Ict Computer
Ict Computer
JUI
CREDIT HOURS: 2
EMAIL: [email protected]
General Introduction:
Information Communications Technology -ICT is a very important module as it cuts across all
the sectors of Computer Science, giving an overall summary of all the aspects of Information
Technology. This is nowhere far from truth that the two other IT related modules (Word
Processing and Computer Studies) offered as examinable subjects at final year and at NCTVA
also have in them topics covered under ICT where most of the questions are drawn from areas
such as: Microsoft Office Word, Microsoft Office Excel, Windows and General IT.
Looking at the challenges of times (COVID-19) which resulted in the suspension of lectures,
implying that all courses including as ICT were put on hold. Preparing materials for ICT would
require much more than just explanatory lesson notes but rather one that is similar to an
instructional manual that guides the learner on how to comprehend and implement the
information from this materials using their PCs and Smartphones and as well make it easier to
memorise the content in byte size format to enable quick, easier and faster learning.
Technology (ICT) together with the advantages and the usages of ICT in today’s world.
Ø to learn short and direct methods of performing several tasks on Windows, word and
excel.
Ø use quick on-point steps of identifying threats to computers and the essence of securing
computer systems.
Ø use sample questions to prepare for college-based questions and even provide further
Ø Help learners to not only learn how to create and configure email accounts, but to also get
the practical experience of sending and receiving emails and to get additional knowledge
Ø Introduce new and vital topics such mobile and multimedia and so much more.
POLICIES
ATTENDANCE POLICY: The student is expected to attend all classes. Exceptional cases will
extraordinary times in the wake-up to the global pandemic of COVID-19, all students are
supposed to adhere to all government policies on social distancing and masking-up in the fight
MAKE-UP POLICY: Missed classes may require additional assignments, including written
material to be turned in and/or examinations. Make-up examinations differ from original exams
Academic Honesty Policy: Academic dishonesty will not be tolerated. This includes cheating,
That being said, you can help each other out on the homework (this does not mean that you can
1. FUNDAMENTALS OF CMPUTER
2. COMPUTER - APPLICATIONS
4. COMPUTER - PORTS
6. COMPUTER - NETWORKING
9. SECURITY
10. MOBILE
11. MULTIMEDIA
13. ABBREVIATIONS
1. FUNDAMENTALS OF COMPUTERS
operations automatically and sequentially. It is also known as a data processor, as it can store,
Computer
• Input of data
• Manipulation/processing of data
The term “computer” is derived from a Latin term “compute,” which means ‘to calculate.’
Initially, the computer system had been designed to calculate; it was intended to be a computing
device. However, over a period of time, this device technically advanced; at present, it can
• follows the instructions and stores the data given by the user.
intervention is required; simply you need to give the command and then it will do the
work automatically.
• Speed − Depending upon the power of the computer, it can perform, it can take
• Storage − A computer system can store enormous quantity of data in different format.
The storage capacity of a computer system is normally expressed in terms of Kilobytes
• Reliability − As a computer system always gives accurate result; therefore, its reliability
is very high.
• Vast memory − A computer system can have a wide range of memory which can recall
The present Computer System has evolved after centuries of efforts from different intellectuals
Let us now read about the innovators who contributed immensely in the development of a
computer system.
John Napier
Further, Napier also invented a computing device, which consisted of sticks with numbers
imprinted on them. Napier named sticks ‘bones,’ as they were made up of bones.
Blaise Pascal: Pascal was a French mathematician who invented a machine based on gear wheels,
Philosopher, and Inventor. In 1822, he developed a machine capable to calculate the successive
difference of expression and prepared a table which helped him in his calculations.
Lady Ada Lovelace: Lovelace was an English mathematician, who researched on Babbage’s
work. She has given the concept that ‘computers can be programmed’. Her work helped a great
John Atanstoff: With the assistance of Berry, John Atanstoff developed the Atanstoff Berry
Computer (more popular as ABC) in 1937. It marked the beginning of the development of
John Mauchly and Eckart: In 1947, John Mauchly and Eckart developed the first large scale
Electronic Digital Computer. It was called the Electronic Numerical Integrator and Calculator
(ENIAC).
Maurice V. Wilkes: In 1949, Wilkes (at Cambridge University) designed Electronic Delay
Storage Automatic Calculator (EDSAC). It was the first computer that started its operating system
Business
A computer has high speed of calculation, diligence, accuracy, reliability, or versatility which has
• Payroll calculations
• Budgeting
• Sales analysis
• Financial forecasting
• Banking
Online accounting facility, which includes checking current balance, making deposits and
ATM machines which are completely automated are making it even easier for customers to deal
with banks.
Insurance
Insurance companies are keeping all records up-to-date with the help of computers. Insurance
companies, finance houses, and stock broking firms are widely using computers for their
concerns.
Insurance companies are maintaining a database of all clients with information showing −
• Maturity date
• Interests due
• Survival benefits
• Bonus
Education
The computer provides a tool in the education system known as CBE (Computer Based
Education).
There are a number of methods in which educational institutions can use a computer to educate
the students.
It is used to prepare a database about performance of a student and analysis is carried out on this
basis.
Marketing
Advertising: With computers, advertising professionals create art and graphics, write and revise
copy, and print and disseminate ads with the goal of selling more products.
Home Shopping: Home shopping has been made possible through the use of computerized
catalogues that provide access to product information and permit direct entry of orders to be filled
by the customers.
Healthcare: Computers have become an important part in hospitals, labs, and dispensaries. They
are being used in hospitals to keep the record of patients and medicines. It is also used in
scanning and diagnosing different diseases. ECG, EEG, ultrasounds and CT scans, etc. are also
Following are some major fields of health care in which computers are used.
• Diagnostic System − Computers are used to collect data and identify the cause of
illness.
• Lab-diagnostic System − All tests can be done and the reports are prepared by
computer.
• Patient Monitoring System − These are used to check the patient's signs for abnormality
• Pharma Information System − Computer is used to check drug labels, expiry dates,
One of the major areas is CAD (Computer Aided Design) that provides creation and modification
• Structural Engineering − Requires stress and strain analysis for design of ships,
also employs computerized control systems. Some military areas where a computer has been used
are −
• Missile Control
• Military Communication
• Smart Weapons
that is received and understood clearly and correctly by the person for whom it is meant. Some
Chatting
Usenet
FTP
Telnet
Video-conferencing
Government: Computers play an important role in government services. Some major fields in
• Weather forecasting
3. ROLE OF COMPUTER IN TODAY’S WORLD
In today’s world, for almost every activity whether personal (for example, operating personal
savings bank account) or business-related (for example, selling any product or services); in some
Due to the growing dependency on computers, every small and big organizations and other
business companies have started offering computer-based service. Furthermore, the advancement
of communications, electronic service networks, and multimedia have opened a new door for
corporates by providing an effective way of business processing, payment transfer, and service
delivery.
Independency
As computers help in making the business automated, the businesses are becoming more and
more independent. No more, there is the need to put man-power for every work, as with the help
of computer most of the works can be automated. Starting from ticket booking to a luxury car
Cost Cutting
A number of business are based online in recent times; therefore, there is no need to open
business branch in every city, rather having one centralized inventory can make the business
Marketing
With the use of computer system with Internet facility, it is very simple to make a business global
in a given period of time. