Basic Comp. Class x
Basic Comp. Class x
COMPUTER
NOTES USE AND THROW NOTES
CLASS X
INSTRUCTIONS
BLUE TEXT = Important.
RED TEXT = FACT. CAN BE IN MCQs
Advantages/benefits/disadvantages Any two or three.
For Long defini on, try to grasp the concept or key idea. You won’t have to
cram the long lengthy defini ons.
For bizarre terms ( the one you haven’t came across in your whole life, yet)
try to remember the essen al part (the Blued one).
DEFINITIONS
Data
Data is a collec on of unprocessed facts, figures, and symbols. e.g. Ram, age, 32, years, old.
Informa on
Informa on is a processed form of data. It is organized, meaningful, and useful.
e.g. Ram is 32 years old. Or Ram’s age is 32 years.
Hardware
Hardware is any part of the computer that has a physical structure that can be seen and touched, though
some may be so ny that they are invisible to the naked eye.
2. Output devices: Output devices are used to display the result or informa on to the user through
monitor or VDUs, LCDs, printers, plo ers and speakers.
3. Storage devices: Storage devices are the devices which are used to retrieved from and saved to the
data and informa on such as hard drives, memory s cks (pen drives), compact discs, DVDs and tape
drives.
1. Floppy disks were developed in late 1960s. A floppy disk is made up of a circular thin plas c
jacket coated with magne c material. Its outer cover which is a hard plas c protects this plas c disk. It
can hold 1.44 MB data. Nowadays, these disks are outdated.
2. Hard disk is made up of a metal disk and coated with a metal oxide used to store bulk of data.
These disks can store more informa on than floppy disks, up to tens or hundreds of gigabytes.
3. Compact disk – Read Only Memory or CD-ROM is a read only or read-write disk. It can store
large amount of data which can be distributed to large number of users. It is inexpensive and fast, but its
access me is longer than that of magne c disk.
There are two types of CDs: CD-R and CD-RW. CD-R stands for Compact Disk – Recordable. CD-RW stands
for Compact Disk – ReWriteable
4. DVD, short for Digital Versa le Disc, is an op cal storage disc similar to CD-ROM, as this is
double sided with dual layer disc and can hold 4.7 GB of data.
5. Blue-Ray disks are used to store more than 25 GB of data with a very high speed in less
amount of me. A single layer of BD can store 13 hours of video where as double layer BD can store
more than 20 hours of video.
Memory
There are two categories of memory, primary memory and secondary memory (or external memory).
Primary Memory is very fast as data and programs must be in the primary memory for execu on.
1. Random Access Memory (RAM). The informa on stored here disappears the very moment the
machine is turned off. It is also referred to as vola le memory.
2. Read Only Memory (ROM) Read Only Memory is permanently built into the computer at the me of
produc on. The informa on from this memory can only be read and it is not possible to write into it. It
permanently stores a set of instruc ons which instructs the computer how to work.
So ware
So ware is a collec on of instruc ons, programs, or data that enables a computer or device to perform
specific tasks. It acts as the intermediary between users and hardware, allowing for the execu on of
various func ons.
Types of So ware
1. System So ware: This type of so ware is essen al for the opera on of computer hardware. It
includes opera ng systems (like Windows, macOS, and Linux) that manage hardware resources
and provide a pla orm for applica on so ware to run. System so ware also includes device
drivers and u lity programs that help maintain and op mize system performance.
2. Applica on So ware: Applica on so ware is designed to perform specific tasks for users. This
includes produc vity so ware (like Microso Office), web browsers, media players, and
specialized applica ons (like Adobe Photoshop or AutoCAD). Applica on so ware can be
general-purpose or tailored to meet specific needs.
3. Open Source: Source code is publicly available for modifica on and distribu on. Open-source
so ware is typically free to use, modify, and distribute, leading to significant cost savings
compared to proprietary so ware, which o en requires expensive licenses and maintenance
fees. Users can modify the source code to tailor the so ware to their specific needs, providing
greater flexibility in mee ng unique business requirements.
Examples: Linux opera ng system, Apache web server, VLC, Telegram, etc
4. Closed Source: Source code is proprietary and not available for public modifica on.
Examples: Microso Windows, Adobe Photoshop.
