Computer Awareness
Computer Awareness
Introduction of Computer: Input − In this step, the input data is prepared in some convenient
form for processing. The form will depend on the processing
A computer is a machine or device that performs processes, machine.
calculations and operations based on instructions provided by a Processing − In this step, the input data is changed to produce data
software or hardware program. It is designed to execute in a more useful form.
applications and provides a variety of solutions by combining
Output − At this stage, the result of the proceeding processing step
integrated hardware and software components.
is collected. The particular form of the output data depends on the
In general, a machine which has capability to store large data value use of the data.
in its memory. It works using input (like keyboard) and output (like
Full form of computer: COMPUTER stands for Common Operating
printer) devices. ... It allows us to make changes in the already
Machine Purposely Used for Technological and Educational
stored data as well as store new data.
Research.
Data can be defined as a representation of facts, concepts, or
instructions in a formalized manner, which should be suitable for History of Computer
communication, interpretation, or processing by human or
electronic machine. The first counting device was used by the primitive people. They
used sticks, stones and bones as counting tools. As human mind and
Data is represented with the help of characters such as alphabets technology improved with time more computing devices were
(A-Z, a-z), digits (0-9) or special characters (+, -, /, *, <, >, = etc.) developed. Some of the popular computing devices starting with the
Information is organized or classified data, which has some first to recent ones are described below
meaningful values for the receiver. Information is the processed Abacus:
data on which decisions and actions are based.
The history of computer begins with the birth of abacus which is
believed to be the first computer. It is said that Chinese invented
Data Information Abacus around 4,000 years ago. It was a wooden rack which has
The collection of raw facts The processed form of data is metal rods with beads mounted on them. The beads were moved by
and figures is called called information/output the abacus operator according to some rules to perform arithmetic
Data/input. calculations. Abacus is still used in some countries like China, Russia
Data is an input for computer. Information is an output from and Japan
computer.
Data is independent. Information is dependent on
data.
When data is lost, it can't be When information is lost, it can
reproduced. reproduced from data
Data is meaningless and Information is meaningful and
valueless. valuable
Napier's Bones:
It was a manually-operated calculating device which was invented
by John Napier (1550-1617) of Merchiston. In this calculating tool,
he used 9 different ivory strips or bones marked with numbers to
multiply and divide. So, the tool became known as "Napier's Bones.
It was also the first machine to use the decimal point
Analytical Engine:
This calculating machine was also developed by Charles Babbage in
1830. It was a mechanical computer that used punch-cards as input.
It was capable of solving any mathematical problem and storing
Pascaline:
information as a permanent memory.
Pascaline is also known as Arithmetic Machine or Adding Machine.
It was invented between 1642 and 1644 by a French mathematician-
philosopher Biaise Pascal. It is believed that it was the first
mechanical and automatic calculator. It could only perform addition
and subtraction. It was a wooden box with a series of gears and
wheels. When a wheel is rotated one revolution, it rotates the
neighboring wheel. A series of windows is given on the top of the
wheels to read the totals.
Difference Engine:
In the early 1820s, it was designed by Charles Babbage who is known
as "Father of Modern Computer". It was a mechanical computer
which could perform simple calculations. It was a steam driven
calculating machine designed to solve tables of numbers like
logarithm tables.
Generation of Computer
First Generation (1940-1956):
Application Software:
Applications software is a set of programs designed to perform a
specific task. It does not control or coordinate the working of
Software: computer. A computer can run without application software.
