control (MAC) outgoing messages into frames. switches) fake and break connections, define vollages and dala rates, convert data bits int electrical signal. Decide whether transmission is simplex, half duplex or fall duplex. Physical Layer [Signals-cables or operated by repeater] In OSI model, physical layer is the lowest layer which is implemented on both hardware and software and application layer is the highest layer.Data Communication and Networking Terms Related to Network 1. Multiplexing It isa technique used for transmitting signals simultaneously over a ‘common medium, It involves single path and multiple channels for data communication 2. Code Division Multiple Access (CDMA) It is a channel access method used by various zadio communication technologies. CDMA ‘employs spread spectrum technology and a special coding scheme, where each transmitter is assigned a code to allow rnultiple users to be multiplexed over the same physical channel 3. Packet Switching. It refers to the method of digital networking communication that ‘combined al transmitted data regardless of 127 content, type or structure into suitable sized blocks, known as packets. Public Switched Telephone Network (PSTN) Its designed for telephone, which requires modem for data communication. It is used for FAX machine also. Integrated Services Digital Network (SDN) It is used for voice, video and data services. It uses digital transmission and combines both circuit and packet switching, Ethernet It is a widely used technology employing a bus technology. An ethernet LAN consists of a single co-axial cable called Ether. It operates at 10 Mbps and provides a 48-bits address, Fast ethernet operates at 100 Mbps. Token It is a small message used to pass between one station to another. QUESTION BANK 1. nu is the transmission of data between ‘hwo or more computers over communication links. inieation (2) Networking communication (4) Data networking ‘yes 2, Communication channel having M1 @2 3 wa 3. In simplex channel, flow of data is (1) always in one direction (2) always in both ditection (3) in both ditecton, but one ata time (4) All of the above 4. Communication between a computer and a keyboard involves...... transmission. [BPS Clerk Mains 2017] (1) automatic (2) half duplex (6) fall duplex (4) simplex None of these 5. Mobile phone is an example of which type of communication channel? (2) Half duplex (4) None ofthese (2) Simplex: (6) Full duplex: 6. Which of the following is not a property of twisted pair cabling? (2) Twisted pair cabling i relatively ow speed (2) The wires ean be shielded (6) The wires ean be unshielded (@) Twisted pair cable catres signals as light 7. In twisted pair, wires are twisted together, ‘which are surrounded by an insulat material and an outer layer ealled () frame (2) cover (8) disk (4) block () jacket 8. Which of the following is the greatest advantage of co-axial cabling? (1) High security (2) Physical dimensions (3) Long distances (8) Easily tapped 9, Which of the following cables can transmit data at high speeds? [IBPS Clerk 2014] (1) Flat cable (2) Co-axial cable (8) Optic fibre cable (4) Twisted pair eable () UTP cableINTERNET AND ITS SERVICES ‘The Internet has gained popularity and emerged san important and efficient means of communication, The idea of introducing the Internet was to allow millions of people to share information and ideas, sound, video clips using their computers across the world. The Internet is a world wide network of networked computers those are able to exchange information with each other, Internet Internet stands for International Network, which began in 1950's by Vint Cerf known as the Father of Internet. Internet is a ‘network of networks! that consists millions of private and public networks of local to global scope. Basically, network is a group of two or more computer systems linked together. History of Internet 11969, the University of California at Los Angeles, the University of Utah were connected a the beginning of the ARPANET (Advanced Research Projects Agency Network) using 50 kbits circuits. t was the world’s frst operational packet Switching network, The goal ofthis project was to connect computers at different universities and US. defence: ‘In mid 80's another federal agency, the National Seience Foundation, created a new high capacity network called NSFuet, which was more eapable than ARPANET. The only drawback of NSFnet was that it allowed only the academic research on its network and not any kind of private business ‘nit. So, private organisations and people started working to build their own networks, which wer later interconnected with ARPA! to form th and NS Internet, Advantages of the Internet The advantages of the Internet are as follows (@ Alloves you to easily communicate with other people (i) Global reach enables one to connect anyone on the Internet (ii) Publishing documents on the Internet saves paper. (iv) A valuable resource for companies to advertise and conduct busines. (¥) Greater access to information reduces research times,Internet and Its Services Disadvantages of the Internet The disadvantages of the Internet areas follows (i Ie isa major source of computer viruses (ii) Messages sent across the Internet can be easily intercepted and are open to abuse by others, (ii) Much ofthe information is not checked and may be incorrect or irrelevant. (ie) Unsuitable and undesirable material available that sometimes are used by notorious people such as terrorists (0) Cyber frauds may take place involving Credit/Debit card numbers and details Internet Connections Bandwidth and cost are the two factors that help you in deciding which Internet connection is to use, The speed of Internet access depends on the bandwidth, Some of the Internet connections available for Internet access are as follows Dial-Up Connection A Dial-up is a method of connecting to the Internet using an existing telephone. Dial-up connection uses the telephone line to connect to the Internet. When a user initiates a dial-up