5. Firmware: Specialized so ware programmed into hardware devices to control them.
Examples: BIOS in computers, firmware in routers.
6. Shareware are copyrighted so ware that can be shared for a limited on a trial basis with the
understanding that if the user decides to use it, he will pay for it.
EULA: An End-User License Agreement (EULA) is a legal contract between the so ware provider and the
end-user that outlines the terms and condi ons under which the so ware can be used.
INTERNET
The Internet is a global network that connects billions of computers and devices, enabling them to
communicate using standardized protocols, primarily the Internet Protocol Suite (TCP/IP).
WWW: The World Wide Web (WWW), commonly referred to as the Web, is an informa on system that
allows users to access and share a vast array of interconnected documents and resources over the
Internet. It was invented by Tim Berners-Lee in 1989.
Internet Protocol: The Internet Protocol (IP) is a set of rules that governs how data is sent and received
over the Internet. It is responsible for addressing and rou ng packets of data, ensuring they reach their
correct des na ons. Each device connected to the Internet is assigned a unique IP address, which
iden fies it among all other devices.
Telnet: Telnet is a network protocol that allows users to establish a command-line interface to access
remote computers over a network, typically using the Internet. It operates on a client-server model,
where the Telnet client ini ates a connec on to a Telnet server, allowing users to log in and execute
commands as if they were physically present at the remote machine. Telnet is commonly used for
remote management of servers and network devices but has largely been replaced by more secure
protocols like SSH (Secure Shell) due to security concerns.
BROWSER
A browser is a so ware applica on that enables users to access and interact with informa on on the
World Wide Web. It retrieves web pages from servers using protocols like HTTP and displays them in a
user-friendly format. Popular browsers include Google Chrome, Mozilla Firefox, Microso Edge, and
Apple Safari. The first web browser, WorldWideWeb, was created by Tim Berners-Lee in 1990.
URL : A URL (Uniform Resource Locator) is a specific address used to iden fy and access resources on the
internet.
Protocol: Indicates the method of communica on (e.g., HTTP, HTTPS).
Domain Name: The main address of the resource (e.g., www.example.com).
Path: Specifies the loca on of a resource within the domain (e.g., /folder/file.html).
Hyperlink: A hyperlink is a digital reference that allows users to navigate between different documents
or sec ons within a document on the internet. It is typically displayed as underlined text or an image
that, when clicked, directs the user to another loca on, which can be an external webpage, a different
sec on of the same page, or even a file download.
Hypertext: Hypertext is a method of structuring and linking digital documents that allows users to
navigate between related pieces of informa on easily. It enables non-linear access to content, meaning
users can jump from one document or sec on to another without following a sequen al order.
NETWORK
A computer network is a system that connects two or more compu ng devices, allowing them to
communicate and share resources. These devices can include computers, servers, and mobile devices,
connected via wired (e.g., Ethernet) or wireless (e.g., Wi-Fi) methods. Networks can vary in size and
complexity, from small home networks (LANs) to extensive global networks (WANs), enabling various
applica ons like file sharing, internet access, and communica on services
Intranet: An intranet is a private network used within an organiza on to facilitate secure communica on,
collabora on, and informa on sharing among employees. Unlike the public Internet, access is restricted
to authorized users, enhancing security. Intranets o en feature tools such as document storage, internal
messaging, and employee directories, serving as a central hub for company resources.
Full Form LAN is an acronym for Local Area MAN is an acronym for WAN is an acronym for Wide Area
Network. Metropolitan Area Network. Network.
Defini on and LAN is a network that usually MAN is a compara vely wider The WAN network spans to an even
Meaning connects a small group of computers network that covers large larger locality. It has the capacity to
in a given geographical area. regions- like towns, ci es, etc. connect various countries together.
For example, the Internet is a WAN.
Network The LAN is private. Hospitals, homes, The MAN can be both private The WAN can also be both private or
Ownership schools, offices, etc., may own it. or public. Many organiza ons public.
and telecom operators may
own them.
Maintenance Very easy to design and maintain. Compara vely difficult to Very difficult to design and maintain.
and Designing design and maintain.
