Computer Science 11 Notes
Computer Science 11 Notes
Computer
Science For Class XI
S # Particular Page #
1 Introduction to Information Technology 3
2 History & Development of Computers 15
3 Digital Computer Systems 20
4 Input Output Devices 31
5 Storage Devices 49
6 Computer Software 57
7 Data Representation 75
8 Data Communication 79
9 Computer Networking 90
10 The Internet 106
11 Security, Copy Right & The Law 113
➢ A computer is an electronic device that can accept data (input), manipulate data (process), and
produce information (output) from the processing.
➢ Computers are used today to store, retrieve, process, and transmit data and information of all
types.
➢ Today, almost all of us in the world make use of computers in one way or the other.
➢ It finds applications in various fields of engineering, medicine, commercial, research and
others. Not only in these sophisticated areas, but also in our daily lives, computers have become
indispensable. They are present everywhere, in all the devices that we use daily like cars,
games, washing machines, microwaves etc. and in day to day computations like banking,
reservations, electronic mails, internet and many more.
➢ The word computer is derived from the word compute. Compute means to calculate. The
computer was originally defined as a super fast calculator. It had the capacity to solve complex
arithmetic and scientific problems at very high speed. But nowadays in addition to handling
complex arithmetic computations, computers perform many other tasks like accepting, sorting,
selecting, moving, comparing various types of information. They also perform arithmetic and
logical operations on alphabetic, numeric and other types of information. This information
provided by the user to the computer is data. The information in one form which is presented
to the computer is the input information or input data.
➢ Electronic Computer
➢ Mechanical Computer
➢ General-purpose Computer
➢ Analog Computer
➢ Digital Computer
• These are high speed electronic devices. These devices are programmable. They
process data by way of mathematical calculations, comparison, sorting etc. They accept
input and produce output as discrete signals representing high (on) or low (off) voltage
state of electricity. Numbers, alphabets, symbols are all represented as a series of 1s
and Os.
• Digital Computers are further classified as General Purpose Digital Computers and
Special Purpose Digital Computers. General Purpose computers can be used for any
applications like accounts, payroll, data processing etc. Special purpose computers are
used for a specific job like those used in automobiles, microwaves etc.
• Another classification of digital computers is done on the basis of their capacity to
access memory and size like:
System unit:
Micro-processor, memory, mother board & power supply, ..
Storage devices:
where programs and data are held permanently between sessions: CD-RW,
floppy, Hard disk, Zip. ..
Peripherals:
Monitor, keyboard, mouse, printer, speaker, scanner, camera...
Power Supply
▪ Input
▪ Process
▪ Output
▪ Storage
➢ The ability to perform the information processing cycle with amazing speed.
➢ Reliability (low failure rate).
➢ Accuracy.
➢ Ability to store huge amounts of data and information.
➢ Ability to communicate with other computers.
Computer science
Information Technology:
➢ It can be defined as the use of computer to manage information.
➢ It is an industry which deals with the usage of computer hardware and software and networking.
➢ IT is a combination of computer and communication technology. It is the transfer of information
from one computer to another.
➢ The significance of IT can be seen from the fact that it has penetrated almost every aspect of our
daily life.
APPLICATIONS OF COMPUTERS
Today computers find widespread applications in all activities of the modern world. Some of the major
application areas include:
1. Scientific, Engineering and Research:
This is the major area where computers find vast applications. They are used in areas which require lot
of experiments, mathematical calculations, weather forecasting, and complex mathematical and
engineering applications. Computer Aided Design (CAD) and Computer Aided Manufacturing (CAM)
help in designing robotics, automobile manufacturing, automatic process control dev ices etc.
2. Business:
Record keeping, budgets, reports, inventory, payroll, invoicing, accounts are all the areas of business
and industry where computers are used to a great extent. Database management is one of the major area
where computers are used on a large scale. The areas of application here include banking, airline
reservations, etc. where large amounts of data need to be updated, edited, sorted, searched from large
databases.
3. Medicine:
4. Information:
This is the age of information. Television, Satellite communication, Internet, networks are all based on
computers.
5. Education:
The use of computers in education is increasing day by day. The students develop the habit of thinking
more logically and are able to formulate problem solving techniques. CDs on a variety of subjects are
available to impart education. On line training programs for students are also becoming popular day by
day. All the major encyclopedias, dictionaries and books are now available in the digital form and
therefore are easily accessible to the student of today. Creativity in drawing, painting, designing,
decoration, music etc. can be well developed with computers.
6. Games and Entertainment:
Computer games are popular with children and adults alike. Computers are nowadays also used in
entertainment areas like movies, sports, advertising etc.
➢ Globalization - IT has brought the world closer together. This means that we can share
information quickly and efficiently. The world has developed into a global village due to the help
of information technology allowing countries to shares ideas and information with each other.
➢ Communication - With the help of information technology, communication has also become
cheaper, quicker, and more efficient. We can now communicate with anyone around the globe
by simply text messaging them or sending them an email for an almost instantaneous response.
➢ Cost effectiveness - Information technology has helped to computerize the business process. This
in turn increases productivity which ultimately gives rise to profits.
➢ More time - IT has made it possible for businesses to be open 24 x7 all over the globe. This
means that a business can be open anytime anywhere, making purchases from different countries
easier and more convenient.
➢ Creation of new jobs - Probably the best advantage of information technology is the creation of
new and interesting jobs. Computer programmers, Systems analysts, Hardware and Software
developers and Web designers are just some of the many new employment opportunities created
with the help of IT.
➢ Technology, however, has changed and this classification is no more relevant. Today all
computers use microprocessors as their CPU.
➢ Thus classification is possible only through their mode of use. Based on mode of use we can
classify computers as o Palms o Laptop PCs
o Desktop PCs and
o Workstations
➢ Based on interconnected computers, we can classify as o Distributed computers and o Parallel
computers
➢ Supercomputers are the fastest computers available at any given time and are normally used to
solve problems, which require intensive numerical computations.
➢ Recently applications of supercomputers have expanded beyond scientific computing; they are
now used to analyze large commercial database, produced animated movies and play games such
as chess.
➢ Supercomputers have a large main memory of around 16 GB and a secondary memory of 1000
GB.
➢ All supercomputers use parallelism to achieve their speed.
Mini computers
➢ A mid-sized computer.
➢ In size and power, minicomputers lie between workstations and mainframes.
➢ But in general, a minicomputer is a multiprocessing system capable of supporting from 4 to
about 200 users simultaneously.
Mainframe computers
➢ A very large and expensive computer capable of supporting hundreds, or even thousands, of users
simultaneously.
➢ In some ways, Mainframes are more powerful than supercomputers because they support more
simultaneous programs.
➢ In fact, the first computers were invented by the Chinese about 2500 years ago. They are called
abacuses and are still used throughout Asia today.
The Abacus
➢ The abacus, shown in Figure, is a calculator; its first recorded use was circa 500 B.C. The Chinese
used it to add, subtract, multiply, and divide.
➢ The first mechanical computer was the analytical engine, conceived and partially constructed by
Charles Babbage in London, England, between 1822 and 1871.
➢ It was designed to receive instructions from punched cards.
➢ The first computer designed expressly for data processing on January 8, 1889, by Dr. Herman
Hollerith of New York.
➢ The prototype model of this electrically operated tabulator was built for the U. S. Census Bureau
and computed results in the 1890 census.
➢ Using punched cards containing information submitted by respondents to the census
questionnaire, the Hollerith machine made instant tabulations from electrical impulses actuated
by each hole. It then printed out the processed data on tape.
➢ Dr. Hollerith left the Census Bureau in 1896 to establish the Tabulating Machine Company to
manufacture and sell his equipment. The company eventually became IBM.
➢ The 80-column punched card used by the company, shown in Figure, is still known as the
Hollerith card.
➢ John W. Mauchly, who, together with engineer John Presper Eckert, developed the first large-
scale digital computer, the Electronic Numerical Integrator and Computer (ENIAC).
➢ When finally assembled in 1945, ENIAC consisted of 30 separate units, plus power supply and
forced-air cooling. It weighed 30 tons, used 19,000 vacuum tubes, 1500 relays, and hundreds of
thousands of resistors, capacitors, and inductors. It required 200 kilowatts of electrical power to
operate.
➢ ENIAC is considered the prototype for most of today's computers.
➢ The most important conceptual breakthroughs, however, came in the early part of the 19th
century
...
The Birth of Modern Computing
➢ The question of who invented the modern computers is not an easy one, given the competing
claims for that achievement.
➢ In 1939, John Atanasoff and Clifford Barry built a prototype computer at Iowa State and a large
machine in 1942.
➢ The first large-scale computer was the Electronic Numerical Integrator and Computer (ENIAC),
completed in 1946 under the direction of J. Presper Eckert and John Mauchly at the Moore School
of the University of Pennsylvania.
➢ Conrad Zuse in Germany and the World War II cryptography team in England also built early
computers.
