Latest Computer Notes
Latest Computer Notes
Control Unit
Input Arithmetic Logic Unit Output
Memory Unit
CPU
System Unit :-
System unit is a container that contains
It is = hardware frame
Made up of = Aluminum/Metal
Also called =
Computer case, computer tower, computer chassis
CU (Control Unit) :-
Cu take input = convert into Control Signal = give it to CPU
ALU (Arithmetic Logic Unit) :-
It is = Building Block of CPU
It performs Arithmetic Operations = +,/,*,-
MU (Memory Unit) :-
CPU store data & instruction in MU.
It store = final processing result
It is also called as = Register Memory
Registers = Fasterst Memory
Register Made up of = Flip Flop
Speed of CPU/ Processor :-
Instruction Rate of Processor/CPU is measured in = KIPS/MIPS (Kilo Instructions Per Second/ Million
Instructions Per Second)
Clock Rate of Processor/CPU is Measure in = Hertz= MHz/GHz (Mega hertz/Giga hertz) = Cycles Per Second
CPU Architecture :-
RISC = Reduced Instruction Set Computer
CISC = Complex Instruction Set Computer
The RISC Processors have a smaller set of instructions with few addressing nodes.
The CISC processors have a larger set of instructions with many addressing nodes.
CPU 4 Basic Functions :-
Fetch
Decode
Execute
Store
Number System :-
Binary to Digital, Digital to Binary :-
128 64 32 16 8 4 2 1
Binary to Octal, Octal to Binary :-
Group 3
Binary to Hexadecimal, Hexadecimal to Binary :-
Group 4
Micro-Processor :-
It is the =latest form of processor or CPU
It is the part of = 4 Gen of computer
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
First Micro Processor = Intel 4004 =1971
Invented by= intel Engineers
Name of Inventors :- Federico Faggin, Marcian (Ted) Hoff, Stanley Mazor, Masatoshi Shima
GPU - Graphics Processing Unit :-
Now a days new processor is using in mobile phones called = GPU
It is used for = video Rendering
GPU based on = Parallel Processing
The term “GPU” was coined by = Sony
GPU is highly Used for = Gaming
In mobile phones GPU is integrated in = Processor
Core in Processor :-
Processor with 2 Cores = Dual-Core
Processor with 4 Cores = Quad-Core
Processor with 6 Cores = Hexa-Core
Processor with 8 Cores = Octo-Core
Punch Card :-
Punch Cards was used for = Data Processing
Punch Card also called = Hollerith cards or IBM cards
Invented By = Herman Hollerith
Computers Used :-
First Generation :- ENIVAC, EDVAC, UNIVAC, IBM-701, IBM-650
Second Generation :- IBM-1620, IBM-7094, CDC-1604, CDC-3600
Third Generation :- Honeywell 6000, PDP = Personal Data Processor, TDC-316 = Torpedo Data Computer
Fourth Generation :- DEC10, STAR 1000, CRAY-1 (Super Computer), CRAY-X-MP (Super Computer)
Fifth Generation :- Desktop, Laptop, Notebook, Ultrabook, Chromebook
Memory Unit :-
1 Bit Binary Digit (0,1)
4 Bit 1 Nibble
8 Bits 1 Byte
1024 Bytes 1 KB (Kilo Byte)
1024 KB 1 MB (Mega Byte)
1024 MB 1 GB (Giga Byte)
1024 GB 1 TB (Tera Byte)
1024 TB 1 PB (Peta Byte)
1024 PB 1 EB (Exa Byte)
1024 EB 1 ZB (Zetta Byte)
1024 ZB 1 YB (Yotta Byte)
1024 YB 1 BB (Bronto Byte)
1024 BB 1 Geop Byte
Memory Unit = decimal :-
Analog Computer :-
Analog computers process analog. i.e. continuously varying data
Examples = Digital Cameras, Watches, Thermometers, Scanners, Human Voice
Digital Computer :-
Hybrid Computer :-
Virtual Assistant :-
Also called = AI Assistant, Digital Assistant, Voice Assistant
Apple Virtual Assistant = Siri = Year = 2011
Google Virtual Assistant = Google Now = Google Assistant = 2012 = 2016
Blackberry Virtual Assistant = Blackberry Assistant = 2013
Amazon Virtual Assistant = Alexa = 2014
Microsoft Virtual Assistant = Cortana = 2014
Facebook Virtual Assistant = Facebook M = 2015 = Home AI System = Mark Zuckerberg = Jarvis
Samsung Virtual Assitant = Bixby = 2017
Disk VS Disc:-
Disk is used for magnetic storage. = Hard Disk, Floppy Disk
Disc is used for optical storage. = Compact Disc, Digital Versatile Disc, Blu-Ray Disc
SRAM :-
Static RAM is the full form of SRAM.
