0% found this document useful (0 votes)
42 views99 pages

FOC Notes

Uploaded by

ikeditor345
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views99 pages

FOC Notes

Uploaded by

ikeditor345
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 99

Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)

Class: F.Y. BBA Semester- II

UNIT-I
INTRODUCTION TO COMPUTERS

Computer

“A computer is a programmable electronic device that accepts raw data as input and processes it

with a set of instructions (a program) to produce the result as output. It renders output just after

performing mathematical and logical operations and can save the output for future use”.

The characteristics of the computer system are as follows –

Page 1
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Characteristics of Computer

Speed

A computer works with much higher speed and accuracy compared to humans while performing

mathematical calculations. Computers can process millions (1,000,000) of instructions per second.

The time taken by computers for their operations is microseconds and nanoseconds.

Accuracy

Computers perform calculations with 100% accuracy. Errors may occur due to data

inconsistency or inaccuracy.

Diligence

A computer can perform millions of tasks or calculations with the same consistency and accuracy.

It doesn‟t feel any fatigue or lack of concentration. Its memory also makes it superior to that of

human beings.

Versatility

Versatility refers to the capability of a computer to perform different kinds of works with same

accuracy and efficiency.

Reliability

A computer is reliable as it gives consistent result for similar set of data i.e., if we give same set

of input any number of times, we will get the same result.

Page 2
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Automation

Computer performs all the tasks automatically i.e. it performs tasks without manual intervention.

Memory

A computer has built-in memory called primary memory where it stores data. Secondary storage

are removable devices such as CDs, pen drives, etc., which are also used to store data.

1. Explain block diagram of computer with its functions.

Answer:

A Block diagram of a computer displays a structural representation of a computer system. The

block diagram gives you a quick overview of the working process of a computer from inputting

the data to retrieving the desired results.

The following diagram represents a block diagram of the computer system:

Page 3
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

A computer system is a combination of three components:

• Input Unit

• CPU (Central Processing Unit)

• Output Unit

Input Unit

The Input Unit consists of input devices such as a mouse, keyboard, scanner, joystick, etc. These

devices are used to input information or instruction into the computer system. Like other

Page 4
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

electronic machines, a computer takes inputs as raw data (binary data) and performs necessary

processing giving out processed data. Therefore, the input unit is the medium of communication

that takes data from us to the computer in an organized manner for processing.

The Input Unit performs the following major functions:

• The input unit converts the inputted data or instructions into binary form for further processing.

• Input Unit transmits the data to the main memory of the computer.

Central Processing Unit

CPU or Central Processing Unit is known as the brain of the computer system. It is an electronic

hardware device that processes all the operations (e.g., arithmetic and logical operations) of the

computer. In other words, all the major calculations, operations or comparisons are performed

inside the CPU. It is also responsible for handling the operations of several other units.

CPU (Central Processing Unit) Structure Diagram

In the above diagram, the Control Unit (CU) and Arithmetic & Logic Unit (ALU) are jointly

called the Central Processing Unit (CPU).

Let's discuss all the parts displayed in the above diagram one by one:

Control Unit

As the name suggests, the control unit of a CPU controls all the activities and operations of the

computer. It is also responsible for controlling input/output, memory, and other devices

Page 5
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

connected to the CPU.

The control unit acts like the supervisor which determines the sequence in which computer

programs and instructions are executed. It retrieves instructions from memory, decodes the

instructions, interprets the instructions and understands the sequence of tasks to be performed

accordingly. It further transmits the instructions to the other parts of the computer system to

execute them. In short, the control unit determines the sequence of operations to execute the given

instructions.

Arithmetic & Logic Unit

The data inputted through input devices is stored in the primary storage unit. The Arithmetic Logic

Unit (ALU) performs arithmetic and logical operations.

The arithmetic unit controls simple operations such as addition, subtraction, division, and

multiplication.

On the other side, the logical unit controls the logical operations such as AND, OR, Equal, greater

than, and less than, etc. Apart from it, the logic unit also responsible for performing several other

operations such as comparing, selecting, matching, and merging data.

The information or data is transmitted to ALU from the storage unit only when it is required. After

completing the operations, the result is either returned to the storage unit for further processing or

getting stored.

Page 6
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Memory Unit

Memory Unit is an essential part of the computer system which is used to store data and

instructions before and after processing. The memory unit transmits the information to other units

of the computer system when required.

There are two types of memory units:

Primary Memory

The primary memory cannot store a vast amount of data. The data stored in the primary memory

is temporary. The data will be lost if they are disconnected from the power supply. The primary

memory usually stores the input data and immediate calculation results. The primary memory is

also known as the Main Memory or temporary memory. Random Access Memory (RAM) is an

example of primary memory.

Secondary Memory

The use of primary memory is not possible to store data permanently for future access. Therefore,

there are some other options to store the data permanently for future use, which is known as

secondary memory or auxiliary storage or permanent storage. The data stored in the secondary

memory is safe even when there is a power failure or no power supply. Hard Disk is usually

considered a secondary memory.

Note: Primary memory is the only memory that is directly accessible to the CPU. Secondary

memory is not directly accessible to the CPU. The data accessed from the secondary unit is first

loaded into RAM and then further transferred to the Processing Unit. The use of different

Page 7
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

memory units depends entirely on the size of the data.

The Central Processing Unit performs the following major functions:

• The CPU controls all components, software and data processing of the computer system.

• The CPU takes data from input devices, executes the data, and sends output to the output

devices.

• The CPU processes all the operations, including all the arithmetical and logical operations.

Output Unit

The output unit consists of devices that are used to display the results or output of processing. The

output data is first stored in the memory and then displayed in human-readable form throughoutput

devices. Some of the widely used output devices are Monitor, Printer, and Projector.

The Output Unit performs the following major functions:

• The output unit accepts the data or information in binary form from the main memory of the

computer system.

• The output unit converts the binary data into a human-readable form for better understanding.

2. What are input devices? Explain with example

Answer:

Input Devices

Page 8
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Input device enables the user to send data, information, or control signals to a computer. The

Central Processing Unit (CPU) of a computer receives the input and processes it to produce the

output.

Some of the popular input devices are:

• Keyboard

• Mouse

• Scanner

• Joystick

• Light Pen

• Digitizer

• Microphone

• Magnetic Ink Character Recognition (MICR)

• Optical Character Reader (OCR)

• Digital Camera

• Paddle

• Steering Wheel

• Gesture recognition devices

• Light Gun

• Touch Pad

• Remote

• Touch screen

Page 9
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• VR

• Webcam

• Biometric Devices

1) Keyboard

The keyboard is a basic input device that is used to enter data into a computer or any other

electronic device by pressing keys. It has different sets of keys for letters, numbers, characters, and

functions. Keyboards are connected to a computer through USB or a Bluetooth device for wireless

communication.

Types of keyboards: There can be different types of keyboards based on the region and language

used. Some of the common types of keyboards are as follows:

2) Mouse

The mouse is a hand-held input device which is used to move cursor or pointer across the screen.

It is designed to be used on a flat surface and generally has left and right button and a scroll wheel

between them. Laptop computers come with a touchpad that works as a mouse. It lets you control

the movement of cursor or pointer by moving your finger over the touchpad. Some mouse comes

with integrated features such as extra buttons to perform different buttons.

The mouse was invented by Douglas C. Engelbart in 1963. Early mouse had a roller ball integrated

as a movement sensor underneath the device. Modern mouse devices come with optical technology

that controls cursor movements by a visible or invisible light beam. A mouse is connected to a

computer through different ports depending on the type of computer and type of

Page 10
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

a mouse.

3) Scanner

The scanner uses the pictures and pages of text as input. It scans the picture or a document. The

scanned picture or document then converted into a digital format or file and is displayed on the

screen as an output. It uses optical character recognition techniques to convert images into digital

ones. Some of the common types of scanners are as follows:

4) Joystick

A joystick is also a pointing input device like a mouse. It is made up of a stick with a spherical

base. The base is fitted in a socket that allows free movement of the stick. The movement of stick

controls the cursor or pointer on the screen.

The first joystick was invented by C. B. Mirick at the U.S. Naval Research Laboratory. A joystick

can be of different types such as displacement joysticks, finger-operated joysticks, hand operated,

isometric joystick, and more. In joystick, the cursor keeps moving in the direction of the joystick

unless it is upright, whereas, in mouse, the cursor moves only when the mouse moves.

Light Pen

A light pen is a computer input device that looks like a pen. The tip of the light pen contains a

light-sensitive detector that enables the user to point to or select objects on the display screen. Its

light sensitive tip detects the object location and sends the corresponding signals to the CPU. It is

not compatible with LCD screens, so it is not in use today. It also helps you draw on the screen if

Page 11
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

needed. The first light pen was invented around 1955 as a part of the Whirlwind project at the

Massachusetts Institute of Technology (MIT).

Digitizer

Digitizer is a computer input device that has a flat surface and usually comes with a stylus. It

enables the user to draw images and graphics using the stylus as we draw on paper with a pencil.

The images or graphics drawn on the digitizer appear on the computer monitor or display screen.

The software converts the touch inputs into lines and can also convert handwritten text to

typewritten words.

It can be used to capture handwritten signatures and data or images from taped papers.

Furthermore, it is also used to receive information in the form of drawings and send output to a

CAD (Computer-aided design) application and software like AutoCAD. Thus, it allows you to

convert hand-drawn images into a format suitable for computer processing.