➢ Other important contributions during the early years include stored-programming concept
generally attributed to John von Neumann and the use of switching circuits to implement binary
arithmetic proposed by Claude Shannon.
Chapter Summary
The following points summarize the main elements of this lesson:
• The concepts that form the basis of computer technology have a long history that stretches back
2500 years.
• Electrically powered computers were first developed in the 1950s and 1960s.
• The "standard" personal computer has undergone several stages of evolution, characterized by
improvements to the processor, internal architecture, and types of storage devices.
Example:
Output: Storing the text and allowing you to retrieve or print it.
➢ The term computer hardware refers to the various electronic components that make up a computer.
➢ Some examples include:
➢ The system unit is the actual computer; everything else is called a peripheral device.
✓ The case - The outside component which provides protection for the parts inside
and provides a fan and power supply which are used to both cool the working parts
inside and provide power to them.
✓ The motherboard - Hold the following computer hardware subcomponents: o
Memory, Microprocessor, Video interface card, Sound card, Hard disk & etc
Control Unit
▪ The control unit executes the instructions, sends control signals to and receives control
signals from peripheral devices.
▪ In other words, it controls the whole computer, and directs the entire system to carry out
instructions.
➢ The Registers are very fast storage locations inside the processor itself.
➢ When the control unit and the arithmetic and logic unit operate, they store the information and
instruction temporarily in registers.
➢ These registers usually have specialized capabilities for arithmetic, logic, and other operations.
➢ Registers are usually fairly small (8, 16, 32, or 64 bits for data, address) ➢ There are many
registers including :
✓ memory address register (MAR) – holds the address of a location in memory
✓ memory data register (MDR) – holds data just read from or written to memory
✓ program counter (PC) – holds the address of the next instruction to be fetched
Execution of an Instruction
✓ Fetch – retrieve an instruction from memory, (based on the current instruction pointer value)
✓ Decode – Put instruction in a form ALU can understand
✓ Execute – Carry out instruction
✓ Store: copy results to a register or RAM
➢ Computer execute an instruction during a machine cycle ➢ Machine cycle time is measured in:
Clock speed:
➢ Series of electronic pulses produced at a predetermined rate that affects machine cycle time.
Often measured in:
▪ A computer chip design based on reducing the number of microcode instructions built into
a chip to an essential set of common microcode instructions.
Lecture # 10
Motherboard
➢ The motherboard is the main component inside the case. It is a large rectangular board with
integrated circuitry that connects the other parts of the computer including the CPU, the RAM,
the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals connected via the
ports or the expansion slots.
✓ The central processing unit (CPU) performs most of the calculations which enable a
computer to function. It is usually cooled by a heat sink and fan
✓ The chip set mediates communication between the CPU and the other components of the
system, including main memory.
✓ RAM (random-access memory) stores programs & data.
o Data Bus: The data bus transfers actual data. For example, a 16-bit bus can transmit 16
bits of data, whereas a 32-bit bus can transmit 32 bits of data. o Address Bus: the address
bus transfers information about where the data should go. o Control Bus: The control bus
consists of a set of control signals.
➢ Main memory consists of a number of storage locations, each of which is identified by a unique
address
➢ Located physically close to the CPU, but not on the CPU chip itself.
➢ Rapidly provides data and instructions to the CPU.
➢ Consists of electronic circuits: Extremely fast and expensive.
➢ Types of main memory: There are two types of main memory, Random Access Memory (RAM)
and Read Only Memory (ROM)
✓ Static RAM
o is called static because it will continue to hold and store information even when power is removed.
o no refreshing, fast but expensive
✓ Dynamic RAM
o Types are
▪ Synchronous DRAM (SDRAM) – faster, works in synch with internal clock ▪ DRAM,
DDRSDRAM – newer and faster
➢ ROM holds programs and data permanently even when computer is switched off
➢ Data can be read by the CPU in any order so ROM is also direct access
➢ The contents of ROM are fixed at the time of manufacture
➢ Stores a program called the bootstrap loader that helps start up the computer
➢ Access time of between 10 and 50 nanoseconds
➢ ROM is typically used to store things that will never change for the life of the computer, such as
low level portions of an operating system.
➢ ROM also has a number of different variations
Cache Memory
Input/Output Devices
➢ Through input and output devices, people provide data and instructions to the computer and
receive results from it
➢ Most external devices are capable of both input and output (I/O).
➢ Some devices are inherently input-only (also called read-only) or inherently output-only (also
called write-only).
➢ Regardless of whether a device is I/O, read-only, or write-only, external devices can be classified
as block or character devices.
Character Device
Block Device
Tracker ball
✓ These are most commonly used to interact with computer games, although they are also used
in other circumstances (e.g. on hospital scanners).
✓ Like the tracker ball, the movement of the joystick moves the cursor on the screen.
Light pen
Touch screen
✓ The most common types of reader used include magnetic strip readers, barcode readers, optical
character readers/recognition, magnetic ink character readers/recognition, and optical mark
readers/recognition).
✓ The most common magnetic tape readers are those used at electronic points of sale (EPOS).
✓ These ‗read‘ the personal data stored on the magnetic strip of a credit or debit card.
✓ Barcodes are used in shops, libraries, luggage handling, and stock control.
✓ The lines on a barcode represent numbers, and can be scanned very quickly using a laser
scanner.
✓ Optical mark recognition sense marks made on specially designed forms (e.g. multiple choice
answer sheets, lottery cards).
✓ OMR is a very cheap, easy and quick to handle system of inputting data, but if a user makes
a mistake they are difficult to correct.
✓ Punched cards and tape were used by the first computers to store programs and data.
✓ They are seldom used today except for clock cards, which records when a person starts and ends
work.
✓ The most common use of sound capture devices involves the use of voice recognition software
and microphones.
✓ Voice recognition software ‗remembers‘ the way a user speaks, and converts their speech into
text that appears on screen.
Terminals
✓ EPOS (Electronic Point of Sale) and EFTPOS (Electronic Fund Transfer at Point Of Sale)
terminals are connected, via secure Internet connections, to the computers of the main banks and
credit card companies.
✓ EPOS and EFTPOS allow a retailer to transfer the cost of what they have sold to a customer from
the customer‘s credit card or bank account to their own bank account.
✓ This is much faster than accepting payment by cheque, and more secure than accepting payment
in cash.
✓ These include video digitisers, scanners, digital cameras, and web cams.
Video Digitisers
✓ The video digitiser is a combination of hardware and dedicated software that converts an
analogue signal into a digital signal.
✓ This is the basis of most set top boxes that give access to digital television on standard
television sets.
✓ It can also be used to ‗capture‘ still images from video.
Scanners
✓ Scanners are used to scan text or images so that they can be stored on and manipulated by
computer.
✓ The scanner converts the text or image into a digital signal which it sends to the computer.
✓ The user can then decide whether they want to store or manipulate what they have scanned.
Digital cameras
✓ Digital cameras convert the analogue image seen through the camera‘s lense into a digital
signal that can be stored.
✓ Each picture is split up into millions of tiny squares (or pixels), each of which is a different
colour.
✓ Each pixel is stored as a ‗bit‘ of digital information.
✓ Web cameras (web cams for short) are small digital cameras which are attached to computers
so that still and motion digital images can be ‗captured‘ and used.
✓ They are often used in conjunction with the Internet so that people can videoconference.
Output Devices
➢ An output device is any piece of computer hardware equipment used to communicate the results
of data processing carried out by an information processing system (such as a computer) to the
outside world.
➢ There are a number of devices, which produce data in different forms, which includes audio,
video or hard copy.
➢ Examples of output devices:
• Screen (Monitor)
• Printer & Plotter
• Projector
• Speaker & Headphone
• The printer produces a hard copy of your output, and the computer
screen produces a soft copy of your output.
Monitor
➢ A monitor or display (also called screen or visual display unit) is an electronic visual display
for computers.
➢ There are two types of computer monitors available, namely CRT and flat panel.
➢ The display device in modern monitors is typically a thin film transistor liquid crystal display
(TFT-LCD) thin panel, while older monitors use a cathode ray tube about as deep as the screen
size.
CRT Monitor
➢ The traditional output device of a personal computer has been the CRT (Cathode Ray Tube)
monitor.
➢ Just like a television set (an older one, anyway) the CRT monitor contains a large cathode ray
tube that uses an electron beam of varying strength to ―paint‖ a picture onto the color
phosphorescent dots on the inside of the screen.
➢ CRT monitors are heavy and use more electrical power than flat panel displays, but they are
preferred by some graphic artists for their accurate color rendition, and preferred by some gamers
for faster response to rapidly changing graphics.
➢ Monitor screen size is measured diagonally across the screen, in inches
➢ The resolution of the monitor is the maximum number of pixels it can display horizontally and
vertically (such as 800 x 600, or 1024 x 768, or 1600 x 1200).
➢ Pixels (short for picture elements) are the small dots that make of the image displayed on the
screen.