connection, the modem dials a phone number of an Internet Service Provider (IP) that is designated to receive dial-up calls. The ISP then establishes the conneetion, which usually takes about ten seconds and is accompanied by several beeping and buzzing sounds. Broadband Connection The term broadband commonly refers to high speed Internet access that is always on and faster than the traditional dial-up access. It uses a telephone line to connect to the Internet, Broadband access allows users to connect to the Internet at greater speed than a standard 256 KB modem or dial-up access, Broadband includes several high speed transmission technologies such as follows 1, Digital Subscriber Line (DSL) It is a popular broadband connection. It 133 provides Internet access by transmitting digital data over the wires of a local telephone network, DSI. is the most common type of broadband service. It uses the existing copper telephone lines. 2, Cable Modem This service enables cable ‘operators to provide broadband using the same co-axial cables that deliver pictures and sound to your TV set. Most cable modems are external devices that have two connections, ‘one to the cable wall outlet and the other to a computer. They provide transmission speed of 1.5 Mbps or more Broadband over Power Line (BPL) BPI. is the delivery of broadband over the existing ow and medium voltage electric power distribution network. BPL. is good for areas, where there are no other broadband connections, but power infrastructure exists, eg. Rural areas. Wireless Connection Wireless broadband connects a home or business to the Internet using a radio link between the customer's location and the service provider's facility. Wireless broadband can be mobile ot fixed. Unlike DSI and eable, wireless broadband requires neither a modem nor cables. It ean be easily cstablished in areas, where itis not feasible to deploy Ds Some ways to connect the Internet wirelessly are as follows 1. Wireless Fidelity (WicF) It is a universal wireless networking technology that utilises radio frequencies to transfer data, Wi-Fi allows high speed Internet connections without the use of cables or wires Wi-Fi networks can be use for public Internet access at ‘hotspot’ such as restaurants, coffee shops, hotel, airports, convention centers and city parks 2, Worldwide Interoperability for Microwave Access (WiMAX) It is one of the hottest broadband wireless technologies around today. WIMAX systems are expected to deliver broadband access services to residential and enterprise customers in an economical way or cable,134 WIMAX has the ability to provide service ‘even in areas that are difficult for wired infrastructure to reach and the ability to ‘overcome the physical limitations of | traditional wired infrastructure 43, Mobile Wireless Broadband Services These services are also becoming available from ‘mabile telephone service providers and others. These services are generally appropriate for mobile customers and require a special PC card ‘with a built-in antenna that plugs into a user's computer. Generally, they provide lower speeds in the range of several hundred kbps. Intranet isa private network for Intemet tools, out available within an organisation. In large organisation, Inranet allows an easy access to corporate information for employees, Extranet isa private network that uses the Internet oland tne public telecomimunication system to Podcast is programme ether tak numer that's ‘made availale in digital format far automatic ‘download over the interne. Interconnecting Protocols A protocol isa set of rules that govern data communications. A protocol defines what is communicated, how itis communicated and when itis communicated Generally, some of protocols used to communicate via an Internet areas follows 1. Transmission Control ProtocoV/Internet Protocol (TCP/IP) The details of TCPIP areas follows {a) Transmission Control Protocol (TCP) It provides reliable transport service, ie. it ensures that message sent from sender to receiver is properly routed, TCP converts zessages into a set of packets at the source Which are then reassembled back into messages at the destination. (©) Internet Protocol (IP) It allows different computers to commimicate by creating a network of networks. IP handles the dispatch of packets over the network It maintains the addressing of packets with Learn, Revise & Practice ~ Computer Awareness multiple standards. Each IP packet contain the source and the destination addresses must Note Ani adress is 82 bit number 2, File Transfer Protocol (FTP) It can transfer 's between any computers that have an Internet connection and also works between computers using totaly different operating systems. Some examples of FTP software are FileZilla, Kasablanca, gFTP, konqueror, etc. 3. HyperText Transfer Protocol (HTTP) HTTP defines how messages are formatted and transmitted and what actions should be taken by the Web servers and browsers in response to various commands, HyperText Markup Language (HTML) Itis used for designing Web pages, A markup language is @ set of markup (angular bracket, <>) lags which tells the Weo browser how to display @ Weo page's words ard images forthe user. Each individual markup code is referred to as an element ortag 4, Telnet Protocol Telnet is a program that runs on the computer and connects PC toa server on the network. The protocol used on the Internet or Local Area Network. Telnet session will started by entering valid username and password 5. Usenet Protocol ‘The usenet service allows a group of Internet users to exchange their ‘views/ideas and information on some common topic that is of interest to all the members belonging to that same group. Several such groups exist on the Internet are called newsgroups. Usenet has no central server or administration 6. Point-to-Point Protocol (PPP) PPP is a dial account which puts your computer direetly on the Intemet, A modem is required for such connection which transmits the data 9600 bits per second. 