Software is a set of instructions, data or programs used to operate Application software can be easily installed or uninstalled as
computers and execute specific tasks. Opposite of hardware, which required.
describes the physical aspects of a computer, software is a generic Microsoft Office Suite, Adobe Photoshop and any other software like
term used to refer to applications, scripts and programs that run on payroll software or income tax software are application software.
a device. Software is of two types: system software and application
software. Hardware Software
Physical parts of the computer A set of instructions given to
System Software: are called hardware. the computer is called software
System software is the main software that runs the computer. When You can touch, see and feel You cannot touch and feel
you turn on the computer it activates the hardware and controls and hardware software
coordinates their functioning. The application programs are also Hardware is constructed using Software is developed by
controlled by system software. It is also known as background physical materials or writing instructions in
software. components. programming language
Computer is hardware, which The operations of computer are RAM categorized into following types.
operates under the control of a controlled through software
1. DRAM- Dynamic memory must be constantly refreshed, or it
software.
loses its contents. This type of memory is more economical.
If hardware is damaged, it is If software is damaged or
2. SRAM- SRAM is faster and less volatile than DRAM but requires
replaced with new one corrupted, its backup copy can
more power and is more expensive. It does not need to be
be reinstalled
refreshed like a DRAM.
Hardware is not affected by Software is affected by
3. SDRAM (Synchronous Dynamic Random-Access Memory) - A
computer viruses computer viruses
type of DRAM that can run at much higher clock speeds.
Hardware cannot be Software can be transferred
transferred from one place to from one place to another Read Only Memory (ROM):
another electronically through electronically through network
It is a non-volatile memory. It means it does not lose its data or
network
programs that are written on it at the time of manufacture. So it is a
User cannot make new User can make many new
permanent memory that contains all important data and
duplicate copies of the duplicate copies of the
hardware software instructions needed to perform important tasks like the boot
process.
Computer Memory ROM memory has several models such names are
following.
Memory is the best essential element of a computer because
computer can’t perform simple tasks. The performance of computer 1. PROM: Programmable Read Only Memory (PROM) maintains
mainly based on memory and CPU. Memory is internal storage large storage media but can’t offer the erase features in ROM.
media of computer that has several names such as majorly This type of RO maintains PROM chips to write data once and
categorized into two types, read many. The programs or instructions designed in PROM
☞ Main memory/ Primary Memory can’t be erased by other programs.
☞ Secondary Memory 2. EPROM: Erasable Programmable Read Only Memory designed
for recover the problems of PROM and ROM. Users can delete
Primary Memory: the data of EPROM thorough pass on ultraviolet light and it
Primary memory is computer memory that a processor or computer erases chip is reprogrammed.
accesses first or directly. It allows a processor to access running 3. EEPROM: Electrically Erasable Programmable Read Only
execution applications and services that are temporarily stored in a Memory similar to the EPROM but it uses electrical beam for
specific memory location. Primary memory is also known as primary erase the data of ROM.
storage or main memory
Some other memories are
☞ RAM (Volatile Memory).
☞ ROM (Non-Volatile Memory) ☞ Register Memory:
Register memory is the smallest and fastest memory in a
Random Access Memory (RAM):
computer. It is located in the CPU in the form of registers. A
register temporarily holds frequently used data, instructions
and memory address that can be quickly accessed by the CPU.
☞ Cache Memory:
It is small in size but faster than the main memory. The CPU can
access it more quickly than the primary memory. It holds the
data and programs frequently used by the CPU. So if the CPU
finds the required data or instructions in cache memory it
doesn't need to access the primary memory (RAM). Thus, it
speeds up the system performance.
☞ Semi-volatile memory:
A third category of memory is "semi-volatile". The term is used
to describe a memory which has some limited non-volatile
duration after power is removed, but then data is ultimately
lost. A typical goal when using a semi volatile memory is to
provide high performance/durability/etc. associated with
It is a volatile memory. It means it does not store data or volatile memories, while providing some benefits of a true non-
instructions permanently. It is read/write memory which stores data volatile memory.
till the machine is working. When you switch on the computer and
☞ Virtual memory:
perform some task the data and instructions from the hard disk are
Virtual memory is a system where all physical memory is
stored in RAM.
controlled by the operating system. When a program needs
CPU utilizes this data to perform the required tasks. As soon as you memory, it requests it from the operating system. The operating
shut down the computer the RAM loses all the data. system then decides in what physical location to place the
program's code and data.
