Hsslive Xi Computer Application English All in One Notes by Act Malappuram
Hsslive Xi Computer Application English All in One Notes by Act Malappuram
in ®
Contents
1 Fundamentals of Computer 2
6 Introduction to Programming 24
7 Control Statements 26
8 Computer Networks 29
9 Internet 37
10 IT Applications 42
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
CHAPTER 1
Fundamentals of Computer
Data and Information
Data denotes raw facts and figures such as numbers, words, etc. that can be processed or
manipulated.
Eg:- Suresh, 17, 12
Information is the meaningful and processed form of data.
Eg:-
Data processing
• Data processing refers to the operations or activities performed on data to generate
information.
• Different Stages of Data processing are:
1. Capturing data
2. Input of data
3. Storage of data
4. Processing data
5. Output of information
6. Distribution of information
ACT MLPM 2
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
1. Input Unit
Accepts instructions and data for processing.
Eg:- Keyboard, mouse
2. Central Processing Unit (CPU)
The CPU is the brain of the computer. All major computations and comparisons are made inside
the CPU.
The functions of CPU are performed by three components:-
(i) Arithmetic Logic Unit(ALU): It performs all arithmetic and logical operations.
(ii) Control Unit(CU): It manages and co-ordinates all other units of the
computer.
(iii) Registers: These are the temporary storage areas inside the CPU.
3. Storage Unit
Store data and instructions, intermediate results and final results.
4. Output Unit
Supplies the results to the outside world.
Eg:- Monitor, Printer
Computer
It is an electronic device for storing and processing data according to instructions given to it.
Characteristics of Computers
Advantages: Speed, Accuracy, Diligence, Versatility, Huge memory
Limitations: Lack of IQ, Lack of decision making power
Number system
• The number of symbols used in a number system is called base or radix.
Binary 2 0, 1 (1101)2
Octal 8 0, 1, 2, 3, 4, 5, 6, 7 (236)8
Decimal 10 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 (5876)10
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F
Hexadecimal 16 (A, B, C, D, E, F represents 10, 11, 12, 13, 14, 15 (12AF)16
respectively)
• MSD: The leftmost digit of a number is called Most Significant Digit (MSD).
• LSD: The right most digit of a number is called Least Significant Digit (LSD).
Number Conversions
2 15 0
2 7 1
2 3 1
2 1 1
(30)10 = (11110)2
0 1
ACT MLPM 3
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
1 0.25 x 2 = 0.50
0 0.50 x 2 = 1.00
8 15 0
(120)10 = (170)8
8 1 7
8 0 1
ACT MLPM 4
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
(167)8 = (119)10
(437)8 = (100011111)2
100 011 111
Octal digit 0 1 2 3 4 5 6 7 8 9 A B C D E F
Binary equivalent 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111
A B
(AB)16 = (10101011)2
1010 1011
ACT MLPM 5
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
(100111100111100)2 = (4F3C)16
1 5 15(F)
(537)8 = (15F)16
ACT MLPM 6
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
+23 in 1’s complement form = (00010111)2 (For +ve numbers, no need to find 1’s
complement)
Example: Represent -23 in 1’s complement form.
Binary of 23 in 8-bit form = (00010111)2
-23 in 1’s complement form = (11101000)2 (by replacing 0 with 1 and 1 with 0)
Representation of characters
Different methods to represent characters in computer memory are: ASCII, Unicode, ISCII, EBCDIC
ASCII
• It stands for American Standard Code for Information Interchange
• ASCII uses 7 bits for each character, can represent only 128 characters.
• Another version is ASCII-8, which uses 8 bits, can represent 256 characters.
EBCDIC
• It stands for Extended Binary Coded Decimal Interchange Code.
• It is an 8 bit code used in IBM Machines. It can represent 256 characters.
ISCII
• It stands for Indian Standard Code for Information Interchange or Indian Script
Code for Information Interchange.
• It is an 8 bit code for representing various writing systems of India.
Unicode
• Unicode used 16 bits which can represent up to 65,536 characters.
• It can represent data in almost all written languages of the world.