7, Simple Mail Transfer Protocol (SMTP) Its the standard protocol for E-mail services on a ‘TCP/IP network. It provides the ability to send and receive E-mail messageInternet and Its Services 8. Wireless Application Protocol (WAP) A WAP browser is a commonly used Web browser for small mobile devices such as cell phones. 9. Voice over Internet Protocol (VolP) It allows delivery of voice communication over 1B’ Internet Protocol networks. e.g. IP calls. Terms Related to Internet World Wide Web (WWW) WWW was introduced on 13th March, 1989. The world wide web is a system of Internet servers that supports hyps several Internet protocols on a single interface. ext and multimedia The world wide web is often abbreviated as the Web or WWW. The world wide web is a way of exchanging information between computers o Internet, Web Page The backbone of the world wide web is made of files, called pages or Web pages, containing information and links to resources - both text and ‘multimedia - throughout the Internet. Itis created using HTML, There are basically two main types of web page as static and dynamic. The main or first page of a Website is known as home page. Website A group of Web pages that follow the same theme and are connected together with hyperlinks is called Website. In other words, “A Website is a collection of digital documents, primarily HTML files, that are linked together and that exist on the Web under the same domain.” eg, http:/;www.carwale.com is a Website while ttp:(;www.carwale.com/new/ is a Web page. Web Browser It isa software application that is used to locate, retrieve and also display content on the world wide web, including Web pages. Web browsers are programs used to explore the Internet, We can install more than one Web browsers on a single 135 computer. The user ean navigate through files, folders and Websites with the help of a browser. There are two types of Web browsers as fllows 1. Text Web Browser A Web browser that displays only text-based information is anown as text Web browser. eg. Lynx, which, provides access to the Internet in the text mode only 2. Graphical Web Browser A Web browser that supports both text and graphic information is known as graphical Web browser. eg. Internet Explorer, Firefox, Netscape, Safari, Google Chrome and Opera. Note The rst raphicai Web bronsor was NCSA Mesa. Web Server ‘The Web browser isa client that requests HTML files from Web servers. The server computer will deliver those Web pages to the computers that request them and may also do other processing with the Web pages. Every Web server that is connected to the Internet is given a unique address, ie. IP address made up of a series of four numbers between 0 to 255 separated by periods. c.g Apache HTTP Server, Interact Information Serviees (US), Lighttpd, ete. Web Address and URL A Web adairess identifies the location of a specific Web page on the Internet, such as itp://www learnyoga.com, On the Web, Web addresses are called URLs. URL stands for Uniform Resource Locator. It is the Web address for a Website or a Web page. Tim Berners Lee created the first URI 1991 to allow the publishing of hyperlinks on the world wide web. eg ‘httpsswww. google.com/services! leche” https — Protocol identifier wow — World Wide Web google.com — Domain name services! Directory indechtm — — Web page136 Domain Name Domain is a group of network resources assigned toa group of users. A domain name is a way to identify and locate computers connected to the Internet. A domain name must be unique. It always have two or more parts, separated by period/dot (). e.g. google.com, yahoo.com, ete Domain Abbreviation Domains are organised by the type of organisations and by country. A UJ abbreviation indicating the organisation and usually two-letter abbreviation indicating the country name. Most common domain abbreviations for ‘organisation are as follows letter info Informational organisation gov Government edu Educational sn Military net Network resources org profit organisation Some domain abbreviations for country are as follows in Trin au Astalia fr France nt New Zealand se United Kingdom Domain Name System (DNS) NS stores and associates many types of information with domain names, but most importantly translates domain names {computers host names) oP addresses. Italo ists mail exchange servers accepting E-railfor each domain. DNSis an essential component of contemporary Interne use. Blogs Ablog is a Website or Web page in which an individual records opinions, links to other ste, on regular basis. Atypical blog combines text, images, and links to other blogs, web pages and other media related to its topic. Learn, Revise & Pra -¢ ~ Computer Awareness ‘Most blogs, are primarily textual, although some focus on art, photographs, videos, musie and audio. These blogs are referred to as edublogs. ‘The entries of blog is also known as posts. Newsgroups Anarea on a computer network especially the Internet, devoted to the discussion of a specified topic is known as Newsgroup. Online discussion group that allows interaction ‘through electronic bulletin board system and chat Search Engine kis a Website that provides the required data on specific topies. Search engines tur the Web into a powerful ool for finding information on any topic. When a search engine returns the links to web pages corresponding to the keywords entered is called a hit, otherwise called a miss. Many search ‘engines also have directories or lists of topics that are organised into categories. Browsing these directories, is also a very ficient way to find information on a given topic Here are some of the most popular search engines Google —_ilpstiwww. google.com AllaVista —_hislawwwallavista.com Yahoo ——_hipmliwww-yahoo.com Hotbot —_ip/www.hotbot.com Lycos hitp:/wwwlyecos.com Excite hutps/wew.exeitecom WebCravler http/wwv.weberawlercom Services of Internet An Internet user can access to a wide variety of services such as electronic mail, fle transfer, interest group membership, multimedia displays, real-time broadcasting, shopping, ete. Some