0% found this document useful (0 votes)
15 views23 pages

It Final

It

Uploaded by

Swayam Keshri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views23 pages

It Final

It

Uploaded by

Swayam Keshri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

UNIT 1 FUNDAMENTALS OF COMPUTER

Components of Computer Systems


Hardware Components:
1. Central Processing Unit (CPU):
o The CPU is the computer's brain, performing processing tasks and controlling other components.
2. Memory (RAM):
o RAM temporarily stores data and instructions for quick access by the CPU during processing.
3. Storage Devices:
o Hard Disk Drive (HDD): Uses spinning disks for data storage.
o Solid-State Drive (SSD): Faster storage using flash memory.
o Optical Drives: Reads and writes data on CDs, DVDs, or Blu-ray discs.
4. Motherboard:
o The main circuit board that connects and facilitates communication between components like the
CPU, RAM, and storage.
5. Power Supply Unit (PSU):
o Supplies power to all computer components.
6. Graphics Processing Unit (GPU):
o Handles rendering of images, videos, and animations, crucial for graphic-intensive tasks.
7. Input Devices:
o Allow user interaction with the computer, such as a keyboard, mouse, or touchscreen.
8. Output Devices:
o Communicate information to the user, like monitors or printers.
9. Network Interface Card (NIC):
o Enables network connectivity, both wired and wireless.
10. Sound Card:
• Manages audio output and input, allowing the computer to handle sound playback and microphone input.

Software Components of Computer Systems


1. Operating System (OS):
o Manages hardware and software resources and provides a user interface. Examples include Windows,
macOS, Linux, and Android.
2. Applications:
o Programs that perform specific tasks, such as web browsers (Chrome), word processors (Word), and
games.
3. System Utilities:
o Tools that maintain and manage the system, like antivirus software, file backup tools, and disk
cleanup utilities.
4. Device Drivers:
o Software that allows the OS to communicate with hardware devices, such as printers or keyboards.
5. Firmware:
o Low-level software embedded in hardware devices, controlling their functions (e.g., BIOS or
smartphone camera firmware).
6. Programming Languages and Development Tools:
o Used by developers to create software. Common languages include Python, Java, and C++, with tools
like code editors and compilers.
7. Middleware:
o Software that acts as a bridge, facilitating communication between different applications or between
an application and the OS.

Applications of Computers
1. Business:
o Accounting, CRM, inventory management, and data analysis.
2. Education:
o E-learning, educational software, student management, and research tools.
3. Healthcare:
o EMRs, medical imaging, telemedicine, and hospital management.
4. Entertainment:
o Video streaming, gaming, music editing, and graphic design.
5. Science and Engineering:
o Simulations, data analysis, research, and CAD.
6. Government:
o E-governance, security, tax management, and infrastructure.
7. Finance and Banking:
o Online banking, trading, fraud detection, and algorithmic trading.
8. Communications:
o Email, messaging, video conferencing, and network management.
9. Manufacturing:
o Automation, quality control, product design, and supply chain.
10. Transportation:
• GPS, traffic management, vehicle design, and autonomous vehicles.

Advantages of Computers
1. Speed and Efficiency:
o Rapid processing and increased productivity in tasks like data entry and communication.
2. Accuracy and Precision:
o High accuracy in tasks, reducing human error.
3. Storage Capacity:
o Large data storage in a compact, easily accessible form.
4. Connectivity and Communication:
o Enables global communication and collaboration via the Internet.
5. Automation:
o Automates tasks, saving time and reducing labor costs.
6. Access to Information:
o Provides easy access to vast information online for learning and research.
7. Multitasking:
o Handles multiple tasks simultaneously, improving workflow.
Disadvantages of Computers
1. Security Risks:
o Susceptible to hacking, malware, and data breaches.
2. Dependency and Addiction:
o Over-reliance can lead to dependency, skill loss, and addiction.
3. Health Issues:
o Prolonged use can cause eye strain, back pain, and reduced physical activity.
4. Job Displacement:
o Automation may displace jobs, requiring workforce retraining.
5. Initial Costs and Maintenance:
o High setup costs and ongoing maintenance expenses.
6. Privacy Concerns:
o Risks of data misuse and privacy breaches.
7. Learning Curve:
o Some technologies can be difficult to learn, and training and support are needed.
Software and Its Types
Software:
Software is a set of instructions that tells a computer how to perform tasks, making hardware functional. It includes
system software, application software, utilities, and device drivers.
Types of Software:
1. System Software:
o Manages and controls hardware components, providing a foundation for other software. Examples
include operating systems (Windows, macOS, Linux), device drivers, and utilities.
2. Application Software:
o Allows users to perform specific tasks like word processing, web browsing, gaming, and graphic
design. Examples include Microsoft Word, Chrome, and Photoshop.
3. Operating System (OS):
o Manages hardware and software resources, providing a user interface and essential services like
memory management and security. Examples include Windows, macOS, Linux, and Android.
4. Mobile Operating System:
o Manages the resources of mobile devices, providing user interaction and access to hardware features.
Examples include Android and iOS.
5. Free and Open-Source Software (FOSS):
o Software that is freely available with openly accessible source code, allowing modification and
redistribution. Examples include Linux, Mozilla Firefox, and LibreOffice.

