Computer Notes by JKSSB Study Fast
Computer Notes by JKSSB Study Fast
st
Fa
y
ud
St
B
SS
JK
JKSSB Study Fast (Iqbal Sir)
Computer
Important Points
Computer - Latin word - Computare -means to Calculate.
Father of Computer - Charles Babbage.
Father of Modern Computer - Alan Turing.
First Computer of India - Sidhartha.
First Super computer of india - PARAM-8000.
First Super computer of World - Cray-1.
Generation of Computer
1. First Generation - Vacuum Tube -John Ambrose Fleming
2. Second Generation - Transistor - William Shockley, John Bardeen and Walter Brattain
3. Third Generation - Integrated Circuit (IC) - Robert Noyce & Jack Kilby
4. Fourth Generation - VLSI Microprocessor - st
Federico Faggin, Ted Hoff etc.
Fa
5. Fifth Generation - ULSI Microprocessor. - Artificial Intelligence - John McCarthy
y
ud
1. Speed :- The computer can process data very fast at the rate of millions of instructions per
B
second (FLOPS)
JK
2. Versatility :- Computers can do types of work simultaneously. They can perform multiple
tasks at the same time.
3. Diligence :- Unlike human beings, a Computer is free from monotony, tiredness, lack of
concentration, etc. and can work for hours without creating any errors.
4. Reliability :- Computers are more reliable than human beings. Computers always produce
exact results. The possibility of errors occur only if the input is wrong, i.e. the computers never
make mistakes of their own accord.
Computer Architecture/ Components Computer :-
It was introduced in 1970 by Von Nauman. Input - Processing - Output - Storage { IPOS}
CPU (Central Processing Unit) :- Also known as Brain of computer. CPU have three parts as below:
1. ALU (Arthematic Logic Unit). 2. Control Unit. 3. Register.
1. ALU (Arithmetic logic unit):- Consists of two subsections namely:
• Arithmetic section :- Performs arithmetic operations like addition, substraction, multiplication, and
division.
• Logic Section: Performs logic operations such as comparing, selecting, matching, and merging of data.
JKSSB Study Fast (Iqbal Sir)
2. Control Unit (CU) :- CU coordinates with the input and output devices of a computer. It directs
the computer to carry out stored program instructions by communicating with the ALU and
Register . It organises the processing of data and instructions.The basic function control unit is
to fetch the instruction stored in the main memory, identify the operations and the devices
involved in it and accordingly generate control signals.
3. Registers :- These are used to quickly accept, store and transfer the data and instructions
that are being used immediately by the CPU.These rigisters are top of the memory
hierarchy.(Fastest Memory).
Computer Memory
Memory is primarily of three types −
1. Primary Memory/Main Memory. . 2. Secondary Memory. 3. Cache Memory
1. Primary Memory (Main Memory) :-
Primary memory holds only those data and instructions on which the computer is currently
working. It has a limited capacity and data is lost when power is switched off (Volatile Memory).
st
It is generally made up of semiconductor device. The data and instruction required to be
Fa
processed resides in the main memory. It is divided into two subcategories RAM and ROM.
y
ud
A. RAM (Random Access Memory) :- RAM is Volatile Memory (temporary storage). It is also
St
known as read/write memory that allows CPU to read as well as write data and instructions into it.
B
(a) Dynamic RAM (DRAM):- It is made up of memory cells where each cell is composed of one
capacitor and one transistor. DRAM must be refreshed continually to store information. DRAM
is slower, less expensive and occupies less space on the computer's motherboard.
(b) Static RAM (SRAM):- It retains the data as long as power is provided to the memory chip. It
need not be refreshed periodically. SRAM uses multiple transistors for each memory cell. It
does not use capacitor. SRAM is often used as cache memory due to its high speed. SRAM is more
expensive than DRAM.
B. ROM (Read Only Memory) :- It is non-volatile memory or permanent storage. It does not lose
its content when the power is switched OFF. ROM has only read capability, no write capability.
There are three categories of ROM as follow
(a) Programmable ROM (PROM):- Once a PROM has been programmed, its contents can never
be changed.
(b) Erasable Programmable ROM (EPROM) :- It can be erased by exposure to strong ultraviolet
light, then rewritten.
JKSSB Study Fast (Iqbal Sir)
(c) Electrically Erasable Programmable ROM (EEPROM) :- It can be erased electrically. Itis now
commonly used for holding BIOS.
2. Secondary Memory :- This type of memory is also known as external memory or non-
volatile. It is slower than the main memory. These are used for storing data/information
permanently. CPU directly does not access these memories, instead they are accessed via
input-output routines. The contents of secondary memories are first transferred to the main
memory, and then the CPU can access it. For example, disk, CD-ROM, DVD, etc.
1. Magnetics Memory:- Magnetic tapes, Magnetic Disks, Hard Disk, Floppy Disks.
2. Optical Memory:- Optical Disks like CD, DVD, CD-ROM, DVD-ROM, CD-RW(CD- Rewritable), CD-
R (CD-Recordable) WORM (Write Once Read Many), Blue-ray Disks.
It acts as a buffer between the CPU and the main memory. It is used to hold those parts of data
ud
and program which are most frequently used by the CPU. The parts of data and programs are
St
transferred from the disk to cache memory by the operating system, from where the CPU can
B
SS
access them.
JK
Memory Units
Memory Units Size Size
Bit 0 &1 -
Nibble 4 Bits -
Byte 8 bits -
So on............
JKSSB Study Fast (Iqbal Sir)
Input Devices
Keyboard Microphone
Mouse Magnetic Ink Card Reader(MICR)
Joy Stick
st
Optical Character Reader(OCR)
Fa
Light pen Bar Code Reader
y
ud
Graphic Tablet
SS
Alphabetical keys (A-Z, a-z), Number keys (0-9), Function keys (F1 to F12),
Backspace key: Used to Erase anything typed.(Or Delete one letter left side)
Delete key: Used to Erase information from computer Memory & from Screen. (Or Delete one
letter on the right side)
Mouse :- Discovered by Douglas Engelbert. It is a Pointing device. Two types of mouses are Optical
mouse and mechanical mouse.
Left Click:- Left mouse button is used for object Selecting & double clicking
Joystick: It is a pointing device like Mouse & trackball. It is a popular device for gaming. Uses in Video
games, Aeroplane Stimulators, Industrial Machinery [Cranes]
Scanners :- Used to convert images or text on paper into a digital Format that can be used by the
computer: Types of Scanners :- • Flatbed , Handheld, Sheet-fed Scanners.
Barcode Reader :- [Point of Sale] (POS). :- is able to scan and decode barcodes.
MICR (Magnetic Ink Character Recognition) : It examines character Shape in the matrix form. Characters
are printed using special Ink, which Contains Iron particles that can be magnetised. Used in "Bank
Cheques".
OCR (Optical Character Recognition) :- It is a technique for scanning of printed pages, translating it than
using OCR software to recognise the image as ASCII [American Standard Code for Information
Interchange) text that is editable. Used for acquiring textual data from image.
st
Fa
QR (Quick response) :- contains a matrix of code
y
Output Devices
B
SS
Printer. Modems
Projector. Network cards
Plotter Touch screen
Headphones. Headsets
Speakers. Facsimile (FAX)
GPS Audio cards/sound cards.
Types of Monitor :
1. Cathode Ray Tube : It is a Rectangular shaped monitor . CRT has Vacuum tubes.
2. Liquid Crystal Display (LCD) :- These are laptops and notepad sized PC's (Non-Emission displays)
JKSSB Study Fast (Iqbal Sir)
3. Light Emitted Diode (LED): It emits light when electric current is passed (Emission Display)
Printers :- Speed measures in Characters per second, Lines per second, Pages per second. • Resolution
of Printer-measures in -Dots Per Inch (DPI).
Types of Printers:
1. Impact Printers: It strikes paper & ribbon together to form a character. It is like a typewriter. It uses
pins or hammers that press an Inked ribbon against the paper. There are 4-types.
a) Dot Matrix Printer (Pin Printer): It forms characters using rows of pins. It can print one character at a
time.
b) Daisy wheel Printer : Here characters are fully formed on Petals (like Typewritten)
2. Non-Import Printer :- They don't hit a ribbon to print. They use electrostatic & Chemical inkjet
technology. It is of 4 types:
st
Fa
a) Laser Printer, b) Inkjet Printer , c) Thermal Printer, d) Electromagnetic.
y
ud
Plotters :- These are used to print out huge graphs, designs, and other types of paper-based documents,
such as engineering drawings, business charts, construction maps, and architectural blueprints.
St
B
SS
JK
Computer Ports :-
1. Parallel Port :- It is an interface for connecting eight or more data wires. The data flows
through the eight wires simultaneously. They can transmit eight bits of data in parallel. As
result, parallel ports provide high speed data transmission. Parallel port is used to connect
printer to the computer.
2. Serial Port :- It transmits one bit of data through a single wire. Since, data is transmitted
serially as single bit. It provides slow speed data transmission. It is used to connect external
modems, plotters, barcode reader, etc.
JKSSB Study Fast (Iqbal Sir)
3. Universal Serial Bus (USB):- It is a common and popular external port available with
computers. Normally, two to four USB ports are provided on a PC. USB also has the plug and
play feature, which allows devices ready to be run.
4. Firewire:- Fastest Speed. (Peer to peer protocol)
5. PS/2 (Personal system/2):- Connects Mouse/Keyboard.
Computer Software
Sytem Software Application Software
A.System Management Program:- A.General Purpose
Operating System Word Processor
Device Drivers MS Excel (Spreadsheet)
System Utility. MS PowerPoint (Presentation
Software) etc.
B.System Development Program:-
B.Special Purpose
Programing languages
Reservation System
Language Translators
Attendence System
Linker & Loader.
st
Billing Systemetc
Fa
y
Operating System :- It consists of programs which control, cordinate and supervise the activities of
ud
• It provides the interface b/w Hardware & User. Eg. MS.DOS, Windows XP/2000/98, Unix, Linux. etc.
B
SS
• Linux is an open-source operating system. Linux was created in 1991 by Linus Torvalds.
JK
• BIOS (Basic Input/output system) - Important for booting. It lies in EEPROM (ROM)
• Cold Booting :- If the computer is in "off state" and we boot by switching on.
Device Drivers:- Making device functional, it act like interface between Device &
2. Closed Source Software :- (Properiaty Software) :- Software that holds the source code safe &
encrypted. Users can't modify or delete part of the code.
Debugging :- is the process of finding and correcting errors or defects (Bug) in software or systems to
prevent improper operation.
Computer Error
1. Synthetic Error:- It occurs when we Violate any grammatical rule of programming Language.
2. Logical Error:- It occurs in the Output of Programs. Its presence leads to undesired/ incorrect Output.
3. Runtime Error:- It occurs due to some illigal Operation performed in the program
Deadlock :- is a situation where a computer process waits for a resource which is being held by another
process or a situation in which two programs sharing the same resource are preventing each other from
JKSSB Study Fast (Iqbal Sir)
accessing the resource. • The minimum number of threads or processes for a deadlock situation is 2.
The OS detects the deadlocks with the help of the Resource Allocation graph. • Deadlock detection is
supported only in Windows XP and later versions of windows.
MS Word Terminologies :-
Thesaurus- A feature that provides synonyms or alternative words for chosen words.
Page Break:- The spot in a document where one page ends and the other starts.
Indentation :- It denotes the distance text boundaries and page margins. It offers three types of
indentation: positive, hanging and negative indent.
Gutter Margin:- (Binding Area) A gutter margin adds extra space to the side, top margin, or
SS
Drop Cap :- A drop cap (dropped capital) is a large capital letter used as a decorative element at
the beginning of a paragraph or section. The size of a drop Caps by default 3 lines and
Maximum 10 lines.
Footer- A feature that allows the text/graphics that are marked on every page or segment,
regularly at the bottom yet can be anywhere on a page.
Header- A feature that allows text/graphics that are imprinted on every page/section, usually at
the top yet can be anywhere on a page.
Indent- A feature that allows setting a temporary left or right margin for paragraph line.
MS Excel :- Spreadsheet
Workbook: Collection of worksheets (By Default: 3 worksheet in a Work book)
Wrap text: If a line of text is too long, click Wrap Text to make it all visible
Macro :- is a set of automated instructions that perform a specific repeated task in Excel. Visual
st
Fa
Basic for Applications (VBA) is a programming language used to create macros.
y
Function:- Predefined formula in MS Excel is called Functions. There are 5 types of functions in
B
MS Excel eg.
SS
JK
=SUM (A1:A4)
=AVERAGE (B2:B17)
=COUNT (A2:A18)
=MAX (B8:B14)
=MIN (A1:A17)
• Charts and Graphs: Users can create visually appealing charts and graphs from their data to illustrate
trends, comparisons, and patterns. Excel offers various chart types, including bar charts, line charts, pie
charts, and more.
Types
1. Relative - A1
2. Absolute - $A$1
3. Mixed - $A1 or A$1
Shortcut Keys
Ctrl + Space - Select the entire column Alt+ Shift+ F1 - Insert the new worksheet
Shift + Space - Select the entire row Shift + F3 - Open the excel formula
Computer Terminology
Hardware :- The physical components of the computer system, such as the hard drive, disc drives, and
modem.
Software :- The programs or instructions that tell the computer what to do, such as word processors,
spreadsheets, and databases.
st
Piracy :- The illegal copying of software or other creative works.
Fa
Pixels :- An acronym derived from .picture element. The smallest element (a dot) on a display screen
y
ud
Spam :- Irrelevant or unsolicited messages sent over Internet, typically to large numbers of users, for the
St
Soft copy :- An electronic copy of data, such as a file viewed on a computer screen or sent as an email
attachment. Soft copies can be text files, images, or videos.
JK
Hard copy :- A physical copy of data, such as a printed document or a file stored on a thumb drive. Hard
copies are also known as printouts
Accumulator :- A local storage area called a register, in which the result of an arithmetic or logic operation is
formed It contains a single data register.
Application Software :- Application software is a subclass of computer software that employs the
capabilities of a computer directly to a task that the user wishes to perform. e.g., word document,
spreadsheet, etc.
Artificial Intelligence :- Fifth generation computing devices, based on artificial intelligence, are still in
development, though there are some applications, such as voice recognition, that are being used today.
ASCII :- (American Standard Code for Information Interchange) is a character set and a character encoding
based on the Roman alphabet as used in Modern English and other Western European languages.
Bar Code :- A bar code is a machine-readable representation of information in a visual format on a surface.
The first bar code system was developed by Norman Joseph Woodland and Bernard Silver in 1952.
Basic Input/Output System (BIOS) :- It is also known as ROM BIOS. It provides an abstraction layer for the
JKSSB Study Fast (Iqbal Sir)
hardware, i.e., a consistent way for application programs and operating system to intract with input/output
devices.
Booting :- Booting is a bootstrapping process which starts the operating system when a computer is
switched on
Bit :- A bit is the most basic information unit used in computing and information theory.
Browser :- A special software that enables users to read/view web pages and jump from one web page to
another.
Bug :- A software bug is an error, flaw, failure, or fault in a computer program or system that produces an
incorrect or unexpected result.
Bus :- A circuit that provides a communication path between two or more devices of a digital computer
system.
Cookie :- A packet of information that travels between a browser and the web server
Encryption :- In cryptography, encryption is the process of encoding messages (or information) in such a
way that hackers cannot read it, but authorised users can access it.
st
Firewall :- A security system usually consisting of hardware and software that prevents unauthorised
Fa
persons from accessing certain parts of a programme database or network .
y
Firmware :- Firmware is a technology which has the combination of both hardware and software . It
ud
provides necessary instructions for how the device communicates with others computer hardware .
St
Icon :- A symbol (such as picture or a folder) that represents a certain function on your computer. When the
B
SS
Machine Language :- The language of computer also called binary language. Instructions in this language
are written as a sequence of O's and l's.
Macro :- A script that operates a series of commands to perform a function. It is set up to automate
repetitive tasks.
Patch :- A small program that improves ,,i piece of software or corrects an error in
USB Universal Serial Bus FLOPS - Floating Point Operations Per Second
VIRUS Vital Information Resource Under Siege GIF - Graphic Interchangeable Format.
Types of Views
1. Normal View :- This is the default view in PowerPoint and this is primarily used to create and edit
slides. You can create/ delete/ edit/ rearrange slides, add/ remove/ modify content and manipulate
sections from this view.
2. Outline view :: to create an outline or story board for your presentation. It displays only the text on
your slides, not pictures or other graphical items
3. Slide Sorter View :- all the slides in your presentation in horizontally sequenced, thumbnails. Slide
show view is helpful if you need to reorganize your slides.
4. Slides Show :-Use Slide Show view to deliver your presentation to your audience. Slide Show view
occupies the full computer screen, exactly the way your presentation will look on a big screen when your
audience sees it.
JKSSB Study Fast (Iqbal Sir)
5. Print Preview :- Print preview is a feature that displays on the screen what a hard copy would look like
when printed. Background colour or effects applied to a document is not visible in Print Preview. (Ctrl +
F2 )
Placeholder: The term “placeholder” is used to identify the containers on a slide which are shown
St
with a dotted external border. Placeholders are specifically used to position different types of
content on the slide and are preformatted for you to provide consistent formatting between each
B
slide.
SS
JK
Outline pane: The Outline pane appears at the left, showing only the text in your presentation.
Slide pane: Slide pane contains the current slide in your presentation. You can use the vertical scroll bar
to view other slides in the presentation. Notes pane is located below the slide pane and is used to type
reference notes.
Microsoft Access
A database is a collection of logically related and similar data. Database stores similar kind of data for a
specific purpose that is organised in such a manner that any information can be retrieved from it, when
needed. Microsoft Access is an application which allows the creating of databases. Microsoft Access is
a Relational Database Management System (RDBMS).
• Uniform Resource Locator (URL) :- URL is the address of a document you'll find on the WWW. • The
elements in a URL:
Protocol://server's address/filename
Example: https://www.google.com.index.html
Internet Protocols
Protocol
Domain Names
WWW (World wide Web) by- Tim Berner's Lee (1989).The World Wide Web is a system of interlinked
hypertext documents accessed via the Internet. With a web browser one can view web pages that may
contain text, images, videos, and other multimedia and navigate between them via hyperlinks.
• Web Browsers :- Firefox, Google Chrome, Microsoft edge, Apple saffari, Opera, Brave ,Vivaldi etc.
• Search Engines :- Google, AltaVista, Yahoo, Hotbot, Lycos, Excite, WebCrawler etc.
Types of Communication
1. Simplex Channel :- In this channel, the flow of data is always in one direction, with no capability to
support response in other direction. This communication is unidirectional. Only one of the
communicating devices and the other can only e.g. Radio, Television, information etc.
2. Half Duplex channel:- In this channel, the data can flow in directions, but not at a same time. Wh one
device transmits other can only receive at informatioir) that point of time. e.g. Walkie Talkie.
3. Full Duplex Channel :- In this channel, the flow of data is in both directions at a time, i.e. both stations
can transmit and receive information simultaneously. e.g. Wireless handset (mobile phone).
Networking Devices
Modem: Modem stands for Modulator- Demodulator. It is used to connect computers for
communication via telephone lines. It converts Analog signal into Digital and vice versa.
Hub: It just acts like a connector of several computers i.e. simply connects all the devices on its ports
together. It broadcasts all the data packets arriving at it.
Switch: It is used for dividing a network into segments called subnets. It provides filtering of data
packets and prevents network traffic also.
st
Fa
Repeater: It is used to amplify (multiply) a signal that has lost its original strength so as to enable them
y
Router: It is used to connect different networks that have different architectures and protocols. It sends
St
the data packets to desired destination by choosing the best path available thus reducing network
B
traffic. It routes the data packets using the routing table that contains all the Information regarding all
SS
known network addresses, possible paths and cost of transmission over them.
JK
Gateway: It can be used to connect two different networks having different architectures, environment
and even models. It converts the data packets in form that is suitable to the destination application. The
two different networks may differ in types of communication protocols they use, language, data formats
etc.
Bridge: They are used two connect two LANs with the same standard but using different types of cables.
It provides an intelligent connection by allowing only desired messages to cross the bridge thus
improving performance.
Network Topology
Topology is the geometric arrangement of a computer system. Each computer system in a topology is
known as a node. Network topology is determined only by the configuration of connections between
nodes.