➢ The spacing of the screen‘s tiny phosphor dots is called the dot pitch (dp), typically .28 or .26
(measured in millimeters). A screen with a smaller dot pitch produces sharper images.
CRT monitor
➢ Today, most systems are sold with a display adapter that connects to a PCI "local bus", supports
some Windows accelerator, and provides SVGA resolutions.(The "local bus" means that the CPU
can send data to the card at high speed.)
Resolution: Resolution refers to the number of dots on the screen or pixels. It is expressed as a pair
of numbers that give the number of dots on a line (horizontal) and the number of lines (vertical).
Four resolutions commonly used today.
• The smaller the pixels, the clearer and sharper the picture appears on the monitor. Most monitors
come with a .28 dot pitch. This is the standard for monitors. Do not buy a monitor if the dot pitch
is more than .28. The smaller the dot pitch the better the monitor.
• Color Depth: Memory on the video adapter limits the number of colors that can be display at each
resolution. If you want to do really high quality photography you need at least 1MB of memory.
Multimedia applications with high resolution graphics need at least 2 MB of memory.
Printer
➢ In computing, a printer is a peripheral which produces a text or graphics of documents stored in
electronic form, usually on physical print media such as paper or transparencies.
➢ Printer takes processed data from the computer to generate a hard copy of the data
➢ Many printers are primarily used as local peripherals, and are attached by a printer cable or, in
most new printers, a USB cable to a computer which serves as a document source.
➢ Some printers, commonly known as network printers, have built-in network interfaces, typically
wireless or Ethernet based, and can serve as a hard copy device for any user on the network.
➢ In addition, a few modern printers can directly interface to electronic media such as memory
cards, or to image capture devices such as digital cameras and scanners; some printers are
combined with scanners or fax machines in a single unit, and can function as photocopiers.
➢ There are three main types of computer printers, namely ink jet, laser printers and dot matrix.
Each of this printer type uses a different technology to print the data.
➢ The most common type of printer for home systems is the color ink jet printer.
➢ These printers form the image on the page by spraying tiny droplets of ink from the print head.
➢ The printer needs several colors of ink (cyan, yellow, magenta, and black) to make color images.
Some photo-quality ink jet printers have more colors of ink.
➢ Ink jet printers are inexpensive, but the cost of consumables (ink cartridges and special paper)
makes them costly to operate in the long run for many purposes.
➢ Dot matrix printers use small electromagnetically activated pins in the print head, and an inked
ribbon, to produce images by impact.
➢ The pin sizes range from 9-24.
Line printer
➢ The line printer is a form of high speed impact printer in which one line of type is printed at a
time.
➢ They are mostly associated with the early days of computing, but the technology is still in use.
➢ Print speeds of 600 to 1200 lines-per-minute (approximately 10 to 20 pages per minute) were
common.
Classification of Printers:
Plotter
➢ Plotters, like printers, create a hard copy rendition of a digitally rendered design.
➢ The design is sent to a plotter through a graphics card and the image is created using a pen.
➢ In simple words, plotters basically draw an image using a series of straight lines.
➢ This computer output device is used with engineering applications. Projector
➢ It is a hardware device, with which an image like a computer screen is projected onto a flat screen.
➢ Image data is sent to the video card, by the computer which is then translated into a video image
and sent to the projector.
➢ A projector is often used in meetings or to make presentations, because they allow for a large
image to be shown, with which the display is available for a large audience.
Headphone
➢ Headphones are a pair of small loudspeakers, or less commonly a single speaker, held close to
a user's ears and connected to a signal source such as an audio amplifier, radio, CD player or
portable Media Player.
➢ They are also known as stereophones, headsets or, colloquially, cans.
➢ The in-ear versions are known as earphones or earbuds.
➢ In the context of telecommunication, the term headset is used to describe a combination of
headphone and microphone used for two-way communication, for example with a telephone.
✓ Port: The pathway for data to go into and out of the computer from external devices such as
keyboards.
• There are many standard ports as well as custom electronic ports designed for special purposes.
• Ports follow standards that define their use.
o SCSI, USB: Multiple peripheral devices (chain). o RS-232, IDE: Individual
peripheral devices.
• Hardware needs software on the computer that can service the device.
✓ Device driver: Software addition to the operating system that will allow the computer to
communicate with a particular device.
Type of Access
▪ Sequential - The accessing of pieces of information will be in a serial order, one after the
other; therefore the time to access a particular piece of information depends upon which piece
of information was last accessed. Such characteristic is typical of off-line storage.
▪ Random Access - Any location in storage can be accessed at any moment in approximately
the same amount of time. Such characteristic is well suited for primary and secondary storage.
Most semiconductor memories and disk drives provide random access.
Hard Disks
➢ Primary storage device in a computer
➢ Hard drive: Storage system consisting of one or more metal magnetic discs permanently
sealed with an access mechanism inside its drive
➢ Data is stored magnetically
➢ Use thicker, metallic platters for storage: Each platter has 2 sides
➢ Several platters, with information recorded magnetically on both surfaces (usually) ➢ Data
organization:
Optical Disks
➢ Optical discs: store data optically (using laser beams) instead of magnetically
➢ Divided into tracks and sectors like magnetic discs but use a single grooved spiral track
➢ Can be read-only, recordable, or rewritable
➢ Permanent storage
Solid-state disks
Remote storage
➢ Using a storage device not directly a part of the PC being used
➢ Network storage: Accessible through a local network
➢ Online storage: Accessed via the Internet
RAID
➢ RAID (redundant arrays of independent discs): Method of storing data on two or more hard drives
that work together to do the job of a larger drive o Usually involves recording redundant copies
of stored data o Helps to increase fault tolerance
Computer Software
Computer software
➢ Computer software, or just software, is a collection of computer programs and related data that
provide the instructions for telling a computer what to do and how to do it.
➢ In other words software is a set of programs, procedures, algorithms and its documentation.
➢ Programs are an ordered sequence / set of instructions, usually written in high-level programming
languages
➢ Program software performs the function of the program it implements, either by directly
providing instructions to the computer hardware or by serving as input to another piece of
software.
➢ In contrast to hardware, software "cannot be touched".
Types of software
➢ Practical computer systems divide software systems into three major classes:
▪ System Software
▪ Programming Software
➢ System software provides the basic functions for computer usage and helps run the computer
hardware and system.
➢ It includes a combination of the following:
▪ Device drivers
▪ Operating systems
▪ Utilities
➢ System software is responsible for managing a variety of independent hardware components, so
that they can work together harmoniously.
➢ Its purpose is to unburden the application software programmer from the often complex details
of the particular computer being used, including such accessories as communications devices,
printers, device readers, displays and keyboards, and also to partition the computer's resources
such as memory and processor time in a safe and stable manner.
Device driver
▪ printers
▪ video adapters
▪ network cards
Operating system
➢ An operating system (OS) is a set of programs that manage computer hardware resources and
provide common services for application software.
➢ The operating system is the most important type of system software in a computer system.
➢ A user cannot run an application program on the computer without an operating system, unless
the application program is self booting.
➢ For hardware functions such as input and output and memory allocation, the operating system
acts as an intermediary between application programs and the computer hardware.
➢ Operating systems are found on almost any device that contains a computer—from cellular
phones and video game consoles to supercomputers and web servers.
➢ Examples of popular modern operating systems include Unix, and Microsoft Windows.
➢ Operating systems can be classified as follows:
▪ Multi-user : Allows two or more users to run programs at the same time. Some operating
systems permit hundreds or even thousands of concurrent users.
▪ Single-user: Single-user operating systems, as opposed to a multi-user operating system,
are usable by a single user at a time.
▪ Multiprocessing : Supports running a program on more than one CPU.
▪ Multitasking : Allows more than one program to run concurrently.
▪ Single-tasking: When only a single program is allowed to run at a time, the system is
grouped under a single-tasking system.
▪ Multithreading : Allows different parts of a single program to run concurrently.
▪ Real time: Responds to input instantly. The main objective of real-time operating
systems is their quick and predictable response to events.
User Interface
➢ A function of the operating system that allows individuals to access and command the computer
▪ Command-based user interface:
• A particular user interface that requires text commands be given to the computer to
perform basic activities
• E.g., unix, DOS
▪ Graphical user interface (GUI)
• A user interface that uses pictures (icons) and menus displayed on the screen to send
commands to the computer system
• E.g. Windows, MAC OS
➢ Utility software is system software designed to help analyze, configure, optimize or maintain a
computer.
➢ A single piece of utility software is usually called a utility or tool.
➢ Utility software usually focuses on how the computer infrastructure (including the computer
hardware, operating system, application software and data storage) operates..
Programming Software
➢ Programming software usually provides tools to assist a programmer in writing computer
programs, and software using different programming languages in a more convenient way.
Programming Languages
➢ Programming languages bridge the gap between human thought processes and computer binary
circuitry.
➢ Programming language makes it possible to talk to the computers and ask the computer to
perform specific work.
➢ Programming language produces programs which are executed by CPU, and then CPU instructs
all the other parts of computers to perform work accordingly.