Data is stored using the state of a six transistor memory cell.
Static RAM is mostly used as a cache memory.
Capable of retaining the stored information as long as the power is applied.
DRAM :-
Dynamic RAM is the full of DRAM.
Data is stored in capacitor.
Used now a days in computers.
Volatile in nature.
Needs to be refreshed with voltage regularly.
SDRAM :-
Synchronous Dynamic RAM.
Used in every modern processor.
SDRAM is an improvement to standard DRAM.
It synchronizes itself with the computer’s system clock.
The next generation of SDRAM is DDR.
Floppy Disk :-
Also called = Floppy or Diskette.
Invented = year = 1971
Developed by = IBM
Invented By = Alan Shugart
Size = 3 ½”, 5 ¼”, 8”
3.5” = 1.44 MB
5.25” = 160 KB single side 320 KB double side
8” = 80 KB
Data written = in a series of sectors
Hard Disk :-
It is = non volatile/Permanent in nature.
Also called = Hard Disk Drive
OS :-
It is System Software
Acts as an interface between a user of a computer and the computer hardware.
It manges all other programs on the machine.
RDBMS = Relational Database Management System = Data arranged in Tabular Form = Rows & Columns
Rows = Tubles, Columns = Attributes
Founder of RDBMS = Edgar F. Codd
Data Hierarchy :-
Bits
Bytes/Characters
Fields/Columns
Records/Rows
Files/Table
Database
DBA :- Database Administrators = Create and Maintain databases compatible with their companies needs.
Example of Database :- MySQL, Oracle RDBMS, QuickBase, SAP Sybase, IBM DB2, Microsoft Access,
Microsoft Excel, Microsoft SQL Server
About SQL :-
Stands for = Structured Query Language
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Database Language
Used for = Manage and Organize data
Developed by = IBM Researchers = Raymond Boyce and Donald Chamberli
Year = 1970
Old Name = SEQUEL
SEQUEL = Structured English Query Language
Database/SQL Language :-
DDL (Data Definition Language)
DML (Data Manipulation Language)
DCL (Data Control Language)
TCL (Transaction Control Language)
Terms Related to Database :-
Data = Raw & Figures
Information = Processed Data
Database = Organized Collection of Data
DDL (Data Definition Language) :-
Used to create = Skeleton of the database
Store = Metadata
Task = Create, Alter, Drop, Truncate, Rename, Comment
DML (Data Manipulation Language) :-
Used to = Access + Manipulate Data
Task = Select, Insert, Update, Merge, Lock Table
DCL (Data Control Language) :-
Used to = Control Access to data stored (Authorization)
Task = Grant, Revoke
TCL (Transaction Control Language) :-
Used to = Merge Transaction in database
Task = Commit, Rollback
ACID Property :-
Atomicity
Consistency
Isolation
Durability
Database Keys :-
Primary key :- The primary key can’t be a duplicate. A table cannot have more than one primary key. The
primary key field cannot be null.
Candidate key :- Candidate key can be a single column or combination of more than oen column.
Foreign key :- Foreign keys are the columns of the table which is used to point to the primary key of another
table.
Super key :- A super key is a group of single or multiple keys which identifies rows in a table.
Alternate key :- Out of all candidate keys, only one gets selected as primary key, remaining keys are known
as alternate keys.
Composite Key :- A key that has more than one attributes is known ascomposite key. It is also known as
compond key.
