IT Notes
IT Notes
SRAM DRAM
1) SRAM is faster and more expensive 1) DRAM is slower and less expensive.
2) SRAM is made up of six transistors. 2) DRAM only uses one.
3) SRAM Consumes more Power. 3) DRAM is a memory chip that can store more data.
Internet Intranet
1) Internet is used to connect different 1) Intranet is owned by Private firm
networks of Computers Simultaneously.
2) On the internet, there are multiple users. 2) On an intranet, there are limited user.
3) Internet is unsafe. 3) Intranet is safe.
RAM ROM
1) Temporary storage. 1) Permanent storage.
2) Store data in MBS 2) Store data in GBS.
3) Volatile. 3) Non-Volatile.
4) Used in normal operations. 4) Used too startup process of computer
5) Writing data is faster. 5) Writing data slower.
Positional Non-Positional
1) In positional number system, each symbol 1) In non-positional number system, each
represents different, value depending on the symbol represents the same value regardless of
Position they occupy in a number. its position.
2) In positional number system, each system 2) In non-Positional number System, each
has a value that relates to number directly next symbol represents a number with its own place
to it. The total value of a positional number is value.
the total of the resultant value of all positions.
Digital India Portal : It is a campaign launched by our country to ensure that the government
services are all available electronically through increasing the internet connectivity and improved
online infrastructure make government services available to citizen electronically by online
infrastructure improvement.
E-mail : Electronic mail, commonly shortened to "email" is a communication method that uses
electronic devices to deliver massages across computer networks. "Email" refers to both the delivery
system and individual massages that are sent and received.
BCD: Binary-Coded decimal (BCD) is a class of binary encodings of decimal numbers where each
digit is represented by a fixed number of bits, usually four or eight.
Gray Code: Gray Code is a form of binary that uses a different method of incrementing from one
number to the ten With Gray code only one-bit changes states from one Position to another.
7) Characteristics of Computer: -
I) Speed:
It works in higher speed. It has unit of speed in microsecond, nanosecond, and even
picosecond.
Process millions (1,000,000) of instruction Pen.
II) Accuracy:
Computer does not make any mistakes if it has provided accurate instruction. Errors may
occur due to data inconsistency on inaccuracy.
III) Diligence:
IV) Reliability:
A computer is reliable as it gives consistent result for a similar set of data i.e, if we give same
set of input any number of times, we will get the same result.
Stores a large amount of data. The data may be in any form video / audio / text / image.
V) Logical:
A computer system has certain characteristics. Such as capability of thinking, reasoning and
learning. These characteristics of computer help them perform tasks logically.
VI) Versatility:
VII) Automation:
Performs all the tasks automatically i.e, it performs tasks without manual intervention.
I) Inkjet Printers.
II) Laser Printers.
III) Dot matrix Printers,
IV) 3D Printers,
V) LED Printers,
VI) Thermal Printer
VII) Line Printer.
VIII) A3 Printer.
IX) Plotter.
X) Canvas Printer.
XI) Xi) Daisy wheel Printers
XII) Sublimation Printers.
XIII) Digital Printing.
10) Cache memory: Most frequently used data Stoned into Cache for further requirement of that
data. Placed in between CPU and Main memory.
11) Web browser and its function: A web browser, also known as a browser, is an application on
software. The main function of a browser is to allow us to access websites available on the Internet.
Some of the web browsers are Google Chrome, Apple Safari etc. Web browsers are mainly used to
access and display website on the Internet.
ASCII: American Standard Code for Information Interchange is the most common character
encoding format for text data in computers and on the internet.
EBCDIC: EBCDIC was devised in 1963 and 1964 by IBM and was announced with the
release of the IBM System/360 line of mainframe computers. It is an eight-bit character
encoding, developed separately from the seven-bit ASCII encoding scheme.
13) Why should we use none more than one search engine simultaneously?
By sending multiple queries to several other search engines this extends the coverage data of the
topic and allows more information to be found. They use the indexes built by other search engines,
aggregating and often fast processing results in unique ways.