UNIT 2 INTERNET SERVICES AND SECURITY MEASURES

Internet
The Internet is a global network system that uses TCP/IP to transmit data across various media. It connects private,
public, business, academic, and government networks through guided, wireless, and fiber-optic technologies. While
often confused with the World Wide Web, the Internet refers to the broader global communication system, including
the hardware and infrastructure, whereas the Web is one of the services available on it.
Advantages of the Internet:
• Access to information, knowledge, and learning resources.
• Enables global connectivity, communication, and sharing.
• Provides mapping, contact information, and online banking.
• Facilitates shopping, selling, and making money online.
• Supports remote work, collaboration, and access to a global workforce.
• Platforms for donations and funding.
• Entertainment options, cloud computing, and storage.
Disadvantages of the Internet:
• Exposure to cyberbullying, trolls, and crime.
• Risks of exploitation, inappropriate content, and addiction.
• Causes distractions and can lead to overuse.
• Vulnerabilities like identity theft, hacking, and viruses.
• Increases spam and unwanted advertising.
• Can affect focus, and patience, and lead to social isolation.
• Potential health issues due to prolonged use and inactivity.

Packet Switching
Packet switching is a data transmission method in which data is broken into smaller packets, each containing a portion
of the data, destination address, and control information. These packets travel independently, taking different paths to
the destination, where they are reassembled.
Key Characteristics:
• Efficiency: Optimizes bandwidth by allowing multiple packets from different sources to share the same
transmission medium.
• Flexibility: Allows packets to take any available path, enabling dynamic routing around congestion or
network issues.
• Reliability: Only lost or corrupted packets are retransmitted, not the entire data set.
• Scalability: Suitable for large networks like the internet, handling numerous connections.
TCP/IP
TCP/IP (Transmission Control Protocol/Internet Protocol) is a set of rules for transmitting data over the Internet.
• TCP: Ensures reliable data delivery by checking that all packets arrive correctly and in order, resending any
that are lost.
• IP: Handles addressing and routing, making sure data packets reach the correct destination using unique IP
addresses for devices.
Together, TCP/IP forms the backbone of internet communication, ensuring data is delivered accurately and efficiently.
IP Address
An IP address is a unique numerical label assigned to each device on a network, allowing devices to identify and
communicate with each other over the internet. It serves as the "home address" for devices, ensuring data is sent to the
correct destination. Example: 192.168.1.1

Versions of Internet Protocol Address


1. IPv4 (Internet Protocol version 4):
• Original and widely used version of IP.
• Uses 32-bit addresses, displayed in decimal as four numbers separated by periods (e.g., 192.168.0.1).
• Limited address pool, leading to depletion with the rise in internet-connected devices.
2. IPv6 (Internet Protocol version 6):
• Developed to overcome IPv4 limitations, offering a vastly larger address pool.
• Uses 128-bit addresses, displayed as eight groups of hexadecimal digits separated by colons (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
• Supports the growing number of devices and future internet expansion.
Coexistence: Both IPv4 and IPv6 are used together through dual-stack technology, allowing devices and networks to
support both protocols.
Types of Internet Service
1. DSL (Digital Subscriber Line):
• Uses telephone lines for internet access.
• Offers higher speeds than dial-up and is widely available in urban and suburban areas.
2. Cable Internet:
• Uses coaxial cables shared with cable TV.
• Typically faster than DSL, common in urban and suburban regions.
3. Fiber Optic Internet:
• Transmits data via light signals through fiber-optic cables.
• Provides extremely high speeds and low latency, ideal for heavy bandwidth usage, but has limited availability.
4. Satellite Internet:
• It uses satellites to deliver internet, which is suitable for remote or rural areas.
• Has higher latency and generally slower speeds compared to wired connections.
5. Fixed Wireless Internet:
• Uses radio signals for internet access to specific locations.
• Serves as an alternative in rural or underserved areas lacking wired infrastructure.
6. Mobile Broadband:
• Uses cellular networks for internet access on mobile devices.
• Provides on-the-go connectivity but speeds vary based on coverage.
7. Dial-Up:
• Connects via telephone lines using a modem.
• Slow speeds, mostly obsolete due to faster technologies like DSL and cable.
These services offer various speeds, coverage, and suitability depending on the location and user needs.

World Wide Web (WWW)


The World Wide Web (WWW) is a system of interconnected web pages and documents accessed via the Internet.
Created by Tim Berners-Lee in 1989, it uses hypertext to link documents through hyperlinks, allowing navigation
between web pages. The WWW hosts content like text, images, and videos on web servers, accessible through web
browsers using URLs (e.g., www.example.com). It revolutionized global information sharing and communication.
Uniform Resource Locator (URL)
A URL (Uniform Resource Locator) is a web address that specifies the location of a resource on the internet. It
includes the protocol (e.g., HTTP or HTTPS), the domain name or IP address, and the specific path to the resource on
the server. For example, in "https://www.example.com/page1.html":
• Protocol: "https://" indicates the protocol.
• Domain Name: "www.example.com" is the domain.
• Path: "/page1.html" specifies the resource location.
URLs standardize the way web browsers retrieve resources from web servers on the WWW.
Types of URL
1. Absolute URL:
• A complete web address that includes the protocol, server name, path, and file name (e.g.,
http://www.ajclasses.com/index.html).
• Examples of protocols include HTTP, HTTPS, FTP, and mailto.
2. Relative URL:
• A partial address used for internal links within the same website. It omits the protocol and server name (e.g.,
"/index.html").
• Useful for linking resources within the same domain.