Networking
Application Application
Presentation Data Presentation
Session Session
Transport Segments Transport
Network Packets Network
Data Link Frames Data Link
Physical Bits Physical
OSI Model = Devices Used :-
Application Gateway
Presentation Gateway
Session Gateway
Transport Gateway
Network Router
Data Link Switch/Bridge
Physical Hub/Repeater
Switching Methods :-
Packet Switching = Connection less = Physical Layer
Circuit Switching = Connection oriented = Network Layer
OSI Model = Protocols :-
HTTP = Hyper Text Transfer Protocol
FTP = File Transfer Protocol
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Telnet = Teletype Network
SMTP = Simple Mail Transfer Protocol
POP3 = Post Office Protocol Version 3
DNS = Domain Network System
DHCP = Dynamic Host Configuration Protocol
SSL = Secured Socket Layer
TLS = Transport Layer Security
MIME = Multipurpose Internet Mail Extension
PPTP = Point-to-Point Tunneling Protocol
NetBIOS = Network Basic Input/Output System
RPC = Remote Procedural Call
TCP = Transmission Control Protocol
UDP = User Datagram Protocol
ICMP = Internet Control Message Protocol
VLAN = Virtual LAN
ATM = Asynchronous Transfer Mode
ARP = Address Resolution Protocol
SLIP = Serial Line Internet Protocol
PPP = Point-to-Point Protocol
Topology :- Geometric representation of how the computers are connected to each other is known as
topology.
BUS Topology :-
Single Cable = Backbone cable
Cable used = coaxial or twisted pair cable
Uses = Ethernet connection = IEEE 802.3
Technology = CSMA = carrier Sense Multiple Access
CSMA CD = Collision Detection
CSMA CA = Collision Avoidance
Maximum nodes attached = 30
Data Transmit = One direction
Used in = Small Networks
Data Transfer Speed = 10 Mbps
Star Topology :-
Central Device = Hub
Central Computer = Server
Peripheral Devices = Client
Cable Used = Twisted Pair Cable or RJ-45 Cable
Data Transfer Speed = 100 Mbps
Ring Topology :-
Each device in ring topology has a = Repeater
Each device is connected with = Two devices
The data flows in = one Direction = Unidirectional = Endless Loop = Clockwise direction
Technology = Token Passing
Token = Frame
Cable = Coaxial Cable
FDDI is used = Fiber Distributed Data Interface
Tree Topology :-
Tree Topology = Bus+Star
Connection = Hierarchical
Top Node = Root Node
Relationship = Parent-Child
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Use = Broadband Service
Mesh Topology :-
Computers are = Interconnected with each other
Used in = WAN = Internet = Wireless Network
Dedicated = Point to Point links
Used in = Home Automation, Smart building, HVAC System (Heating, Ventilating and Air Conditioning)
Network Devices = Data Transfer in Form of :-
Gateway Segments
Router Packets
Switch + Bridge Frames
Hub + Repeater Bits
HUB :-
Device = Networking
Works in = LAN
Cycle wheel = Centre Point = HUB
Topology = Star
Communication Among PC = via HUB
Port = 4/6/8
Nature = Not Intelligent/ Dumb
Layer = Physical
Message = Broadcast
Disadvantage = Send Message to all
Lack of security
Communication = Half Duplex
Single Collision Domain
Not used now a days
Types = Active HUB & Passive HUB
Active HUB :-
Need Electricity to run
Amplifies/Regenerate your symbol
Act as a Repeater
Passive HUB :-
Not Require Electicity
Does not amplify Signal
Simply receive & forward bits
Repeater :-
Networking Device
Regenerate your signal
Increase length of network without degrading
Called = Active HUB
Layer = Physical
Topology = Star
10 Base 2 Cable communicate = upto 185 KM = AddRepeater = Send 185 KM more
Convert = Low Level Signal = High Level Signal
Bridge :-
Networking Device
Intelligent HUB
Layer = Data Link Layer
Layer 2 Device
Topology = BUS/Tree
First Time Broadcast then Unicast
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
2 Collision Domain
Used to Connect = Multiple Network Segment
Switch :-
Networking Device
Layer = Data Link Layer
Nature = Intelligent
Ports = 4/5/8/16/24/32/48
Muyltiple (Seprate) collision domain
Full Duplex Mode
broadcast = Unicast = Multicast
table = Content Accessible Memory/CAM Table
wired Switch = 100 Mbps
wireless Switch = 10 Mbps
Switch Type :-
Store and Forward = slow = reliable
Cut through Switch = Fast = NR
Fragment free Switch = 1+2
Adaptive Switch = As per req.