➢ Each programming language has its own vocabulary and structural rules.
➢ Programmers use these languages to construct programs containing lists of instructions for the
computer to perform.
➢ Popular languages include:
▪ BASIC
▪ Java
▪ Visual Basic
▪ C++
➢ Computers only understand programs in their own machine language. Machine language is the
language of 0‘s and 1‘s.
➢ It is difficult to write program in machine language so what is the solution to this dilemma? The
answer is in what are called high-level languages i.e. Computer programming languages that look
like natural language.
➢ All programs written in high level language must be translated before their instructions execution.
➢ Computer languages can be grouped according to which translation process is used to convert
the instructions into binary code:
➢ To see how this was accomplished, let‘s investigate how programming languages evolved.
• First Generation - Machine Language (code) o Machine language programs were
made up of instructions written in binary code.
Assembler:
➢ A program used to translate Assembly language programs.
➢ Produces one line of binary code per original program statement.
– The entire program is assembled before the program is sent to the computer for execution.
Compiler
➢ A language translator that converts a complete program into machine language (often having a
binary form known as object code).
➢ The most common reason for wanting to transform source code is to create an executable
program.
➢ In computer science, an interpreter normally means a computer program that executes, i.e.
performs, instructions written in a programming language.
➢ translates one program statement at a time into machine code
Execution models
Interpreted
➢ Interpreted languages are read and then executed directly, with no compilation stage.
➢ A program called an interpreter reads each program line following the program flow, converts it
to machine code, and executes it; the machine code is then discarded, to be interpreted anew if
the line is executed again.
Compiled
➢ Low-level languages are closer to the hardware than high-level programming languages, which
are closer to human languages.
➢ Generally this refers to either machine code or assembly language.
➢ Low-level languages can be converted to machine code without using a compiler or interpreter,
and the resulting code runs directly on the processor.
➢ A program written in a low-level language can be made to run very fast, and with a very small
memory footprint; an equivalent program in a high-level language will be more heavyweight.
➢ Low-level programming languages are sometimes divided into two categories:
▪ first generation (machine code)
▪ second generation (Assembly Language)
➢ Machine code: Machine code is the only language a microprocessor can process directly
without a previous transformation.
➢ Assembly language: Assembly language is the most basic programming language available for
any processor. With assembly language, a programmer works only with operations implemented
directly on the physical CPU. Assembly languages are low- level languages which are translated
➢ A high level language is a language for programming computers which does not require detailed
knowledge of a specific computer, as a low-level language does.
➢ High-level languages do not have to be written for a particular computer, but must be compiled
for the computer they will work with.
➢ High-level languages are closer to human language than low-level languages.
➢ On the other hand, a low level language is a computer programming language that is close to
machine language.
➢ Machine language is at the lowest level, because it is the actual binary code of 1s and 0s that the
computer understands.
Application software
➢ Word processing was one of the earliest applications for the personal computer in office
productivity.
➢ Microsoft Word is the most widely used word processing software.
➢ Word processing software is widely used for:
▪ writing documents such as letters, memos, reports, books, articles, notes and faxes
➢ A key advantage of word processing software is that users easily can make changes in
documents.
➢ Word processing software is used because it‘s easy and functional, allowing you to produce
documents that include a range of fonts and font sizes, graphics (pictures), symbols and charts.
A number of proofing tools such as spelling and grammar checkers are also available.
➢ It‘s easy to make changes to existing documents and produce multiple documents that have only
slight differences, for instance a mail merge where a standard letter is sent to customers with
just the customer details changed.
➢ Industry-standard word processing software packages include Microsoft Word and Corel
WordPerfect.
➢ Professional word processing packages are capable of performing many complicated tasks. Here
is a list of some of the features you would expect to find:
▪ centering — vertical/horizontal
▪ macros
▪ tables
▪ watermark
➢ Its proprietary DOC format is considered a de facto standard, although Word 2007 can also use
a new XML-based, Microsoft Office-optimized format called .DOCX
▪ cut and paste — text/graphics can be rearranged within the same document or between a
number of documents
▪ centring — vertical/horizontal
▪ automatic page numbering
▪ Selling-checker/grammar
checker/thesaurus
▪ headers/footers
▪ sorting facilities
▪ macros
▪ styles
Microsoft Excel
Software Package
➢ Data Representation refers to the methods used internally to represent information stored in a
computer.
➢ Computers store lots of different types of information:
▪ Numbers
▪ Text
▪ Graphics of many varieties (image, video, animation) ▪ Sound
➢ However, ALL types of information stored in a computer are stored internally in the same simple
format: a sequence of 0's and 1's.
➢ Computers use numeric codes to represent all the information they store.
Bits
Nibbles
➢ A nibble is a collection of four bits. It takes four bits to represent a single BCD (binary coded
decimal) or hexadecimal digit.
➢ With a nibble we can represent up to 16 distinct values. In the case of hexadecimal numbers the
values 0 1 2 3 4 5 6 7 8 9 A B C D E and F are represented with four bits ➢ BCD uses ten
different digits (0 1 2 3 4 5 6 7 8 9) and requires four bits.
Bytes
➢ A byte consists of eight bits and is the smallest addressable datum (data item) on the 80x86
microprocessor.
➢ The bits in a byte are normally numbered from zero to seven using the convention shown below:
➢ Bit 0 is the low order bit or least significant bit. Bit 7 is the high order bit or most significant bit
of the byte.
➢ Note that a byte also contains exactly two nibbles:
Words
➢ Notice that a word contains exactly two bytes. Bits 0 through 7 form the low order byte, bits 8
through 15 form the high order byte:
Unit Equivalent
Decimal BCD-
number 8421number
0 0000
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
9 1001
▪ Although BCD is not suitable for general purpose arithmetic, it is useful in some embedded
applications.
▪ In 1964, BCD was extended to an 8-bit code, Extended Binary-Coded Decimal Interchange Code
(EBCDIC).
▪ EBCDIC was one of the first widely-used computer codes that supported upper and lowercase
alphabetic characters, in addition to special characters, such as punctuation and control
characters..
ASCII Codes:
▪ Most computers use ASCII (American Standard Code for Information Interchange) codes to
represent text, which makes it possible to transfer data from one computer to another.
▪ Text can be represented easily by assigning a unique numeric value for each symbol used in the
text.
▪ For example, the widely used ASCII code defines 128 different symbols (all the characters found
on a standard keyboard, plus a few extra), and assigns to each a unique numeric code between 0
and 127.
▪ In ASCII, an "A" is 65," B" is 66, "a" is 97, "b" is 98, and so forth.
▪ When you save a file as "plain text", it is stored using ASCII.
▪ ASCII format uses 1 byte per character 1 byte gives only 256 (128 standard and 128 non-
standard) possible characters
▪ The code value for any character can be converted to base 2, so any written message made up of
ASCII characters can be converted to a string of 0's and 1's.
▪ ASCII includes definitions for 128 characters: 33 are non-printing control characters & 95 are
printable characters, including the space, which is considered an invisible graphic.
Unicode
• Many of today‘s systems embrace Unicode, a 16-bit system that can encode the characters of
every language in the world.
Chapter 8:
Data Communication
Data communication
➢ Data communication refers to the transmission of the digital signals over a communication
channel between the sender and receiver computers. Communication is possible only with wired
and wireless connectivity of the computers with each other.
➢ More specifically data communication is the exchange of information from one computer to an
other via transmission mediums such as wires, coaxial cables, fiber optics, or radiated
electromagnetic waves such as broadcast radio, infrared light, microwaves, and satellites.
telephone lines
Medium The channel over which the message is Radio waves, Fiber Optics
sent Cable
Properties of Transmission
2. The speed at which the signal is transmitted (how fast the data travels).
• The number of bits (0‘s and 1‘s) that travel down the channel per second.
▪ Baud rate
• The number of bits that travel down the channel in a given interval.
• The number is given in signal changes per second, not necessarily bits per
second.
3. The type of data movement allowed on the channel (one-way, two-way taking turns, two-way
simultaneously).
Synchronous transmission -
➢ There are three transmission modes for transmitting data from one point to another, these are:
1. Simplex
2. Half Duplex
3. full Duplex
▪ A simplex connection is a connection in which the data flows in only one direction, from
the transmitter to the receiver. This type of connection is useful if the data do not need to
flow in both directions (for example, from your computer to the printer or from the mouse
to your computer...).
▪ A half-duplex connection (sometimes called an alternating connection or semi-duplex)
is a connection in which the data flows in one direction or the other, but not both at the
same time. With this type of connection, each end of the connection transmits in turn.
This type of connection makes it possible to have bidirectional communications using the
full capacity of the line.
➢ An asynchronous connection, in which each character is sent at irregular intervals in time (for
example a user sending characters entered at the keyboard in real time).
➢ Each character is preceded by some information indicating the start of character transmission (the
transmission start information is called a START bit) and ends by sending end-of-transmission
information (called STOP bit).
