A Computer (ICT)
A Computer (ICT)
A computer is an electronic device that manipulates information, or data. It has the ability to store,
retrieve, and process data.
Hardware is touchable any part of your computer that has a physical structure, such as the keyboard
or mouse.
Software is any set of instructions that tells the hardware what to do and how to do it.
ICT, or information and communications technology is the infrastructure and
components that enable modern computing.
Reliability: A computer is reliable as it gives consistent result for similar set of data. 1
Automatic: Computer performs all the tasks automatically 1
storage-Computer have a large storage capasity and store
-Touch screen a touch sensitive screen is a pointing device that allows the user to interact with the
computer by touching it.2
- Light Pen is a pointing device in the shape of a pen. It can be used to select a menu item or to draw
on the monitor screen.
-Barcode reader A barcode is a pattern made up of different thickness lines. This technology allows
for quick and error-free data entry into the computer. Barcode reader is used to read a barcode.2
CPU consists of three components: arithmetic-logic unit, control unit, and register.2
ALU is responsible for performing arithmetic and logical operations, and comparing data. 2
The control unit controls and directs the operation of the whole computer system.2
Register is a special and a small high speed memory of CPU which is used to store temporary results
and control information.2
Output devices is computer hardware that allows a computer to communicate the results of data
processing to the outside world. A computer’s output device allows data to be easily understood by a
human.
The following are some of the important output devices used in a computer.
Monitor is a device that displays information in pictorial or text form. 3
Primary storage device also known as main memory, is the part of the computer that stores
current data, programs, and instructions 3
There are two common types of primary storage: Random Access Memory (RAM) and Read Only
Memory (ROM)3
RAM ROM
1 Data stored in RAM can be read and written. Data stored in ROM can only be read.
Secondary storage device is stores data and information permanently. Any non volatile storage
device3. Secondary storage devices can be used as input and output devices.
Hard Disk-is the most common and usually largest data storage device in a computer system3
Optical Disk -is any computer disk that uses optical and laser technologies to read and write data.
Some examples of optical disk include compact disc (CD) and digital video disc (DVD).
USB flash disk-is used for storage, data back-up and transferring of computer files.3
Secure digital (SD) card 4-is a type of removable memory card used to read and write data in a
wide variety of mobile electronics and cameras.4
System software is responsible for controlling, integrating, and managing the individual hardware
components of a computer system. 4
Cookies are small pieces of text sent to your browser by a website you visit.
They help that website remember information about your visit, which can both make it easier
to visit the site again and make the site more useful to you.
Artificial intelligence refers to the simulation of human intelligence in machines that are
programmed to think like humans and mimic their actions.4
Utility programs: The purpose of utility software is to manage matters associated with the analysis,
configuration, performance improvement, and maintenance of a computer system.5
processing: is used to create, edit, format, and save text documents, for example, Microsoft Word,
WordPerfect, and WordPad.5
computer languages :-
computer languages can be classified broadly into the following three categories:
1. M achine Language
2. A ssembly Language
3. H igh-level Language.5
Multimedia
Hardware Requirements for Multimedia
The basic hardware requirement for multimedia are:
4. Video Card
5. Sound Card
5. Video can be used by using software like Video for Windows, Author Ware, etc6
Components of Multimedia
The multimedia components are:6
Computer Generation6
Computer generation is change happened in the development of computers.6
A. First generation :-
The main features of the first generation computers were as follows:
B. Second generation -
The main features of the second generation computers were as follows:
4. They were more reliable and faster than the first generation computers.
C. Third generation:-
7The main features of the third generation computers were as follows
4. They were faster and reliable than the second generation computers.
D. Fourth generation-
The main features of the fourth generation computers are:
2. They contain huge storage volumes in the form of magnetic and optical storage.
E. Fifth generation 7
• Input
• Process
• Output
• Storage7
Microcompute-ex.A.Desktops7,B.Portables7like Notebooks7,Labtops,Tablet7
r Minicomputer Mainframe computer Supercomputer8
Files are collections of data and folders are containers of files and other folders.
Files are stored in folder and folders are stored in computer drives, which can be internal Hard Disk,
CD, Flash Disk, etc.8
NETWORKING
Types of Networks8
1,Based on Transmission Medium
Wired Network and
Wireless Network
2,Based on Size of the Network
Personalized Area Network(PAN) is a network arranged within an individual person, typically
within a range of 10 meters.
Personal Area Network is used for connecting the computer devices of personal use is known
as Personal Area Network.
Local Area Network L(LAN) is a group of computers connected to each other in a small area
such as building, office.
LAN is used for connecting two or more personal computers through a communication
medium such as twisted pair, coaxial cable, etc.
Government agencies use MAN to connect to the citizens and private industries.
In MAN, various LANs are connected to each other through a telephone exchange line.
Star
Ring
Mesh
Client-Server10
Types Of Internetwork:
1.Extranet: An extranet is a communication network based on the internet protocol
such as Transmission Control protocol and internet protocol.
Standard
Guest account.
internet service provider (ISP). ISP’s are companies which provide internet related services to
its users.13
Web page
webpage is a document available on WWW. Web pages are
stored on a web server and can be viewed using a web
browser. 14
Static web page
Static web pages contain only static information i.e. user can
only read the information but cannot do any modification or
interact with the information. Static web pages are only used
when the information is no more required to be modified. A
static web page remains the same until it is updated.
Blogs
Many users of the Internet have fun keeping journals, or web
logs—called blogs for short, accessible to users. Blogs are often
updated daily and reflect the personality and views of a
blogger. 14
FUNCTIONS OF LAYERS:
Functions of the Layers
Physical Layer :
Physical characteristics of interfaces and media
Representation of bits.