☞ Protected memory:
Protected memory is a system where each program is given an Primary memory Secondary memory
area of memory to use and is not permitted to go outside that The primary memory is The secondary memory is
range. Use of protected memory greatly enhances both the categorized as volatile & always a nonvolatile memory.
reliability and security of a computer system. nonvolatile memories.
☞ Secondary Memory: These memories are also called Secondary memory is known as
The storage devices in the computer or connected to the internal memory. a Backup memory or Additional
computer are known as secondary memory of the computer. It memory or Auxiliary memory.
is non-volatile in nature so permanently stores the data even Data is directly accessed by the Data cannot be accessed
when the computer is turned off. The CPU can't directly access processing unit. directly by the processor. It is
the secondary memory. First the secondary memory data is first copied from secondary
transferred to primary memory then CPU can access it. Common memory to primary memory.
secondary storage devices are the hard disk and optical disks. Only then CPU can access it.
The hard disk has enormous storage capacity compared to main It holds data or information It stores a substantial amount
memory. that is currently being used by of data and information.
There are three main types of secondary storage in a the processing unit. Capacity is Capacity is generally from
computer system: usually in 16 to 32 GB 200GB to terabytes.
Primary memory can be Secondary memory is accessed
☞ Solid state storage devices (such as USB memory sticks): accessed by the data bus. by I/O channels.
Solid state storage is also faster than traditional hard disk drives Primary memory is costlier Secondary memory is cheaper
because the data is stored electrically in silicon chips called cells. than secondary memory. than primary memory.
Within the cells, the binary data is stored by holding an electrical
current in a transistor with an on / off mode.
☞ Optical storage devices (such as CD, DVD and Blue-ray discs): Memory unit
Optical devices use a laser to scan the surface of a spinning disc Memory unit is the amount of data that can be stored in the storage
made from metal and plastic. The disc surface is divided into unit. This storage capacity is expressed in terms of Bytes.
tracks, with each track containing many flat areas and hollows.
The flat areas are known as lands and the hollows as pits. Unit Description
☞ Magnetic storage devices (such as hard disk drives): Bit (Binary Digit) A binary digit is logical 0 and 1 representing a
Magnetic devices such as hard disk drives use magnetic fields to passive or an active state of a component in an
magnetize tiny individual sections of a metal spinning disk. Each electric circuit.
tiny section represents one bit. A magnetized section represents Nibble A group of 4 bits is called nibble.
a binary '1' and a demagnetized section represents a binary '0'. Byte A group of 8 bits is called byte. A byte is the
☞ Hard drive: smallest unit, which can represent a data item
It is a non-removable storage device containing magnetic disks or a character
or platters rotating at high speeds. The hard drives store data in Kilobyte (KB) 1 KB = 1024 Bytes
segments of concentric circles. It may spin at 5,400 to 15,000 Megabyte (MB) 1 MB = 1024 KB
RPM.
GigaByte (GB) 1 GB = 1024 MB
☞ Optical disk:
TeraByte (TB) 1 TB = 1024 GB
an electronic data storage medium that can be written to and
PetaByte (PB) 1 PB = 1024 TB
read using a low-powered laser beam.
Exa Byte 1 EB = 1024 PB
☞ CD-ROM:
Zetta Byte 1 ZB = 1024 EB
"Read Only" (used for distribution of commercial software, for
Yotta Byte 1 YB = 1024 ZB
example) Standard storage capacity is 640MB.
☞ CD-R (or CD-WORM): "Write Once, Read Many" times
☞ CD-RW: rewritable multiple times
Types of Computer
☞ DVD: similar to CD, but with significantly larger storage capacity
(4.7GB) Write once read many (WORM) describes a data storage We can categorize computer by three ways:
device in which information, once written, cannot be modified
☞ Based on data handling capabilities
☞ Floppy Disk:
☞ Based on size.