Domain Name System (DNS)


DNS (Domain Name System) translates memorable domain names (like www.example.com) into IP addresses (like
192.168.1.1), allowing users to access websites and services without needing to remember numeric IP addresses. It
functions like a contacts app, converting names into numbers for computers to communicate.
Web Browser
A web browser is software used to access and view content on the World Wide Web. It allows users to navigate
websites and interact with online content. Popular browsers include Google Chrome, Mozilla Firefox, Microsoft Edge,
Safari, and Opera.
Internet of Things (IoT)
IoT (Internet of Things) connects physical objects (e.g., household appliances, vehicles) to the Internet, enabling them
to collect, share data, and be controlled remotely. It aims to create smart systems that improve efficiency and
convenience in various sectors like home automation, healthcare, and transportation.
Smart Device
A smart device is an internet-connected electronic device with built-in sensors and communication capabilities.
Examples include smartphones, smart TVs, and smart thermostats. These devices enhance convenience and
connectivity by integrating technology into everyday activities.

RFID (Radio Frequency Identification)


Concept:
1. Tags: Small devices with a unique identifier. Can be passive (no battery), active (battery-powered), or semi-
passive (battery-powered, but needs a reader’s signal).
2. Readers: Emit radio waves and receive signals from tags. They can be fixed or handheld.
3. Communication: Tags transmit their identifier to readers, which then collect data about the tag in real-time.
4. Data Exchange: Enables real-time tracking and visibility of tagged objects.
Use Cases:
1. Inventory Management: Tracks stock levels and reduces errors in retail and warehouses.
2. Asset Tracking: Monitors location and condition of assets in various industries.
3. Access Control: Grants or restricts access in security systems, electronic key cards, and passports.
4. Supply Chain Management: Tracks goods through the supply chain to improve visibility and prevent theft.
5. Healthcare: Manages medical equipment, patient records, and medications.
6. Animal Tracking: Monitors animals in agriculture and wildlife management.
7. Smart Packaging: Provides product authentication and traceability to prevent counterfeiting.
RFID technology enhances efficiency and accuracy in tracking and managing objects across multiple industries.

Wireless Sensor Networks (WSNs)


Concept: WSNs consist of small, low-power sensors that wirelessly collect and transmit data about environmental
parameters.
Applications:
1. Environmental Monitoring:
o Tracks temperature, humidity, air quality, and detects natural disasters like fires and floods.
2. Precision Agriculture:
o Monitors soil conditions and optimizes irrigation and fertilization for better crop yield.
3. Smart Cities:
o Enhances traffic management, parking, waste management, and air quality monitoring.
4. Healthcare Monitoring:
o Enables remote tracking of vital signs and real-time patient health monitoring.
5. Industrial Automation:
o Monitors manufacturing processes, equipment, and inventory to improve efficiency.
6. Structural Health Monitoring:
o Checks the integrity of bridges, dams, and buildings for early detection of issues.
7. Wildlife Tracking:
o Tracks animal movements and behaviors for conservation and research.

Information Rights
1. Right to Privacy: Control over the collection, use, and sharing of personal data. Includes knowing what data
is collected and consent options.
2. Right to Access: Ability to review and request copies of personal data held by organizations.
3. Right to Rectification: Correct inaccurate or incomplete personal data.
4. Right to Erasure (Right to be Forgotten): Request removal of personal data when it's no longer needed.
5. Right to Data Portability: Move or transfer personal data across services in a standard format.
6. Right to Restriction of Processing: Limit the processing of personal data in certain situations.
7. Right to Object: Object to data processing, especially for direct marketing or based on legitimate interests

Privacy and Freedom of Information


1. Privacy:
o Definition: The right to control personal information and decide how it is collected, used, and shared.
o Importance: Protects individual autonomy, dignity, and prevents unwarranted intrusion.
o Implications: Ensures trust and accountability in handling personal data, preventing abuse and
breaches.
2. Freedom of Information:
o Definition: The right to access information held by public authorities and know about matters of
public interest.
o Importance: Fosters transparency, accountability, and informed decision-making.
o Implications: Promotes access to government data and knowledge, enhancing innovation and civic
engagement.
Privacy and freedom of information are complementary, supporting a balanced and democratic information society.

Cybersecurity Principles
1. Keep Devices Safe: Use strong passwords and update software regularly to fix security issues.
2. Be Cautious with Links and Attachments: Avoid clicking on unknown links or opening suspicious
attachments to prevent phishing.
3. Use Secure Connections: Ensure websites use "https://" and look for a padlock icon for secure connections,
especially for financial transactions.
4. Protect Personal Information: Share personal data only on trusted websites and be careful with social media
sharing.
5. Backup Data: Regularly back up important files to prevent loss from cyberattacks or hardware failures.
6. Stay Informed and Vigilant: Keep up with cybersecurity threats and watch for unusual activity.
Computer Malware
• Definition: Malicious software designed to damage or disrupt computer systems and steal information.
• Types: Includes viruses, worms, Trojans, ransomware, spyware, adware, and rootkits.
• Spread: Via email attachments, infected websites, removable media, or software vulnerabilities.
• Effects: Can steal data, encrypt files for ransom, disrupt operations, or turn devices into bots for attacks.