Router :-
Inter-networking Device
Layer = 3 device
Layer = Networking
Communication b/w = 2 different n/w
Table = Routing Table
Maintain = Network ID
Not used in = LAN
Used in = WAN
Every port has = Broadcast Domain
IP Address = Packets
Port = 2/4/8
Gateway :-
Connect 2 different network
Work in = Above 4 layer
Work line = Firewall
Gateways = regulate trafic between two dissimilar networks
Routers = Regulate traffic between similar networks
Gateway = Modem + Router
Use in = Different Protocol
Topology = Star
Modem :-
Modulator & Demodulator
Modulator converts = Digital to Analog Signal
Demodulator converts = Analog to Digital signal
Star Topology
Network Types :-
LAN (Local Area Network):-
Private Network
Small Geographical Area
Share Resources
Data Transfer Speed = 10 Mbps to 1 Gbps
Devices = Hub/Switch
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
High Security
Range = 100 Mt - 2 Km
Cable = Twisted Pair Cable/Coaxial Cable
IEEE develop specification for LAN
Types = Wired & Wireless
Wired LAN = Cables = Ethernet = 802.3
Wireless LAN = WIFI = 802.11
MAN (Metropolitian Area Network) :-
Cover = City
Create = Interconnecting 2 LAN (LAN+LAN=MAN)
Cable = Fiber Optic Cable
Ex. = Cable television network
Devices = HUB/Switch, Routers/Bridge
Range = 5 to 50 Km
Less Security
WAN (Wide Area Network) :-
WAN = Telecommunication Network
Cover = Countries (Large Geographical Area)
Internet is largest WAN
Transmission medium= Satellite
Device = Router
Less Security
PAN (Personal Area Network) :-
Bluetooth Enable Device
Infrared Enabled Device
Hotspot
Wireless Keyboard & Mouse
Bluetooth enabled headphones
Wireless Printers
TV remotes
Range = 10 metres
SAN (Storage Area Network) :-
Cloud Computing
CAN (Campus Area Network) :-
A can is also known as a corporate area network
Group of interconnected Local Area Network
Range = 1 to 5 Km
Unguided medium :-
Radio Transmission
Microwave Transmission
Infrared Transmission
Un-Guided Medium is also called as = Wireless Transmission, Wireless Communication, Unbounded
Medium, GeoFencing Technology
Transmits = electromagnetic waves without using any physical medium.
Broadcast Signals = via Air
Radio WavesTransmission :-
Signal = Electromagnetic
Range/Wavelength = 1mm - 100 Km
Frequency = 3 KHz - 1 GHz
Nature = Omni Directional/ All Direction
Penetrate Through Walls = Yes
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Security = Poor
Used in = Television, FM, Military Communication, Mobile Phones, MRI (Magnetic Resonance Imaging),
Geofencing
Micro Waves Transmission :-
Signal = Electromagnetic
Range/Wavelength = 0.3 mt - 3 mm
Frequency = 1GHz - 300 GHz
Nature = Unidirectional
Penetrate Through Walls = No
Security = Medium
Infrared Waves Transmission :-
Signal = Electromagnetic
Range/Wavelength = 780 nm - 1 mm
Frequency = 300 GHz - 400 GHz
Nature = Short Range, Communication/Unidirectional
Penetrate through walls = No
Security = High
Geofencing :-
A Geofencing is a = Virtual geographic area
Location-Based Service (LBS)
Uses = App/Software
Triggered = Targeted marketing action
Action = E-mail, Advertisement, Notification
Uses = Wi-Fi, GPS, RFID, Bluetooth, Drones
Wi-Fi :-
Wi-Fi = Wireless Fidelity
Wi-Fi = Wireless LAN
IEEE Standard = 802.11
Year = 21 September 1998
GPS :-
GPS = Global Positioning System
Track = Location
Made up of = Satellite + Ground Stations + Receivers
Year = 21 September 1998
Operational Satellites = 31
Range = 20,200 KM
RFID :-
RFID = Radio-Frequency Identification
Consists of = Tags + Readers
Track = Object
Ex. = FASTag
Range = 100 mt
BlueTooth :-