Floppy disk is composed of a thin, flexible magnetic disk sealed
☞ Based on Utility
in a square plastic carrier. Floppy disks were widely used to
distribute software, transfer files, and create backup copies of On the basis of data handling capabilities, the computer is of three
data. To read and write data from a floppy disk, a computer types:
system must have a floppy disk drive (FDD).
☞ Analogue Computer
☞ Magnetic Tape:
☞ Digital Computer
Magnetic tape used in recording sound, pictures, or computer
data. ☞ Hybrid Computer
☞ Flash memory:
a kind of memory that retains data in the absence of a power
supply
Cathode-Ray Tube (CRT) Monitor: 1. Impact Printers: They are of two types:
The CRT display is made up of small picture elements called pixels. ☞ Character Printers
The smaller the pixels, the better the image clarity or resolution. It ✓ Dot Matrix printers
takes more than one illuminated pixel to form a whole character, ✓ Daisy Wheel printers
such as the letter ‘e’ in the word help.
☞ Line printers
A finite number of characters can be displayed on a screen at once. ✓ Drum printers
The screen can be divided into a series of character boxes - fixed ✓ Chain printers
location on the screen where a standard character can be placed.
Most screens are capable of displaying 80 characters of data 2. Non-impact printers:
horizontally and 25 lines vertically. They are of two types:
There are some disadvantages of CRT – ☞ Laser printers
☞ Large in Size ☞ Inkjet printers
☞ High power consumption Impact Printer:
The impact printer uses a hammer or print head to print the
character or images onto the paper. The hammer or print head
strikes or presses an ink ribbon against the paper to print characters
and images.
Impact printers are further divided into two types.
☞ Character Printers
☞ Line printers
Character Printers:
Character printer prints a single character at a time or with a single
Flat-Panel Display Monitor: stroke of the print head or hammer. It does not print one line at a
The flat-panel display refers to a class of video devices that have time. Dot Matrix printer and Daisy Wheel printer are character
reduced volume, weight and power requirement in comparison to printers.
the CRT. You can hang them on walls or wear them on your wrists.
Dot Matrix Printer:
Current uses of flat-panel displays include calculators, video games,
monitors, laptop computer, and graphics display.
Printer:
A printer produces hard copies of the processed data. It enables the
user, to print images, text or any other information onto the paper.
Based on the printing mechanism, the printers are of two types:
Impact Printers and Non-Impact Printers.
Non-Impact Printer:
They print characters and images without direct physical contact
between the paper and the printing machinery. These printers can
print a complete page at a time, so they are also known as page
printers. The common types of non-impact printers are Laser printer
and Inkjet printer
Laser Printer:
A laser printer is a non-impact printer that uses a laser beam to print
the characters. The laser beam hits the drum, which is a
photoreceptor and draws the image on the drum by altering
electrical charges on the drum. The drum then rolls in toner, and the
charged image on the drum picks the toner. The toner is then
printed on the paper using heat and pressure.
Multitasking:
Multitasking is when multiple jobs are executed by the CPU
simultaneously by switching between them. Switches occur so
frequently that the users may interact with each program while it is
OR GATE:
running. A program that is loaded into memory and is executing is
commonly referred to as a process. The OR gate is an electronic circuit which gives a high output if one
or more of its inputs are high. The operation performed by an OR
Spooling:
gate is represented by a plus (+) sign.
Spooling is an acronym for simultaneous peripheral operations on
line. Spooling refers to putting data of various I/O jobs in a buffer.
This buffer is a special area in memory or hard disk which is
accessible to I/O devices.
Booting:
When the computer starts, the operating system is first loaded (as it
is essential for running all other programs), this process is known as
booting. NOT GATE:
Cold Boot: The NOT gate is an electronic circuit which produces an inverted
Turn ON the computer from an OFF position is called Cold Booting. version of the input at its output. It is also known as an Inverter.
Warm Boot:
A computer system starts up/reset from a complete powerless state
is called Warm Booting.
Full Adder
Full adder is developed to overcome the drawback of Half Adder
NOR GATE: circuit. It can add two one-bit numbers A and B, and carry c. The full
adder is a three input and two output combinational circuit.
The NOT-OR (NOR) gate which is equal to an OR gate followed by a
Multiplexers Multiplexer is a special type of combinational circuit.
NOT gate. The NOR gate gives a low output if any of the inputs are
There are n-data inputs, one output and m select inputs with 2m =
high. The NOR gate is represented by an OR gate with a small circle
n. It is a digital circuit which selects one of the n data inputs and
on the output. The small circle represents inversion
routes it to the output.
Demultiplexers
A demultiplexer performs the reverse operation of a multiplexer i.e.
it receives one input and distributes it over several outputs. It has
only one input, n outputs, m select input.
Decoder
Exclusive-OR/ XOR GATE: A decoder is a combinational circuit. It has n input and to a maximum
m = 2n outputs. Decoder is identical to a demultiplexer without any
The 'Exclusive-OR' gate is a circuit which will give a high output if one
data input. It performs operations which are exactly opposite to
of its inputs is high but not both of them. The XOR operation is
those of an encoder.
represented by an encircled plus sign
Encoder
Encoder is a combinational circuit which is designed to perform the
inverse operation of the decoder. An encoder has n number of input
lines and m number of output lines.
Priority Encoder
This is a special type of encoder. Priority is given to the input lines. If
two or more input line are 1 at the same time, then the input line
EXCLUSIVE-NOR/Equivalence GATE: with highest priority will be considered.
The 'Exclusive-NOR' gate is a circuit that does the inverse operation Number System
to the XOR gate. It will give a low output if one of its inputs is high
but not both of them. The small circle represents inversion When we type some letters or words, the computer translates them
in numbers as computers can understand only numbers. A computer
can understand the positional number system where there are only
a few symbols called digits and these symbols represent different
values depending on the position they occupy in the number.
☞ The value of each digit in a number can be determined using −
The digit
☞ The position of the digit in the number
☞ The base of the number system (where the base is defined as
Boolean algebra: the total number of digits available in the number system)
Boolean algebra can be considered as an algebra that deals with Decimal Number System:
binary variables and logic operations. Boolean algebraic variables
The number system that we use in our day-to-day life is the decimal
are designated by letters such as A, B, x, and y. The basic operations
number system. Decimal number system has base 10 as it uses 10
performed are AND, OR, and complement. The Boolean algebraic
digits from 0 to 9. In decimal number system, the successive
functions are mostly expressed with binary variables, logic operation
positions to the left of the decimal point represent units, tens,
symbols, parentheses, and equal sign. For a given value of variables,
hundreds, thousands, and so on.
the Boolean function can be either 1 or 0
Octal Number System: Using the database, you can easily retrieve, insert, and delete the
information.
Characteristics of the octal number system are as follows –
☞ Uses eight digits, 0,1,2,3,4,5,6,7 Database Management System
☞ Also called as base 8 number system Database management system is software which is used to manage
☞ Each position in an octal number represents a 0 power of the the database. For example: MySQL, Oracle, etc are a very popular
base (8). Example 80 commercial database which is used in different applications.
☞ Last position in an octal number represents a x power of the DBMS provides an interface to perform various operations like
base (8). Example 8x where x represents the last position – 1 database creation, storing data in it, updating data, creating a table
Hexadecimal Number System: in the database and a lot more. It provides protection and security
to the database. In the case of multiple users, it also maintains data
☞ Characteristics of hexadecimal number system are as follows −
consistency. DBMS allows users the following tasks:
Uses 10 digits and 6 letters, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E,
F ☞ Data Definition: It is used for creation, modification, and
☞ Letters represent the numbers starting from 10. A = 10. B = 11, removal of definition that defines the organization of data in the
C = 12, D = 13, E = 14, F = 15 database.