Microphone

The microphone is a computer input device that is used to input the sound. It receives the sound

vibrations and converts them into audio signals or sends to a recording medium. The audio signals

are converted into digital data and stored in the computer. The microphone also enables the user

to telecommunicate with others. It is also used to add sound to presentations and with webcams

for video conferencing.

Magnetic Ink Character Recognition (MICR)

MICR computer input device is designed to read the text printed with magnetic ink. MICR is a

Page 12
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

character recognition technology that makes use of special magnetized ink which is sensitive to

magnetic fields. It is widely used in banks to process the cheques and other organizations where

security is a major concern. It can process three hundred cheques in a minute with hundred- percent

accuracy. The details on the bottom of the cheque (MICR No.) are written with magnetic ink. A

laser printer with MICR toner can be used to print the magnetic ink.

The device reads the details and sends to a computer for processing. A document printed in

magnetic ink is required to pass through a machine which magnetizes the ink, and the magnetic

information is then translated into characters.

Optical Character Reader (OCR)

OCR computer input device is designed to convert the scanned images of handwritten, typed or

printed text into digital text. It is widely used in offices and libraries to convert documents and

books into electronic files.

It processes and copies the physical form of a document using a scanner. After copying the

documents, the OCR software converts the documents into a two-color (black and white),version

called bitmap. Then it is analyzed for light and dark areas, where the dark areas are selected as

characters, and the light area is identified as background. It is widely used to convert hard copy

legal or historic documents into PDFs. The converted documents can be edited if required like we

edit documents created in ms word.

Digital camera:

It is a digital device as it captures images and records videos digitally and then stores them on a

Page 13
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

memory card. It is provided with an image sensor chip to capture images, as opposed to film used

by traditional cameras. Besides this, a camera that is connected to your computer can also be

called a digital camera.

It has photosensors to record light that enters the camera through the lens. When the light strikes

the photosensors, each of the sensors returns the electrical current, which is used to create the

images.

Biometric Devices:

Biometrics refers to a process in which a person is identified through his or her biological features

such as fingerprints, eye cornea, face structure, etc. It is done by using biometric devices, which

can be of different types based on their scanning features and abilities, such as:

i) Face Scanner:

Face Scanner

It is designed to identify a person by scanning his or her face. It takes the face measurements of a

person. For example, the distance between eyes, nose, and mouth, etc., accordingly, it confirms

the identity of a person. Besides this, it is smart enough to differentiate between a person's picture

and the real person.

ii) Hand Scanner:

The hand of a person can also be used to verify his or her identity as every person has a unique

pattern of veins in the palm, just like fingerprints. This device takes advantage of this feature; it

Page 14
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

identifies a person by scanning the palm of his hand. It uses infrared light to scan veins' patterns

and blood flowing in them. Palm is even more unique than fingerprints.

iii) Fingerprint Scanner:

It scans the fingerprints to identify people or for biometric authentication. This device is

developed, keeping in mind the fact that no two persons in the world can have the same

fingerprints. It is widely used in companies as a fingerprint attendance system to mark the

attendance of employees. This type of scanners captures the pattern of valleys and ridges found on

a finger and store it in the memory or database. When you press your finger on the given space, it

verifies the identity by using its pattern-matching software.

3. What are output devices? Explain with example

Answer:

Output Devices

The output device displays the result of the processing of raw data that is entered in the computer

through an input device. There are a number of output devices that display output in different ways

such as text, images, hard copies, and audio or video.

Some of the popular output devices are:

• Monitor

• CRT Monitor

• LCD Monitor

Page 15
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• LED Monitor

• Plasma Monitor

• Printer

• Impact Printers

• Character Printers

• Dot Matrix printers

• Daisy Wheel printers

• Line printers

• Drum printers

• Chain printers

• Non-impact printers

• Laser printers

• Inkjet printers

• Projector

1) Monitor

The monitor is the display unit or screen of the computer. It is the main output device that

displays the processed data or information as text, images, audio or video.

2) Printer

A printer produces hard copies of the processed data. It enables the user, to print images, text or

any other information onto the paper.

Page 16
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Based on the printing mechanism, the printers are of two types: Impact Printers and Non-impact

Printers.

3) Projector

Projector

A projector is an output device that enables the user to project the output onto a large surface such

as a big screen or wall. It can be connected to a computer and similar devices to project their

output onto a screen. It uses light and lenses to produce magnified texts, images, and videos. So,

it is an ideal output device to give presentations or to teach a large number of people.

Modern projects (digital projectors) come with multiple input sources such as HDMI ports for

newer equipment and VGA ports that support older devices. Some projectors are designed to

support Wi-Fi and Bluetooth as well. They can be fixed onto the ceiling, placed on a stand, and

more and are frequently used for classroom teaching, giving presentations, home cinemas, etc

A digital projector can be of two types:

Liquid Crystal Display (LCD) digital projector: This type of digital projectors are very popular as

they are lightweight and provide crisp output. An LCD projector uses transmissive technology to

produce output. It allows the light source, which is a standard lamp, to pass through the three

colored liquid crystal light panels. Some colors pass through the panels and some are blocked by

the panels and thus images are on the screen.

Page 17
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Digital Light Processing (DLP) digital projector: It has a set of tiny mirrors, a separate mirror for

each pixel of the image and thus provide high-quality images. These projectors are mostly used

in theatres as they fulfill the requirement of high-quality video output.

4. What are storage devices? Explain with example

Answer:

Computer Storage Device Definition: A hardware device which can be used to store digital data

and applications which may be in the form of images, video, audio, etc. is called a storage device.

It is a key component of a computer and the hard drive is one of its examples.

List of Computer Storage Devices

There are four types of devices in which computer data can be stored. Discussed below are the

same in detail.

Magnetic Storage Devices

The most commonly used storage devices in today‟s time are magnetic storage devices. Theseare

affordable and easily accessible. A large amount of data can be stored in these through magnetised

mediums.

A magnetic field is created when the device is attached to the computer and with the help of the

two magnetic polarities, the device is able to read the binary language and store the information.

Given below are the examples of magnetic storage devices.

Page 18
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Floppy Disk – Also known as a floppy diskette, it is a removable storage device which is

in the shape of a square and comprises magnetic elements. When placed in the disk reader

of the computer device, it spins around and can store information. Lately, these floppy

disks have been replaced with CDs, DVDs and USB drives

• Hard Drive – This primary storage device is directly attached to the motherboard‟s disk

controller. It is integral storage space as it is required to install any new program or

application to the device. Software programs, images, videos, etc. can all be saved in a hard

drive and hard drives with storage space in terabytes are also easily available now

• Zip Disk – Introduced by Iomega, is a removable storage device which was initially

released with a storage space of 100 MB which was later increased to 250 and then finally

750 MB

• Magnetic Strip – A magnetic strip is attached in the device comprising digital data. The

most suitable example for this is a debit card which has a strip placed on one of its sides

which stores the digital data

Optical Storage Devices

Such devices used lasers and lights to detect and store data. They are cheaper in comparison to

USB drives and can store more data. Discussed below are a few commonly used optical storage

devices.

• CD-ROM – This stands for Compact Disc – Read-Only Memory and is an external device

which can store and read data in the form of audio or software data

Page 19
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Blu-Ray Disc – Introduced in 2006, Blu-ray disk was backup up by major IT and computer

companies. It can store up to 25 GB data in a single-layer disc and 50 GB data in a dual-

layer disc

• DVD – Digital Versatile Disc is another type of optical storage device. It can be readable,

recordable, and rewritable. Recordings can be done in such devices and then can be

attached to the system

• CD-R – It is a readable Compact Disc which uses photosensitive organic dye to record

data and store it. They are a low-cost replacement for storing software and applications

5. List different types of computer

Answer:

Computers are divided into different types based on different criteria. Based on the size, a

computer can be divided into five types:

• Micro Computer

• Mini Computer

• Mainframe Computer

• Super Computer

• Workstations

1. Micro Computer:

It is a single-user computer which has less speed and storage capacity than the other types. It

Page 20
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

uses a microprocessor as a CPU. The first microcomputer was built with 8-bit microprocessor

chips. The common examples of microcomputers include laptops, desktop computers, personal

digital assistant (PDA), tablets, and smartphones. Microcomputers are generally designed and

developed for general usage like browsing, searching for information, internet, MS Office, social

media, etc.

2. Mini Computer:

Mini-computers are also known as "Midrange Computers." They are not designed for a single.

They are multi-user computers designed to support multiple users simultaneously. So, they are

generally used by small businesses and firms. Individual departments of a company use these

computers for specific purposes. For example, the admission department of a University can use

a Mini-computer for monitoring the admission process.

3. Mainframe Computer:

It is also a multi-user computer capable of supporting thousands of users simultaneously. They are

used by large firms and government organizations to run their business operations as they canstore

and process large amounts of data. For example, Banks, universities, and insurance companies use

mainframe computers to store the data of their customers, students, and policyholders,

respectively.

4. Super Computer:

Super-computers are the fastest and most expensive computers among all types of computers. They

have huge storage capacities and computing speeds and thus can perform millions of

Page 21
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

instructions per second. The super-computers are task-specific and thus used for specialized

applications such as large-scale numerical problems in scientific and engineering disciplines

including applications in electronics, petroleum engineering, weather forecasting, medicine,space

research and more. For example, NASA uses supercomputers for launching space satellites and

monitoring and controlling them for space exploration.

5. Work stations:

It is a single-user computer. Although it is like a personal computer, it has a more powerful

microprocessor and a higher-quality monitor than a microcomputer. In terms of storage capacity

and speed, it comes between a personal computer and minicomputer. Work stations are generally

used for specialized applications such as desktop publishing, software development, and

engineering designs.