of the important services provided by the Internet are briefed in the following sections Chatting It is the online textual or multimedia ‘conversation. It is widely interactive text-basedInternet and Its Services communication process that takes place over the Internet. Chatting, ie. a virtual means of communication that involves the sending and receiving of messages, share audio and video between users located in any part of the world. e.g. Skype, Yahoo, Messenger, ete E-mail (Electronic mail) E-mail is an electronic version of sending and receiving letter, Electronic mail lets you send and receive messages in clectronie form. E-mail is transmitted between computer systems, which exchange messages or pass them onto othe sites according to certain Internet protocols or rules for exchanging E-mail, To use E-mail, a user must have an E-mail address. Emoticons or smileys are used in an E-mail to express emotions ot feelings clearly. Storage area for E-mail messages is called rail box, E-mail address consists of two parts separated by @ symbol ~ the first part is user name and the second partis host name (domain name). However, spaces not allowed within the E-mail address. eg. arihantbooks(@gmail.com Here, arihantbooks is a username and gmail.com is a host name, Video Conferencing It is a communication technology that integrates video and audio to connect users anywhere in the world as if they were in the same room, This term usually refers to communication between, three or more users who are in atleast two locations. Each user or group of users who are participating in a video conference typically must hhave a computer, a camera, a microphone, a video screen and a sound system. E-learning Elearning Electronic Learning) refers to the clectronic mode of delivering learning, training or educational programs to users. It is the mode of acquiring knowledge by means of the Internet and computer based training programs. 137 E-banking R-banking (Electronic Banking) is also known as Internet Banking or Online Banking, E-banking means any user with a personal ‘computer and a browser can get connected to hhis bank's Website to perform any of the virtual banking functions. All the services that the bank has permitted on the Internet are displayed in E-shopping -shopping (Electronic Shopping) or online shopping isthe process of buying goods and services from merchants who sell on the Internet, Books, clothing, household appliances, toys, hardware, software and health insurance are just some of the hundreds of produets, consumers ean, buy from an online store. Some E-shopping sites are Naaptol, Flipkast, Yebbi, Homeshop 18, ete E-reservation E-reservation (Electronic Reservation) means making a reservation for a service via Internet. You need not personally go to an office or a counter to book/reserve railways, airways tickets, hotel rooms, tourist packages, etc Examples of E-reservation sites are as follows () www.irete.com Gi) wwwanakemyteip.com (ii) www.yatra.com (iv) www bookingsite.com Social Networking Ttis the use of Internet based social media programs to make connections with friends, family, classmates, customers, elients ete. It ean ‘occur for social purposes, business purposes oF both. Social networking has grown to become one of the largest and most influential components of the web, The most popular social networking sites are Facebook, MySpace, Orkut, ete [Note Facebook was developed by Mark Zuckerberg138 E-commerce E-commerce (Blectronic Commerce) includes sharing, business information, maintaining bus relationships and conducting business transactions by means of telecommunication networks or process of trading goods over the Internet, Electronic Data Interchange (EDI) is the electronic transfer of a business transaction between sender or receiver computer. M-commerce M-commerce (Mobile Commerce) provides the application for buying and selling goods or services through wireless Internet enabled handheld devices. It involves new technologies, services and business models. Learn, Revise & Pra .¢ ~ Computer Awareness Note Mobile commerce was launched in 1997 by Kevin Duty ~ Ti = Cluster is a group of servers that share work and may be able to back each other up ane server fal = With the Webmail interface E-mails are accessible from anyuhere in the word. = Rich Text Formatting helps the sender (of E-mail) format the contents of his/ner E-mail massage by applying font, 820, bold, tai, otc * Cookie is a small mossage given to a Wed browser by a Web server. I stores information the User's Web activi. = Bookmarks are links to Web pages tnat make {easily to get back to your favourite places. QUESTION BANK The vast network of computers that connects millions of people all over the world is called (LAN Web (8) Hypertext (@)Intemet 2, The Internet isa system of () software bundles (2) web page () website (3) imerconnected networks 3. The Internet is (1) a large network of networks (2) sn internal communication system fora business (3) a communication system for the Indian goverment (4) Allof the above 4, The Internet allows to (0) send electronic mail (2) view Web pages (3) connect to servers all around the world (4) All of th 5. Which of the following is an example of connectivity? (0) Internet () Power cord above (2) Floppy disk @ Data Internet was developed in the (1) 1950s. (2) 19605.) 