☞ Also called as base 16 number system ☞ Data Updation: It is used for the insertion, modification, and
☞ Each position in a hexadecimal number represents a 0 power of deletion of the actual data in the database.
the base (16). Example, 160 ☞ Data Retrieval: It is used to retrieve the data from the database
☞ Last position in a hexadecimal number represents a x power of which can be used by applications for various purposes.
the base (16). Example 16x where x represents the last position ☞ User Administration: It is used for registering and monitoring
–1 users, maintain data integrity, enforcing data security, dealing
with concurrency control, monitoring performance and
Programming Languages recovering information corrupted by unexpected failure.
Characteristics of DBMS
The computer system is simply a machine and hence it cannot
perform any work; therefore, in order to make it functional different ☞ It uses a digital repository established on a server to store and
languages are developed, which are known as programming manage the information.
languages or simply computer languages. ☞ It can provide a clear and logical view of the process that
manipulates data.
Languages comes with its own set of vocabulary and rules, better
☞ DBMS contains automatic backup and recovery procedures.
known as syntax
☞ It contains ACID properties which maintain data in a healthy
Following are the major categories of Programming Languages state in case of failure.
1. Machine Language ☞ It can reduce the complex relationship between data.
2. Assembly Language ☞ It is used to support manipulation and processing of data.
3. High Level Language ☞ It is used to provide security of data.
4. System Language ☞ It can view the database from different viewpoints according to
5. Scripting Language the requirements of the user.
Machine Language or Code Users
This is the language that is written for the computer hardware. Such A typical DBMS has users with different rights and permissions who
language is effected directly by the central processing unit (CPU) of use it for different purposes. Some users retrieve data and some
a computer system. back it up. The users of a DBMS can be broadly categorized as follows
–
Entity
An entity in an ER Model is a real-world entity having properties
called attributes. Every attribute is defined by its set of values called
domain.
Relationship
The logical association among entities is called relationship.
Relationships are mapped with entities in various ways. Mapping
cardinalities define the number of association between two entities.
Mapping cardinalities –
☞ 3-tier Architecture: 3-tier architecture separates its tiers from ☞ One to one
each other based on the complexity of the users and how they ☞ One to many
use the data present in the database. It is the most widely used ☞ Many to one
architecture to design a DBMS.
☞ Many to many
Relational Model
The most popular data model in DBMS is the Relational Model. It is
more scientific a model than others. This model is based on first-
order predicate logic and defines a table as an n-ary relation.
The main highlights of this model are –
☞ Data is stored in tables called relations.
☞ Relations can be normalized.
☞ Database (Data) Tier − At this tier, the database resides along ☞ In normalized relations, values saved are atomic values.
with its query processing languages. We also have the relations ☞ Each row in a relation contains a unique value.
that define the data and their constraints at this level. ☞ Each column in a relation contains values from a same domain.
☞ Application (Middle) Tier − At this tier reside the application Computer Network
server and the programs that access the database. For a user,
this application tier presents an abstracted view of the database. ☞ Computer Network is a group of computers connected with
End-users are unaware of any existence of the database beyond each other through wires, optical fibres or optical links so that
various devices can interact with each other through a network.
the application. At the other end, the database tier is not aware
of any other user beyond the application tier. Hence, the ☞ The aim of the computer network is the sharing of resources
among various devices.
application layer sits in the middle and acts as a mediator
between the end-user and the database. ☞ In the case of computer network technology, there are several
types of networks that vary from simple to complex level.
☞ User (Presentation) Tier − End-users operate on this tier and
they know nothing about any existence of the database beyond Computer Network Architecture:
this layer. At this layer, multiple views of the database can be Computer Network Architecture is defined as the physical and
provided by the application. All views are generated by logical design of the software, hardware, protocols, and media of the
applications that reside in the application tier. transmission of data. Simply we can say that how computers are
organized and how tasks are allocated to the computer.