1. Bus Topology: A bus topology is such that there is a single line to which all nodes are connected and
the nodes connect only to this bus.
2. Mesh Topology: This type of network topology contains at least two nodes with two or more paths
between them.
3. Ring Topology: In this network topology, every node has exactly two branches connected to it. The
ring is broken and cannot work if one of the nodes on the ring fails.
4. Star Topology: In this network topology, the peripheral nodes are connected to a central node, which
rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network,
including the originating node.
5. Tree Topology: This is a network topology in which nodes' are arranged as a tree. The function of the
central node in this topology may be distributed.
st
Fa
y
ud
St
B
SS
JK
Types of Network :
PAN - Personal Area Network eg. Bluetooth
LAN - Local Area Network eg. Ethernet, Wifi.
MAN - Metropolitan Area Network eg. Cable tv network
WAN - Wide Area Network. Eg. Internet.
VPN = Virtual Private Network
WLAN = Wireless Local Area Network
SAN = Storage Area Network
Types of Internet Connection
1. Dial-Up Connection
A dial-up connection is established between your computer and the ISP server using a modem. A dial-up
Connection is a cheap and traditional connection that is not preferred these days as this type of
connection is very slow.
2. Broadband Connection
Broadband refers to high-speed internet access that is faster than traditional dial-up access. It is
provided through either cable or telephone composition. It does not require any telephone connection
that’s why here we can use telephone and internet connection simultaneously. In this connection, more
than one person can access the internet connection simultaneously.
It is a wide bandwidth data transmission that transports several signals and traffic types. In this
st
connection, the medium used is coaxial cable, optical fiber cable, radio, or twisted pair cable.
Fa
3. DSL (Digital Subscriber Line)
y
ud
DSL stands for Digital Subscriber Line. It provides an internet connection through the telephone
St
line(network). DSL is a form of broadband communication that is always on, there is no need to dial a
B
phone number to connect. DSL connection uses a router to transport data and the speed of this
SS
connection range between 128k to 8Mbps depending on the service offered. A DSL connection can
JK
E-mail :- :-Ray Tomlinson 1971 (1st message sent by him was QWERTYUIOP.
E-mail supports-
What is Switching?
In computer networking, Switching is the process of transferring data packets from one device to
another in a network, or from one network to another, using specific devices called switches
1. Message Switching
2. Circuit Switching
3. Packet Switching
1. Message Switching: This is an older switching technique that has become obsolete. In message
switching technique, the entire data block/message is forwarded across the entire network thus, making
it highly inefficient.
2. Circuit Switching: In this type of switching, a connection is established between the source and
destination beforehand. This connection receives the complete bandwidth of the network until the data
is transferred completely.
This approach is better than message switching as it does not involve sending data to the entire
network, instead of its destination only.
3. Packet Switching: This technique requires the data to be broken down into smaller components, data
frames, or packets. These data frames are then transferred to their destinations according to the
available resources in the network at a particular time.
This switching type is used in modern computers and even the Internet. Here, each data frame contains
additional information about the destination and other information required for proper transfer through
network components.
Code Division Multiple Access (CDMA) It is a channel access method used by various radio
St
communication technologies. CDMA employs spread spectrum technology and a special coding
scheme, where each transmitter is assigned a code to allow multiple users to be multiplexed over the
B
SS
Public Switched Telephone Network (PSTN) It is designed for telephone, which requires modem for data
communication. It is used for FAX machine also.
Integrated Services Digital Network (ISDN) It is used for voice, video and data services. It uses digital
transmission and combines both circuit and packet switching.
Ethernet :- It is a widely used technology employing a bus technology. An ethernet LAN consists of a
single co-axial cable called Ether. It operates at 10 Mbps and provides a 48-bits address. Fast ethernet
operates at 100 Mbps.
DHTML :- or Dynamic HTML, is a web-development technique combining HTML, CSS, and JavaScript to
create dynamic, interactive web pages and complex web applications.
Telnet Protocol :- Telnet is a text-based network protocol that facilitates remote computer access
Cookie :- is a small message given to a Web browser by a Web server. It stores information about the
user's Web activity.
Bookmarks :- are links to Web pages that make it easily to get back to your favourite places.