7. What is number system? Which are different forms of number system?

Answer:

The Number System is the system of representing numbers. The various types of Number Systems

used in Maths and other applications are binary, decimal, octal, hexadecimal, etc.

Definition :

A Number System is defined as a system of writing to express numbers that can be easily

understood by the person it was intended for. It is the mathematical notation for representing

numbers of a given set by using various other digits along with other symbols in a predefined

structured manner. It hence proves to provide a unique representation for every number and

Page 22
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

represents the arithmetic and algebraic structure of the figures, thereby allowing us to operate

arithmetic operations like addition, subtraction, multiplication, and division.

The value of any digit in a number can be determined by:

• The digit

• Its position in the number

• The base of the number system

Types of Number System (International, Decimal, Octal, Indian, etc.)

There are various types of number systems in mathematics and computer science. The four most

common number system types are:

• Binary number system (Base-2)

• Decimal number system (Base- 10)

• Octal number system (Base-8)

• Hexadecimal number system (Base- 16)

8. List different types of monitor in detail.

Answer:

Common types of the mouse:

i) Trackball Mouse:

It is a stationary input device that has ball mechanism to move the pointer or cursor on the

Page 23
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

screen. The ball is half inserted in the device and can be easily rolled with finger, thumb or the

palm to move the pointer on the screen. The device has sensor to detect the rotation of ball. It

remains stationary; you don't need to move it on the operating surface. So, it is an ideal device if

you have limited desk space as you don't need to move it like a mouse.

ii) Mechanical Mouse:

It has a system of a ball and several rollers to track its movement. It is a corded type of mouse. A

mechanical mouse can be used for high performance. The drawback is that they tend to get dust

into the mechanics and thus require regular cleaning.

iii) Optical Mouse:

An optical mouse uses optical electronics to track its movement. It is more reliable than a

mechanical mouse and also requires less maintenance. However, its performance is affected by

the surface on which it is operated. Plain non-glossy mouse mat should be used for best results.

The rough surface may cause problems for the optical recognition system, and the glossy surface

may reflect the light wrongly and thus may cause tracking issues.

iv) Cordless or Wireless Mouse:

As the name suggests, this type of mouse lacks cable and uses wireless technology such as IrDA

(infrared) or radio (Bluetooth or Wi-Fi) to control the movement of the cursor. It is used to improve

the experience of using a mouse. It uses batteries for its power supply.

8. List different types of printer in detail.

Page 24
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

The impact printer uses a hammer or print head to print the character or images onto the paper.

The hammer or print head strikes or presses an ink ribbon against the paper to print characters and

images.

Impact printers are further divided into two types.

• Character Printers

• Line printers

A) Character Printers

Character printer prints a single character at a time or with a single stroke of the print head or

hammer. It does not print one line at a time. Dot Matrix printer and Daisy Wheel printer are

character printers. Today, these printers are not in much use due to their low speed and because

only the text can be printed. The character printers are of two types, which are as follows:

i) Dot Matrix Printer

Dot Matrix Printer is an impact printer. The characters and images printed by it are the patterns

of dots. These patterns are produced by striking the ink soaked ribbon against the paper with a

print head. The print head contains pins that produce a pattern of dots on the paper to form the

individual characters. The print head of a 24 pin dot matrix contains more pins than a 9 pin dot

matrix printer, so it produces more dots which results in better printing of characters. To produce

color output, the black ribbon can be changed with color stripes. The speed of Dot Matrix printers

is around 200-500 characters per second.

ii) Daisy Wheel Printer

Page 25
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Daisy Wheel Printer was invented by David S. Lee at Diablo Data Systems.It consists of a wheel

or disk that has spokes or extensions and looks like a daisy, so it is named Daisy Wheel printer. At

the end of extensions, molded metal characters are mounted. To print a character the printer rotates

the wheel, and when the desired character is on the print location the hammer hits disk and the

extension hits the ink ribbon against the paper to create the impression. It cannot be used to print

graphics and is often noisy and slow, i.e., the speed is very low around 25-50 characters per second.

Due to these drawbacks, these printers have become obsolete.

B) Line Printers:

Line printer, which is also as a bar printer, prints one line at a time. It is a high-speed impact printer

as it can print 500 to 3000 lines per minute. Drum printer and chain printer are examples of line

printers.

i) Drum Printer:

Drum printer is a line printer that is made of a rotating drum to print characters. The drum has

circular bands of characters on its surface. It has a separate hammer for each band of characters.

When you print, the drum rotates, and when the desired character comes under the hammer, the

hammer strikes the ink ribbon against the paper to print characters. The drum rotates at a very high

speed and characters are printed by activating the appropriate hammers. Although all the characters

are not printed at a time, they are printed at a very high speed. Furthermore, it can print only a

predefined style as it has a specific set of characters. These printers are known to be very noisy

due to the use of hammering techniques.

Page 26
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

ii) Chain Printer:

Page 27
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Chain Printer

Chain printer is a line printer that uses a rotating chain to print characters. The characters are

embossed on the surface of the chain. The chain rotates horizontally around a set of hammers, for

each print location one hammer is provided, i.e., the total number of hammers is equal to the total

number of print positions.

The chain rotates at a very high speed and when the desired character comes at the print location,

the corresponding hammer strikes the page against the ribbon and character on the chain.They can

type 500 to 3000 lines per minute. They are also noisy due to the hammering action.

Non-Impact Printer:

Non-impact printers don't print characters or images by striking a print head or hammer on the ink

ribbon placed against the paper. They print characters and images without direct physical contact

between the paper and the printing machinery. These printers can print a complete page at a time,

so they are also known as page printers. The common types of non-impact printers are Laser printer

and Inkjet printer:

i) Laser Printer:

Laser Printer

A laser printer is a non-impact printer that uses a laser beam to print the characters. The laser beam

hits the drum, which is a photoreceptor and draws the image on the drum by altering

Page 28
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

electrical charges on the drum. The drum then rolls in toner, and the charged image on the drum

picks the toner. The toner is then printed on the paper using heat and pressure. Once the document

is printed, the drum loses the electric charge,and the remaining toner is collected. The laser printers

use powdered toner for printing instead of liquid ink and produce quality print objects with a

resolution of 600 dots per inch (dpi) or more.

ii) Inkjet Printer:

Inkjet Printer

The inkjet printer is a non-impact printer that prints images and characters by spraying fine, ionized

drops of ink. The print head has tiny nozzles to spray the ink. The printer head moves back and

forth and sprays ionized drops of ink on the paper, which is fed through the printer. These drops

pass through an electric field that guides the ink onto the paper to print correct images and

characters.

An inkjet printer has cartridges that contain ink. Modern inkjet printers are color printers that have

four cartridges containing different colors: Cyan, Magenta, Yellow, and Black. It is capable of

printing high-quality images with different colors. It can produce print objects with a resolution of

at least 300 dots per inch (dpi).

Page 29
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

UNIT-II

Basics of Computer Networks & Internet

1. Define Operating System

Answer:

An operating system, or "OS," is software that communicates with the hardware and allows

other programs to run. It is comprised of system software, or the fundamental files your

computer needs to boot up and function. Every desktop computer, tablet, and smartphone

includes an operating system that provides basic functionality for the device.

Common desktop operating systems include Windows, OS X, and Linux. While each OS is

different, most provide a graphical user interface, or GUI, that includes a desktop and the

ability to manage files and folders. They also allow you to install and run programs written for

the operating system. Windows and Linux can be installed on standard PC hardware, while OS

X is designed to run on Apple systems. Therefore, the hardware you choose affects what

operating system(s) you can run.

2. Explain Functions of Operating System

Answer:

An Operating System provides services to both the users and to the programs.

• It provides programs an environment to execute.

Page 30
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• It provides users the services to execute the programs in a convenient manner.

Following are a few common services provided by an operating system −

• Program execution

• I/O operations

• File System manipulation

• Communication

• Error Detection

• Resource Allocation

• Protection

Program execution

Operating systems handle many kinds of activities from user programs to system programs

like printer spooler, name servers, file server, etc. Each of these activities is encapsulated as a

process.

A process includes the complete execution context (code to execute, data to manipulate,

registers, OS resources in use). Following are the major activities of an operating system with

respect to program management −

• Loads a program into memory.

• Executes the program.

• Handles program's execution.

Page 31
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Provides a mechanism for process synchronization.

• Provides a mechanism for process communication.

• Provides a mechanism for deadlock handling.

I/O Operation

An I/O subsystem comprises of I/O devices and their corresponding driver software. Drivers

hide the peculiarities of specific hardware devices from the users.

An Operating System manages the communication between user and device drivers.

• I/O operation means read or write operation with any file or any specific I/O device.

• Operating system provides the access to the required I/O device when required.

File system manipulation

A file represents a collection of related information. Computers can store files on the disk

(secondary storage), for long-term storage purpose. Examples of storage media include

magnetic tape, magnetic disk and optical disk drives like CD, DVD. Each of these media has

its own properties like speed, capacity, data transfer rate and data access methods.

A file system is normally organized into directories for easy navigation and usage. These

directories may contain files and other directions. Following are the major activities of an

operating system with respect to file management −

• Program needs to read a file or write a file.

Page 32
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• The operating system gives the permission to the program for operation on file.

• Permission varies from read-only, read-write, denied and so on.

• Operating System provides an interface to the user to create/delete files.

• Operating System provides an interface to the user to create/delete directories.

• Operating System provides an interface to create the backup of file system.