19708 5)1990s 1. Which of the following is not a type of broadband Intemet connection? (2) Cable Q)DSL_—@) Diakup (4) BPL 8. What does the acronym ISP stand for? IIBPS Clerk 2014] al Service Provider (4) 19805 () ine (2) International Service Provider (9) Internet Service Provider (3) Internet Service Providing (9) Internet Service Provision 9. Your business has contracted with another company to have them host and run an application for your company over the Internet. The company providing this service to your business is called an (1) Intemet Service Provider (2) Intemet Access Provider (3) Appli (4) Application Access Provider 1a Service ProviderCOMPUTER SECURITY ‘Computer security is also known as cyber security or IT security. Computer security is a branch of information technology known as information security, which is intended to protect computers, It is the protection of computing systems and the data that they store or access Methods to Provide Protection There are four primary methods to provide protection 1. System Access Control_ It ensures that ‘unauthorised users do not get into the system by encouraging authorised users tobe security 2. Data Access Control. It monitors who can access the data, and for what purpose. Your system might support mandatory access controls with these, The system determines access rules based on the security levels of the people, the files and the other objects in your system 4. System and Security Administration It perforins offline proceduses that make of break secure system, 4, System Design It takes advantages of basic hardware and software security characteristics. Components of Computer Security Computer security is associated with many core Basic components of computer security system are as follows 1, Confidentiality It ensures that data is not accessed by any unauthorised person. 2, Integrity It ensures that information is not altered by any unauthorised person in such a way that itis not detectable by authorised users 5, Authentic the persons they claim to be. 4, Access Control It ensures that users access only those resources that they are allowed to access. jon Tt ensures thal users are 5, Non-Repudiation It ensures that originators of messages cannot deny they are not sender of the message. 6, Availability It ensures that systems work promptly and service is not denied to authorised users. 7. Privacy Tt ensures that individual has the right to use the information and allows another to use that information,146 8, Stenography It is an art of hiding the existence of a message. It aids confidentiality and integrity of the data, 9. Cryptography It is the science of writing information in a ‘hidden’ or “secret” form and ‘an ancient art. It protects the data in transmit and also the data stored on the disk. Some terms commonly used in eryptography are as follows () Plain text It is the original message that is an input, (i) Cipher It is a bit-by-bit or character-b) character transformation without regard to the meaning of the message. (di) Cipher Text It is the coded message or the encrypted dats (iv) Encryption It is the process of converting plain text to cipher text, using an encryption algorithin. (#) Decryption It is the reverse of encryption, ive. converting cipher text to plaint ext. Sources of Cyber Attack “The most potent and vulnerable threat of computer users is virus attacks, A computer virus is a small software program that spreads from one computer to another and that interferes with computer operation I is imperative fr every computer user to be aware about the software and its programs that can help to protect the personal computers from attacks The sources of attack can be follow 1. Downloadable Programs Downloadable files are one ofthe best possible sources of virus, Any type of executable file ike games, sereen saver are one ofthe major sources, If you want to download programs from the Internet then itis necessary to sean every program before downloading them 2. Cracked Software These softwares are another source of virus attacks. Such eracked forms of illegal files contain virus and bugs that are difficult to detect as well as to remove. Hence, its always a preferable Learn, Revise & Pra .¢ ~ Computer Awareness option to download software from the appropriate source. 3, Email Attachments These attachments are the most common source of viruses. You must handle E-mail attachments with extreme care, especially if the E-mail comes from an unknown sender. 4, Internet Majority of all computer users are unaware as when viruses attack computer systems, Almost all computer users click or download everything that comes their way and hence unknowingly invites the possiblity of virus attacks. Booting from Unknown CD When the computer system is not working, itis a good practice to remove the CD. If you do not remove the CD, it may start to boot automatically from the disk which enhances the possibility of virus attacks. Malware : Threats to Computer Security ‘Malware stands for malicious software. Itis a broad term that refers to a variety of malicious programs that are used to damage computer system, gather sensitive information or gain access to private computer systems. It includes computer viruses, worms, trojan horses, rootkits, spyware, adware, etc. Some of them are described below Virus, VIRUS stands for Vital Information Resources Under Siege. Computer viruses or perverse softwares are small programs that can negatively affect the computer, It obtains control of a PC and directs it to perform unusual and often destructive actions. Viruses are copied itself and attached If to other programs which further spread the infection. The virus can affect or attack any part ‘of the computer software such as the boot block, ‘operating system, system areas, files and application programs, The first computer virus Creeper exeated in 1971.Computer Security Types of Virus Some common types of viruss are as follows 1. Resident Virus It fixes themselves into the system's memory and get activated whenever the ‘operating system runs and infects all the files that are opened. It hides in the RAM and stays there even after the malicious code is executed, ‘eg Randex, Meve ete 2. Direct Action Virus It comes into action when, the file containing the virus is executed. It infects files inthe folder that are specified in the AUTOEXEC.bat file path. eg. Vienna virus. 