Well-Known Cyber Attacks


1. Phishing: Attackers impersonate trusted entities via email or messages to steal sensitive information like
passwords or credit card numbers by tricking users into clicking malicious links or attachments.
2. Spoofing: Hackers disguise themselves as trusted sources (like websites or individuals) to deceive users into
sharing personal info or performing unauthorized actions.
3. Malware: Malicious software (viruses, worms, Trojans, ransomware, spyware, adware) designed to damage
or access systems. It often spreads through phishing emails, infected websites, or compromised software.
4. Denial of Service (DoS) & Distributed Denial of Service (DDoS): DoS attacks flood a system with traffic to
disrupt its normal operation, while DDoS attacks use multiple compromised systems to intensify the attack.
5. Man-in-the-Middle (MitM): Attackers intercept and potentially alter communications between two parties
without their knowledge, such as through Wi-Fi eavesdropping or HTTPS spoofing.
6. SQL Injection: Attackers inject malicious SQL queries into input fields of a web application to exploit
database vulnerabilities, allowing them to access or alter sensitive data and execute commands on the server.
Prevention Measures to Mitigate Cyber Attacks
1. CAPTCHA Codes:
o Phishing Prevention: Differentiates between human users and bots, reducing automated phishing and
brute-force attacks.
o Account Registration: Ensures real users are creating accounts, preventing fake accounts.
o Comment Spam Prevention: Blocks automated bots from posting spam or malware links.
2. Strong Passwords:
o Credential Protection: Use complex, unique passwords combining letters, numbers, and symbols to
prevent unauthorized access.
o Password Policies: Enforce regular updates, prohibit reuse, and set complexity requirements.
3. Two-Factor Authentication (2FA):
o Additional Security: Requires a second authentication method (e.g., SMS code or mobile app) along
with a password, enhancing security.
o Phishing Protection: Adds an extra layer of defense against phishing by requiring both password and
second factor.
o Account Recovery: Provides additional verification for account recovery, preventing unauthorized
access.
4. Password Managers:
o Secure Storage: Store and manage passwords securely, generating strong, unique passwords and
encrypting them.
o Autofill Functionality: Automatically fills in credentials, reducing phishing risks by avoiding manual
entry on fake sites.
Blockchain Technique
Blockchain is a secure, transparent digital ledger that records information in linked blocks. Once added, blocks are
nearly impossible to alter, making it a reliable system for verifying and recording transactions without a central
authority.
Uses for Security Measures:
1. Data Integrity: Ensures information remains accurate and untampered.
2. Decentralization: Distributes data across multiple nodes, reducing single points of failure.
3. Transparency: Allows all participants to view transactions, making fraud easier to detect.
4. Encryption: Uses cryptography to secure data access and interpretation.
5. Immutable Records: Provides a permanent, unchangeable record of all transactions.
6. Smart Contracts: Automates and enforces agreements without intermediaries.
7. Identity Verification: Manages digital identities securely to prevent theft.
8. Supply Chain Security: Tracks products from origin to delivery, ensuring authenticity.
9. Secure Voting Systems: Records votes transparently, preventing tampering.
10. Financial Transactions: Ensures secure, efficient transactions with reduced fraud risk.

UNIT 3 – CURRENT COMPUTING PARADIGM

Cloud Computing
Cloud Computing allows users to access and store data, applications, and services over the internet, rather than
relying on local hardware. It provides flexibility, scalability, and cost savings by offering on-demand computing
resources from anywhere with internet access.
Merits:
• Cost-Efficiency: Reduces need for physical hardware and maintenance.
• Scalability: Easily adjusts resources based on demand.
• Accessibility: Access from anywhere with an internet connection.
• Reliability: Offers high availability and disaster recovery.
Demerits:
• Security Concerns: Vulnerable to data breaches and cyberattacks.
• Dependence on Internet: Requires stable internet for access.
• Limited Control: Less control over infrastructure and systems.
• Potential Downtime: Service outages can disrupt access.

Types of Cloud
1. Public Cloud:
o Definition: Services provided over the internet by third-party providers, with shared resources among
multiple organizations.
o Examples: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP).
o Advantages: Cost-effective, no maintenance, scalable, highly available.
o Disadvantages: Less control over security and customization, potential privacy concerns.
2. Private Cloud:
o Definition: Cloud infrastructure used exclusively by one organization, either on-premises or hosted
by a third party.
o Examples: VMware, OpenStack.
o Advantages: Greater control, enhanced security, tailored customization.
o Disadvantages: More expensive, requires maintenance, less scalable.
3. Hybrid Cloud:
o Definition: Combines public and private clouds, allowing data and applications to be shared between
them.
o Examples: IBM Hybrid Cloud, Microsoft Azure (with on-premises solutions).
o Advantages: Flexible, cost-optimized, balanced security and scalability.
o Disadvantages: Complex management, potential compatibility issues, requires robust networking.
4. Community Cloud:
o Definition: Shared cloud infrastructure among several organizations with common concerns,
managed by the organizations or a third party.
o Examples: Government agencies or educational institutions sharing resources.
o Advantages: Cost savings, shared infrastructure, collaboration.
o Disadvantages: Limited control, potential for conflicting interests.

Service-Oriented Approach
• Design: Focuses on creating reusable, self-contained services.
• Integration: Services communicate through well-defined interfaces over a network.
• Flexibility: Services can be independently developed, updated, or replaced.
• Analogy: Like building with LEGO blocks—each service can be combined in different ways to create
applications.
Virtualization
• Function: Creates virtual representations of physical resources (servers, storage).
• Efficiency: Runs multiple virtual machines on a single physical machine.
• Benefits: Enhances hardware resource usage, reduces costs, supports cloud computing.
• Flexibility: Abstracts physical hardware into software, removing limitations of physical proximity and
network design.