Communication

In case of distributed systems which are a collection of processors that do not share memory,

peripheral devices, or a clock, the operating system manages communications between all the

processes. Multiple processes communicate with one another through communication lines in

the network.

The OS handles routing and connection strategies, and the problems of contention and security.

Following are the major activities of an operating system with respect to communication −

• Two processes often require data to be transferred between them

• Both the processes can be on one computer or on different computers, but are connected

through a computer network.

• Communication may be implemented by two methods, either by Shared Memory or by

Message Passing.

Page 33
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Error handling

Errors can occur anytime and anywhere. An error may occur in CPU, in I/O devices or in the

memory hardware. Following are the major activities of an operating system with respect to

error handling −

• The OS constantly checks for possible errors.

• The OS takes an appropriate action to ensure correct and consistent computing.

Resource Management

In case of multi-user or multi-tasking environment, resources such as main memory, CPU

cycles and files storage are to be allocated to each user or job. Following are the major activities

of an operating system with respect to resource management −

• The OS manages all kinds of resources using schedulers.

• CPU scheduling algorithms are used for better utilization of CPU.

Protection

Considering a computer system having multiple users and concurrent execution of multiple

processes, the various processes must be protected from each other's activities.

Protection refers to a mechanism or a way to control the access of programs, processes, or

users to the resources defined by a computer system. Following are the major activities of an

operating system with respect to protection −

Page 34
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• The OS ensures that all access to system resources is controlled.

• The OS ensures that external I/O devices are protected from invalid access attempts.

• The OS provides authentication features for each user by means of passwords.

3. List and explain different types of operating system

Operating systems are there from the very first computer generation and they keep evolving

with time. In this chapter, we will discuss some of the important types of operating systems

which are most commonly used.

Batch operating system

The users of a batch operating system do not interact with the computer directly. Each user

prepares his job on an off-line device like punch cards and submits it to the computer operator.

To speed up processing, jobs with similar needs are batched together and run as a group. The

programmers leave their programs with the operator and the operator then sorts the programs

with similar requirements into batches.

The problems with Batch Systems are as follows −

• Lack of interaction between the user and the job.

• CPU is often idle, because the speed of the mechanical I/O devices is slower than the

CPU.

• Difficult to provide the desired priority.

Time-sharing operating systems

Page 35
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Time-sharing is a technique which enables many people, located at various terminals, to use

a particular computer system at the same time. Time-sharing or multitasking is a logical

extension of multiprogramming. Processor's time which is shared among multiple users

simultaneously is termed as time-sharing.

The main difference between Multiprogrammed Batch Systems and Time-Sharing Systems is

that in case of Multiprogrammed batch systems, the objective is to maximize processor use,

whereas in Time-Sharing Systems, the objective is to minimize response time.

Multiple jobs are executed by the CPU by switching between them, but the switches occur so

frequently. Thus, the user can receive an immediate response. For example, in a transaction

processing, the processor executes each user program in a short burst or quantum of

computation. That is, if n users are present, then each user can get a time quantum. When the

user submits the command, the response time is in few seconds at most.

The operating system uses CPU scheduling and multiprogramming to provide each user with

a small portion of a time. Computer systems that were designed primarily as batch systems

have been modified to time-sharing systems.

Advantages of Timesharing operating systems are as follows −

• Provides the advantage of quick response.

• Avoids duplication of software.

• Reduces CPU idle time.

Page 36
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Disadvantages of Time-sharing operating systems are as follows −

• Problem of reliability.

• Question of security and integrity of user programs and data.

• Problem of data communication.

Distributed operating System

Distributed systems use multiple central processors to serve multiple real-time applications

and multiple users. Data processing jobs are distributed among the processors accordingly.

The processors communicate with one another through various communication lines (such as

high-speed buses or telephone lines). These are referred as loosely coupled systems or

distributed systems. Processors in a distributed system may vary in size and function. These

processors are referred as sites, nodes, computers, and so on.

The advantages of distributed systems are as follows −

• With resource sharing facility, a user at one site may be able to use the resources

available at another.

• Speedup the exchange of data with one another via electronic mail.

• If one site fails in a distributed system, the remaining sites can potentially continue

operating.

• Better service to the customers.

Page 37
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Reduction of the load on the host computer.

• Reduction of delays in data processing.

Network operating System

A Network Operating System runs on a server and provides the server the capability to manage

data, users, groups, security, applications, and other networking functions. The primary

purpose of the network operating system is to allow shared file and printer access among

multiple computers in a network, typically a local area network (LAN), a private network or

to other networks.

Examples of network operating systems include Microsoft Windows Server 2003, Microsoft

Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD.

The advantages of network operating systems are as follows −

• Centralized servers are highly stable.

• Security is server managed.

• Upgrades to new technologies and hardware can be easily integrated into the system.

• Remote access to servers is possible from different locations and types of systems.

The disadvantages of network operating systems are as follows −

• High cost of buying and running a server.

Page 38
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Dependency on a central location for most operations.

• Regular maintenance and updates are required.

Real Time operating System

A real-time system is defined as a data processing system in which the time interval required

to process and respond to inputs is so small that it controls the environment. The time taken by

the system to respond to an input and display of required updated information is termed as the

response time. So in this method, the response time is very less as compared to online

processing.

Real-time systems are used when there are rigid time requirements on the operation of a

processor or the flow of data and real-time systems can be used as a control device in a

dedicated application. A real-time operating system must have well-defined, fixed time

constraints, otherwise the system will fail. For example, Scientific experiments, medical

imaging systems, industrial control systems, weapon systems, robots, air traffic control

systems, etc.

There are two types of real-time operating systems.

Hard real-time systems

Hard real-time systems guarantee that critical tasks complete on time. In hard real-time

systems, secondary storage is limited or missing and the data is stored in ROM. In these

systems, virtual memory is almost never found.

Page 39
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Soft real-time systems

Soft real-time systems are less restrictive. A critical real-time task gets priority over other tasks

and retains the priority until it completes. Soft real-time systems have limited utility than hard

real-time systems. For example, multimedia, virtual reality, Advanced Scientific Projects likes

undersea exploration and planetary rovers, etc.

4. Explain Windows operating system.

Answer:

Windows is a graphical operating system developed by Microsoft. It allows users to view

and store files, run the software, play games, watch videos, and provides a way to connect to

the internet. It was released for both home computing and professional works.

Microsoft introduced the first version as 1.0

It was released for both home computing and professional functions of Windows on 10

November 1983. Later, it was released on many versions of Windows as well as the current

version, Windows 10.

In 1993, the first business-oriented version of Windows was released, which is knownas

Windows NT 3.1. Then it introduced the next versions, Windows 3.5, 4/0, and Windows

2000. When the XP Windows was released by Microsoft in 2001, the company designed its

various versions for a personal and business environment. It was designed based on standard

x86 hardware, like Intel and AMD processor. Accordingly, it can run on different brands of

hardware, such as HP, Dell, and Sony computers, including home-built PCs.

Page 40
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Editions of Windows

Microsoft has produced several editions of Windows, starting with Windows XP. These

versions have the same core operating system, but some versions included advance features

with an additional cost. There are two most common editions of Windows:

o Windows Home

o Windows Professional

Windows Home

Windows Home is basic edition of Windows. It offers all the fundamental functions of

Windows, such as browsing the web, connecting to the Internet, playing video games, using

office software, watching videos. Furthermore, it is less expensive and comes pre-installed

with many new computers.

5. Explain Android operating system.

Answer:

Android is an open source and Linux-based Operating System for mobile devices such as

smartphones and tablet computers. Android was developed by the Open Handset Alliance, led

by Google, and other companies.

Android offers a unified approach to application development for mobile devices which means

developers need only develop for Android, and their applications should be able to run on

different devices powered by Android.

Page 41
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

The first beta version of the Android Software Development Kit (SDK) was released by Google

in 2007 where as the first commercial version, Android 1.0, was released in September 2008.

On June 27, 2012, at the Google I/O conference, Google announced the next Android version,

4.1 Jelly Bean. Jelly Bean is an incremental update, with the primary aim of improving the

user interface, both in terms of functionality and performance.

The source code for Android is available under free and open source software licenses. Google

publishes most of the code under the Apache License version 2.0 and the rest, Linux kernel

changes, under the GNU General Public License version 2.

Features of Android

Page 42
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

6. Explain iOS operating system

Answer:

IOS stands for iphone operating system. It is a proprietary mobile operating system of apple

for its handheld. It supports Objective-C, C, C++, Swift programming language. It is based

on the Macintosh OS X. iPhone, ipod and iPad all comes with IOS.

Features of IOS Platform

It has following features:

• Multitasking

• Social Media

• iCloud

• In-App purchase

• Game Center

• Notification Center

• Accelerometer

• Gyroscope

• Powerful APIs

• GPS

• High end processor

• Accessibility

Page 43
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Bluetooth

• Orientations

• Camera integration

• Location services

• Maps

• Email, contacts, web pages and messages etc.

History

iPhone was first release in June, 2007 and on September 5, 2007, Apple released the iPod Touch

which had most of the non phone abilities of the iPhone. In june 2010 apple rebranded iPhone Os

as iOS. iPad first generation was released in April 2010 and iPad Mini was released in November

2012.

To develop iOS application use following steps:

Page 44
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Register as a developer.

• Design beautiful app interfaces.

Page 45
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Learn the Objective-C language.

• Develop great apps.

• Learn about the technologies available to you.

• Access the documentation.

• Debug and test your app.

• Ship your app.