3. Overwrite Virus It deletes the information contained in the file that it infects, rendering them partially or totally useless, once they have been infected, eg. Way, TriReboat, Trivial 8.) te. 4, Boot Sector Virus It is also called Master Boot Sector virus or Master Boot Record virus. This type of virus affects the boot sector of a hard disk. Brain was the frst PC boot sector vieus created in 1986. eg, PolybootB, AntEXE ete. 5. Macro Virus It infects files that are created using certain applications or programs that contain macros, lke doc, xls, ppt ete eg. Melissa.A 6. File System Virus Its also called Cluster virus or Directory virus It infects the directory ofthe computer by changing the path that indicates the location of a file og, Dir-2 virus 7. Polymorphic Virus Il encrypts or encodes itself in an encrypted way, every time it infects a system, This virus then goes on to ereate a large number of copies, eg. Elkem, Tuareg ete 8. FAT Virus It is used to store all the information about the location of files, unusable space, ete. eg: Link virus ete 9. Multipartite Virus It may spread in multiple ‘ways such as the operating system installed or the existence of certain files eg. Hip. 147 10, Web Scripting Virus Many Websites execute complex code in order to provide interesting content. These sites are sometimes ereated with purposely infected code. og. JS Fortnight Some common viruses are tabulated below Year 1971 Creeper 1982 ElkCloner "1988 The Morris Internet Worm Name 1999 Melissa 2000 Lave You 2001 Code Red 2008 SQLSlammer 2003 Blaster 2004 Sasser 2010 Stuxnet 2011 Trojan 2012 Rostki 2014 Generic PUP 2014 Net Worm Effects of Virus ‘There are many different effects that viruses can have on your computer, depending on the types of virus. Some viruses can () monitor what you are doing. i) slow down your computer's performance. (iil) destroy all data on your local disk. jv) affect on computer networks and the connection to Internet, (») increase or decrease memory size. (vi) display different types of error messages (vil) decrease partition size (vili)alter PC settings (Gx) display arrays of annoying advertising, (8) extend boot times, (xi) create more than one partitions.148 Worms A.computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, elying on security failures on the target computer to access it, Worms are hard to detect because they are invisible files eg. Bagle, I love you, Morris, Nimda etc. Trojan A Trojan, ot Trojan horse, sa noresel-replicating type of malware which tppears to perform a desirable funetion but instead facilitates unauthorised access to the ters computer eystem, Trojans do not attempt to ine virus, Trojan horses may seal information, or harm thet host computer systems, Trojans ray ate dive by dovaloads or install ve online ames or Internet driven applleation in ordct to feach target computers, Unlike viruses, Trojan horses do not replicate themselves. eg Beast, Sub?-Zens, ZeroAccess Rootkit te Spyware Its a program whichis installed on a computer system to spy on the system ovmer’s activity and collets all the information which is misused afterwards It tracks the user's behaviour and reports back toa central source These are used fr either legal or illegal purpose. Spyware can transmit personal information to another person's computer over the Internet. eg. CoolWeb Search, FinFsher, Zango, Zlob Trojan, Keyloggers ete ¢ themselves into other files like a computer ‘Symptoms of Malware Attack There is alist of symptoms of malware atack which indicates that your system is infected with 2 computer malware. Some primary symptoms of malware attack are as follows () Odd messages are displaying on the sereen, (i) Some files are missing, Learn, Revise & Practice ~ Computer Awareness, (i) System nuns slower (iv) PC crashes and restarts again and again, (9) Drives are not accessible (ci) Antivirus software will ot fun oF installed (vi) Unexpected sound oF musi plays (citi) The mouse pointer changes its graphic (jx) System receives strange E-mails containing ‘odd attachments of viruses. (6) PC starts performing functions like opening or closing window, running programs on its own, Some Other Threats to Computer Security There are some other threats to computer security ‘which are described below 1. Spoofing It isthe technique to access the unauthorised data without conceraing to the authorised user. It accesses the resources over the network. It is also known as “Masquerade”. IP spoofing is a process or technique to enter in another computer by accessing its IP address. It pretends to be a legitimate user and access to its computer via a network. 2, Salami Technique it diverts small amounts of money from a large aumber of accounts maintained by the system, 3, Hacking It isthe act of intruding into someone else's computer or network. Hacking may result in a Denial of Service (DoS) attack It prevents authorised users from accessing the resources of the computer. A hacker is someone, who does hacking process. 4, Cracking. It is the act of breaking into computers. It is a popular, growing subject ‘on Internet. Cracking tools are widely distributed on the Internet. They include password crackers, trojans, viruses, war- dialers, ete 5, Phishing It is characterised by attemy to fraudulently acquire sensitive information such as passwords, credit cards 1%Computer Security details ete, by masquerading as a trustworthy person. 6, Spam It is the abuse of messaging systems to send unsolicited bulk messages in the form of E-mails, It is a subset of electronic spam involving nearly identical messages sent to numerous recipients by E-mails. 7. Adware It is any software package which automatically renders advertisements in order to genera term is sometimes used to refer the software that displays unwanted advertisements. 