Types of Virtualization
1. Hardware Virtualization
o Definition: Abstracts physical hardware into multiple virtual machines (VMs) that run different OSes
and applications independently.
o Examples: VMware ESXi, Microsoft Hyper-V, Oracle VM VirtualBox.
o Benefits: Maximizes hardware use, isolates applications, supports multiple OSes on one server.
2. Server Virtualization
o Definition: Creates multiple virtual servers on a single physical server, each functioning as an
independent server.
o Examples: VMware vSphere, Microsoft Hyper-V, Citrix XenServer.
o Benefits: Reduces hardware costs, simplifies management, improves resource allocation and
scalability.
3. Operating System (OS) Virtualization
o Definition: Runs isolated containers on a single OS kernel, sharing the same OS but operating
independently.
o Examples: Docker, LXC (Linux Containers), Kubernetes.
o Benefits: Lightweight, fast deployment, efficient resource use, simplified management.
4. Storage Virtualization
o Definition: Combines physical storage from multiple devices into a unified, centrally managed
storage resource.
o Examples: SAN (Storage Area Network) virtualization, NAS (Network-Attached Storage)
virtualization.
o Benefits: Simplifies management, improves utilization, provides easier scalability and backup
solutions.

Cloud Business Models


1. Infrastructure as a Service (IaaS)
o Definition: Provides virtualized computing resources like virtual machines, storage, and networking
over the internet.
o Examples: AWS EC2, Microsoft Azure Virtual Machines, Google Cloud Compute Engine.
o Control: High level of control over OS and applications.
2. Platform as a Service (PaaS)
o Definition: Offers a development platform for building, deploying, and managing applications
without managing underlying infrastructure.
o Examples: Google App Engine, Microsoft Azure App Services, Heroku.
o Control: Abstracts hardware and OS complexities, enabling faster development.
3. Software as a Service (SaaS)
o Definition: Provides fully functional applications over the internet, managed by the provider.
o Examples: Google Workspace, Microsoft Office 365, Salesforce.
o Control: Minimal setup and management needed by users.

Use Cases of Cloud Computing


• Data Storage and Backup: Scalable storage for data with automatic backups and remote access.
• Web Hosting: Flexible, cost-effective hosting solutions with high availability and performance.
• Application Development and Testing: Quick development and testing using scalable cloud resources.
• Big Data Analytics: Processing and analyzing large datasets for insights and decision-making.
• Disaster Recovery: Cost-effective backup and restoration services to ensure business continuity.
• Collaborative Tools: Real-time document sharing and team collaboration with apps like Google Workspace
and Office 365.
• Machine Learning and AI: Scalable infrastructure for developing and deploying AI models and handling
large-scale data.

Green Computing
Definition: Environmentally friendly technology design, use, and disposal aimed at reducing computing's
environmental impact.
Benefits:
• Reduced Energy Consumption: Lowers power usage and electricity costs.
• Lower Carbon Footprint: Decreases greenhouse gas emissions.
• Cost Savings: Reduces operational costs and extends equipment lifespan.
• Extended Hardware Life: Minimizes the need for frequent replacements.
• Enhanced Corporate Image: Boosts reputation and attracts eco-conscious customers.
• Compliance and Incentives: Meets regulations and may access government incentives.
• Waste Reduction: Encourages recycling and proper disposal of e-waste.
Edge Computing
Definition: Processes data close to its source rather than relying on distant data centers.
Benefits:
• Faster Response Times: Reduces delays by processing data locally.
• Reduced Bandwidth Use: Minimizes data transfer costs by limiting data sent over the internet.
• Improved Reliability: Maintains functionality even if central servers are unreachable.
• Enhanced Security: Lowers interception risks by keeping data closer to its source.
• Lower Latency: Essential for real-time applications due to faster data processing.
Quantum Computing
Definition: Utilizes qubits to process information based on quantum mechanics principles, allowing simultaneous
representation of multiple states.
Benefits:
• Super-Fast Calculations: Solves complex problems more rapidly than classical computers.
• Better Problem-Solving: Advances in cryptography, drug discovery, and materials science.
• Enhanced Simulations: Accurately models complex systems for research and development.
• Improved Optimization: Efficiently optimizes systems like supply chains and financial portfolios.
• Advanced AI and Machine Learning: Boosts capabilities in artificial intelligence and machine learning.

Big Data
Definition: Extremely large and complex datasets that exceed traditional data management tools' capabilities,
characterized by high volume, velocity, and variety.
Challenges:
• Data Management: Complexity in storing, organizing, and retrieving large volumes of data.
• Data Integration: Difficulty in combining diverse data sources and formats.
• Scalability: Need for systems to efficiently handle growing data without performance issues.
• Data Quality: Ensuring accuracy and consistency to avoid incorrect insights.
• Security and Privacy: Protecting data from breaches and ensuring compliance with regulations.
• Complexity: Requires advanced algorithms and tools for analysis.
• Cost: High expenses for specialized hardware, software, and skilled personnel.
Solutions:
• Use Scalable Tools: Employ Hadoop and Spark for efficient data handling.
• Implement Data Integration Solutions: Use tools to harmonize data from various sources.
• Adopt Cloud Services: Leverage cloud platforms for scalable storage and processing.
• Ensure Data Quality: Apply data governance and quality control measures.
• Strengthen Security: Implement encryption, access controls, and regular audits.
• Utilize Advanced Analytics: Use machine learning and AI for complex data analysis.
• Manage Costs Efficiently: Optimize resource usage and explore cost-effective solutions.

UNIT 4 – business data handling

Transaction Processing System (TPS)


Definition: A system that manages and processes real-time transactions, ensuring data integrity and rapid responses.
Types:
1. Batch Processing:
o Transactions are collected and processed together at scheduled intervals.
o Efficient for large volumes of transactions but not immediate.
2. Real-Time Processing:
o Each transaction is processed immediately as it occurs.
o Essential for applications needing instant feedback, like online banking and e-commerce.