Sample Questions
1. Meaningful and processed form of data is known as ..............
2. The number of symbols used in a number system is called ...............
3. ASCII stands for .................
4. The base of hexadecimal number system is ..............
(2, 8, 10, 16)
ACT MLPM 7
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
ACT MLPM 8
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
CHAPTER 2
Components of the Computer System
Motherboard
• A motherboard is a Printed Circuit Board to which all the major components of a computer
(processor, memory, etc.) are connected.
a. Serial port
• A serial port transmit data one bit at a time.
• It was used to connect modem, mouse and keyboard.
b. Parallel port
• Parallel ports can transmit several bits of data at a time.
ACT MLPM 9
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
ACT MLPM 10
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• Cache memory is a small and fast memory between the processor and RAM.
• Frequently accessed data and instructions are stored in cache memory for quick access.
• Cache is faster than RAM.
• Cache is more expensive than RAM.
b. Secondary memory (Auxiliary memory)
• Secondary memory is used to store large amount of data or programs permanently.
• It is non-volatile, i.e. its contents are retained even when the device is powered off.
• It is much larger in size than RAM.
• It is slower than RAM.
• It acts as a backup.
The major categories of secondary storage devices are:
(i) Magnetic storage devices. Eg:- magnetic tapes, floppy disks, hard disks.
(ii) Optical storage devices. Eg:- CD, DVD, Blu-Ray DVD
(iii) Semiconductor storage devices. Eg:- USB flash drive, Flash memory cards
Input devices
An input device is used to feed data and instructions into the computer.
Different types of input devices are:
1. Keyboard: It is an input device used to input alphabets, numbers and other characters.
2. Mouse: It is a hand-held device that controls the movement of the cursor on a display
screen.
3. Light pen: It is a light-sensitive pointing device used to draw pictures on a computer
screen.
4. Touch screen: It allows the user to operate the computer by simply touching on the
display screen.
5. Graphic tablet: It allows artists to create graphical images.
6. Touchpad: It is a pointing device used to move the mouse pointer on a display screen.
7. Joystick: It is a pointing device commonly used for playing video games.
8. Microphone: It is used to input sound.
9. Scanner: It is an input device that scans documents such as photos and pages of text.
10. Optical Mark Reader (OMR): It reads pencil marks made on pre-defined positions on the
OMR form. It is used to process competitive exam results quickly and accurately.
11. Barcode Reader/Quick Response (QR) code reader
• Barcode readers are electronic devices for reading printed barcodes.
• A QR code is similar to barcodes. Barcodes are single dimensional whereas QR codes are two
dimensional. It can store website URLs, plain text, phone numbers, etc.
12. Magnetic Ink Character Recognition (MICR) Reader: It is used in banks for faster
clearing of cheques.
13. Biometric sensor: It is used to identify unique human physical features like fingerprints,
retina, etc.
14. Smart card reader: A smart card is a plastic card that stores and transacts data (Eg:- ATM
Card). Smart card readers are used to access data in a smart card.
ACT MLPM 11
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
15. Digital camera: It can take pictures and videos and that can be transferred to a computer.
Output devices
Output device is used to present information from a computer system.
Hard copy and Soft copy output
• Hard copy outputs are permanent outputs which can be used at a later date or when
required.
Eg. for Hard copy output device: Printer, Plotter
• Soft copy outputs are electronic and are available on the screen in a digital form.
Eg. for Soft copy output device: Monitor
ACT MLPM 12
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
a. Operating system
• It is a set of programs that acts as an interface between the user and computer hardware.
Example:- DOS, Windows, Unix, Linux
Computer languages
High Level Language is like English language and is simpler to understand. Not
understandable to the computer. Example: C++
b. Language processor
ACT MLPM 13
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• It translates programs written in high level language or assembly language into its equivalent
machine language.
Application software
• Software developed for specific purpose is called application software.
• It includes general purpose software and specific purpose software.
ACT MLPM 14
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
Proprietary software
• It is a software that is an exclusive property of its developer and cannot be copied or distributed
without permission.
Eg:- Microsoft Windows OS, MS Office
Humanware
• Humanware or liveware refers to humans who use the computer.
Eg:- Computer programmers, Computer Operators, System Administrators, etc.