Founder :- Nils Rydbeck
Company :- Ericsson Mobile
Year = 1989
Range = 10 mt
Network = PAN
Drones :-
Called = unmanned Aircraft
Called = Flying Robot
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Official Range = 2 KM
Invented by = Abrahan Karem
Guided Media :-
Twisted Pair
Coaxial Cable
Fiber Optical
Malware
Malware :-
Stands for = Malicious Software
Cause Damage to = Computer, Server, Client, Network
Virus :-
Founder = Fred Cohen
Vital Information Resource Under Seize
Replicate Itself
First Virus = Creeper = 1971 = Bob Thomas
First Boot Sector Virus = Brain = 1986 = Amjad Farooq Alve = Pakistan = First Indian Virus
Execute on = Human Action
Virus stay in RAM & Deploy in RAM = Resident Virus
Virus deploy in RAM but not stay in RAM = Non Resident Virus
Application Software Virus = Macro Virus
Virus changing types & Signature = Polymorphic Virus
WORM :-
Write Once Read Many
Founder = Robert morris
Write Worm = Ray Tomlinson
First Worm = Morris Worm
Nature = SelfReplicating
Standalone = Malicious Program
Run = Independently
Worm more dangerous than Virus
Trojan Horse :-
Trojan is a type of malware.
Pretend to be useful but actually not
Cantake control of your computer
Sending, receiving, launching, and deleting files and rebooting the computer
Phishing :-
Clone Website.
Hack Username & Password
Hack Login Credentials
Fake Webpage & Website.
Not Start with HTTP/s
Ransomware :-
Designed to deny access to a computer system or data.
Demand for ransom.
Encrypts files.
First ransomware = AIDS/PC Cyborg
Spoofing :-
Spoofing (ਚਕਮਾ ਦੇਣਾ)
IP Address
Address Resolution Protocol
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Emails from talso sender
Sniffing (ਸੁਘਣਾ):-
Capturing all the Packets
Tapping phone wires
Protect = VPN
Spyware :-
Type of Malware
Monitoring online behavious
Type of Adware (Popup)
Tracking cookies
Comes from Freeware/Shareware
Ex. = Keyloggers, Rootkits, Web Beacons
Keyloggers :-
Also called a keystroke logger.
Type of surveillance technology
Used to monitor and record each keystroke.
Web Beacons :-
Track who visited = web page
It is a = Transparent Graphic image placed on a website
Used with cookies
Also called :- web bug, pixel tag, clear GIF
DDOS Attack :-
Distributed Denial-of-Service
Hacker hacks into the system once the network is down.
Skimming Device :-
Skimming Devices Attack
Steal bank details is through attacking ‘skimming’ devices in ATM machines.
Reading information from the magnetic strip on the back of the card when it is inserted into the machine.
Rogue Malware :-
Type of internet fraud.
Mislead user that there is VIRUS on computer.
Convince user to pay for a fake malware removal tool.
But these tool install malware on user’s computer.
Wiper malware :-
Destructive in nature.
Not to gain monetary benefits.
Aim = Wiping entire Hard Disk.
Prevention = Regular Backup.
Scareware :-
Scareware = Rogue Software + Ransomware
Popup advertisement = ”your computer may be infected with harmful spyware programs.Immediate
removal may be required to scan, click “Yes, below”.
Time Bomb Vs. Logic Bomb :-
Time Bomb = It is a virus program that performs an activity on a particular date.
Logical Bomb = It is a destructive program that performs an activity when a certain action has occurred.
Multipartite Virus :-
Infect both = Files Infector + Boot Sectors.
Infect computer = Multiple times.
Ex. Flip & Invader
Cyber stalking :-
Online stalking
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Stalk or harass an individual, group, or organization.
It may include false accusations, defamation.