7. Define Networking

Answer:

Networking refers to the total process of creating and using computer networks, with respect to

hardware, protocols and software, including wired and wireless technology. It involves the

application of theories from different technological fields, like IT, computer science and

computer/electrical engineering.

8. What are different goals of network?

Answer:

Goals of Computer Networks: The following are some important goals of computer networks:

1. Resource Sharing –

Many organization has a substantial number of computers in operations, which arelocated

apart. Ex. A group of office workers can share a common printer, fax, modem, scanner,

etc.

Page 46
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

2. High Reliability –

If there are alternate sources of supply, all files could be replicated on two or more

machines. If one of them is not available, due to hardware failure, the other copies could

be used.

3. Inter-process Communication –

Network users, located geographically apart, may converse in an interactive session

through the network. In order to permit this, the network must provide almost error-free

communications.

4. Flexible access –

Files can be accessed from any computer in the network. The project can be begun on one

computer and finished on another.

Other goals include Distribution of processing functions, Centralized management, and allocation

of network resources, Compatibility of dissimilar equipment and software, Good network

performance, Scalability, Saving money, Access to remote information, Person to person

communication, etc.

9. List different applications of network.

Answer:

Page 47
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Computer Networks: Business Applications

Following are some business applications of computer networks:

1. Resource Sharing:

The goal is to make all programs, equipments(like printers etc), and especially data, available to

anyone on the network without regard to the physical location of the resource and the user.

2. Server-Client model:

One can imagine a company's information system as consisting of one or more databases and some

employees who need to access it remotely. In this model, the data is stored on powerful computers

called Servers. Often these are centrally housed and maintained by a system administrator. In

contrast, the employees have simple machines, called Clients, on their desks, using which they

access remote data.

3. Communication Medium:

A computer network can provide a powerful communication medium among employees. Virtually

every company that has two or more computers now has e-mail (electronic mail), which

employees generally use for a great deal of daily communication

4. eCommerce:

A goal that is starting to become more important in businesses is doing business with consumers

over the Internet. Airlines, bookstores and music vendors have discovered that many customers

like the convenience of shopping from home. This sector is expected to grow quickly in the

Page 48
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

future.

The most popular forms are listed in the below figure:

Mobile computers, such as notebook computers and Mobile phones, is one of the fastest-growing

segment of the entire computer industry.

Computer Networks: Home Applications

Some of the most important uses of the Internet for home users are as follows:

• Access to remote information

• Person-to-person communication

• Interactive entertainment

• Electronic commerce

Computer Networks: Mobile Users

Page 49
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

10. Explain with example types of network.

Answer:

A computer network is a group of computers linked to each other that enables the computer to

communicate with another computer and share their resources, data, and applications.

A computer network can be categorized by their size. A computer network is mainly of four

types:

o LAN(Local Area Network)

o PAN(Personal Area Network)

o MAN(Metropolitan Area Network)

o WAN(Wide Area Network)

LAN(Local Area Network)

o Local Area Network is a group of computers connected to each other in a small area such

Page 50
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

as building, office.

o LAN is used for connecting two or more personal computers through a communication

medium such as twisted pair, coaxial cable, etc.

o It is less costly as it is built with inexpensive hardware such as hubs, network adapters,

and ethernet cables.

o The data is transferred at an extremely faster rate in Local Area Network.

o Local Area Network provides higher security.

Page 51
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

PAN(Personal Area Network)

o Personal Area Network is a network arranged within an individual person, typically

within a range of 10 meters.

Page 52
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

o Personal Area Network is used for connecting the computer devices of personal use is

known as Personal Area Network.

o Thomas Zimmerman was the first research scientist to bring the idea of the Personal

Area Network.

o Personal Area Network covers an area of 30 feet.

o Personal computer devices that are used to develop the personal area network are the

laptop, mobile phones, media player and play stations.

There are two types of Personal Area Network:

Page 53
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

o Wired Personal Area Network

o Wireless Personal Area Network

Wireless Personal Area Network: Wireless Personal Area Network is developed by simply

using wireless technologies such as WiFi, Bluetooth. It is a low range network.

Wired Personal Area Network: Wired Personal Area Network is created by using the USB.

SQL CREATE TABLE

Examples Of Personal Area Network:

o Body Area Network: Body Area Network is a network that moves with a person. For

example, a mobile network moves with a person. Suppose a person establishes a network

connection and then creates a connection with another device to share the information.

o Offline Network: An offline network can be created inside the home, so it is also known

as a home network. A home network is designed to integrate the devices such asprinters,

computer, television but they are not connected to the internet.

Page 54
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

o Small Home Office: It is used to connect a variety of devices to the internet and to a

corporate network using a VPN

MAN(Metropolitan Area Network)

o A metropolitan area network is a network that covers a larger geographic area by

interconnecting a different LAN to form a larger network.

o Government agencies use MAN to connect to the citizens and private industries.

o In MAN, various LANs are connected to each other through a telephone exchange line.

o The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3,

ADSL, etc.

o It has a higher range than Local Area Network(LAN).

Page 55
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Uses Of Metropolitan Area Network:


o MAN is used in communication between the banks in a city.

o It can be used in an Airline Reservation.

o It can be used in a college within a city.

o It can also be used for communication in the military.

WAN(Wide Area Network)

o A Wide Area Network is a network that extends over a large geographical area such as

states or countries.

o A Wide Area Network is quite bigger network than the LAN.

o A Wide Area Network is not limited to a single location, but it spans over a large

geographical area through a telephone line, fibre optic cable or satellite links.

o The internet is one of the biggest WAN in the world.

o A Wide Area Network is widely used in the field of Business, government, and

education.

Page 56
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Examples Of WideArea Network:

o Mobile Broadband: A 4G network is widely used across a region or country.

o Last mile: A telecom company is used to provide the internet services to the customers

in hundreds of cities by connecting their home with fiber.

o Private network: A bank provides a private network that connects the 44 offices. This

network is made by using the telephone leased line provided by the telecom company.
Page 57
Advantages Of Wide Area Network:
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Following are the advantages of the Wide Area Network:

o Geographical area: A Wide Area Network provides a large geographical area. Suppose

Page 58
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

if the branch of our office is in a different city then we can connect with them through

WAN. The internet provides a leased line through which we can connect with another

branch.

o Centralized data: In case of WAN network, data is centralized. Therefore, we do not

need to buy the emails, files or back up servers.

o Get updated files: Software companies work on the live server. Therefore, the

programmers get the updated files within seconds.

o Exchange messages: In a WAN network, messages are transmitted fast. The web

application like Facebook, Whatsapp, Skype allows you to communicate with friends.

o Sharing of software and resources: In WAN network, we can share the software and

other resources like a hard drive, RAM.

o Global business: We can do the business over the internet globally.

o High bandwidth: If we use the leased lines for our company then this gives the high

bandwidth. The high bandwidth increases the data transfer rate which in turn increases the

productivity of our company.

Disadvantages of Wide Area Network:

The following are the disadvantages of the Wide Area Network:

o Security issue: A WAN network has more security issues as compared to LAN and MAN

network as all the technologies are combined together that creates the security

Page 59
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

problem.

o Needs Firewall & antivirus software: The data is transferred on the internet which can

be changed or hacked by the hackers, so the firewall needs to be used. Some people can

inject the virus in our system so antivirus is needed to protect from such a virus.

o High Setup cost: An installation cost of the WAN network is high as it involves the

purchasing of routers, switches.

o Troubleshooting problems: It covers a large area so fixing the problem is difficult.

Internetwork

o An internetwork is defined as two or more computer network LANs or WAN or computer

network segments are connected using devices, and they are configured by a local

addressing scheme. This process is known as internetworking.

o An interconnection between public, private, commercial, industrial, or government

computer networks can also be defined as internetworking.

o An internetworking uses the internet protocol.

o The reference model used for internetworking is Open System Interconnection(OSI).

Types Of Internetwork:

1. Extranet: An extranet is a communication network based on the internet protocol such

as Transmission Control protocol and internet protocol. It is used for information sharing.

Page 60
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

The access to the extranet is restricted to only those users who have login credentials. An extranet

is the lowest level of internetworking. It can be categorized as MAN, WAN or other computer

networks. An extranet cannot have a single LAN, atleast it must have one connection to the

external network.

2. Intranet: An intranet is a private network based on the internet protocol such

as Transmission Control protocol and internet protocol. An intranet belongs to an organization

which is only accessible by the organization's employee or members. The main aim of the

intranet is to share the information and resources among the organization employees. An intranet

provides the facility to work in groups and for teleconferences.

Intranet advantages:

o Communication: It provides a cheap and easy communication. An employee of the

organization can communicate with another employee through email, chat.

o Time-saving: Information on the intranet is shared in real time, so it is time-saving.

o Collaboration: Collaboration is one of the most important advantage of the intranet. The

information is distributed among the employees of the organization and can only be

accessed by the authorized user.

o Platform independency: It is a neutral architecture as the computer can be connected to

another device with different architecture.

o Cost effective: People can see the data and documents by using the browser and distributes

the duplicate copies over the intranet. This leads to a reduction in the cost.

Page 61
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

UNIT-III

INTRODUCTION TO SPREADSHEET AND PRESENTATION

1. What is Excel Spreadsheet?

Answer:

A spreadsheet is a file that exists of cells in rows and columns and can help arrange, calculate

and sort data. Data in a spreadsheet can be numeric values, as well as text,

formulas, references and functions.

The rows in a spreadsheet have numeric names (1, 2, 3 etc) and the columns have alphabetic

names (a, b, c etc), thus the names of cells subsequently exist of a letter and a number that

conveniently point out their position in the grid.