Sample Questions
1. 1 Byte = ............ bits
2. Name the software that translates assembly language program into machine language program.
3. Write the full form of HDMI.
4. OMR stands for .................
5. What is the importance of registers in computer system? Name any two registers.
6. Name any four ports on the motherboard.
7. Give two examples for free and open source software.
8. Compare RAM and ROM.
9. What is an input device? List and explain any two input devices.
10. What is an output device? List few commonly used output devices.
11. Categorize devices given below into input devices and output devices.
(Joystick, Scanner, Plotter, Microphone, Printer, Mouse, VDU, Speaker)
12. Compare dot matrix printers and laser printers.
13. Give two examples for non-impact printers.
14. Which printer is widely used as portable printer? Why?
15. Define (a) Plotter (b) 3D Printer
16. What is e-Waste? List and explain different e-waste disposal methods.
17. Define the term, green computing. How can you implement green computing?
18. Define (a) Assembler (b) Interpreter (c) Compiler
19. Define operating system. Give two examples for OS.
20. List four major functions of operating system.
21. What do you mean by free and open source software? Give two examples.
22. What are the four freedoms which make up free and open source software?
23. Compare Freeware and Shareware.
ACT MLPM 15
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
CHAPTER 3
Principles of Programming and Problem Solving
Advantages of flowchart
• Better communication
• Effective analysis
• Effective synthesis
• Effective synthesis
Limitations of Flowchart
• Time consuming
ACT MLPM 16
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• Modification is difficult
Eg: Write an algorithm and draw a flowchart to find the sum of two numbers
Step 1: Start
Step 2: Input A, B
Step 3: S=A+B
Step 4: Print S
Step 5: Stop
Eg: Write an algorithm and draw a flowchart to find the sum and average of three numbers
Step 1: Start
Step 2: Input A, B, C
Step 3: S=A+B+C
Step 4: Avg = S / 3
Step 5: Print S, Avg
Step 6: Stop
Eg: Write an algorithm and draw a flowchart to find the biggest of two numbers.
Step 1: Start
Step 2: Input N1, N2
Step 3: If N1 > N2 Then
Step 4: Print N1
Step 5: Else
Step 6: Print N2
Step 7: End of If
Step 8: Stop
Translation
ACT MLPM 17
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• Translation is the process of converting a program written in high level language into its
equivalent version in machine language.
• The program in machine language (Binary language) is called object code.
Source code -------> Translation ---------> Object
code
Debugging
• Programming errors are known as 'bugs'. The process of detecting and correcting errors is called
debugging.
There are three types of errors:
Syntax errors: Errors which occur when the rules or syntax of the programming language
are not followed.
Logical errors: Logical error, is due to improper planning of the program's logic.
Run-time errors: Errors which occur during program execution. Eg:- division by zero
Execution and testing
• It involves running the program to process the test data that will produce 'known results'.
Documentation
• Writing comments in the source code is known as internal documentation.
• It will help in debugging process and program modification at later stage.
• Preparing user manual and system manual are known as external documentation.
Sample Questions
1. Pictorial representation of algorithm is known as ....................
2. .................. is a step by step procedure to solve a problem.
3. Which flow chart symbol has one entry flow and two exit flows?
4. In a flowchart, ................ is used as the input/output symbol.
5. Source code is converted into object code during .................. phase in programming.
(Execution, Coding, Documentation, Translation)
6. A program written in High Level Language is called ........
7. List any two limitations of flowcharts.
8. Write any two advantages of flowcharts
9. Program errors are known as ..................
10. What is debugging?
11. List different phases in programming.
12. Define: (a) Syntax errors (b) Logical errors (c) Run-time errors
13. Write an algorithm to find the sum and average of 3 numbers.
14. What is the importance of proper documentation in programming ?
15. How will you choose the best algorithm for a problem ?
ACT MLPM 18
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
CHAPTER 4
Getting Starting with C++
Character set
• Fundamental units of C++ Language. It consists of letters, digits, special characters, white spaces
Tokens
• Tokens are Fundamental building blocks of C++ program. (Lexical units)
Classification of Tokens
Sample Questions
1. The non graphic symbols in C++ can be represented by using …………
2. The tokens that convey a specific meaning to the language compiler are called ............
3. Which among the following is not a character literal ?
( 'a' , '\a', a , '8' )
4. Pick odd one out
(sum , break, add, num_1 )
5. Classify the following identifiers as valid or invalid. If invalid, give a reason.
a) Height_1 b) _Height1 c) 1Height d) Height 1
6. Identify the tokens in the following C++ statement
int x=100;
7. What is the difference between float and “float” ?
8. Categorise the following into different types of tokens
a. result b. % c.# d. Float
9. Differentiate between the literals ‘p’ and “p” in C++.
ACT MLPM 19
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
ACT MLPM 20
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
CHAPTER 5
Data Types and Operators
Data types: Used to identify nature and type of data stored in a variable.