Important Questions :-
India Rank on cyber Threat =
Country Rank 1 on Cyber Threat =
Which country has maximum number of hackers =
Name No.1 hacker in world = kevin David Mitnick
Name No.1 hacker in India = Ankit Fadia
First Antivirus = Reaper
Founder of Antivirus = John McAfee
Internet
Types of Network :-
Internet
Intranet
Extranet
Internet :-
Wide Area Network
Protocol = TCP/IP
Largest Internetwork in World.
No Authority.
In Internet information is stored in = Database/Servers.
Pull or Retrieve Stored information with the help of = WWW (World Wide Web)
Internet Father = Vint Cerf (Vinton Grey Cerf)
TCP/IP Father :- Vint Cerf + Bob Kahn
Intranet :-
Private Network
Protocol = TCP/IP
Network used By = employees
Username & Password = Shared with Staff only.
Security = Firewall
Extranet :-
Controlled Private Network
Uses Public Network to share information with = Client/Suppliers/Vendors.
Restricted to Selected Users
Ownership = Single/Multiple Organization.
Security Measures = VPN + Encryption + Digital Signature
Protocol = TCP/IP
Net Neutrality :-
Net Neutrality = is the principle that internet service providers treat all data on the Internet equally.
VOIP :-
Voice Over Internet protocol
It is a technology that allows you to make voice calls using a broadband internet connection.
VOLTE :-
Voice Over LTE (Long Term Evolution)
It’s voice calls over a 4G LTE network.
VOLTE carries ability to use voice and data at the same time.
Browser :-
Used to display web pages.
First software on Internet.
Ex.
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Google = Chrome, Chromium
Mozilla = Firefox
Apple = Safari
Microsoft = IE, Edge
China = Baidu, UC Browser
First Browser = WWW = 1990
First Graphical Browser = Mosaic = 1993
Secure/Private Browser = TOR (The Onion Router)
WorldWideWeb :-
First Web Browser
First HTML Editor (WYSIWYG)
Renamed = Nexus
Developed in = 1990 (-1994)
Developed by = Tim Berners Lee
Computer = NeXt Computer
Mosaic :-
First Graphical Web Browser
Developed in = 1993 (-1997)
Support = Image + Text
Developed at = NCSA (National Center for Supercomputing Applications)
Developed by = Marc Andreessen
Netscape Navigator :-
Used for = Home Users
Year = 1994 (-2008)
Developed by = AOL/Verizon
Internet Explorer :-
Developed by = Microsoft
Year = 1995 (-2020)
Founder = Thomas Reardon
Last Version = IE 11
Mozilla Firefox :-
Developed by = Mozilla Foundation
Year = 2002
Free & Open-Source Browser
Logo Animal = Red Panda
Safari :-
Developed by = Apple
Year = 2003
Apple Graphical Browser
Google Chrome :-
Developed by = Google
Year = 2008
Cross platform Web Browser
Edge :-
Developed by = Microsoft
Year = 2015
Cross platform Web Browser
Tor Borwser :-
Stands for = the onion routing
Year = 2002
Designed for = anonymous web surfing
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Possible to Visit lock websites
Access to dark web
Search Engine :-
It is a software used to fetch information on Web.
China Search Engine = Baidu
Search Engine Store information about web pages through = Web Crawler = Web Spider
Ex.
Google
Bing
Yahoo
Ask.com
AOL.com
Baidu
Wolframalpha
DuckDuckGo
Search Engine is a = Website
Helps user to find information on = World Wide Web
Name the first Search Engine= Archie = Alan Emtage
Year = 1970
Google :-
Company = Google LLC
Launched = 1997
Languages = 149
Bing :-
Company = Microsoft
Launched = 2009
Languages = 40
Yahoo :-
Founder = Jerry Yang and David Filo
Company = Yahoo Inc
Launched = 1995
Languages = 40
Baidu :-
Country = China
Year = 2000
AOL :-
AOL = American Online
AOL was acquired by = Verizon (2015)
Search Engine = American
Ask.com :-
Country = America
Year = 1996
DuckDuckGo :-
Country = America
Founded = 2008
Cookies :-
Cookies are most commonly used to =track website activity
Small Text File.