The most common reason to use spreadsheets is to store and organize data, like revenue,

payroll and accounting information. Spreadsheets allow the user to make calculations with this

data and to produce graphs and charts.

2. Explain features of Excel.

Answer:

1. Add Header and Footer

MS Excel allows us to keep the header and footer in our spreadsheet document.

2. Find and Replace Command

Page 62
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

MS Excel allows us to find the needed data (text and numbers) in the workbook and also

replace the existing data with a new one.

3. Password Protection

It allows the user to protect their workbooks by using a password from unauthorized access to

their information.

4. Data Filtering

Filtering is a quick and easy way to find and work with a subset of data in a range. A filtered

range displays only the rows that meet the criteria you specify for a column. MS Excel provides

two commands for filtering ranges:

• AutoFilter; which includes filter by selection, for simple criteria

• Advanced Filter; for more complex criteria

5. Data Sorting

Data sorting is the process of arranging data in some logical order. MS Excel allows us to sort

data either in ascending or descending order.

6. Built-in formulae

MS Excel has got many built-in formulae for sum, average, minimum, etc. We can use those

formulae as per our needs.

7. Create different charts (Pivot Table Report)

Page 63
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

MS Excel allows us to create different charts such as bar graph, pie- charts, line graphs, etc.

This helps us to analyze and compare data very easily.

8. Automatically edits the result

MS Excel automatically edits the result if any changes are made in any of the cells.

9. Formula Auditing

Using formula auditing we can graphically display or trace the relationships between cells and

formulas with blue arrows. We can trace the precedents (the cells that provide data to a specific

cell) or the dependents (the cells that depend on the value in a specific cell).

3. What are different list of charts in excel?

Answer:

Excel provides you different types of charts that suit your purpose. Based on the type of data,

you can create a chart. You can also change the chart type later.

Excel offers the following major chart types −

• Column Chart

• Line Chart

• Pie Chart

• Doughnut Chart

• Bar Chart

• Area Chart

Page 64
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• XY (Scatter) Chart

• Bubble Chart

• Stock Chart

• Surface Chart

• Radar Chart

• Combo Chart

Each of these chart types have sub-types. In this chapter, you will have an overview of the

different chart types and get to know the sub-types for each chart type.

Column Chart

A Column Chart typically displays the categories along the horizontal (category) axis and

values along the vertical (value) axis. To create a column chart, arrange the data in columns or

rows on the worksheet.

A column chart has the following sub-types −

• Clustered Column.

• Stacked Column.

• 100% Stacked Column.

• 3-D Clustered Column.

• 3-D Stacked Column.

• 3-D 100% Stacked Column.

• 3-D Column.

Page 65
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Line Chart

Line charts can show continuous data over time on an evenly scaled Axis. Therefore, they are

ideal for showing trends in data at equal intervals, such as months, quarters or years.

In a Line chart −

• Category data is distributed evenly along the horizontal axis.

• Value data is distributed evenly along the vertical axis.

To create a Line chart, arrange the data in columns or rows on the worksheet.

A Line chart has the following sub-types −

• Line

• Stacked Line

• 100% Stacked Line

• Line with Markers

• Stacked Line with Markers

• 100% Stacked Line with Markers

• 3-D Line

Pie Chart

Pie charts show the size of items in one data series, proportional to the sum of the items. The

data points in a pie chart are shown as a percentage of the whole pie. To create a Pie Chart,

arrange the data in one column or row on the worksheet.

Page 66
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

A Pie Chart has the following sub-types −

• Pie

• 3-D Pie

• Pie of Pie

• Bar of Pie

Doughnut Chart

A Doughnut chart shows the relationship of parts to a whole. It is similar to a Pie Chart with

the only difference that a Doughnut Chart can contain more than one data series, whereas, a

Pie Chart can contain only one data series.

A Doughnut Chart contains rings and each ring representing one data series. To create a

Doughnut Chart, arrange the data in columns or rows on a worksheet.

Bar Chart

Bar Charts illustrate comparisons among individual items. In a Bar Chart, the categories are

organized along the vertical axis and the values are organized along the horizontal axis. To

create a Bar Chart, arrange the data in columns or rows on the Worksheet.

A Bar Chart has the following sub-types −

• Clustered Bar

• Stacked Bar

• 100% Stacked Bar

Page 67
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• 3-D Clustered Bar

• 3-D Stacked Bar

• 3-D 100% Stacked Bar

Area Chart

Area Charts can be used to plot the change over time and draw attention to the total value

across a trend. By showing the sum of the plotted values, an area chart also shows the

relationship of parts to a whole. To create an Area Chart, arrange the data in columns or rows

on the worksheet.

An Area Chart has the following sub-types −

• Area

• Stacked Area

• 100% Stacked Area

• 3-D Area

• 3-D Stacked Area

• 3-D 100% Stacked Area

XY (Scatter) Chart

XY (Scatter) charts are typically used for showing and comparing numeric values, like

scientific, statistical, and engineering data.

A Scatter chart has two Value Axes −

Page 68
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Horizontal (x) Value Axis

• Vertical (y) Value Axis

It combines x and y values into single data points and displays them in irregular intervals, or

clusters. To create a Scatter chart, arrange the data in columns and rows on the worksheet.

Place the x values in one row or column, and then enter the corresponding y values in the

adjacent rows or columns.

Consider using a Scatter chart when −

• You want to change the scale of the horizontal axis.

• You want to make that axis a logarithmic scale.

• Values for horizontal axis are not evenly spaced.

• There are many data points on the horizontal axis.

• You want to adjust the independent axis scales of a scatter chart to reveal more

information about data that includes pairs or grouped sets of values.

• You want to show similarities between large sets of data instead of differences between

data points.

• You want to compare many data points regardless of the time.

o The more data that you include in a scatter chart, the better the comparisons you

can make.

A Scatter chart has the following sub-types −

• Scatter

Page 69
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Scatter with Smooth Lines and Markers

• Scatter with Smooth Lines

• Scatter with Straight Lines and Markers

• Scatter with Straight Lines

Bubble Chart

A Bubble chart is like a Scatter chart with an additional third column to specify the size of

the bubbles it shows to represent the data points in the data series.

A Bubble chart has the following sub-types −

• Bubble

• Bubble with 3-D effect

Stock Chart

As the name implies, Stock charts can show fluctuations in stock prices. However, a Stock

chart can also be used to show fluctuations in other data, such as daily rainfall or annual

temperatures.

To create a Stock chart, arrange the data in columns or rows in a specific order on the

worksheet. For example, to create a simple high-low-close Stock chart, arrange your data with

High, Low, and Close entered as Column headings, in that order.

A Stock chart has the following sub-types −

• High-Low-Close

Page 70
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

• Open-High-Low-Close

• Volume-High-Low-Close

• Volume-Open-High-Low-Close

Surface Chart

A Surface chart is useful when you want to find the optimum combinations between two sets

of data. As in a topographic map, colors and patterns indicate areas that are in the same range

of values.

To create a Surface chart −

• Ensure that both the categories and the data series are numeric values.

• Arrange the data in columns or rows on the worksheet.

A Surface chart has the following sub-types −

• 3-D Surface

• Wireframe 3-D Surface

• Contour

• Wireframe Contour

Radar Chart

Radar charts compare the aggregate values of several data series. To create a Radar chart,

arrange the data in columns or rows on the worksheet.

Page 71
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

A Radar chart has the following sub-types −

• Radar

• Radar with Markers

• Filled Radar

Combo Chart

Combo charts combine two or more chart types to make the data easy to understand, especially

when the data is widely varied. It is shown with a secondary axis and is even easier to read.

To create a Combo chart, arrange the data in columns and rows on the worksheet.

A Combo chart has the following sub-types −

• Clustered Column – Line

• Clustered Column – Line on Secondary Axis

• Stacked Area – Clustered Column

• Custom Combination

4. What is MS presentation?

Answer:

MS PowerPoint is a program that is included in the Microsoft Office suite. It is used to make

presentations for personal and professional purposes.

PowerPoint (PPT) is a powerful, easy-to-use presentation graphics software program that

Page 72
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

allows you to create professional-looking electronic slide shows.

The image given below shows the main page of MS PowerPoint, where a person lands when

the program is opened on a computer system:

5. Explain difference between animation and transition.

Answer:

Animations control how objects move onto, off of, and around your slides. Transitions control

how your presentation moves from one slide to the next. This lesson teaches you howto create

animations and transitions. It also teaches how to spell-check your document, how

to use the Outline and Slides tabs, how to use Sorter view, and how to print.

Page 73
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
Add Animations

You can animate the objects on your PowerPoint slides. PowerPoint provides four types of
animations: Entrance, Emphasis, Exit, and Motion Paths. An Entrance animation determines the

manner in which an object appears on a slide; for example, an object can move onto a slide. An

Emphasis animation does something to draw attention to an object; for example, the object can

become larger. An Exit animation determines the manner in which an object leaves a slide; for

example, an object can move off a slide. A Motion Paths animation determines how an object moves

around a slide; for example, an object can move from left toright.

After you add an animation, you can use the Custom Animation pane to modify it by choosing

an effect. Choosing an effect enables you to define what starts the animation, its properties

(such the direction from which an object moves onto the slide), and control the speed of the

animation. In addition, you can have an animation start when you click the mouse, start along

with the previous animation, or start at a specified time after the previous animation.

If the Auto Preview box is checked on the Custom Animation pane, PowerPoint provides you

with preview of your animation after you create it and each time you modify it. You can also

use the Play button on the Custom Animation pane to preview an animation.