1) Binary to Decimal
i) (𝟏𝟎𝟏𝟏)𝟐 = (? )𝟏𝟎
⇒13 02 11 10
⇒(1x23 ) + (0x2²) + (1x21 ) + (1x2°)
⇒ (1x8) +0+2+1
⇒8+2+1
=⇒(11)10
ii) (𝟏𝟎𝟏𝟏𝟏. 𝟎𝟏)𝟐 = (? )𝟏𝟎
=15 04 13 12 11 10 . 0−1 1−2
= (1*25 ) + (0 ∗ 24 ) + (1 ∗ 23 ) + (1 ∗ 22 )+ (1*21 ) + (1*20 ) + (0*2−1 ) + (1*2−2 )
1
= 32+0+8+4+2+2+1+0+4
=47+0.25
=(47.25)10
2. Octal to Decimal
=2125+0.5
=(2125.5)10
3. Hexadecimal to Decimal
=2665+0.2812
=(2665.2812)10
1. (175)10 = (?)2
2 175
2 87 1
2 43 1
2 21 1
2 10 1
2 5 0
2 2 1
1 0
⸫ (75)10 = (10101111)2
2. (125.75)10 = (?)2
2 125
0.75 X 2 = 1.5 = 1 + 0.5
2 62 1 0.5 X 2 = 1.0 = 1 + 0.0
2 31 0
2 15 1
2 7 1
2 3 1
1 1
⸫ (125.75)10 = (1111101.11)2
5) Decimal to Octal:
1. (57.3125)10 = (?)8
0.3125 X 8 = 2.5 = 2 + 0.5
8 57 0.5 X 8 = 4.0 = 4 + 0.0
7 1
⸫ (57.3125)10 = (71.24)8
1. (147.45)10 = (?)16
16 147
9 3 0.45 X 16 = 7.2 = 7 + 0.2
0.2 X 16 = 3.2 = 3 + 0.2
⸫ (147.45)10 = (93.73)16
7. Binary to Octal:
1. (1010101110101)2 = (?)8
1010101110101
= 001 010 101 110 101
= (12565)8
9. Octal to Binary:
1. (1532.501)8 = (?)2
1532.501
=1 5 3 2 . 5 0 1
= (001 101 011 010 . 101 000 001)2
= (001101011010.101000001)2
1. (31E7.D2)16 = (?)2
31E7.D2
= 3 1 14 7 . 13 2
= (0011 0001 1110 0111. 1101 0010)2
= (0011000111100111.11010010)2
1. (3724.365)8 = (?)16
3724.365
= 3 7 2 4 . 3 6 5
= 011 111 010 100 . 011 110 101
= (7D4.7A)16
12.Hexadecimal to Octal:
1) (7A5B)16=(?)8
=7 A 5 B
=000111101001011011
= (75133)8
An operating system is manages Computer hardware and system software that and Software,
resources Provides Common services for Computer Programs.
It manages the computer’s memory and process. as well as all of its software and hardware.
An operating system serves as the intermediary between computer hardware the computer user. Its
primary functions include managing hardware software resources and providing common service for
computer programs. Here are the function of the main function of an operating system.
1. Process Management :-
Process Scheduling : Determines the order in which processes are executed by the CPU. It ensure
efficient CPU utilization by switching between processes.
Creation and Termination : Facilitates the creation and deletion of processes. When a new process
is initiated, the OS allocates resources and schedules it for execution.
Synchronization: Manages process synchronization to ensure that process do not interference with
each other while accessing shored resources with cache resources.
Inter-Process Communication (IPE) : Provides mechanisms for process to Communicate and
synchronize their actions.
2. Memory Management:
Allocation and deallocation : Manage the allocation of memory various application while ensuring
no overlap occurs, and locates memory when it is on longer needed.
Paging and Segmentation : Implements techniques like paging efficiently paging and segmentation
to efficiently use memory and manage the loading of process into memory.
Virtual Memory : Allows the execution of process that may not be completely in memory,
effectively extending the physical memory into the hand disk.
File Operations : Provides mechanism to create, delete, read, write and manipulate files.
Directory Management : Organizes files in directories for easy navigation and access.
Access Control : Enforces security measure to control who can access and measures to modify
files.
Runs and on multiple interconnected Computer and appears as a Single Coherent system.
Facilitates resource sharing and communication between nodes in a network.
Examples include Google's Chrome OS, distributed versions of Unix/Linux.
7. Embedded Operating systems:
These components work together to provide a stable. Running applications facilitating and
facilitating and efficient platform for managing user computer system. Hardware resources
interaction with the computer system.