Fundamental data types:
Data Memory
Type of value Eg:
type (bytes)
void null or empty data 0
char character values 1 ‘A’, ‘\n’ Integral
datatypes
int integer values 4 84, -4
Numerical
float real values 4 datatypes
Floating
5.6, -89.5 point
Real values(more
double 8 datatypes
precision than float)
Float data has a precision of 7 digits and double data has a precision of 15 digits
Classification of operators
(a) Arithmetic operators : Used for arithmetic operations such as addition(+), subtraction(-),
multiplication(*), division(/) and modulus (%).
x y x+y x-y x*y x/y x%y
7 3 10 4 21 2 1(remainder)
ACT MLPM 21
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
Statements: Smallest executable unit of a program. C++ statement ends with semicolon (;)
1. Declaration statement: Specifies the type of data that will be stored in a variable.
Syntax: datatype var_name;
eg: float avg;
2. Assignment statements: It stores a value to a variable. Eg: a=15;
3. Input statements: Specifies an input operation. Eg: cin>>score;
4. Output statement: Specifies output operation. Eg: cout<<score;
ACT MLPM 22
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
Sample Questions
1. The ____ data_type is used for null or empty set of values.
2. Which among the following is the insertion operator?
( << , >> , < , > )
3. The fundamental data_type that uses 8 bytes of memory is ____.
4. Predict the output of the following expressions if m=7 and n=2
(i) m/y (ii) m%y (iii) (m==n) (iv) (m>10)&&(n<5)
5. Distinguish between == and = operators.
6. What is the importance of data_type ? Name two integral data_types in C++.
7. Find the R value and memory size of the variable total from the following c++ statement
float total = 34.6;
8. How is a binary operator different from a unary operator? Give one example each.
9. Write a C++ statement to declare a variable to store the mark of a student.
10. What are statements in C++? Explain any three types of statements with an example each.
11. The following are some fundamental data types in C++. Arrange them in any order of size (memory
usage).
int , void , double , char
12. Which are the numerical data types in C++?
13. Explain Logical operators in C++
ACT MLPM 23
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
CHAPTER 6
Introduction to Programming
Basic structure of a C++ Program
#include <headerfile> -----> line 1
using namespace identifier; ----> line 2
int main() ----> line 3
{
statements;
return 0;
}
Line 1: Preprocessor directive :
Instructs the compiler to perform an action before actual compilation. Starts with the
symbol #.
eg: #include<iostream> --instruction to link the header file iostream.
Line 2: namespace statement:
Tells the compiler to use namespace std in this program. std is the standard namespace in which
a lot of objects, including cin and cout are defined.
Line 3: Function header:
main() is the essential function for every C++ program. A C++ program starts and ends within
the main() function.
A sample program
#include<iostream>
using namespace std;
int main()
{
cout<<"Hello, Welcome to C++";
return 0;
}
Guidelines for coding
• Use suitable naming convention for identifiers
• Use clear and simple expressions
• Use comments wherever needed
• Relevance of indentation
Comments
Comments in C++ are used to describe the program.
There are two ways to write comments in C++:
• Single line comment: The characters // (two slashes) is used to write single line comments.
• Multiline comments: Anything written within /* and */ is treated as comment
Variable Initialisation:
(a) Supplying the initial value to a variable at the time of declaration.
eg: int n =5 ; or int n(5);
(b) Supplying the initial value to a variable during execution (dynamic initialisation).
eg: float sum=a+b;
Arithmetic assignment operators (C++ short hands)
The operators which combine arithmetic and assignment operators. They are +=, -=, *=,
/=, %=
eg: a=a+5 can be given as a+=5 a=a/10 can be given as a/=10
Increment (++) and Decrement (--) operators
++ is used to increment the value in a variable by 1.