VOLTE :- Voice over Long-Term Evolution is an LTE high-speed wireless communication
VoIP :- Voice over Internet Protocol makes communication more accessible and affordable. Common
examples of VoIP apps include Skype, WhatsApp, Viber, Google Hangouts, Facebook Messenge
OSI Model :- OSI = Open Systems Interconnection. The OSI reference model was developed by ISO –
‘International Organization for Standardization‘, in 1984. it works on 7 layers.
Spyware: It is a program which is installed on a Computer to spy on the system owner's activities &
B
Virus : A virus is a malicious executable code attached to another executable file that can be harmless
JK
or can modify or delete data. When the computer program runs attached with a virus it performs some
action such as deleting a file from the computer system. Viruses can’t be controlled by remote
Worms (Write Once Read Many) By Robert Morris . It is a "standalone Malware" that can automatically
propagate or self-replicate without human interaction, enabling its spread to other computers across a
network. It causes slow down the computer system.
Salami Technique :- Small amount money from large No. of accounts. es. Rs.1. from.
VIRUS:- A computer virus is a type of program that, when executed, replicates itself by modifying other
computer programs and inserting its own code.
First PC Book Sector Virus Brain (1986) developed by Amjad Farooq Alvi from Pakistan & First Indian
Virus is also Brain. st
Fa
y
Elk Cloner 1982 for the Apple II Systems was created by Richard Skrenta.
ud
St
Boot Sector Virus :- It affects the boot sector. This virus enters ,the system when computers are booted
SS
from floppy disks. Nowadays, these viruses can even penetrate in forms of physical media such as
JK
external hard drives or USBs. Brain is the first PC Boot sect Post
Direct Action Virus :- When a virus connects itself directly to a .exe or .com file and penetrates the
device while its execution is named a Direct Action Virus. It is also known as a Non-Resident Virus as it
does not install itself.
Resident Virus :- Unlike Direct Action Virus this type of virus installs itself in the primary memory of the
computer and then infects other files and programs. A resident virus can affect anytime when an
operating system loads; heading towards file and program corruption. These viruses are hidden in the
memory and are hard to find and removed from the system.
Multipartite Virus :- It can infect and spread in various ways. It can infect multiple parts of the system
including program files, memory files, and boot sector.
Overwrite Virus. :- One of the most damaging viruses, the overwrite virus can fully remove the existing
program and substitute it with the malicious code by overwriting it. These types of viruses generally
spread through emails and are difficult to trace, to remove the virus one needs to delete the infected file.
Polymorphic Virus :- A polymorphic virus is difficult to track or remove as these viruses alter their code
each time an infected file is executed. Spread through spam and infected websites.
Spacefiller virus :- As the name implies, this type of virus fills in the empty spaces of a file with viruses
without affecting the size of the file such that the user cannot detect it easily. It is also recognized as a
"cavity virus".
Macro Virus :- It infects files that are created using certain applications or programs that contain
macros, e.g. Melissa.A
✓ Logical Bomb: It is a destructive program that performs an activity when a certain action has occurred.
🔍 A Logic bomb can have various triggers, such as specific events or user actions, while a time bomb relies
st
solely on the passage of time to activate and execute its payload
Fa
IT Act 2000 :- Notified on 17 October 2000 & Enacted 9 June 2000. Introduced by = Pramod Mahaja. Dealing
y
Anti-virus:-It is a program /utility software, which protect your PC/Laptops from Malwares. First Antivirus -
Reaper was designed by Bob Thomas to delete Creeper.
Popular Anti Viruses:-It is a utility software which protects your PC/Laptops from Malwares.
Firewall :- It can either be software based or hardware based and is used to help in keeping a network
secure.
Its primary objective is to control the incoming and outgoing network traffic by analyzing the
data packets and determining whether it should be allowed through or not, based on a
predetermined rule set.
A network's firewall builds a bridge between an internal network that is assumed to be secure
and trusted, and another network, usually an external (inter) network, such as the Internet, that is
not assumed to be secure and trusted.
A firewall also includes or works with a proxy server that makes network requests on behalf of
workstation users.
Software Piracy :- means copying of data or computer software without the owner's permission.