8. Rootkit It is a type of malware that is designed to gain administrative level control over a computer system without being detected. revenue for its author, The Solutions to Computer Security Threats Some safeguards (or solutions) to protect a computer system from accidental access, are described below Antivirus Software Itis an application software that is designed to prevent, search for, detect and remove viruses and other malicious softwares like worms, trojans, adware and more. It consists of computer programs that attempt to identify threats and eliminate computer viruses and other malware. Some popular Antiviruses ) Avast (i) Avg (ai) K7 (iv) Kaspersky (©) Trend Micro (vi) Quick Heal (wii) Symantec (vii) Norton (ix) MeAfee Digital Certificate Its the atlachment to an electronic message used for security purposes. The common use ofa digital certificate isto verify that a user sending a message is who he or she claims tobe, and to provide the receiver with the means to encode @ reply. It provides a means of proving yout identity in electronic transactions. 149 Digital Signature Itis an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer ofa document, and also ensure thatthe original content of the message or document that has been sent is unchanged. Firewall Itcan either be software based or hardware based and is used to help in keeping a network secure. Its primary objective is to control the incoming and outgoing network traffic by analysing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter) network, such as the Internet, that is not assumed to be secure and trusted. A firewall also includes or works with a proxy server that makes network requests on behalf of ‘workstation users, Password It is a secret word or a string of characters used for user authentication to prove identity or access approval to gain access to a resource. A password is typically somewhere between 4 to 16 characters, depending on how the computer system is setup, When a password is entered, the computer system is careful not to display the characters on the display screen, in case others might see it. There are two common modes of password as follows (@) Weak Password. Easily remember just like names, birth dates, phone number etc, (i) Strong Password Difficult to break and a combination of alphabets and symbols. File Access Permission Most current file systems have methods of assigning permissions or access rights to specific user and group of users, These systems control150 the ability of the users to view or make changes to the contents of the file system. permission refers to privileges that allow a user to read, write or execute a file There are three specific file access permissions as follows () Read Permission If you have read permission of a file, you ean only see the contents. In ease of directory, access means that the user can read the contents, (i) Write Permission If you have write permission of a file, you can only modify or remove the contents of a file. Ia case of directory, you can add or delete contents to the files of the directory. (ii) Exeeute Permission If you have execute permission of a file, you can only execute a file, In ease of directory, you must have execute access to the bin directory in order to execute it or ed command. Terms Related to Security 1. Eavesdropping The attacker monitors transmissions for message content. 2. Masquerading The attacker impersonat authorised user and thereby gain certain ‘unauthorised privilege 3. Patches It is apiece of software designed to fix problems with a computer program or its Learn, Revise & Pra .¢ ~ Computer Awareness supporting data, This includes fixing security vulnerabilities and other bugs and improving the usability and performance. 4, Logic Bomb It is a piece of code intentionally inserted into a computer's memory that will set off a malicious function when specified conditions are met. They are also called slag code and does not replicate itself 5. Application Gateway This applies security mechanisms to specific applications such as File Transfer Protocol (FTP) and Telnet swall by responding to input packets in the manner of an application while blocking other packets. Ithides the true network addresses and used to intercept all messages entering and leaving the network. — Tit-Bits * Keylogger is @ sofmare program designed to record every keysitox® of the machine on which i 6, Proxy Server It can act as a “= The legal right 10 use software based on spectic restrictions is granted via Software license. = Payloads 's code in the worm designed to do more than spread the worm, Bomb virus has @ delayed payload. * Software Piracy moans copying of data or ‘computer software without ne owners permission,
You might also like
Hourglass Workout Program by Luisagiuliet 2
PDF
76% (21)
Hourglass Workout Program by Luisagiuliet 2
51 pages
12 Week Program: Summer Body Starts Now
PDF
87% (46)
12 Week Program: Summer Body Starts Now
70 pages
Read People Like A Book by Patrick King-Edited
PDF
57% (82)
Read People Like A Book by Patrick King-Edited
12 pages
Livingood, Blake - Livingood Daily Your 21-Day Guide To Experience Real Health
PDF
77% (13)
Livingood, Blake - Livingood Daily Your 21-Day Guide To Experience Real Health
260 pages
Cheat Code To The Universe
PDF
94% (79)
Cheat Code To The Universe
34 pages
Facial Gains Guide (001 081)
PDF
91% (45)
Facial Gains Guide (001 081)
81 pages
Curse of Strahd
PDF
95% (467)
Curse of Strahd
258 pages
The Psychiatric Interview - Daniel Carlat
PDF
91% (34)
The Psychiatric Interview - Daniel Carlat
473 pages
The Borax Conspiracy
PDF
91% (57)
The Borax Conspiracy
14 pages
TDA Birth Certificate Bond Instructions
PDF
97% (285)
TDA Birth Certificate Bond Instructions
4 pages
The Secret Language of Attraction
PDF
86% (108)
The Secret Language of Attraction
278 pages
How To Develop and Write A Grant Proposal
PDF
83% (542)
How To Develop and Write A Grant Proposal
17 pages
Penis Enlargement Secret
PDF
60% (124)
Penis Enlargement Secret
12 pages
Workbook For The Body Keeps The Score
PDF
89% (53)
Workbook For The Body Keeps The Score
111 pages
Donald Trump & Jeffrey Epstein Rape Lawsuit and Affidavits
PDF
83% (1016)
Donald Trump & Jeffrey Epstein Rape Lawsuit and Affidavits
13 pages
KamaSutra Positions
PDF
78% (69)
KamaSutra Positions
55 pages
7 Hermetic Principles
PDF
93% (30)
7 Hermetic Principles
3 pages
27 Feedback Mechanisms Pogil Key
PDF
77% (13)
27 Feedback Mechanisms Pogil Key
6 pages
Frank Hammond - List of Demons
PDF
92% (92)
Frank Hammond - List of Demons