ACT MLPM 24
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
Type modifiers
• Used to change the range and size of data_type
• Type modifiers in C++ are long, short, signed and unsigned
Type conversion
• Conversion of the data_type of an operand to another.
Two types of conversion:
1. Implicit (Type promotion): This is done by the compiler and the conversion is from lower
data_type to higher.
Eg: 5/2.0 => 2.5 (Here, int datatype of 5 is converted to float by compiler. Thus the result of the
float expression is also float)
2. Explicit (Type casting): This is done by the programmer explicitly and conversion can be to
any data_type.
Eg: 5/(int)2.0 => 2 (Here, programmer uses type casting (int) to convert the float data_type of 2.0
to int. Thus the result of this integer expression is also an integer.)
Sample Questions
1. .............. is the essential function for every C++ program.
2. Pick out the symbol which indicates a preprocessor directive.
( “ , $ , #, { )
3. Give the output for the following C++ code segment
int a=10, b=20;
a=b++;
cout<<a<<’\n’<<b;
4. Give the equivalent statement using arithmetic assignment operator for the following.
(a) a=a*35; (b) sum=sum+num;
5. What is variable initialisation? Give examples
6. Write four statements to increment the value of x by 1.
7. Write the output of given C++ statements giving explanations
1. cout << 5/2;
2. cout << 5.0/2;
8. Write C++ statements/expression for the following.
a) Display the message “We shall overcome”
b) Initialise an integer variable num with 25.
9. Explain type conversion in C++, listing out the different types with examples.
ACT MLPM 25
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
CHAPTER 7
Control Statements
Control Statements
The statements used to change the normal sequential flow of program execution.
Two types: (1) Decision (2) Iteration
1. Decision (Selection) Statements : Statements are selected for execution based on a condition.
Statement Syntax Example
if ( test expression )
{ if (mark>=18)
if statement
statement block; cout<<”Passed” ;
}
if ( test expression )
{
statement block 1; if (mark>=18)
if ...... else } cout<<”Passed” ;
statement else else
{ cout <<”Failed “ ;
statement block 2;
}
if ( test expression )
{
statement block 1;
}
else if ( test expression 2 )
if (mark>=80)
{
cout<<”A Grade”;
statement block 2 ;
else if(mark>=60)
}
if .... else ... if cout<<”B Grade “ ;
else if (test expression 3 )
ladder else if(mark>=40)
{
cout<<”C Grade”;
statement block 3 ;
else
}
cout<<”D Grade”;
.........................
else
{
statement block n;
}
switch(variable / expression)
{ switch(n)
case constant_1 : statement 1; {
break; case 1 : cout<<”One”;
case constant_2 : statement 2; break;
switch statement break; case 0 : cout<<”Zero”
case constant_3 : statement 3; break;
break; default :
............................................. cout<<”Invalid”;
default : statement n; }
}
ACT MLPM 26
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
All switch statements can be converted to else if ladder. But not all if-else if can
be converted to switch.
ACT MLPM 27
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
Sample Questions
1. The ................. block is executed in a switch, if no matching conditions are found.
(case, break, default, else)
2. Pick the odd one out
( while , do ... while , for )
3. Control Statements can be classified in to two. Explain each with example.
4. Write any two selection statements in C++ ?
5. Explain loop elements with a suitable example
6. How is entry controlled loops different from exit controlled loops ?
7. Compare switch and if else if ladder
8. “There are situations where if ..else if ladder cannot be rewritten using switch statement. What
are the situations?
9. Do as instructed :
(a) Rewrite using switch
if(ch==1) cout<<”Red”;
else if (ch==2) cout<<”Blue”;
else if (ch==3) cout<<”Green”;
else cout<<”Wrong code”;
(b) Rewrite using do while and identify the loop components.
for (a=5; a<=20; a++)
{
cout<<a*a ;
}
ACT MLPM 28
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
CHAPTER 8
Computer Networks
• Its a group of computers and other devices connected to each other electronically through a
communication medium
Communication Medium
• The medium for data transmission over a computer network is called communication channel
or communication medium.