9.Write down the difference between system Software and application software.
1) Gives path to software application to run. 1) It’s designed and built for specific task.
2) Programing is complex. 2) Programing is simple when components to
system software.
3) When compared to application software. 3) Installed by the users as needed.
4) Installed by the manufactures. 4) Works in the forefront.
5) Works in the background. 5) Works in foreground.
START
INPUT A,
B
C=A+B
PRINT C
STOP
• Advantages of Flowcharts-
• Disadvantages of Flowcharts-
I) Time consuming
LOOP BRANCHING
1) A programming loop is a series of statements 1) Branching statement allow the flow of
that executes for a specific no. of repetitions execution to jump to a different part of
or until specific conditions are met. program.
2) Loop always means backward jump. 2) Branching means a simple forward jump.
Solution :
START
INPUT A,
B
M=A
N=B
YES
H=A IS B =
L = (M*N)/H 0?
NO
PRINT H, L R = A% B
A=B
STOP B=R
Algorithm gives computer step-by-step instruction to accomplish specific takes and make
decisions that is why algorithm is used before any programming.
A program is a set of instructions for the computer to follow. The machine cannot read a program
directly, because it only understands machine code. But you can write stuff in a computer
language, and then a compiler or interpreter can make it understandable to the computer.
6. Draw a flowchart to find out highest number among the three different number.
INPUT A, B, C
YES
IS A>B
&& A>C
?
PRINT A
NO
IS
B>C
PRINT B
?
PRINT C
STOP
Algorithm Flowchart
STEP 1 : START
STAR
STEP 2 : INPUT C T
STEP 3 : CALCULATE F =(9*C +160)/5
INPUT C
STEP 4 : PRINT F
STEP 5 : END
F = (9*C + 160)/5
PRINT F
STOP
START / STOP
PROCESS
INPUT / OUTPUT
DECISION
FLOW OF DATA
START
LET A = 10, B =
20
C=A+B
PRINT C
STOP
Solution :
START
INPUT A
YES IS A mod 2 NO
=0?
PRINT PRINT
“EVEN” “ODD”
STOP
Solution : START
INPUT N
LET I = 2, FLAG = 0
IS N > I
?
YES
FLAG = 1 IS N
mod I =
0?
NO
I=I+1
NO
IS
FLAG = 0 PRINT “NOT
? PRIME”
YES
PRINT STOP
“PRIME”
Example as Html
<!DOCTYPE html> defines that this document is an HTML document <html> root element at an
HTML page which of an enclose all other elements in the HTML page <head> - contains
information about the page, such as, the <title> and <metadata.>.
4. What is "CSS''?
CSS stands for Cascading Style Sheets. It is a simple design language which simplifies the process
CSS is control making web pages presentable to control the used as the text, the color at the text,
the style at the fonts, the speeding between par grapes, variety of effects such as back ground pages
and colors, layout design, columns sizing and other effects can handle by CSS it is easy to learn
and understand.
HTML tags defines that how can browser will format and display content. HTML tags are nothing
but like keywords by the help at which a browser can distinguish between HTML content and
simple content. HTML tags have three main parts – (a) opening tag (b) content and closing tag.
JavaScript is a scripting language that enables you to create dynamically updating content, control
multimedia, animate images, and pretty much everything else.
(a) Speed (b) Reduces load on the server (c) Rich interface (d) Versatility (e) In term operability
(f) Popularity (g) Response to user activity (h) Updates.
(a) Number
(b) String
(c) Boolean
(d) Null
(e) Undefined
(f) object
1. Number : The valid numbers in java script are in tag and floating point numbers like,C-237,Oxd.
Here OXD is a hexadecimal number and it is valid in java script.
3. BOOLEAN : Boolean are the logical Values it can be either true or false.
4. NULL : Null is used to represent the absence at identity and can only come from a listed
expression. [let a = null]
When something is expected, but it is currently unavailable in this case "NULL" is used.
5. Undefined : Undefined is a global which represents the non-existence of data. eg.- var a;
Ans: The comparison or relation at operators are used to compare two quantities to take decision
depending on their relation whether it for it is true or false. If for it is true it returns 1and false it
returns O'.
Java-Script is a is a CSS-Sensitive language. This means that Language key wants variables,
functions other names, any identifier’s must always be typed with as consist capital Z.