Speed LAN offers a very high Internet MAN offers a moderate WAN offers a low Internet speed.
speed. Internet speed.
Delay in It faces a very short propaga on It faces a moderate It faces a high propaga on delay.
Propaga on delay. propaga on delay.
Faulty The LAN exhibits a be er fault The MAN exhibits a lesser The WAN also exhibits a lesser fault
Tolerance tolerance than the rest of the fault tolerance. tolerance.
networks.
Conges on The conges on in the network is very It exhibits a higher network It exhibits a higher conges on in the
low. conges on. network.
Communica on LAN typically allows a single pair of MAN allows mul ple A huge group of computers can easily
Allotment devices to establish a computers to interact interact with each other using the
communica on. But it may also simultaneously with each WAN.
support more computers. other.
Uses Schools, homes, colleges, hospitals, It basically covers a city, a It covers an en re country, a
offices, etc., can privately use it. small town, or any given area subcon nent, or an equivalent area.
with a bigger radius than the
LAN.
Wi-Fi: Wi-Fi (Wireless Fidelity) is a wireless networking technology based on the IEEE 802.11 standard. It
uses radio waves to enable devices like smartphones, laptops, tablets, and other smart gadgets to
connect to the internet or communicate with each other within a local area network (LAN). Wi-Fi
operates on different frequency bands, primarily 2.4 GHz and 5 GHz, offering flexibility in data
transmission and connec vity.
Benefits of Wi-Fi:
1. Wireless Convenience: Eliminates the need for physical cables, allowing mobility and ease of
use.
2. Cost-Efficient: Reduces the need for wired infrastructure, making it cost-effec ve for homes and
businesses.
3. Flexibility: Supports a variety of devices, including laptops, smartphones, tablets, IoT gadgets,
and smart appliances.
4. High-Speed Connec vity: Modern Wi-Fi standards (e.g., Wi-Fi 6) provide fast data speeds
suitable for streaming, gaming, and large file transfers.
5. Accessibility: Widely available in public spaces like cafes, airports, and libraries, providing easy
internet access on the go.
Disadvantages of Wi-Fi:
1. Limited Range: Wi-Fi signals weaken as the distance from the router increases, leading to dead
zones in large areas.
2. Interference: Other electronic devices, such as microwaves and neighboring networks, can
interfere with Wi-Fi signals.
3. Security Risks: Open networks or improperly secured Wi-Fi can be vulnerable to hacking and
unauthorized access.
4. Bandwidth Sharing: Mul ple users on a network can slow down connec on speeds.
5. Power Consump on: Wireless devices o en consume more ba ery compared to wired
connec ons.
Bluetooth: Bluetooth is a wireless communica on technology that allows devices to exchange data over
short distances using radio waves in the 2.4 GHz frequency range. It is designed for low-power
consump on and is widely used for connec ng devices like smartphones, headphones, smartwatches,
and other peripherals within a range of approximately 10 meters to 100 meters, depending on the
device and Bluetooth version.
Benefits of Bluetooth:
1. Wireless Connec vity: Eliminates the need for physical cables, enhancing convenience.
2. Low Power Consump on: Op mized for energy efficiency, making it suitable for ba ery-
operated devices.
3. Ease of Use: Simple pairing process for connec ng devices.
4. Cost-Effec ve: Integrated into most modern devices without requiring addi onal hardware.
5. Interoperability: Compa ble with a wide range of devices across mul ple pla orms.
Disadvantages of Bluetooth:
1. Limited Range: Has a shorter range compared to Wi-Fi, usually between 10-100 meters
depending on the class of the device.
2. Slower Data Transfer Speeds: Not ideal for transferring large files or streaming high-quality
media.
3. Interference Issues: Can be disrupted by other devices opera ng on the same frequency, such as
Wi-Fi and microwaves.
4. Security Vulnerabili es: Suscep ble to unauthorized access, such as "bluejacking" and
"bluesnarfing," if not properly secured.
5. Limited Device Connec ons: Generally supports fewer simultaneous connec ons compared to
Wi-Fi.