Characteristics of Transaction Processing System (TPS)


• Speed: Processes transactions quickly, often in real-time.
• Accuracy: Ensures correct recording of transactions, minimizing errors.
• Reliability: Consistently handles many transactions without crashing.
• Security: Protects sensitive transaction data from unauthorized access.
• Consistency: Ensures all parts of a transaction are completed correctly.
• Backup and Recovery: Quickly recovers from issues like crashes or power failures.
Analytical Processing Concepts
Online Analytical Processing (OLAP):
• Definition: Technology for complex data analysis using multidimensional databases.
• Features: Allows interactive exploration of data, efficient querying, and detailed analysis.
• Uses: Business intelligence, reporting, trend analysis, and forecasting.

Types/Techniques of Online Analytical Processing (OLAP)


• MOLAP (Multidimensional OLAP): Uses pre-calculated data stored in a multidimensional data cube
(hypercube) for fast analysis. Ideal for quick data retrieval and analysis.
• ROLAP (Relational OLAP): Performs multidimensional analysis on data from relational databases using
SQL queries. Suitable for large and detailed datasets but has slower query performance compared to MOLAP.
• HOLAP (Hybrid OLAP): Combines MOLAP and ROLAP techniques. Provides quick retrieval of data from
a cube and detailed analysis from relational databases, offering a balance between speed and detail.

Data Mining
Definition: The process of analyzing large data sets to uncover patterns and relationships that aid in solving business
problems and predicting future trends. It is a core discipline in data science.
Text Mining
Definition: Analyzing large amounts of text data to extract useful information and insights. Techniques include
keyword extraction, sentiment detection, and text clustering, helping understand trends and customer opinions.
Web Mining
Definition: Discovering useful information and patterns from web data, including website content, user behavior, and
link structures. It aids in improving website design, targeting ads, and enhancing user experience.

Artificial Intelligence (AI)

Definition: AI simulates human intelligence in machines to perform tasks like speech recognition, decision-making,
and problem-solving. It includes technologies such as machine learning, natural language processing, and computer
vision.

Importance of AI

• Automation: Streamlines repetitive tasks, boosting productivity and efficiency.


• Decision-Making: Analyzes large data sets for quicker, more informed decisions.
• Personalization: Delivers tailored experiences, enhancing customer satisfaction.
• Innovation: Drives new technologies and solutions, fostering advancements in various fields.
• Problem-Solving: Tackles complex issues like climate modeling and drug discovery.
• Accessibility: Enhances technology access for people with disabilities through tools like speech recognition.
• Economic Growth: Creates new jobs and markets, improving efficiency and reducing costs.

Evolution of AI
• 1950s - Early Days: Focused on creating machines to perform tasks requiring human-like intelligence, such
as playing chess.
• 1960s-70s - Symbolic AI: Used symbols and rules to represent knowledge and make decisions, effective for
simple tasks but limited for complex problems.
• 1980s-90s - Machine Learning: AI systems learned from data, improving performance over time based on
experience.
• 2000s - Deep Learning: Introduced multi-layered neural networks, significantly advancing image, speech
recognition, and language translation.
• Present - Modern AI: Integrated into everyday technology like virtual assistants and recommendation
systems, with ongoing advancements in natural language processing, robotics, and ethics.
Data Handling
• Collecting: Gathering data from various sources.
• Cleaning: Removing errors and inconsistencies.
• Storing: Organizing data for easy access and analysis.
Effective data handling ensures data is accurate, secure, and ready for decision-making and analysis.

Business Data Handling Use Cases


1. Business Operations:
o Analyzing sales, inventory, and customer feedback to refine production and marketing strategies.
2. Healthcare:
o Collecting patient symptoms, medical history, and test results to diagnose, treat, and monitor health
trends.
3. Finance:
o Using market trends, economic indicators, and financial statements for investment and risk
management decisions.
4. Education:
o Tracking student performance and engagement to adjust teaching methods and improve learning
outcomes.
5. Research:
o Gathering and analyzing data to test hypotheses, identify trends, and guide future research decisions.

Expert System in Business Data Management


Concept: An expert system is AI software designed to emulate the decision-making abilities of a human expert. It
uses a knowledge base to solve problems that typically require human expertise, providing advice and explanations.
Characteristics:
• Permanence: Unlike human experts, expert systems are always available.
• Knowledge Distribution: Shares the expertise of multiple experts.
• Cost-Efficient: Reduces the need for costly consultations.
• Problem-Solving: Uses if-then rules to derive solutions.
• AI Milestone: One of the first successful AI applications.
Components:
• Knowledge Base: Stores facts, rules, and domain-specific knowledge.
• Inference Engine: Retrieves and applies knowledge to solve problems.
• Knowledge Acquisition Module: Updates the knowledge base with new information.
• User Interface: Allows users to interact with the system.
• Explanation Module: Provides reasoning behind the system’s conclusions.