• Two types: (1) Guided (2) Unguided
Guided Medium
• Coaxial cable, twisted pair cable (Ethernet cable) and optical fibre cable
(a) Twisted pair cable (Ethernet cable)
• Most widely used
• Two types: (1) Unshielded Twisted pair (UTP), (2) Shielded Twisted Pair (STP)
Characteristics of UTP cable
ACT MLPM 29
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• Low cost
• Thin and flexible
• Easy installation
• Carry data upto a length of 100m
Unguided Medium
• Electro magnetic waves are used for wireless communication
(a) Radio Waves
• Frequency range is 3KHz to 3 GHz
• Used for short and long distance communication
• Waves are transmitted in all directions
• Inexpensive than wired media
• Can penetrate through most objects
• Transmission can be affected by motors and other electric equipments
• Less secure
• Permission required for radio wave transmission
(b) Microwaves
• Frequency range is 300MHz to 300GHz
• Travels in straight line
• Can not penetrate any solid object
• Inexpensive than wired media
(c) Infrared Waves
• Frequency range is 300GHz to 400THz
• Used for short range communication
• Line of sight transmission
• Only two devices can communicate at a time
• Can not cross solid objects
• The longer the distance the weaker the performance
ACT MLPM 30
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
ACT MLPM 31
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• In bus topology, all the nodes are connected to a main cable called bus.
• A small device called a terminator is attached to each end of the bus.
• If a node has to send data to another node, it sends data to the bus. The signal travels through
the bus and each node checks the bus and only the intended node will accept the data. When the
signal reaches the end of the bus, the terminator absorbs the signal from the bus.
ACT MLPM 32
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• In ring topology, all nodes are connected using a cable that loops the ring or circle.
• A ring topology is in the form of a circle.
• Data travels only in one direction in a ring.
• Each node regenerates the signal and passes to the next node until it reaches the intended
node reaches.
Characteristics of ring topology
1) No signal amplification is required as each node amplifies the signal.
2) Requires less cable length and hence is cost-effective.
3) If one node fails, the entire network will fail.
4) Addition of nodes to the network is difficult.
Mesh Topology
ACT MLPM 33
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
Types of network
• On the basis of the area covered, computer networks are classified as:
PAN - Personal Area Network
LAN - Local Area Network
MAN - Metropolitan Area Network
WAN -Wide Area Network
Personal Area Network (PAN)
• PAN is a network of communicating devices (computer, mobile, tablet, printer, etc.) in the
proximity of an individual.
• It can cover an area of a radius of few meters.
LAN (Local Area Network)
• LAN is a network of computing and
• communicating devices in a room building or campus.
• It can cover an area of few meters to few kilometers.
MAN (Metropolitan Area Network)
• MAN is a network of computing and communication devices within a city.
• It can cover an area of a few kilometers to a few hundred kilometers radius.
• MAN is usually formed by interconnecting a number of LANs and individual computers.
WAN (Wide Area Network)
• WAN is a network of computing and communicating devices crossing the limits of a city,
country, or continent.
• It can cover an area of hundreds of Kilometers in radius.
Summary of PAN, LAN, MAN, WAN
Parameter PAN LAN MAN WAN
Transmission
High speed High speed Moderate speed Low speed
speed
Networking Moderately
Negligible Inexpensive Expensive
cost expensive
ACT MLPM 34
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
ACT MLPM 35
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• The first half (MM:MM:MM) of a MAC address contains the ID number of the adapter manufacturer.
• The second half (SS:SS:SS) of a MAC address represents the serial number assigned to the adapter
(NIC) by its manufacturer.
• eg. 00:A0:C9 : 14:C8:35
➢
Uniform Resource Locator(URL)
• Its a formatted string used to identify a network resource on the internet
• URL consists of letters, numbers and punctuations
• Three parts :
(1) Network Protocol
(2) Domain name
(3) Filename
CHAPTER 9
Internet
History of internet
ACT MLPM 36
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• Popular broadband technologies are Integrated Service Digital Network(ISDN), Cable Internet,
Digital Subscriber Line(DSL), Leased Lines and Fiber to the Home(FTTH)
ACT MLPM 37
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• Uses coaxial cables laid for television signal transmission to our home
• Uses a cable modem
• It can provide speed between 1Mbps to 10Mbps
3. Digital Subscriber Line (DSL)
• Uses standard telephone lines
• Use the copper telephone lines for both internet communication and for making the voice
calls simultaneously
• ADSL(Asymmetric Digital Subscriber Line) is the common subcatagory
• Speed ranges from 256Kbps to 24Mbps
• Most popular broadband service available in india
4. Leased line
• It is the dedicated lines used to provide internet facility
• Speed ranges from 2Mbps to 100Mbps
5. Fibre To The Home (FTTH)
• Uses optical fibers for data transmission
• High speed connectivity
Wireless broadband connectivity
• Popular wireless broadband accesses are Mobile Broadband, Wi-Max, Satellite Broadband and Wi-
Fi
1. Mobile Broadband
• Its a wireless internet access using mobile phone
• The modem is built into the devices like mobile phones, tablet etc.