Send By = Server
Stored in = Client/Browser
Website :-
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Collection of web page = Website
Web Protal = Login Protected
CMS = Content Management System
Website Mobile Friendly = Responsive
Website Language =
HTML = Hypertext Markup Language
CSS = Cascading Style Sheet
Java Script
PHP = Hypertext Preprocessor
Website :-
Websites used for building network with friends and relatives is called as = social Networking websites.
Websites used to sell and buy something are categorized under = E-Commerce Website
The first page that you normally view at a website is its = Home Page
Collection of Web Pages is called = Website
The first web page went live on = August 6, 1991
URL :-
Uniform Resource Locator
A URL has two main components = Protocol identifier, Resource name
URI :-
URI = URL + URN
URI = Uniform Resource Identifier (Name + Address)
URL = Uniform Resource Locator ( Address)
URN = Uniform Resource Name (Name)
ISP :-
Iternet Service Provider
First ISP (India) = VSNL (Videsh Sanchar Nigam Limited) = 14 August, 1995
First ISP (World) = Telnet
E-Mail :-
Electronic Mail
Year = 1971
Invented By = Shiva Ayyadurai
Invented By = Ray Tomlinson
@ = 1972 = Ray Tomlinson
CC = Carbon Copy
BCC = Blind Carbon Copy
Automatically = From, Date/Time
First E-mail Service = Hotmail
Hotmail = Sabeer Bhatia
Hotmail = Outlook
Unwanted Mail = Spam
Email Spoofing = Malware Attachment
E-mail Part = 2
Part = username@domainname
E-Mail Protocol :-
Send Mail = SMTP (Simple Mail Transfer Protocol)
Receive Mail = POP3 (Post Office Protocol Version 3)
Receive Mail = IMAP (Internet Message Access Protocol)
E-Mail Client :-
Software Install = In Computer to read mails.
Ex. MS Outlook, Mozilla Thunderbird, Apple Mail
Webmail :-
Vikas Bansal Academy , Street No.17, Ajit Road , Bathinda-151001(Mobile-96462-05415,81462-75555)
Access Mail = From Internet.
Ex. Gmail, Yahoo, AOL= Verizon
IT Act 2000 :-
It Act 2000-69A deals with = Procudure and safeguards for Blocking of Access of Information by Public
Notified on = 17 October 2000
Enacted = 9 June 2000
Introduced By = Pramod Mahajan
Dealing With = Cybercrime & E-Commerce
Cyber Law :- When Internet was developed, the founding fathers of Internet hardly had any inclination that
Internet could transform itself into an all pervading revolution which could be misused for criminal activities
and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the
anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity
and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal
activities in cyberspace.
• Father of Cyber Law Karuppannan Jaishankar (Prof. K. Jaishankar
• Word Cyber Space first appeared “William Gibson” ,“Science Fiction Neuromancer” published 1984.
• In India the bill was finalised by group of officials headed in by then minister of Information
Technology Mr. Pramod Mahajan.
• The bill was passed in the budget session of 2000 and signed by president K.R. Narayanan on 9 June
2000.
• This law is applicable across India.
• 94 Sections Divided into 13 Chapters and 4 Schedules.
• 17 October 2000
• Amendment 22 December 2008
• 124 Sections Divided into 14 Chapters and 2 Schedules.
Section 66 A Dangerous Act :- On 24th March 2015, the Supreme Court of India struck down Section 66 A of
the Information Technology Act, as unconstitutional.
Section 65 :- Tampering with computer source documents
Section 66 :- Hacking with computer system
Section 66 B :- Receiving stolen computer or communication device
Section 66 C :- Using password of another person (Identity Theft)
Section 66 D :- Cheating using computer resource
Section 66 E :- Publishing private images of others
Section 66 F :- Acts of cyber terrorism
Section 67 :- Publishing information which is obscene in electronic form.
Section 67 A :- Publishing images containing sexual acts (Porn Grapy)
Section 67 B :- Publishing child porn or predating children online (Child Porn Grapy)
Section 67 C :- Failure to maintain record
Section 68 :- Failure/refusal to comply with orders
Section 69 :- Failure/refusal to decrypt data
Section 70 :- securing access or attempting to secure access to a protected system
Section 71 :- Misrepresentation