UNIT - 5
NETWORK UTILITIES AND DEVICE TOOLS/PROJECT
1) A) What is Malware?
Malware is intrusive Software that is designed to damage and destroy computers and computer
Systems Malware is for malicious Software. Example as common malware include, viruses,
warm, Trojan viruses, SPY ware, adware, Ran son ware.
B) Types of malware?
Ans. (a) Viruses (b) Worms (c) Trojans (d) Ransomware. (e) Adware (f) Spy ware Root .etc.
Ans- It’s important because computer security protects individuals and organizations against cyber
threats and the Loss al important data Becoming the target at a cybercriminal can be incredibly
damaging and disruptive to daily activities, whether personal or professional.
1) Source Code - Source Code means, Statement that are Programmer, with Or a Programming
created by a text editor or a visual programming tool and the Saved in a file.
2) Executable code - Executable language code refers which is native instructions that carries out
in hardware to machine Set of computer.
1) A Web browser is a Software application used to retrieve data from Web Pages of HTML
Files present Servers.
2) Multiple web browser can installed on a single device
3) Example –chrome, Fire fox, Internet explorer.
4) Uses to web browser to able to display in formation.
Search Engine-
1) Search engine is Kind of Engine Where Websites a user can Search for information and
results based on are the same displayed on the Screen.
Ans: Yes, a worm is a type of Computer virus. unlike tradition al viruses, which attach themselves
to files and require user action to Spread, worms can replicate themselves and Spread across
networks without any user interaction. They can cause significant damage by consuming
bandwidth Slowing doon network traffic, and even deleting files.
My Opinion : Worms represent a serious threat to cybersecurity due to their ability to rapidly
propagate and cause wide spread damage.
A computer standalone program Worm malware is a computer that replicates itself in order to
spread to other computer often uses a it computer network to spread it Sat, re lying on Security
failures on target Computer access it. it will this to machine Scan Other as and the to use host a
infect computer.
5) An evolving technique.
A DDoS on, Distributed Denial – of service attack is a cyber-attack in which the central Server is
continuously flooded with frequent data requests. Such attacks intend to disrupt the target system
and business. In DD OS attack, the hackers make are a network resource unavailable to its users
by disrupting the services at a host connected to the internet. It is done by flooding on, crashing
the websites with too much traffic.
Firewalls are Software that can keep us a way and spams. They protect our privacy and can save
us from hassle of getting data recovered by preventing its theft and spamming.
1) Fire walls can help enhance your systems security.
1) Phishing attacks are designed to steal user private information such as password, bank accounts
credits card details.
2) Phishing is not limited to emails it can happen via phone calls, SMS, social media etc.
3) Example-
Spamming
1) Cyber Stalking - The World Wide Web and internet are Great even Place to study. But cyber
space, has an ugly side cyberspace reflects the real world and some people and to forget that cyber
staking and harassment are problems that a large number at people are realizing.
2) Spam - Spam is any Unsolicited Communication sent- in bulk. Usually sent via emails, spam
is also distributed through text massage, social media or phone calls.
Computer hacking is defined as one who uses programming skills to legally or illegally to a
computer or file.
LAN
2) LAN is high speed connection typically ranging from 100 Mbps to 10 Gbps.
WAN
2) Slower speeds due to vast distance data must travels widely depending on the technology used.
1) Delete Suspicious emails. It is best to delete Spam on dubious- looking emails without opening
them.
Internet is the connection of different networks interacting with each other. Computers and many
devices can be connected Communicate among each other’s.
(1) Firewalls - Implementing firewalls can help filter out malicious traffic before it reaches your
network.
(2) Intrusion Prevention Systems - IPS can delete and block Suspicious traffic Patterns
associated with DoS attacks.
(3) Load Balancers - Distributing incoming traffics across multiple Servers the impact can help
mitigate the impact of Dos attacks by preventing any single server from being overwhelmed.
(4) Rate limiting - Implementing rate – limiting mechanism Can restrict the number of request
from single source, reducing the effectiveness of Dos attacks.
(6) Network Segmentation - Segmenting your network can limit the scope of a Dos attack.
Preventing it from affecting the entire infrastructure.
(7) Regular Updates and Patches - Keeping systems software up-to-date with the latest security
patches can help prevent vulnerabilities that attackers might exploit for Dos attacks between
Software and Hardware.