Machine Learning
Concept: Machine Learning (ML) is a branch of artificial intelligence where computers learn from data and improve
over time without explicit programming. ML algorithms identify patterns in data to make predictions or decisions,
enhancing their performance as they process more information.
Types of Machine Learning:
1. Supervised Learning:
o Examples: Classification (e.g., spam detection) and regression (e.g., predicting house Description:
Trained on labeled data with known outcomes.
o prices).
2. Unsupervised Learning:
o Description: Analyzes unlabelled data to find patterns or groupings.
o Examples: Clustering (e.g., customer segmentation) and dimensionality reduction (e.g., simplifying
data for visualization).
3. Semi-Supervised Learning
4. Definition: Combines a small amount of labeled data with a large amount of unlabeled data to enhance
learning.
5. Example: Classifying animal images with a few labeled examples (cats and dogs) and many unlabeled ones,
improving accuracy by leveraging all available data.
6. Reinforcement Learning
7. Definition: Learns through interactions with an environment, receiving rewards or penalties based on actions.
8. Example: Training a self-driving car in a simulation, where it learns to navigate safely by receiving rewards
for correct driving and penalties for mistakes
Application of Machine Learning in Banking and Finance
1. Fraud Detection: Identifies unusual transaction patterns to catch fraudulent activities quickly.
2. Credit Scoring: Enhances accuracy of credit assessments by analyzing various borrower data.
3. Algorithmic Trading: Makes high-speed trading decisions to optimize investment returns.
4. Customer Service: Utilizes chatbots and virtual assistants for faster, personalized support.
5. Risk Management: Predicts risks and financial downturns by analyzing historical data and market trends.
Importance of ERP for Business
1. Efficiency: Automates and streamlines processes, reducing manual work and errors.
2. Centralized Data: Consolidates information from all departments into one system, improving access and
decision-making.
3. Improved Reporting: Provides accurate insights and reporting on performance, compliance, and financial
status.
4. Enhanced Collaboration: Improves communication and coordination between departments.
5. Scalability: Adapts to business growth and increased complexity.
6. Customer Satisfaction: Enhances responsiveness and order management, leading to better customer service.
Intelligent Agents
Intelligent agents are systems or software that independently perform tasks and make decisions by analyzing and
learning from data. Examples include virtual assistants like Siri or Alexa.
Features:
• Autonomy: Operate independently.
• Learning: Adapt based on experience.
• Decision-Making: Make choices to achieve goals.
• Adaptability: Adjust behavior as needed.
Applications:
• Customer Support: Virtual assistants and chatbots handle routine inquiries and troubleshooting, operating
24/7.
• Personal Assistants: Apps like Siri and Alexa help with tasks such as setting reminders and providing
updates, learning user preferences over time.
• Healthcare: Assist with diagnosing conditions, managing records, and recommending treatments based on
medical data.
• Finance: Analyze market trends, manage portfolios, and detect fraud, aiding in real-time trading and strategy
optimization.
• Smart Homes: Control lighting, heating, and appliances based on user preferences, improving energy
efficiency and convenience.
• Autonomous Vehicles: Navigate and make driving decisions using data from sensors and cameras, enhancing
safety.
• E-commerce: Recommend products based on browsing history and previous purchases, personalizing the
shopping experience.
UNIT 5 – IT ACT 2000 AND CYBERCRIMES

Information Technology Act 2000 (IT Act 2000)


Definition: Indian law provides a legal framework for electronic transactions, cyber activities, and addressing
cybercrimes.
Key Points:
• Enacted: October 17, 2000.
• Scope: Applies to all of India and offenses committed abroad by Indian citizens.
• Objectives:
1. Legal Recognition: Validates electronic records and digital signatures.
2. E-Governance: Promotes electronic governance.
3. E-Commerce: Supports secure online transactions.
4. Cybercrime: Defines offenses and enhances cybersecurity.
5. Certifying Authorities: Regulates digital signature certifying authorities.
6. Cyber Appellate Tribunal: Establishes a body for cyber law disputes.
Original Structure: 94 sections, 13 chapters, and 4 schedules.

Features of the IT Act 2000


1. Digital Signatures: Legally validates electronic documents, making them as binding as paper documents.
2. Electronic Contracts: Allows formation and enforcement of contracts online.
3. Offenses and Penalties: Defines cybercrimes like hacking and data theft, with specified penalties.
4. Cyber Activities Regulation: Sets rules for managing and protecting digital information.
5. Certifying Authorities: Establishes bodies to verify digital signatures, ensuring secure online
communications.
6. E-Governance: Supports using electronic records and signatures in government processes.

Definitions of Key Terms in the IT Act 2000


1. Certifying Authority: An entity licensed to issue Digital Signature Certificates under section 24.
2. Computer: An electronic device that performs data processing tasks like logic, arithmetic, and storage,
including associated software and communication facilities.
3. Computer Network: A system connecting multiple computers or devices through various communication
methods (e.g., satellite, wire, wireless), whether continuously maintained or not.
4. Computer System: A device or group of devices capable of processing data and executing programs,
excluding non-programmable calculators.
5. Controller: The official responsible for overseeing Certifying Authorities, as appointed under section 17(7).
6. Cyber Security: The protection of information and computer resources from unauthorized access, use, or
damage.
7. Data: Information processed or intended to be processed by a computer, stored in various formats like
printouts or magnetic media.
8. Digital Signature: A method of authenticating electronic records through electronic procedures, ensuring the
sender's identity and data integrity.
9. Digital Signature Certificate: A certificate issued under section 35(4) that verifies a digital signature.
10. Electronic Gazette: The official government gazette published in electronic form.
11. Electronic Record: Data or information stored or transmitted in electronic form, such as images or sound
files.
12. Originator: A person who generates, sends, or transmits an electronic message but is not an intermediary.
13. Subscriber: An individual in whose name a Digital Signature Certificate is issued.
14. Private Key: A secret key used to create a digital signature.
15. Public Key: A key used to verify a digital signature, listed in the Digital Signature Certificate.