The two types of network architectures are used: Components of Computer Network:
☞ Peer-To-Peer network Computer network components are the major parts which are
☞ Client/Server network needed to install the software. Some important network
components are NIC, switch, cable, hub, router, and modem.
Peer-To-Peer network: Depending on the type of network that we need to install, some
☞ Peer-To-Peer network is a network in which all the computers network components can also be removed. For example, the
are linked together with equal privilege and responsibilities for wireless network does not require a cable.
processing the data.
☞ Peer-To-Peer network is useful for small environments, usually
up to 10 computers.
☞ Peer-To-Peer network has no dedicated server.
☞ Special permissions are assigned to each computer for sharing
the resources, but this can lead to a problem if the computer
with the resource is down.
NIC:
☞ NIC stands for network interface card.
☞ NIC is a hardware component used to connect a computer with
another computer onto a network
☞ It can support a transfer rate of 10,100 to 1000 Mb/s.
☞ The MAC address or physical address is encoded on the network
card chip which is assigned by the IEEE to identify a network card
uniquely. The MAC address is stored in the PROM
(Programmable read-only memory).
Client/Server Network:
There are two types of NIC: wireless NIC and wired NIC.
☞ Client/Server network is a network model designed for the end
users called clients, to access the resources such as songs, video, ☞ Wireless NIC: The wireless NIC contains the antenna to obtain
the connection over the wireless network. For example, laptop
etc. from a central computer known as Server.
computer contains the wireless NIC.
☞ The central controller is known as a server while all other
☞ Wired NIC: The Wired NIC is present inside the motherboard.
computers in the network are called clients.
Cables and connectors are used with wired NIC to transfer data.
☞ A server performs all the major operations such as security and
☞ Hub: Hub is a central device that splits the network connection
network management.
into multiple devices. When computer requests for information
☞ A server is responsible for managing all the resources such as
from a computer, it sends the request to the Hub. Hub
files, directories, printer, etc. distributes this request to all the interconnected computers.
☞ All the clients communicate with each other through a server. ☞ Switches: Switch is a networking device that groups all the
For example, if client1 wants to send some data to client 2, then devices over the network to transfer the data to another device.
it first sends the request to the server for the permission. The A switch is better than Hub as it does not broadcast the message
server sends the response to the client 1 to initiate its over the network, i.e., it sends the message to the device for
communication with the client 2. which it belongs to. Therefore, we can say that switch sends the
message directly from source to the destination.
Cables and connectors:
Cable is a transmission media that transmits the communication
signals. There are three types of cables:
☞ Twisted pair cable: It is a high-speed cable that transmits the
data over 1Gbps or more.
☞ Coaxial cable: Coaxial cable resembles like a TV installation
cable. Coaxial cable is more expensive than twisted pair cable,
but it provides the high data transmission speed.
☞ Fibre optic cable: Fibre optic cable is a high-speed cable that
transmits the data using light beams. It provides high data
transmission speed as compared to other cables. It is more
expensive as compared to other cables, so it is installed at the
government level.
There are six types of topology ☞ In star topology, server is connected to each node individually.
☞ Bus Topology ☞ Server is also called the central node.
☞ Ring Topology ☞ Any exchange of data between two nodes must take place
☞ Star Topology through the server.
☞ Tree topology ☞ It is the most popular topology for information and voice
☞ Mesh topology networks as central node can process data received from source
☞ Hybrid Topology node before sending it to the destination node.
Bus Topology:
Tree Topology:
☞ When two or more different topologies are combined together Full-duplex mode:
is termed as Hybrid topology and if similar topologies are
connected with each other will not result in Hybrid topology. For
example, if there exist a ring topology in one branch of ICICI bank
and bus topology in another branch of ICICI bank, connecting
these two topologies will result in Hybrid topology.