• Offer the freedom to allow the user to access the internet from anywhere on the move
• It uses the cellular network of the mobile phones for data transmission
2. Wi-Max
• Worldwide Interoperability for Microwave Access
• Its an alternative for wired broadband
• It can provide wireless internet access upto a distance of 50KM
• It can provides speed upto 70Mbps
3. Satellite broadband
• Internet connectivity is provided through satellite
• A very small aperture Terminal (VSAT) dish antenna and a transceiver (Transmitter and
Receiver) are required at the users location
• Speed upto 1Gbps
• Most expensive forms of broadband internet
• Used by banks, stock exchanges, governments etc.
Internet Access sharing methods
1. Using LAN
• The internet connection in a computer can be shared among other computers in the LAN
• It can done using the features of the Operating system or using proxy server software
2. Using Wi-Fi network
• The internet connectivity can shared using Wi-Fi router or wireless network access point,
popularly called hotspot
• It has a range of about 100 meters
• Less secure than wired connection
3. Using Li-Fi network
• Fast optical version of wifi
• Data rate is 100Mbps
• It can be used in aircrafts and hospitlas
ACT MLPM 38
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
Services on Internet
• The internet offers a variety of services like WWW, e-mail, search engines, social media.
1) World Wide Web (WWW)
• WWW is a huge client-server system consisting of millions of clients and servers connected
together.
a) Browser :
• A web browser is a software that we use to retrieve or present information and to navigate
through web pages in the World Wide Web.
• Some common browsers are Google Chrome, Internet Explorer, Mozilla Firefox, Opera, and
Safari.
b) Web browsing:
• Traversing through the web pages of World Wide Web is called web browsing.
ACT MLPM 39
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
ACT MLPM 40
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
CHAPTER 10
IT Applications
e-Governance
• Government uses Internet and communication technology for delivering their services for the
people.
Types of interactions in e-Governance
1) Government to Government (G2G)
• It is the sharing of data or information between government department or organizations.
2) Government to Citizens (G2C)
• It creates an interface between the government and citizens. Here the citizens enjoy a large
range of public services.
3) Government to Business (G2B)
• The business people can interact with the government by using ICT tools.
4) Government to Employee (G2E)
ACT MLPM 41
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• Government uses information and communication tools for the interaction with their
employees.
e-Governance Infrastructure
1. State Data Center (SDC)
• Responsible for delivering online services for the citizens, keeping the central database of the
state, securing data storage.
2. Kerala State Wide Area Network (KSWAN)
• It acts as a backbone of the e-Governance infrastructure
• It connects Thiruvananthapuram, Kochi, and Kozhikode as its hubs and extends to all the 14
districts linking each of the 152 Block Panchayaths.
3. Common Service Centers (CSC)
➢ It is the front end delivery point of the e-Governance services for the rural areas.
➢ It helps in utility payments such as electricity, telephone and water bills, submission of on line
applications etc.
➢ Eg: Akshaya Centres
e-Business
• It is the sharing of business information, maintaining business relationships and conducting
business transactions with the help of information technology.
1. e-Commerce and e-Business
• e-Commerce covers business transaction that involves exchange of money
• e-Business includes all aspects of running a business such as marketing, obtaining raw
materials or goods, customer education, looking for suppliers, etc.
2. Electronic Payment System (EPS)
• A system of financial exchange between buyers and sellers in an online environment is
called EPS.
• The financial exchange is done by credit/debit card, electronic cheque or digital cash.
3. e-Banking
• it is the automated delivery of banking services directly to customers through electronic
channels.