Synchronous Transmission
➢ In a synchronous connection, the transmitter and receiver are paced by the same clock.
➢ The receiver continuously receives the information at the same rate the transmitter sends it.
➢ In addition, supplementary information is inserted to guarantee that there are no errors during
transmission.
➢ Analog signals use continuously variable electric currents and voltages to reproduce data being
transmitted. Since data is sent using variable currents in an analog system, it is very difficult to
remove noise and wave distortions during the transmission. For this reason, analog signals cannot
perform high-quality data transmission.
➢ On the other hand, digital signals use binary data strings (0 and 1) to reproduce data being
transmitted. Noise and distortions have little effect, making high-quality data transmission
possible. The two big advantages of digital technology are:
▪ The recording does not degrade over time.
▪ Groups of numbers can often be compressed by finding patterns in them.
Modem (Modulation/Demodulation)
➢ A Modem converts digital signals into analog signals which can be transmitted over an analog
line and transforms incoming analog signals into their digital equivalents.
➢ The specific technique used to encode the digital bits into analog signals is called "Modulation",
their reconversion (analog to digital) to the original signal is called ―Demodulation‖
➢ Modern modems work at 56 thousand bits per second (Kbps) or higher data transfer speeds.
➢ The means through which data is transformed from one place to another is called transmission or
communication media.
➢ There are two categories of transmission media used in computer communications.
▪ Wired / Bounded / Guided Media
▪ Wireless / Unbounded / Unguided Media
➢ Bounded media are the physical links through which signals are confined to narrow path. These
are also called guide media.
➢ Bounded media are made up of a external conductor (Usually Copper) bounded by jacket
material.
➢ They offer high speed, good security and low cast.
➢ However, some time they cannot be used due distance communication.
➢ Three common types of bounded media are used of the data transmission. These are
▪ Coaxial Cable
▪ Twisted Pairs Cable
▪ Fiber Optics Cable
Coaxial Cable:
➢ Coaxial cable is very common & widely used commutation media. For example TV wire is
usually coaxial.
➢ Coaxial cable gets its name because it contains two conductors that are parallel to each other.
➢ The center conductor in the cable is usually copper. The copper can be either a solid wire or
stranded martial.
➢ Outside this central Conductor is a non-conductive material. It is usually white, plastic material
used to separate the inner Conductor form the outer Conductor.
➢ The other Conductor is a fine mesh made from Copper. It is used to help shield the cable form
EMI.
➢ Outside the copper mesh is the final protective cover. (as shown in Fig)
▪ Low cost
▪ Easy to install
▪ Up to 10Mbps capacity
▪ Medium immunity form EMI
Twisted Pair Cable
▪ low cost
▪ easy to install
▪ High speed capacity
▪ High attenuation
▪ Effective to EMI
▪ 100 meter limit
Fiber Optics
➢ Fiber optic cable uses electrical signals to transmit data. It uses light.
➢ A laser at one device sends pulse of light through this cable to other device. These pulses
translated into ―1’s‖ and ―0’s‖ at the other end.
➢ In the center of fiber cable is a glass stand or core. The light from the laser moves through this
glass to the other device around the internal core is a reflective material known as Cladding.
➢ No light escapes the glass core because of this reflective cladding.
➢ Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per Second)
Characteristics of Fiber Optic Cable:
▪ Expensive
▪ Very hard to install
▪ Capable of extremely high speed
▪ Extremely low attenuation
▪ No EMI interference
➢ Unguided transmission media are methods that allow the transmission of data without the use of
physical means to define the path it takes. Transmission and reception are achieved by means of
an antenna.
➢ Wireless media may carry surface waves or sky waves, either longitudinally or transversely. In
both cases, communication is in the form of electromagnetic waves.
➢ Unguided media provide a means for transmitting electromagnetic waves but do not guide them;
examples are propagation through air, vacuum and seawater. ➢ Three types of unguided media
▪ Satellite
▪ Microwave
▪ Infrared
Terrestrial microwave
➢ Terrestrial microwaves use Earth-based transmitter and receiver. The equipment looks similar to
satellite dishes. Terrestrial microwaves use low-gigahertz range, which limits all communications
to line-of-sight. Path between relay stations spaced approx, 48 km (30 mi) apart.
Communications satellites
➢ The satellites use microwave radio as their telecommunications medium which are not deflected
by the Earth's atmosphere. The satellites are stationed in space, typically 35,400 km (22,000 mi)
Infrared communication
➢ Infrared communication can transmit signals between devices within small distances of typically
no more than 10 meters. In most cases, line-of-sight propagation is used, which limits the physical
positioning of communicating devices.
➢ A computer network can also consist of, and is usually made for, more than two computers:
➢ Computer network components consist of 2 parts - the items that are to be connected and the
equipment that connects them.
➢ Each computer or device on the network is a node.
Wireless Networking
➢ The term refers to any kind of networking that does not involve cables.
➢ The transmission system is usually implemented and administrated via radio waves.
▪ Cost Effective
▪ Convenient
▪ Reliable
▪ Efficient
▪ Improves Productivity
▪ Systematic Backup
▪ Centralized Information
▪ Improved Security
Network Performance
➢ Bandwidth
▪ Network media operate across a certain range of frequencies, measured in Hertz (Hz), is known
as its bandwidth.
➢ Speed
▪ Speed is measured in megabits per second (Mbps) or Megabytes per second (MBps). The speed
depends on the bandwidth, the type of network and the technology used.
Peer-to-Peer Networking
Client/Server Networking
➢ A computer network is referred to as client/server if (at least) one of the computers is used to
"serve" other computers referred to as "clients".
➢ They are sometimes referred to as Domains.
➢ This is a centralized model of networking with resources placed on a dedicated machine called
Server. There is no user limit as such, as it depends directly on your hardware resources and
capacity to support users.
➢ A personal area network (PAN) is a computer network used for communication among computer
and different information technological devices close to one person.
➢ Some examples of devices that are used in a PAN are personal computers, printers, fax machines,
telephones, and even video game consoles.
➢ A PAN may include wired and wireless devices.
➢ The reach of a PAN typically extends to 10 meters.
➢ A local area network (LAN) is a computer network that connects computers and devices in a
limited geographical area such as home, school, computer laboratory or office building.
➢ The nodes are linked in a bus, ring, star, tree, or fully connected topology network configuration.
➢ Benefits of LANs:
➢ A Metropolitan area network (MAN) is a large computer network that usually spans a city or a
large campus.
➢ The Internet is a global system of interconnected governmental, academic, corporate, public, and
private computer networks.
➢ It is based on the networking technologies of the Internet Protocol Suite.
➢ The Internet is also the communications backbone underlying the World Wide Web (WWW).
Summary:
▪ Bus
▪ Star
▪ Ring
▪ Tree
▪ Mesh
▪ Hybrids Tree
➢ The first type of LAN topology is the Bus topology and consists of coaxial cable connected to
all the computers on the LAN network.
➢ All the computer network devices communicate through the same shared bus – so that‘s why a
bus is also a logical topology.
➢ LAN Bus topology is very simple and inexpensive to implement, there is only one main trunk.
➢ This type of bus LAN topology is not popular today, and it is part of the past ➢ All nodes can
detect all messages sent along the bus.
Mesh Topology
Hybrid Topologies
➢ In large network environment, you can attach Switches one to another to create larger LAN to
support more devices.
➢ Hybrid topologies combined the above topologies together to form three popular hybrid
topologies: tree, hierarchical star, and star-wireless.
Networks Devices
Hub
➢ The hub or network hub connects computers and devices and sends messages and data from any
one device to all the others.
➢ If the desktop computer wants to send data to the laptop and it sends a message to the laptop
through the hub, the message will get sent by the hub to all the computers and devices on the
network. They need to do work to figure out that the message is not for them.
➢ Hubs are not used often these days.
Repeater
Switch
➢ The switch connects the computer network components but it is smart about it. It knows the
address of each item and so when the desktop computer wants to talk to the laptop, it only sends
the message to the laptop and nothing else.
➢ It receives packets from its input link, and then sorts them and transmits them over the proper
link that connects to the node addressed
➢ A switch is distinct from a hub in that it only forwards the frames to the ports involved in the
communication rather than all ports connected.
Router
➢ A router is a device that connects 2 networks.
➢ A router is an inter-networking device that forwards packets between networks by processing
information found in the data gram or packet.
➢ Routers use routing tables to determine what interface to forward packets.
➢ It sends network packets in one of many possible directions to get them to their destination.
Gateway
➢ A link between two different networks that have different rules of communication.
➢ It is usually a computer that acts as a translator between two completely dissimilar systems.
Because it is both a translator and a router, it is usually slower than a bridge or router alone.
NIC card
➢ A network card, network adapter, or NIC (network interface card) is a piece of computer
hardware designed to allow computers to physically access a networking medium.
➢ They come in 2 varieties, wired or wireless. Most modern desktop computers come with a wired
NIC and laptops come with both a wired and a wireless NIC.