To choose an effect:

1. Select the object you want to animate.

2. Choose the Animations tab.

3. Click the Custom Animation button . The Custom Animation pane

Page 74
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

appears.

4. Click the Add Effect button . A menu appears.

5. Choose the type of effect you want. A submenu appears.

6. Click the effect you want. PowerPoint applies the effect.

To modify an effect:

1. Click the down arrow next to the Start field on the Custom Animations pane and then select

the start method you want.

2. Click the down arrow next to the Property field on the Custom Animations pane and the

select the property you want. The Property field might be labeled Direction, Size, or some

other property.

3. Click the down arrow next to the Speed field on the Custom Animations pane and then

select the speed you want to apply to your animation.

To preview the animation, click the Play button on the Custom Animations pane.

EXERCISE 1

Add an Animation to a Slide

Page 75
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

1. Click Slide 2 on the Slides tab.

2. Select "Start saving early."

3. Choose the Animations tab.

4. Click the Custom Animation button . The Custom Animation pane

appears.

5. Click the Add Effect button . A menu appears.

6. Choose Entrance. A submenu appears.

7. Click Fly In. PowerPoint applies the effect. If the Auto preview box is checked,

PowerPoint automatically provides you with a preview of the animation.

Page 76
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Modify the Effect

1. Click the down arrow next to the Start field and then select After Previous.

2. Click the down arrow next to the Direction field and then select From Bottom.

3. Click the down arrow next to the Speed field and then select Medium.

Add Another Animation

1. Select "Apply for financial aid."

2. Click the Add Effect button . A menu appears.

3. Choose Entrance. A submenu appears.

4. Click Fly In. PowerPoint applies the effect. If the Auto preview box is checked,

PowerPoint automatically provides you with a preview of the animation.

Page 77
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Modify the Animation

1. Click the down arrow next to the Start field and then select After Previous. The Apply for

Financial Aid field appears in the center of the Custom Animation pane.

2. Click the down arrow next to the Apply for Financial Aid field and then click Timing.

The Fly In dialog box appears.

Page 78
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

3. Type 0.05 in the Delay text box.

4. Click OK.

5. Click the down arrow next to the Direction field and then select From Bottom.

6. Click the down arrow next to the Speed field and then select Medium. If the Auto preview

box is checked, PowerPoint automatically provides you with a preview of the animation.

You can click the Play button on the Custom Animation pane at

anytime to preview an animation.

Page 79
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Add Transitions

Transitions determine how your presentations move from one slide to the next. For example,

a slide can move up onto the screen and replace the previous slide. PowerPoint provides several

transition methods. You can add sound to a transition and you can control its speed. You can

apply a transition to selected slides or to all of the slides in your presentation.

A transition can occur when the presenter clicks the mouse or after the amount of time you

specify.

To apply a transition to selected slides:

1. On the Slides tab, hold down the Ctrl key and then click the slides to which you want to

apply the transition.

2. Choose the Animations tab.

3. Click the More button in the Transition to this Slide group. A menu of transitions appears.

4. Click the transition you want to apply. PowerPoint applies the transition. As you roll your

pointer over each transition, PowerPoint provides you with a live preview of the transition.

To apply a transition to all slides:

1. Choose the Animations tab.

Page 80
2. Click the More button in the Transition to this Slide group. A menu of transitions
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
appears.

Page 81
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

3. Click the transition you want to apply. As you roll your pointer over each transition,

PowerPoint provides you with a live preview of the transition.

4. Click the Apply to All button in the Transition to This Slide group.

To add a sound to a transition:

1. Choose the Animations tab.

2. Click the down arrow next to the Transition Sound field and then click the sound you want.

As you roll your pointer over each sound, PowerPoint plays the sound.

To set the speed of a transition:

1. Choose the Animations tab.

2. Click the down arrow next to the Transition Speed field and then click the speed you want.

If you want the transition to occur after the presenter clicks the mouse, check the On Mouse

Click check box. If you want a transition to occur after a specified period of time, check the

Automatically After check box and then specify the amount of time you want to elapse before

the transition occurs. The On Mouse Click check box and the Automatically After check box

are both located on the Animations tab in the Transition to This Slide group.

EXERCISE 2

Add Transitions

Page 82
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

1. Choose the Animations tab.

2. Click the More button in the Transition to this Slide group. A menu of transitions

appears.

3. Click the Push Up transition. As you roll your pointer over each transition, PowerPoint

provides you with a live preview of the transition.

Add Sound and Set the Speed

Page 83
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

1. Click the down arrow next to the Transition Sound field and then click Click.

2. Click the down arrow next to the Transition Speed field and then click Slow.

6. Explain uses of presentation

Answer:

Uses of PowerPoint Presentation

PowerPoint presentations are useful for both personal and professional usage. Given below are

a few of the major fields where PPT is extremely useful:

• Education – With e-learning and smart classes being chosen as a common mode of

education today, PowerPoint presentations can help in making education more interactive

and attract students towards the modified version of studying

• Marketing – In the field of marketing, PowerPoint presentations can be extremely

important. Using graphs and charts, numbers can be shown more evidently and clearly

which may be ignored by the viewer if being read

• Business – To invite investors or to show the increase or decrease in profits, MS

PowerPoint can be used

• Creating Resumes – Digital resumes can be formed using MS PowerPoint. Different

Page 84
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

patterns, photograph, etc. can be added to the resume

• Depicting Growth – Since both graphics and text can be added in a presentation,

depicting the growth of a company, business, student‟s marks, etc. is easier using PPT.

Page 85
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

UNIT-IV

INTRODUCTION TO INTERNET

1. Define Internet.

Answer:

The Internet is a global network of billions of computers and other electronic devices. With

the Internet, it's possible to access almost any information, communicate with anyone else in

the world, and do much more.

You can do all of this by connecting a computer to the Internet, which is alsocalled

going online. When someone says a computer is online, it's just another way of saying it's

connected to the Internet.

Page 86
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

2. Explain internet service providers.

Answer:

An Internet Service Provider (ISP) is the industry term for the company that is able to provide

you with access to the Internet, typically from a computer. If you hear someone talking about

the Internet and they mention their “provider,” they‟re usually talking about their ISP.

Your ISP makes the Internet a possibility. In other words, you can have a shiny computer with

a built-in modem and could have a router for networking, but without a subscription with an

ISP, you won‟t have a connection to the Internet.

For the typical homeowner or apartment dweller, the ISP is usually a “cable company” that,

in addition, or offering a TV subscription, also offers an Internet subscription. You don‟t get

both for the price of one, however. You can get just cable TV or just high-speed Internet, or

both.

An ISP is your gateway to the Internet and everything else you can do online. The second your

connection is activated and set up, you‟ll be able to send emails, go shopping, do research, and

more. The ISP is the link or conduit between your computer and all the other “servers” on the

Internet. You may feel like you‟re talking to your mom directly through email, but in reality,

it‟s more “indirectly.” Your email goes from your computer to the ISP computers/servers,

where it‟s sent along to its destination through other servers on the network.

Page 87
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

3. What is the information security?

Answer:

Information security, also known as infosec is the process of securing data and information

secure from any kind of violations in the form of theft, abuse or loss. Information security aims

to protect data at different stages- whether it is while storing it, transferring it or usingit. For

practical reasons, it is also referred to as data security as it involves protecting all kinds of

print or electronic data.

Information security has evolved as one of the main requirements of businesses worldwide

today. Since data is our main asset in the digital economy, it becomes of paramount importance

to protect that data. Companies of all scales, from big corporate giants to self- funded startups

have all started to invest in information security, creating a huge demand for experts in the

domain.

4. What are types cyber attack?

Answer:

A cyberattack is a malicious and deliberate attempt by an individual or organization to breach

the information system of another individual or organization. Usually, the attacker seeks some

type of benefit from disrupting the victim‟s network.

Malware is a term used to describe malicious software, including spyware, ransomware,

Page 88
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

viruses, and worms. Malware breaches a network through a vulnerability, typically when a

user clicks a dangerous link or email attachment that then installs risky software. Once inside

the system, malware can do the following:

• Blocks access to key components of the network (ransomware)

• Installs malware or additional harmful software

• Covertly obtains information by transmitting data from the hard drive (spyware)

• Disrupts certain components and renders the system inoperable

Phishing

Phishing is the practice of sending fraudulent communications that appear to come from a

reputable source, usually through email. The goal is to steal sensitive data like credit card and

login information or to install malware on the victim‟s machine. Phishing is an increasingly

common cyberthreat.

Man-in-the-middle attack

Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers

insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can

filter and steal data.

Two common points of entry for MitM attacks:

1. On unsecure public Wi-Fi, attackers can insert themselves between a visitor‟s device and

the network. Without knowing, the visitor passes all information through the attacker.

Page 89
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

2. Once malware has breached a device, an attacker can install software to process all of the

victim‟s information.

Denial-of-service attack

A denial-of-service attack floods systems, servers, or networks with traffic to exhaust resources

and bandwidth. As a result, the system is unable to fulfill legitimate requests. Attackers can

also use multiple compromised devices to launch this attack. This is known asa distributed-

denial-of-service (DDoS) attack.

SQL injection

A Structured Query Language (SQL) injection occurs when an attacker inserts malicious code

into a server that uses SQL and forces the server to reveal information it normally would not.

An attacker could carry out a SQL injection simply by submitting malicious code into a

vulnerable website search box.