Data rate
Synchronisation of bits
Line configuration (point to point or multipoint)
Transmission Mode
Physical Topology
Data Link Layer :
Framing
Physical addressing
Error control
Flow control
Access control
Network Layer :
- Routing
- Congestion control
- Billing
Transport Layer :
- Service – Point addressing
- Segmentation and reassembly
- Flow control
- Error control
Session Layer :
-Dialog control
-Synchronization
Presentation Layer :
- Data encoding
- Encryption
- Compression16
Application Layer :
- File Transfer
- Mail services
- Directory services16
Security
Computer Viruses16
Computer viruses are proving to be main cause of crashing
computer system. 17it is a malicious program that is designed to corrupt or delete the
information stored in the computer.17
2. Second type is designed to gain access to your machine and then hijack it. Once it has control of the
affected computer a hacker can use it for malicious purposes or as a spam machine to send thousands of
unwanted e-mails.
3. Third type is sometimes referred to as macro viruses. This type of virus is designed so they can delete
or overwrite the system or data files on the affected computer. This causes the computer to crash and
become unbootable or non-operable. M any of the computers that get this type of virus have a crashed
hard drive which is not repairable and all your data is lost permanently.17
The antivirus software protects your computer from virus attacks in three main ways:17
1. prevention which involves detecting and eliminating new viruses from your computer.
2. cleaning infected computers. This involves detection and extermination of the virus, along with
repairing the damaged files. 17
3. protecting your computer by monitoring e-mails, downloads and protection while Internet
surfing.
firewall
two main types of firewall in network security are :- 1,Network-
based Firewalls: These are placed on the boundary between a private network and a public network
(often the internet).
2,Host-based Firewalls: These are installed on individual devices or servers, regardless of the network to
which they're connected.
* There are many types of firewalls, often categorized by system protected, form factor, network
placement, and data filtering method, including:
Network firewall
Host-based firewall
Hardware firewall
Software firewall
Internal firewall
Distributed firewall
Perimeter firewall
Proxy firewall
Malware , short for malicious software, refers to any intrusive software developed
by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer
systems. Examples of common malware include viruses, worms, Trojan viruses,spyware, adware, and
ransomware.
Database management:
Database management: serves to create a computerized data table, to insert records, make
queries, analyze data, and append data into it.18
Advantages of DBMS:
Controlling of Redundancy: Data redundancy refers to the duplication of data (i.e storing same
data multiple times). In a database system, by having a centralized database and centralized control of
data by the DBA the unnecessary duplication of data is avoided. It also eliminates the extra time for
processing the large volume of data. It results in saving the storage space.18
Improved Data Sharing : DBMS allows a user to share the data in any number of application
programs.
Data Integrity : Integrity means that the data in the database is accurate. Centralized control of the
data helps in permitting the administrator to define integrity constraints to the data in the database. For
example: in customer database we can can enforce an integrity that it must accept the customer only
from Noida and Meerut city.
Security : Having complete authority over the operational data, enables the DBA in ensuring that the
only mean of access to the database is through proper channels. The DBA can define authorization
checks to be carried out whenever access to sensitive data is attempted.
Data Consistency : By eliminating data redundancy, we greatly reduce the opportunities for
inconsistency. For example: is a customer address is stored only once, we cannot have disagreement on
the stored values. Also updating data values is greatly simplified when each value is stored in one place
only. Finally, we avoid the wasted storage that results from redundant data storage.
Efficient Data Access : In a database system, the data is managed by the DBMS and all access to
the data is through the DBMS providing a key to effective data processing Enforcements of Standards :
With the centralized of data, DBA can establish and enforce the data standards which may include the
naming conventions, data quality standards etc.
Data Independence : Ina database system, the database management system provides the
interface between the application programs and the data. When changes are made to the data
representation, the meta data obtained by the DBMS is changed but the DBMS is continues to provide
the data to application program in the previously used way. The DBMs handles the task of
transformation of data wherever necessary. Reduced Application Development and Maintenance Time :
DBMS supports many important functions that are common to many applications, accessing data stored
in the DBMS, which facilitates the quick development of application.
Disadvantages of DBMS
1) It is bit complex. Since it supports multiple functionality to give the user the best, the underlying
software has become complex. The designers and developers should have thorough knowledge about
the software to get the most out of it.
2) Because of its complexity and functionality, i t uses large amount of memory. It also
needs large memory to run efficiently.
3) DBMS system works on the centralized system, i.e.; all the users from all over the world access this
database. Hence any failure of the DBMS, will impact all the users.
4) DBMS is generalized software, i.e.; it is written work on the entire systems rather specific
one. Hence some of the application will run slow.
19
OPERATING SYSTEM
Operating System: is the most important program that runs a computer.19
desktop operating systems include the following:
Windows is Microsoft's flagship operating system, the de facto standard for home and business
computers.
Mac OS is the operating system for Apple's Macintosh line of PCs and workstations.
Linux is a Unix-like operating system that was designed to provide PC users a free or low-cost
alternative.
The Android OS is the most common operating system among the mobile operating system.
2. Bada
3. Blackberry OS
4. Apple iOS
After android, it is one of the most popular OS. Also, it has very strong security features.
The developer of this OS is Microsoft. It is basically designed for pocket PCs and smartphones.
6. Symbian OS
Symbian Ltd. is the developer of this OS. Moreover, Nokia was the first to use this OS on its mobile
phones. This OS is based on java language.
7. Harmony OS
It is a latest OS moreover, Huawei is its developer. It is specifically designed for use in IoT devices.
8. Palm OS
9. WebOS
Palm Ltd is its developer. Moreover, it is based on Linux kernel and HP uses it in its mobile devices and
touchpads.