➢ Converts computer data to information that can be transmitted via wires (telephone, ISDN, fiber
optics, as well as wireless communication).
➢ Allows communication between computers over long and short distances.
➢ Outgoing: Converts binary data from computer (digital) into telephone compatible signals
(analog).
➢ Incoming: Converts telephone signal (analog) into binary data for the computer (digital).
➢ Can be an external or internal device (usually a ―card‖).
OSI Model
➢ OSI: Open System interconnection o was created in the 70‘s by the ISO
TCP / IP
➢ Developed by the US defense advanced research project agency (DARPA) for its packet switched
network (ARPANET).
➢ Used by the global internet.
➢ Like the OSI model, the TCP/IP suite is layered
– Because the protocols found at each layer are independent of those at the other layers, a
given protocol can be modified without affecting those found at other layers. Layers
Chapter 10
The Internet
The Internet:
➢ It is the largest network in the world that connects hundreds of thousands of individual networks
all over the world.
➢ The popular term for the Internet is the ―information highway‖.
➢ A world-wide network connecting millions of computer networks for the purpose of exchanging
data and communications using special rules of communication.
➢ The word internet is used to describe a network of networks which incorporate a very large and
complicated set of equipment.
➢ The Internet is a global system of interconnected governmental, academic, corporate, public, and
private computer networks
➢ The Internet is referred to as a packet-switching network, As the packet travels through the
Internet from network to network:
• Packet: A unit of information created by the Transfer Control Protocol (TCP) software for
transmission over the Internet.
The uses of the Internet
➢ Send e-mail messages.
➢ Send (upload) or receive (down load) files between computers.
➢ Participate in discussion groups, such as mailing lists and newsgroups.
➢ Surfing the web.
Internet Services
▪ Web browsing – Supported by the HTTP protocol, this allows users to view web pages using
a web browser.
▪ E-mail - Allows people to send and receive electronic messages.
▪ Telnet - allows remote login to computers
45
➢ The Web (World Wide Web) consists of information organized into Web pages containing text
and graphic images.
➢ It contains hypertext links or highlighted keywords and images that lead to related information.
➢ A collection of linked Web pages that has a common theme or focus is called a Web site.
➢ The main page that all of the pages on a particular Web site are organized around and link back
to is called the site‘s home page.
➢ It allows multimedia information to be accessed and transmitted via the Internet.
▪ Google- http://www.google.com
▪ Infoseek- http://guide.infoseek.com
▪ Alta Vista – http://www.altavista.digital.com
▪ Yahoo! – http://www.yahoo.com
➢ Once you have your Internet connection, then you need special software called a browser to
access the Web.
➢ Web browsers are used to connect you to remote computers, open and transfer files, display text
and images.
Internet Organizations
➢ ISPs (Internet Service Providers):
▪ A commercial organization with permanent connection to the Internet that sells temporary
connections to subscribers.
▪ They provide the connection to the internet for users and also provide routers that direct
internet traffic.
▪ Examples: America Online, Microsoft network, AT&T Networks.
➢ Corporations or Web hosting providers:
▪ They provide the information posted on the internet and virtual data connections to other
mail servers.
➢ The data stored on a computer is usually far more valuable and important than the computer
hardware itself. But it can be easily lost or destroyed.
➢ The loss of data on a computer system may be accidental or deliberate.
➢ The accidental loss occurs due to the following reasons:
▪ Technical failure of hardware
▪ Virus attack
▪ Un authorized access of a computer system
➢ The security of computer hardware and its components is also necessary for the overall protection
of data
➢ In the field of computing, the area of computer system security consists of the provisions and
policies, adopted by the administrator to prevent and monitor unauthorized access, misuse,
modification of data.
➢ Hacking (and cracking) refers to the act of gaining unauthorized access to a computer, network,
Web site, or areas of a system.
➢ Commonly, hackers will impersonate a valid user to gain access to a system.
➢ If the system requires a username and password before allowing entry, a hacker may take an
authentic user‘s identity.
➢ On a network or an office with Internet access, a hacker can impersonate someone else by simply
sitting at the unattended workstation of another user who hasn‘t logged off.
➢ It also commonly occurs when someone has an easy to guess username and password, or allows
this information to be known by others.
➢ Another common method hackers use to gain access is to guess or crack a username and password
that‘s used to access a computer, network, or Internet account.
➢ To prevent being hacked in this manner, you should use passwords that are difficult to guess.
➢ You should change your password at regular intervals, and set a minimal length to passwords
Viruses
1. Resident Virus: This type of virus is a permanent as it dwells in the RAM. From there it can
overcome and interrupt all the operations executed by the system. It can corrupt files and
programs that are opened, closed, copied, renamed etc.
2. Direct Action Viruses: The main purpose of this virus is to replicate and take action when it is
executed. When a specific condition is met, the virus will go into action and infect files in the
directory or folder.
Virus Damage
➢ In most cases, viruses can do any amount of damage the creator intends them to do.
➢ They can send your data to a third party and then delete your data from your computer.
➢ They can also ruin your system and render it unusable without a re-installation of the operating
system.
➢ The normal effect a virus will have on your system is that over time your system will run slower.
➢ Also when you are using the internet your connection may seem to run slower. Eventually you
may have trouble running programs on your system, your system may freeze, and in the worst
case you may not be able to get it to boot up when you turn your computer on.
2. Firewall
➢ A firewall is a device that limits access to your system from the outside.
➢ A firewall may be a software program running on your computer or it may be a piece of hardware
outside your computer.
➢ The firewall screens any attempts to access your system and only allows access that you decide
to allow.
➢ In this way much vulnerability that could be used to gain unauthorized access to your system are
eliminated.
➢ The vital role firewalls play in network security grows in parallel with the constant increase in
'cyber' attacks for the purpose of stealing/corrupting data, planting viruses, etc.
➢ Many users install anti-virus software that can detect and eliminate known viruses after the
computer downloads or runs the executable.
➢ There are two common methods that an anti-virus software application uses to detect viruses.
▪ The first, and by far the most common method of virus detection is using a list of virus
signature definitions.
▪ The second method is to use a heuristic algorithm to find viruses based on common
behaviors. This method has the ability to detect novel viruses that anti-virus security firms
have yet to create a signature for.
➢ Anti-virus software resides in the active memory of your computer, and takes control of it to alert
you to an active virus present on your machine. If the software cannot repair the infected file, it
will quarantine this file or give you the option of safely deleting the file.
➢ Anti-virus software may also be used to scan your hard drive or CD ROMs. It may also be used
to scan attachment files to e-mails. The important thing to remember is that new viruses are being
discovered daily, so if you have anti-virus software installed then make sure that you keep it's
library of known viruses up-to-date, otherwise you will have no protection against the latest
batch.
Software copyright
➢ The software company that develops the costly software gets its costs back by selling the
software.
Computer crime
➢ Computer crime, or cyber crime, refers to any crime that involves a computer and a network.
➢ The computer may have been used in the commission of a crime, or it may be the target. Netcrime
refers to criminal exploitation of the Internet.
➢ Computer crime encompasses any criminal act dealing with computers and networks (called
hacking).
➢ Computer crime encompasses a broad range of activities. Generally, however, it may be divided
into two categories:
1. Crimes that target computers directly;
2. Crimes facilitated by computer networks or devices, the primary target of which is
independent of the computer network or device.
Different Types of Cyber Crime ➢ As Internet usage continues to rise throughout the world,
the threat of cyber crime also grows. While some of these crimes are relatively harmless and
commonplace, others are very serious and carry with them lawbreaking charges. Here are a few of
the more common forms of cyber crime.
1) Spam: The most common type of cyber crime is spam. Spam, or the unsolicited sending of bulk
email for commercial purposes, is unlawful in some jurisdictions.
2) Fraud: Credit fraud is another common form of cyber crime. Certain computer viruses can log
keystrokes on your keyboard and send them to hackers, who can then take your Social Security
number, credit card number and home address. This information will be used by the hacker for
his own means.
3) Cyber terrorism: Cyber terrorism in general, can be defined as an act of terrorism committed
through the use of cyberspace or computer resources. As such, a simple propaganda in the
Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism.
Glossary
Accelerated Graphics Port (AGP) An Intel-design expansion port found on Pentium II and later
computers that allows a separate data path for display adapters.
Access speed The time required to complete read or write instructions as required by the memory
controller chip. Usually measured in nanoseconds (ns) for memory chips and milliseconds (ms) for disk
drives. Most manufacturers rate average access time on a hard disk as the time required for a seek across
one-third of the total number of cylinders plus one half of the time for a single revolution of the disk
platters.
Address bus A group of parallel conductors (circuit traces) found on the motherboard that are used by
the CPU to "address" memory locations. Determines what information or code is sent to or received
from the data bus.
ASCII file Commonly used term to refer to a text file that contains only data as set forth by the American
Standard Code for Information Interchange to conform to their standard.
Asynchronous Not synchronized—the computer is free to transmit any number of characters at any
time. The bits constituting a single character are transmitted at a fixed rate, but the pauses between
transmission can be of any duration.