DHCP (Dynamic Host Configura on Protocol): DHCP is a network management protocol used to
automa cally assign IP addresses and other network configura on se ngs (such as subnet masks,
default gateways, and DNS servers) to devices on a network. This eliminates the need for manual
configura on and ensures that devices can communicate seamlessly within the network. It operates on a
client-server model, where a DHCP server provides configura on informa on to DHCP clients.
INTERNET SERVICES
Email : An email is a method of exchanging digital messages over the Internet.
It consists of two main components: the username and the domain name,
forma ed as [email protected].
E-Commerce : E-commerce, or electronic commerce, refers to the buying and selling of goods and
services over the internet. It encompasses various transac ons between businesses and consumers,
facilitated through pla orms like websites (Amazon, Flipkart, Ebay…), mobile apps, and online
marketplaces.
Benefits: E-commerce offers numerous advantages, such as:
Credit Card: A credit card is a financial tool issued by banks or financial ins tu ons that allows
cardholders to borrow funds to purchase goods and services. Users can make purchases up to a
predetermined credit limit, which is set based on their creditworthiness.
Digital Signature: A digital signature is a cryptographic technique used to verify the authen city and
integrity of digital messages or documents. It serves as a secure method for confirming that a message
or document has not been altered and that it originates from a legi mate source.
Cryptography: Cryptography is the study and prac ce of techniques for securing communica on and
protec ng informa on from unauthorized access. It involves the use of algorithms and protocols to
ensure that data remains confiden al, integral, and authen c during transmission.
CYBER CRIME
Cybercrime encompasses a range of illegal ac vi es conducted via the internet or involving computer
systems. It is any illegal act for which knowledge of computer technology is essen al to execute,
inves gate, or implement.
Types of Cybercrime
Hacking: Unauthorized access to computer systems or networks to steal, alter, or destroy data.
Fraud: Ac vi es aimed at deceiving individuals or organiza ons for financial gain, including phishing
scams and online auc on fraud.
Harassment: Cyberbullying and online harassment through social media or other pla orms.
Iden ty The : Illegally obtaining and using someone else's personal informa on to commit fraud.
Computer Virus: A computer virus is a type of malicious so ware (malware) that a aches itself to
legi mate programs or files. Upon execu on, it replicates by modifying other programs and inser ng its
code, leading to system infec on. Viruses can cause various harmful effects, such as corrup ng or
dele ng files, stealing data, and disrup ng system opera ons. They typically require user ac on to
spread, o en through email a achments or downloads. The term "computer virus" was first defined by
computer scien st Fred Cohen in his 1984. The first computer virus is o en a ributed to Bob Thomas,
who developed the Creeper virus in 1971.
An -Virus: An -virus so ware is a program designed to detect, prevent, and remove malicious so ware,
including viruses, worms, and other types of malware. It scans files and programs on a computer to
iden fy known threats using signature-based detec on and heuris c analysis for unknown threats.
Common features include real- me protec on, scheduled scans, and quaran ne op ons for infected
files. Popular an virus solu ons include Norton, Kaspersky, McAfee, and Bitdefender.
Firewall: A firewall is a network security device that monitors and controls incoming and outgoing traffic
based on predetermined security rules. It acts as a barrier between trusted internal networks and
untrusted external networks, such as the internet, to prevent unauthorized access and protect against
threats like malware and hackers. Firewalls can be implemented as hardware devices, so ware
applica ons, or a combina on of both. They filter traffic using criteria such as IP addresses, protocols,
and ports, ensuring that only legi mate data packets are allowed through while blocking poten ally
harmful ones.
Firewalls play a crucial role in network security by monitoring and controlling incoming and outgoing
traffic based on predefined security rules. Here are the primary uses of firewalls:
1. Network Security
2. Access Control
3. Protec on of Sensi ve Data
4. Preven on of Malware and Cyber A acks
5. Network Segmenta on
6. Traffic Monitoring and Logging
7. Intrusion Detec on and Preven on
8. Virtual Private Network (VPN) Support
D DoS: A Denial-of-Service (DoS) a ack is a malicious a empt to disrupt the normal func oning of a
targeted server, service, or network. The primary goal of a DoS a ack is to make a machine or network
resource unavailable to its intended users by overwhelming it with a flood of illegi mate requests, which
can lead to slow performance, unresponsiveness, or complete inaccessibility.