Digital Signature
A digital signature is a secure electronic version of a handwritten signature, used to verify the authenticity and
integrity of a digital document or message. It ensures that the document was created and sent by the stated sender and
has not been altered.
E-Governance
E-Governance uses technology, especially the internet, to deliver government services online, making processes like
applying for licenses or paying taxes more efficient and accessible. It enhances transparency, reduces corruption, and
improves communication between citizens and the government.
Benefits of E-Governance:
• Convenience: Access services online anytime, anywhere.
• Faster Services: Reduces waiting times for approvals and payments.
• Transparency: Makes government operations more open and accountable.
• Cost-Effective: Saves money by reducing paperwork and in-person visits.
• Reduced Corruption: Automated processes limit opportunities for corruption.
• Improved Communication: Simplifies feedback and concerns from citizens.

Attribution, Acknowledgement & Dispatch of Electronic Records under the IT Act, 2000
1. Attribution of Electronic Records:
An electronic record is linked to a person if it was sent by them, someone authorized by them, or their system
automatically.
2. Acknowledgement of Receipt:
Confirmation from the recipient that they received the electronic record, done through automated replies,
manual confirmation, or other agreed methods.
3. Dispatch of Electronic Records:
An electronic record is considered dispatched when it leaves the sender’s system. The dispatch location is
where the sender's business or residence is, and the time is when it exits their system.
Regulation of Certifying Authority as per IT Act 2000: Functions of CCA (Sections 18-25)
The Controller of Certifying Authorities (CCA) licenses and regulates Certifying Authorities (CAs) under Sections 18
to 25 of the IT Act.
Key Functions of CCA:
• Supervision: Oversees activities of CAs.
• Certification: Certifies public keys of CAs.
• Standards and Qualifications: Sets standards for CAs and specifies employee qualifications.
• Business Conduct: Specifies conditions for CAs to conduct business and maintain accounts.
• Auditing: Specifies terms for appointment and remuneration of auditors.
• Electronic Systems: Facilitates and regulates electronic systems.
• Conflict Resolution: Resolves conflicts between CAs and subscribers.
• Duties and Database: Lays down duties of CAs and maintains a public database of CA records.
Additional Powers:
• Recognition of Foreign CAs (Sec. 19): Can recognize foreign CAs with government approval.
• Grant Licenses (Sec. 21): Licenses CAs to issue electronic signature certificates if they meet specified
criteria.
• Suspend Licenses (Sec. 25): May suspend a CA's license if they provide false information, fail to comply
with terms, or breach standards or provisions of the Act.

Digital Signature Certificate (DSC)


A Digital Signature Certificate (DSC) is an electronic signature that verifies the identity of the signer in digital
transactions. It ensures the authenticity and security of online documents by encrypting them. DSCs are used for
secure online transactions, tax filings, and document signing.
Duties of Subscribers
Under the IT Act, 2000, subscribers who hold digital signatures must:
1. Protect Private Key: Safeguard their private keys used for digital signatures.
2. Notify Breach: Immediately inform the certifying authority if the private key is compromised or suspected to
be compromised.
3. Ensure Accuracy: Provide accurate information when applying for a DSC.
4. Use Appropriately: Use the DSC only for its intended purpose.

Penalties Under the IT Act, 2000


1. Unauthorized Access (Section 43): Unauthorized access, data theft, or disruption of computer systems can
result in compensation of up to ₹1 crore.
2. Tampering with Computer Source Documents (Section 65): Altering source code can lead to imprisonment
up to 3 years, a fine up to ₹2 lakh, or both.
3. Hacking (Section 66): Hacking with malicious intent may result in imprisonment up to 3 years, a fine up to
₹5 lakh, or both.
4. Publishing Obscene Information (Section 67): Publishing obscene content online can lead to imprisonment
up to 3 years and a fine up to ₹5 lakh for the first offense; subsequent offenses may incur harsher penalties.
Adjudication Under the IT Act, 2000
1. Adjudicating Officer: Handles cases where damages claimed do not exceed ₹5 crore, investigating and
deciding on cybercrime matters.
2. Process of Adjudication: Begins with a complaint, followed by an inquiry where both parties present their
case. The officer can order compensation or fines.
3. Appeal to Cyber Appellate Tribunal: Dissatisfied parties can appeal to the Cyber Appellate Tribunal, with
further appeals possible in a High Court.
These measures create a framework to address cybercrimes and impose penalties to discourage such actions.

Cyber Appellate Tribunal (CAT)


Establishment: The Central Government establishes Cyber Appellate Tribunals (CAT) by notification.
Composition: CAT consists of a Chairperson and members appointed by the government.
Qualifications:
• Chairperson: Must be, have been, or be qualified as a Judge of a High Court.
• Members: Must have special knowledge or experience in IT, telecommunications, industry, management, or
consumer affairs.
• Judicial Members: Appointed from the Indian Legal Service.
Term of Office: Chairperson or members serve for 5 years or until 65 years of age, whichever is earlier.
Appeals: Aggrieved parties can appeal to CAT within 45 days of the original order.
Powers and Procedures: Includes summoning individuals, requiring document production, receiving evidence,
reviewing decisions, and issuing commissions.
Offenses and Cybercrime Under the IT Act, 2000
Offenses: Include unauthorized access, data theft, source code tampering, and publishing obscene material. Penalties
range from fines to imprisonment.
Cybercrimes: Illegal activities using digital means, such as hacking, identity theft, phishing, and online fraud,
affecting individuals, organizations, or governments.

You might also like