Attachment A file attached to e-mail; most e-mail clients allow the user to append files (for instance,
graphics files like GIFs or JPEGs) to e-mail as a handy way of sending information to other people.
Bandwidth Used in several ways to denote the amount of data or load capacity of a medium. 1) The
range of frequencies that an electronic system can transmit. High bandwidth allows fast transmission or
the ability to transmit many signals at once. 2) On a monitor screen, a higher bandwidth that provides a
sharper image. 3) The rate at which data can be send over a modem or other telecommunication device.
Baud Roughly speaking, a measurement of how fast data can be sent over telephone lines.
Binary file A file type in the form of pure data (1s and 0s) that needs to be converted to image, sound,
or application to be used. Contrast this to an ASCII file.
Binary system The language used by computers—it is based on something being either on or off. There
are only two digits used in binary language; 1 equals on and 0 equals off.
BIOS (basic input/output system) Software that includes hundreds of little programs stored on ROM
chips, used during the startup routine to check out the system and prepare to run the hardware.
bit The smallest unit of information that is recognized by a microcomputer. Shorthand term for binary
digit. There are only two possible binary digits: 0 and 1.
Boot partition A hard-disk partition containing the portion of the operating system needed to launch the
operating environment.
Boot up To start a computer; drawn from the phrase "pulling oneself up by one's own bootstraps."
bps (bits per second) The speed at which a modem transmits data. Typical rates are 14,400, 28,800,
33,600 and 56,600 bps. This represents the actual number of data bits that can be transmitted per second.
Bridge A device that provides communication between two or more network segments, thereby forming
one logical network.
Browser Software used to navigate the World Wide Web, such as Microsoft's Internet Explorer and
Netscape Navigator.
Bus The main communication avenue in a computer. It consists of a set of parallel wires that are
connected to the CPU, memory, and all input/output devices. The bus can transmit data in either direction
between any two components. If a computer did not have a bus, it would need separate wires to connect
all the components.
Bus network A network in which all computers are connected to a single linear cable. Both ends of the
cable must be terminated. Because there is no central point, it is harder to isolate problems in a bus
network than in a star network topology.
Byte A group of 8 bits that represents 1 character of information (for instance, pressing one key on the
keyboard). A byte is the standard unit of measuring memory in a microprocessor. Memory size is
measured in terms of kilobytes (KB) or megabytes (MB). 1 KB of RAM is 1024 bytes; 1 MB is
approximately one million bytes.
Cache A place where data is stored so that it does not need to be read from a slower device. Copies of
frequently used disk sectors are stored in RAM so they can be accessed without accessing the hard disk.
CD-ROM (compact disc read-only memory) A disc similar to an audio compact disc, but it contains
computer data.
CGA (Color Graphics Adapter) An early color graphics adapter standard with resolutions of 320 pixels
by 200 pixels or 640 x 200. CGA supported no more than four colors.
Chip The ultimate integrated circuit; contains the complete arithmetic and logic unit of a computer. See
microprocessor
Chip set A group of computer chips or ICs (integrated circuits) that, when working in harmony, manage
and control the computer system. This set includes the CPU and other chips that control the flow of data
throughout the system. Typical chip sets consist of a bus controller, a memory controller, data and
address buffer, and a peripheral controller.
CISC (complex instruction set computing) A computer with many different machine-language
instructions.
Client A computer that connects to a network and uses the available resources provided by the server.
Clock Establishes the maximum speed at which the processor can execute commands. Not to be
confused with the clock that keeps time.
Clock speed Measured in megahertz (MHz)—millions of cycles per second—it is the speed at which a
clock can cycle, or how fast a CPU can execute a command.
Clone A term that derives from the early days of personal computing used to denote a computer
compatible with, but not manufactured by, IBM.
Clusters A unit of storage on a mass-storage device such as a hard disk drive or CD-ROM disc. On a
hard drive a cluster usually consists of two to eight sectors. The actual amount of data a cluster can hold
is dependent on the operating system and controller type.
Coaxial cable Made of two conductors that share the same axis. The center is a relatively stiff copper
wire encased in insulating plastic. A wire-mesh tube around the insulation serves as shielding. The
outside is a tough insulating plastic tube.
Code A way of representing information on a machine or in some physical form so that the information
can be placed on the external data bus to be read by all devices. Also, statements (source code) written
in a programming language, which are compiled into executable instructions (object code).
Compression "Squeezing" a file down in size by getting rid of all the bits it doesn't really need. Many
files (especially those with graphics) are very large and require a long time to travel over the Internet, so
they are best compressed before sent.
Cookie A special message stored on a computer that allows a Web site to keep track of when a user has
visited that site.
Coprocessor A separate circuit inside a computer that adds additional functions to the CPU or handles
extra work while the CPU is busy.
CPU (central processing unit) The part of a computer in which arithmetic and logical operations are
performed and instructions are decoded and executed. It controls the operation of the computer.
CRT (cathode-ray tube) The main component of a monitor. One end of the tube is a very slender
cylinder containing an electron gun(s). The fatter end is the display screen.
Cursor When entering data, whether in an application or in an MS-DOS command, the cursor (often a
small flashing line) indicates the place at which the characters will be inserted.
Data bus A group of parallel conductors (circuit traces) found on the motherboard that is used by the
CPU to send and receive data from all the devices in the computer. Also called the external data bus.
Default drive The active drive on the computer. Each drive has its own letter designation. Unless
otherwise specified, any commands are performed upon the default drive.
Device driver A program that extends the operating system to support specific devices.
Direct memory access (DMA) Allows a peripheral device to access the memory of a computer directly,
without going through the CPU. This speeds up the transfer of data to or from external devices.
DLC (Data Link Control) A protocol developed by IBM to connect token-ring-based workstations to
IBM mainframe computers. Printer manufacturers have adopted the protocol to connect remote printers
to network print servers.
DOS (disk operating system) The system used by most early PCs as the operating system software to
manage hardware, data, and applications.
dpi (dots per inch) Units used to measure the resolution of images on many printers and scanners. Keep
in mind that dpi is an exact measurement in laser printers, but often used as an approximation in ink jet
printers.
DRAM (dynamic random access memory) Memory that requires a refresh signal to be sent to it
periodically.
ECC (error-correction coding) The use of a code to verify or disprove that a data string received is the
same as the data sent.
EGA (Enhanced Graphics Adapter) An improvement on the older CGA standard. Supports a
resolution of up to 640 pixels by 350 pixels at 16 colors in text-only mode or 640 x 200 at 2 colors in
graphics mode. The EGA standard was not fully backward-compatible with CGA and MDA.
e-mail (electronic mail) The transmission of messages by computer from one person to another, often
via the Internet.
Encryption The act of encoding data so that it can be read only by the intended party. A secure Web
site or Internet-based transaction uses some form of encryption.
Ethernet A type of local area network in which communication takes place by means of radio frequency
signals carried by a coaxial cable.
Expansion slots Specialized sockets that allow additional devices (circuit boards/adapter cards) to be
attached to the motherboard (by means of the expansion bus). These are used to expand or customize a
computer. They are an extension of the computer's bus system.
Fiber-optic cable A cable that is made out of light-conducting glass or plastic fibers. Multiple fiber
cores can be bundled in the center of its protective tubing.
filenames (also filespec) Ways to designate files. A filename is made up of three parts—a name of up
to eight characters, a period, and extension of up to three characters. The name can include any number,
character, or the following symbols: _()~'!%$&#. For example: "myfile.doc." Spaces cannot be used in
MS-DOS filenames.
Firewall A gateway with special security software. It intercepts and inspects packets of data moving
between an organization's main computer system and the Internet. It allows only authorized access and
is a major defense against certain types of hacker attacks. floppy disk drive Low-capacity magnetic
removable storage drive.
G
gateway A link between different computer networks. It is usually a computer that acts as a translator
between two completely dissimilar systems. Because it is both a translator and a router, it is usually
slower than a bridge or router alone.
GIF (Graphics Interchange Format) A file type for storing and exchanging pictures.
GUI (graphical user interface) Microsoft Windows is a GUI-based operating system. A GUI allows
users to choose commands and functions by pointing to a graphical icon using either a keyboard or
pointing device such as a mouse.
Handshaking A term used to describe the sequence of data and related tones used to align and
synchronize two modems before working data is sent between the devices.
Hard disk drive High-capacity magnetic disk for data storage and program files. Also called a fixed
disk.
header The top part of an e-mail or newsgroup message that shows where the message came from and
when it was posted. The declaration at the "head" of a graphics file.
Host A computer that you connect to in order to access information. For instance, a computer at an ISP
that lets you access the Internet is a host.
HTTP (Hypertext Transfer Protocol) The protocol used to transmit data in the HTML format.
image map A "clickable" graphic that performs different actions depending on where in the graphic the
user clicks.
Integrated circuit (IC) An electronic device consisting of many miniature transistors and other circuit
elements (resistors and capacitors and so forth).