3 pages
Phone Codes
PDF
79% (28)
Phone Codes
5 pages
36 Questions That Lead To Love
PDF
91% (35)
36 Questions That Lead To Love
3 pages
How 2 Setup Trust
PDF
97% (307)
How 2 Setup Trust
3 pages
The 36 Questions That Lead To Love - The New York Times
PDF
94% (34)
The 36 Questions That Lead To Love - The New York Times
3 pages
100 Questions To Ask Your Partner
PDF
78% (36)
100 Questions To Ask Your Partner
2 pages
Satanic Calendar
PDF
25% (56)
Satanic Calendar
4 pages
The 36 Questions That Lead To Love - The New York Times
PDF
95% (21)
The 36 Questions That Lead To Love - The New York Times
3 pages
Jeffrey Epstein39s Little Black Book Unredacted PDF
PDF
75% (12)
Jeffrey Epstein39s Little Black Book Unredacted PDF
95 pages
14 Easiest & Hardest Muscles To Build (Ranked With Solutions)
PDF
100% (8)
14 Easiest & Hardest Muscles To Build (Ranked With Solutions)
27 pages
1001 Songs
PDF
70% (73)
1001 Songs
1,798 pages
The 4 Hour Workweek, Expanded and Updated by Timothy Ferriss - Excerpt
PDF
23% (954)
The 4 Hour Workweek, Expanded and Updated by Timothy Ferriss - Excerpt
38 pages
Zodiac Sign & Their Most Common Addictions
PDF
63% (30)
Zodiac Sign & Their Most Common Addictions
9 pages
Computer Networks Unit 1
PDF
No ratings yet
Computer Networks Unit 1
74 pages
Network and Network Types
PDF
No ratings yet
Network and Network Types
61 pages
CS Chapter-6 (Computer Network)
PDF
No ratings yet
CS Chapter-6 (Computer Network)
26 pages
Data Communication
PDF
No ratings yet
Data Communication
52 pages
Notes of Networking
PDF
No ratings yet
Notes of Networking
51 pages
Fundamentals of Network (Autosaved)
PDF
No ratings yet
Fundamentals of Network (Autosaved)
51 pages
Computer Networks Unit 1
PDF
No ratings yet
Computer Networks Unit 1
71 pages
Data Communication
PDF
No ratings yet
Data Communication
33 pages
Computer Network
PDF
No ratings yet
Computer Network
16 pages
Computer Network
PDF
No ratings yet
Computer Network
4 pages
Network CH 6
PDF
No ratings yet
Network CH 6
40 pages
Computer Network - Part 1
PDF
No ratings yet
Computer Network - Part 1
8 pages
Additional Notes Computer Network Unit-1
PDF
No ratings yet
Additional Notes Computer Network Unit-1
19 pages
Data Com Notes
PDF
No ratings yet
Data Com Notes
12 pages
NETWORKING ONE
PDF
No ratings yet
NETWORKING ONE
66 pages
Chapter 8 - Computer Network
PDF
No ratings yet
Chapter 8 - Computer Network
15 pages
Chapter-5-Computer-Networks
PDF
No ratings yet
Chapter-5-Computer-Networks
36 pages
Part 1 Computer Network
PDF
No ratings yet
Part 1 Computer Network
32 pages
Networking (1)
PDF
No ratings yet
Networking (1)
11 pages
Networking
PDF
No ratings yet
Networking
15 pages
LESSON 1-Networking Concepts
PDF
No ratings yet
LESSON 1-Networking Concepts
50 pages
DATA CommunicationsUNIT 3
PDF
0% (1)
DATA CommunicationsUNIT 3
69 pages
COMPUTER COMMUNICATION
PDF
No ratings yet
COMPUTER COMMUNICATION
24 pages
Class 12 Network
PDF
No ratings yet
Class 12 Network
32 pages
Together with class 12
PDF
No ratings yet
Together with class 12
8 pages
Computer Network Notes and Pyq
PDF
No ratings yet
Computer Network Notes and Pyq
15 pages
PDF Class 12 Computer Networks Notes by MNJ (1)
PDF
No ratings yet
PDF Class 12 Computer Networks Notes by MNJ (1)
65 pages
Lecture - 09 - Intro To Netwoks
PDF
No ratings yet
Lecture - 09 - Intro To Netwoks
38 pages
Computer Science Chapters 11 & 12 Short Note Live Note
PDF
No ratings yet
Computer Science Chapters 11 & 12 Short Note Live Note
20 pages
Chapter 4 Data Communication and Computer Networks and e Commerce
PDF
No ratings yet
Chapter 4 Data Communication and Computer Networks and e Commerce
108 pages
Network Notes Cs
PDF
No ratings yet
Network Notes Cs
21 pages
Data Communication and Networking
PDF
No ratings yet
Data Communication and Networking
6 pages
CSI2103 Computer Networks and Data Communications I
PDF
No ratings yet
CSI2103 Computer Networks and Data Communications I
47 pages
Computer Science - Computer Networks
PDF
No ratings yet
Computer Science - Computer Networks
81 pages
Reviewer Networking
PDF
No ratings yet
Reviewer Networking
6 pages
Network Communication and Protocols
PDF
No ratings yet
Network Communication and Protocols
24 pages
Fundamentals of Network
PDF
No ratings yet
Fundamentals of Network
52 pages
NOTES NETWORKING
PDF
No ratings yet
NOTES NETWORKING
6 pages
Data
PDF
No ratings yet
Data
7 pages
Networking PPT For Class (1) - 1
PDF
No ratings yet
Networking PPT For Class (1) - 1
120 pages
Intro To Netwoks - TCP - IP - OSI - Model
PDF
No ratings yet
Intro To Netwoks - TCP - IP - OSI - Model
43 pages
Computer Networks (New)
PDF
No ratings yet
Computer Networks (New)
74 pages
CBSE Class 12 Computer Science - Networking
PDF
No ratings yet
CBSE Class 12 Computer Science - Networking
10 pages
Networking Concepts
PDF
0% (1)
Networking Concepts
11 pages
Networking
PDF
No ratings yet
Networking
47 pages
UNIT 5 Basics of Networking
PDF
No ratings yet
UNIT 5 Basics of Networking
73 pages
TYBCom Sem V CSA Unit I DCNI 1 PDF
PDF
No ratings yet
TYBCom Sem V CSA Unit I DCNI 1 PDF
5 pages
Section 2 - COMPUTER NETWORKS AND WEB TECHNOLOGIES
PDF
No ratings yet
Section 2 - COMPUTER NETWORKS AND WEB TECHNOLOGIES
73 pages
Lec 7 Computer Networks
PDF
No ratings yet
Lec 7 Computer Networks
30 pages
CS 12 Computer Netowrk
PDF
No ratings yet
CS 12 Computer Netowrk
25 pages
Jeeeeer
PDF
No ratings yet
Jeeeeer
6 pages
Reading Material Veda File
PDF
No ratings yet
Reading Material Veda File
14 pages
Chapter 4
PDF
No ratings yet
Chapter 4
36 pages
Chapter8 ComputerNetworkseditable
PDF
No ratings yet
Chapter8 ComputerNetworkseditable
45 pages
computer notes 4.3k
PDF
No ratings yet
computer notes 4.3k
20 pages
Computer Networks & Internet Technologies
PDF
No ratings yet
Computer Networks & Internet Technologies
13 pages
Computer Networks Updated 2024
PDF
No ratings yet
Computer Networks Updated 2024
25 pages
Introduction
PDF
No ratings yet
Introduction
36 pages
Data Communication and Computer Networking: Content
PDF
No ratings yet
Data Communication and Computer Networking: Content
42 pages