Transmission modes
The way in which data is transmitted from one device to another
device is known as transmission mode.
The transmission mode is also known as the communication mode.
The Transmission mode is divided into three categories:
☞ Simplex mode
☞ Half-duplex mode ☞ In Full duplex mode, the communication is bi-directional, i.e.,
the data flow in both the directions.
☞ Full-duplex mode
☞ Both the stations can send and receive the message
Simplex mode: simultaneously.
☞ Full-duplex mode has two simplex channels. One channel has
traffic moving in one direction, and another channel has traffic
flowing in the opposite direction.
☞ The Full-duplex mode is the fastest mode of communication
between devices.
☞ In Simplex mode, the communication is unidirectional, i.e., the ☞ The most common example of the full-duplex mode is a
data flow in one direction. telephone network.
☞ A device can only send the data but cannot receive it or it can
OSI Model
receive the data but cannot send the data.
☞ The radio station is a simplex channel as it transmits the signal OSI stands for Open System Interconnection is a reference model
to the listeners but never allows them to transmit back. that describes how information from a software application in one
☞ Keyboard and Monitor are the examples of the simplex mode as computer moves through a physical medium to the software
a keyboard can only accept the data from the user and monitor application in another computer.
can only be used to display the data on the screen. OSI model was developed by the International Organization for
☞ The main advantage of the simplex mode is that the full capacity Standardization (ISO) in 1984, and it is now considered as an
of the communication channel can be utilized during architectural model for the inter-computer communications.
transmission.
OSI consists of seven layers, and each layer performs a particular
Half-Duplex mode: network function.
These are the attacks which are intended to compromise a computer Short for malicious software, is any software used to disrupt
or a computer network. Some of the important system-based computer operation, gather sensitive information, or gain access to
attacks are as follows private computer systems. It can appear in the form of executable
code, scripts, active content, and other software.
1. Virus:
5. Ransomware:
A computer virus is a type of malicious software that, when
executed, replicates itself by modifying other computer programs Ransomware is a type of malware program that infects and takes
and inserting its own code. When this replication succeeds, the control of a system. It infects a computer with the intention of
affected areas are then said to be "infected" with a computer virus. extorting money from its owner.
Trojan horse or Trojan is any malware which misleads users of its Phishing is the fraudulent attempt to obtain access credentials such
true intent. Trojans are generally spread by some form of social as usernames, passwords and credit card details by disguising
engineering, for example where a user is duped into executing an e- oneself as a trustworthy entity in an electronic communication.
mail attachment disguised to appear not suspicious, (e.g., a routine Typically carried out by email spoofing or instant messaging, it often
form to be filled in), or by clicking on some fake advertisement on directs users to enter personal information at a fake website which
social media or anywhere else. matches the look and feel of the legitimate site.
Trojans may allow an attacker to access users' personal information 10. Spoofing:
such as banking information, passwords, or personal identity. It can A Spoofing attack is a situation in which one person or program
also delete a user's files or infect other devices connected to the successfully represents oneself as another by falsifying data and
network. Ransomware attacks are often carried out using a Trojan. thereby gaining an illegitimate advantage.
After it is activated, it can achieve any number of attacks on the host,
11. Pharming:
from irritating the user (popping up windows or changing desktops)
to damaging the host (deleting files, stealing data, or activating and Pharming is a cyber-attack intended to redirect a website's traffic to
spreading other malware, such as viruses). Trojans are also known another, fake site. Pharming can be conducted either by changing
to create backdoors to give malicious users access to the system. the hosts file on a victim's computer or by exploitation of a
vulnerability in DNS server software. DNS servers are computers
Unlike computer viruses and worms, Trojans generally do not
responsible for resolving Internet names into their real IP addresses.
attempt to inject themselves into other files or otherwise propagate
User of online banking and e-commerce websites are more prone to
themselves.
this attack.