Integrated Drive Electronics (IDE) The most common standard for interfacing hard disk and CD-ROM
drives in the PC environment. Much of the actual work of controlling the hard disk drive is handled by
the system BIOS. This reduces hardware cost, but introduces an overall system performance penalty
during I/O operations. See also Enhanced IDE (EIDE)
International Organization for Standardization (ISO) Groups of experts drawn from the industry that
set standards for various technologies. The work of these teams has led to development of SCSI, SMAL
and the Internet, and the ASCII character set.
Internet A system that links computer networks all over the world.
I/O address A unique name assigned to each device that allows the CPU to recognize the device with
which it is communicating.
IP (Internet Protocol) The protocols used to define how data is transmitted over the Internet.
IP address (Internet Protocol address) A unique address that identifies every network and host on the
Internet. (A host is defined as the TCP/IP network interface within the computer, not the computer
itself— a computer with two network cards will have two IP addresses.)
ISP (Internet service provider) A host computer that users can dial into over a modem to connect to
the Internet.
JPEG (Joint Photographic Experts Group) A graphics file format named after the group. JPEGs are
compressed file formats used for photographic images on the Web. The image quality of a JPEG can
vary with the degree of compression used. It is possible to reduce a picture file to one-twentieth of its
original size. Compare with GIFs. The counterpart for movies is called MPEG (Motion Picture Experts
Group). K
keyboard A primary input device for a computer, used for entering text and shortcuts for command
functions.
kilobyte (KB) A unit of memory equal to 1,024 characters or bytes (1 KB = one kilobyte).
LAN (local area network) A network that covers a limited distance (such as a single building or facility)
to allow computers to share information and resources.
link Means, also known as a hyperlink, by which reader is moved to a different location on the Internet
when the link is activated. When text is used for a hyperlink, it is often colored differently from the body
text of the page so it stands out.
logging on Means by which—when connecting to a remote computer—the host computer (the one that
is called) gives permission to connect. The process of sending the appropriate information to sign on is
called logging on. Often a user name and password are required.
megabyte (MB) An amount of computer memory equal to 220. 1,048,576 bytes = 1024 kilobytes. One
megabyte can store more than one million characters. megahertz (MHz) One million hertz (one million
cycles per second). A measurement of clock speed.
memory The area within a computer where information is stored while being worked on. It stores
information (in the form of data bits) that the CPU and software need to keep running.
microphone Just like the microphone on a tape recorder. Allows input of voice or music to be recorded
and saved to a computer file.
microprocessor An integrated circuit containing the entire CPU of a computer, all on one chip, so that
only the memory and input/output devices need to be added.
MIME (Multipurpose Internet Mail Extensions) A new Internet standard for moving around sound
and pictures by email.
modem (MOdulator/DEModulator) Converts computer data to information that can be transmitted via
wires (telephone, ISDN, fiber optics, as well as wireless communication). Allows communication
between computers over long and short distances. monitor The primary output device that resembles a
television set—it visually displays text and graphics.
motherboard Also known as a PWB or printed wiring board. The large circuit board found inside the
computer. For all practical purposes, it is the computer. It contains the following items: chip set, data
bus, address bus, expansion slots, clock, battery, and memory.
They come in a variety of shapes and sizes. N network A group of computers connected together in
network card An expansion card that connects a computer to a group of computers so they can access
information and programs. Also known as a network interface card, NIC, and network adapter card.
O
offline Networked computers that are not actively connected so that transmission of data is not possible.
online The state in which two or more computers are connected to each other, making possible data
transmission.
operating system The program that controls a PC and makes it possible for users to run their own
applications. The operating system provides the built-in routines that allow the computer to recognize
commands, manage files, connect devices, and perform input/output operations. P packet A group of
consecutive characters transmitted from one computer to another over a network. parallel The
transmission of several bits at the same time over separate wires.
parity bit A very basic method of error-correcting code that uses the value of an extra bit sent at the end
of a data string. The bit must have a set value based on an algorithm to verify that the data at the receiving
end is correct.
path The address to a file. The path consists of the drive name, the location of the file in the directory
structure, and the filename. Example: C:\Mystuff\Myfile.doc.
peer-to-peer network A network in which each connected computer acts as either a server or a client
depending on the users' needs. Each user or workstation establishes its own security and determines
which resources are available to other users. These networks are limited in size, usually 15 to 20
workstations. peripheral An external device connected to a computer such as a printer, scanner, modem,
or joystick.
pixel Short for "picture element." One of the dots that make up a graphical image.
plotter Similar to a printer, but uses pen(s) to draw an image. Used most often with graphics and drawing
programs.
port Specific channel used by a network service. For example, Gopher often uses port 70, while some
Web sites use port 80.
prompt The command prompt—a user interface provided by COMMAND.COM to signal to the user
that the computer is ready to receive input (for example, C:\> or A:\>).
protocol A set of rules that govern the transfer of information. The format used to upload or download
files to allow two different computers to communicate in a standard format.
RAM (random access memory) The main memory where a computer temporarily stores data.
register Temporary memory storage areas located inside the CPU. Used to hold the intermediate results
of calculations or other operations.
repeater A device that works like an amplifier; it increases or boosts a signal to allow transmissions
over longer distances. ring network A type of network in which all the servers and clients are connected
in a closed loop.
ROM (read-only memory) Computer memory that contains instructions that do not need to be changed,
such as operating system startup instructions. The computer can access data from ROM but cannot put
new data into it.
router A device that works like a bridge but is able to select the best route from network to network
based on traffic load. A router can also connect dissimilar networks. S
scanner A peripheral that converts information from the written page (or a printed graphic) to digital
information that can be used by the computer. Works similarly to the scanning process in a photocopy
machine.
search engine A program that searches indexes of Internet addresses using keywords. There are
hundreds of search engines located on servers throughout the Internet. Some popular search engines are
AltaVista, Yahoo, HotBot, and Excite.
server The computer that runs the network operating system, manages security, and administers access
to resources. Strictly speaking, any computer that stores information and allows outside users to get
copies of that information. software Any program (set of instructions) that causes a computer to carry
out a task or function.
synchronous Form of computer communication in which data is transmitted in packets containing more
than one character. This is faster than asynchronous transmission because there is no start/stop bit
between each individual character.
TCP/IP (Transfer Control Protocol/Internet Protocol) The name given to a collection of protocols
that were designed in the 1970s for use on the large-scale mixed-platform that became the Internet.
telecommunications The ability to transmit data over telephone lines to a remote computer.
Topology The layout scheme that describes the way in which network nodes are wired in relation to
each other.
twisted-pair cable Consists of two insulated wires twisted around each other to form a pair. One or
more twisted pairs are used in a twisted-pair cable. U
universal serial bus (USB) A new external expansion bus that is popular for use with low-speed mass
storage devices such as ZIP drives, modems, and printers. upload The ability to transfer (send) a file
from one computer to a remote computer.
UPS (uninterruptible power supply) Acts as both a surge suppresser and a power leveler to provide
the computer with a constant source of power. It also provides power during a power failure or
interruption so the user can safely save data before shutting down.
VGA (Video Graphics Array) A graphics adapter that offers 16 colors at a resolution of 640 pixels by
480 pixels. To gain more colors, VGA uses an analog video signal instead of a digital signal. With the
analog signal, the VGA standard is able to provide 64 distinct levels for each color, giving users 64 3 or
262,144 possible colors. It uses a 15-pin, three-row, female DB-type connector.
worm (write once, read many) drives A type of older optical drive that allows the user to "write once,
read many," allowing reader to reread, but not to alter, data after it has been recorded.
Zip files Files compressed into Zip format, which requires them to be decompressed with a special
program such as PKUNZIP or WINZIP before being used or installed.
5. 1 Terabyte is equal to :
* 1024 MB * 1024 KB * 1024 GB * 1024 Bytes
33. The monitor with black background and a single colour is called:
* Colour * Flat Panel * Monochrome * none of these
34. In which topology all computers are connected with central server?
* Bus * Ring * Star * Mesh
36. The number of instructions executed by a computer depends upon the size of:
* Opcode *Decoder * MBR * MAR
40. Coaxil cable, fiber optic, Microwave & satellite refers to:
* Communication Media * Topology * Communication Mode
* none of these
45. To transmit data from memory to a microprocessor and vice versa is carried on by:
46. The software used to access the world wide web is called:
* Browser * Web * Server * e-mail
48. The process of converting digital signal into analog signal is called:
* Modulation * Demodulation * Telecommunication * None of these
54. A program that converts a source code into a machine code is called a/an:
* Compiler * Assembler * Driver * All of them
58. A group of parallel conductors that are used by the CPU to "address" memory locations.
* Address bus * Control bus * Data bus * None of them
59. A device that works like a bridge but is able to select the best route from network to
network based on traffic load
* Modem * Router * Communication media * Ring network
60. The transmission of messages by computer from one person to another, via the Internet.
* Browser * Web * Server * e-mail