Advantage of e-Business
• It overcomes geographical limitation
• Reduces the operational cost
• It minimises travel time and cost
• It remains open all the time
• We can locate the product quicker from the wider range of choice
Challenges to e-Business
• Lack of knowledge about e-Business and its possibilities.
• Rural population do not possess plastic money- credit card, debit card and net banking system.
• If not used with caution, customers may lose valuable information like their credit card number,
passwords, etc.
• Customers don't have this ‘touch and feel’ advantage.
• Efficient shipment facility is needed.
e-Learning
• The use of electronic media and IT in education is termed e-Learning.
e-Learning Tools
1. Electronics Book Reader (e-Books)
• Portable computer devices that are loaded with digital book content via communication
interfaces is called electronic books reader
ACT MLPM 42
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
2. e- Text
• Textual information available in electronic format is called e-Text
3. Online Chat
• It is a real-time exchange of text messages between two or more persons over the internet
4. e-Content
• The e-Learning materials such as videos, presentations, animations, graphics etc. are called e-
Content.
5. Educational TV channels
• These television channels are dedicated for e-Learning purpose.
• These channels broadcast recorded classes on various subjects, interviews with experts, lab
experiments etc.
Advantages of e-Learning
• It can offer courses on a variety of subjects to large number of students from a distant location.
• Cost for learning is much less
• Students can do online courses from various nationally or internationally reputed institutions.
• Time and place is not a constraint for e-Learning.
Challenges to e-Learning
• Face to face contact between students and teachers is not possible.
• Limited interaction between teachers and students
• Computers or any similar kind of devices and high speed Internet is required for e-Learning
• Students will not get any individual attention
• Hands-on practicals in real laboratory scenario is also a constraint in e-Learning.
ICT application in health care
• Medical equipments: Most of the medical equipments such as ECG, ECHO test, TMT, CT scanner
etc...work with the help of computers.
• Electronic Medical Record (EMR): It is a digital version of a paper chart that contains all of a
patient's medical history from one practice.
• Web based support: Internet is used by the doctors to acquire information to diagnose and give
treatments to the patients who are suffering from diseases.
• Telemedicine: With the help of Tele-Medicine equipment doctors and nurses can examine
patients in remote location by monitoring patients condition. Telemedicne is implemented with a
telephone and computer.
• Research and development: The role of computers in different field of research and
development unavoidable.
ICT enabled services:
• Business Process Outsourcing (BPO): The process of hiring a third party service provider to do
the operations and responsibilities of specific business functions. It may also involve transferring
of employees and asset from one firm to another. It increases the efficiency in services and saves
cost.
Eg. Costumer care service.
• Knowledge Process Outsourcing (KPO): Knowledge and information related work is carried
out by different company or subsidiary within the organization. It includes data search, data
integration, market research etc.
• Call center: A call center (also called service center, sales center, contact center etc..) is a
telephone service facility set up to handle a large number of incoming and outgoing calls for
supporting various responsibilities of an organization.
• Teleconferencing: Teleconferencing is a meeting or conference held between two or more
parties in remote locations by use of IT infra structure and services.
ACT MLPM 43
Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®
• Video Conferencing: Video conferencing is a type of teleconferencing in which the video of the
parties involved in the conference is also included. A video camera and microphone and
communication system is needed.
Sample Questions
1. Write any two challenges for implementing e-Governance.
2. e-Learning allows us to overcome many limitations of conventional teaching-learning process.
a) Name any three e-Learning tools for enhancing e-Learning process.
b) Write any three advantages of e-Learning.
3. Compare the advantage and disadvantages of implementing e-Business.
4. Almost all services and business are available online now.
a) Name the system that facilitates money transaction between buyers and sellers in
such cases.
b) Explain the infrastructure of e-Governance.
5. Briefly describe any two benefits of e-Governance.
6. Distinguish between teleconferencing and video conferencing?
7. What is the role of ICT in Health care?
8. What is mean by Knowledge Process Outsourcing (KPO)?
Prepared by:
LIJU MATHEW MARTHOMA HSS CHUNGATHARA
PRIYA M D GHSS PURATHUR
MOHAMMED JASIM K DHOHSS POOKKARATHARA
ABDUL MAJEED C GHSS PATTIKKAD
VARUN C S PMSAMAHSS CHEMMANKADAVU
ROSHID P K MES HSS MAMPAD
ACT MLPM 44