Zero-day exploit

A zero-day exploit hits after a network vulnerability is announced but before a patch or solution

is implemented. Attackers target the disclosed vulnerability during this window of time. Zero-

day vulnerability threat detection requires constant awareness.

DNS Tunneling

DNS tunneling utilizes the DNS protocol to communicate non-DNS traffic over port 53. It

sends HTTP and other protocol traffic over DNS. There are various, legitimate reasons to

Page 90
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

utilize DNS tunneling. However, there are also malicious reasons to use DNS Tunneling VPN

services. They can be used to disguise outbound traffic as DNS, concealing data that is

typically shared through an internet connection. For malicious use, DNS requests are

manipulated to exfiltrate data from a compromised system to the attacker‟s infrastructure. It

can also be used for command and control callbacks from the attacker‟s infrastructure to a

compromised system.

5. Differentiate between information security and cyber security.

Information Security vs. Cybersecurity

Though often used interchangeably, the terms information security and cybersecurity are

actually two different domains. Cybersecurity is a broader domain which deals with all kinds

of digital security activities which involves securing all kinds of IT assets from any kind

misuse, theft and disclosure. Information security is a specific sub-domain under the umbrella

domain of cybersecurity. Similar to information security, there are other sub- domains within

cybersecurity like network security, application security and more.

6. Explain 3 Principles of Information Security

Answer:

Information security is based on three main aspects of data security, frequently referred to as

the CIA- namely confidentiality, integrity, and availability.

1. Confidentiality: This is the primary foundation of information security. Confidentiality

ensures that any kind of information is not disclosed to unauthorised sources or is not

Page 91
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

accessed by any unwarranted party. Information security systems put processes in place

to identify and block any kind of unauthorised access attempts. These processes range from

password protections, encryptions, and authentication, to identifying malware to prevent

data theft and misuse. Confidentiality is highly valued in all kinds of business setups

because of competitor aggression, cyber crimes and more. Information security addresses

these concerns by providing adequate protection against it.

2. Integrity: This is another key aspect of information security. Integrity refers to the process

of ensuring that data is maintained in its intended state and not modified by any accident

or compromised in any other way. Edits, if any are made to the data should be done in such

a way that if anything is modified accidentally, could be recovered back. Integrity systems

in information security consist of tools that can verify data integrity andprovide adequate

defence against any kind of breach. These systems also help you backup data frequently

so that you can restore the most authentic version. Data integrityis an extremely important

concept, especially when legal rights are involved.

3. Availability: Availability refers to how accessible the data is on a regular basis.

Businesses always prefer high availability since it enables seamless operations with

optimised data usage. High or effective availability also results in ready information

processing which can be of high value to any business environment. The

availability of any data depends on the hardware and software of the device. Hence,

information security professionals take special care to keep both the hardware and software

requirements in place.

Page 92
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

7. Explain digital signature

Answer:

Digital Signature

A digital signature is a mathematical technique used to validate the authenticity and integrity

of a message, software or digital document.

1. Key Generation Algorithms : Digital signature are electronic signatures, which assures

that the message was sent by a particular sender. While performing digital transactions

authenticity and integrity should be assured, otherwise the data can be altered or someone

can also act as if he was the sender and expect a reply.

2. Signing Algorithms: To create a digital signature, signing algorithms like email programs

create a one-way hash of the electronic data which is to be signed. The signing algorithm

then encrypts the hash value using the private key (signature key). This encrypted hash

along with other information like the hashing algorithm is the digital signature. This digital

signature is appended with the data and sent to the verifier. The reason for encrypting the

hash instead of the entire message or document is that a hash function converts any

arbitrary input into a much shorter fixed length value. This saves time as now instead of

signing a long message a shorter hash value has to be signed and moreover hashing is much

faster than signing.

3. Signature Verification Algorithms : Verifier receives Digital Signature along with the

data. It then uses Verification algorithm to process on the digital signature and the public

Page 93
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

key (verification key) and generates some value. It also applies the same hash function on

the received data and generates a hash value. Then the hash value and the output of the

verification algorithm are compared. If they both are equal, then the digital signature is

valid else it is invalid.

The steps followed in creating digital signature are :

1. Message digest is computed by applying hash function on the message and then message

digest is encrypted using private key of sender to form the digital signature. (digital

signature = encryption (private key of sender, message digest) and message digest =

message digest algorithm(message)).

2. Digital signature is then transmitted with the message.(message + digital signature is

transmitted)

3. Receiver decrypts the digital signature using the public key of sender.(This assures

authenticity,as only sender has his private key so only sender can encrypt using his private

key which can thus be decrypted by sender‟s public key).

4. The receiver now has the message digest.

5. The receiver can compute the message digest from the message (actual message is sent

with the digital signature).

6. The message digest computed by receiver and the message digest (got by decryption on

digital signature) need to be same for ensuring integrity.

Page 94
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

Message digest is computed using one-way hash function, i.e. a hash function in which

computation of hash value of a message is easy but computation of the message from hash

value of the message is very difficult.

8. Explain security threats.

Answer:

Information Security threats can be many like Software attacks, theft of intellectual property,

identity theft, theft of equipment or information, sabotage, and information extortion.

Threat can be anything that can take advantage of a vulnerability to breach security and

negatively alter, erase, harm object or objects of interest.

Software attacks means attack by Viruses, Worms, Trojan Horses etc. Many users believe

that malware, virus, worms, bots are all same things. But they are not same, only similarity is

that they all are malicious software that behave differently.

Malware is a combination of 2 terms- Malicious and Software. So Malware basically means

malicious software that can be an intrusive program code or a anything that is designed to

Page 95
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

perform malicious operations on system. Malware can be divided in 2 categories: Infection

Methods

1. Malware Actions

Malware on the basis of Infection Method are following:

1. Virus – They have the ability to replicate themselves by hooking them to the program on

the host computer like songs, videos etc and then they travel all over the Internet. The

Creeper Virus was first detected on ARPANET. Examples include File Virus, Macro Virus,

Boot Sector Virus, Stealth Virus etc.

2. Worms – Worms are also self replicating in nature but they don‟t hook themselves to the

program on host computer. Biggest difference between virus and worms is that worms are

network aware. They can easily travel from one computer to another if network is available

and on the target machine they will not do much harm, they will for example consume hard

disk space thus slowing down the computer.

3. Trojan – The Concept of Trojan is completely different from the viruses and worms. The

name Trojan derived from the „Trojan Horse‟ tale in Greek mythology, which explains

how the Greeks were able to enter the fortified city of Troy by hiding their soldiers in a big

wooden horse given to the Trojans as a gift. The Trojans were very fond of horses and

trusted the gift blindly. In the night, the soldiers emerged and attacked the city from the

inside.

Their purpose is to conceal themselves inside the software that seem legitimate and when that

Page 96
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

software is executed they will do their task of either stealing information or any other purpose

for which they are designed.

They often provide backdoor gateway for malicious programs or malevolent users to enter

your system and steal your valuable data without your knowledge and permission. Examples

include FTP Trojans, Proxy Trojans, Remote Access Trojans etc.

4. Bots –: can be seen as advanced form of worms. They are automated processes that are

designed to interact over the internet without the need of human interaction. They can be

good or bad. Malicious bot can infect one host and after infecting will create connection to

the central server which will provide commands to all infected hosts attached to that

network called Botnet.

Malware on the basis of Actions:

1. Adware – Adware is not exactly malicious but they do breach privacy of the users. They

display ads on computer‟s desktop or inside individual programs. They come attached with

free to use software, thus main source of revenue for such developers. They monitor your

interests and display relevant ads. An attacker can embed malicious code inside the

software and adware can monitor your system activities and can even compromise your

machine.

2. Spyware – It is a program or we can say a software that monitors your activities on

computer and reveal collected information to interested party. Spyware are generally

dropped by Trojans, viruses or worms. Once dropped they installs themselves and sits

Page 97
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II

silently to avoid detection.

One of the most common example of spyware is KEYLOGGER. The basic job of keylogger

is to record user keystrokes with timestamp. Thus capturing interesting information like

username, passwords, credit card details etc.

3. Ransomware – It is type of malware that will either encrypt your files or will lock your

computer making it inaccessible either partially or wholly. Then a screen will be displayed

asking for money i.e. ransom in exchange.

4. Scareware – It masquerades as a tool to help fix your system but when the software is

executed it will infect your system or completely destroy it. The software will display a

message to frighten you and force to take some action like pay them to fix your system.

5. Rootkits – are designed to gain root access or we can say administrative privileges in the

user system. Once gained the root access, the exploiter can do anything from stealing

private files to private data.

6. Zombies – They work similar to Spyware. Infection mechanism is same but they don‟t

spy and steal information rather they wait for the command from hackers.

• Theft of intellectual property means violation of intellectual property rights like

copyrights, patents etc.

• Identity theft means to act someone else to obtain person‟s personal information or to

access vital information they have like accessing the computer or social media account of

a person by login into the account by using their login credentials.

Page 98
Subject: Fundamentals of Computer Sub Code: 206 (2019 Pattern)
Class: F.Y. BBA Semester- II
• Theft of equipment and information is increasing these days due to the mobile nature

of devices and increasing information capacity.

• Sabotage means destroying company‟s website to cause loss of confidence on part of its

customer.

• Information extortion means theft of company‟s property or information to receive

payment in exchange. For example ransomware may lock victims file making them

inaccessible thus forcing victim to make payment in exchange. Only after payment

victim‟s files will be unlocked.

These are the old generation attacks that continue these days also with advancement every

year. Apart from these there are many other threats. Below is the brief description of these new

generation threats.

Page 99

You might also like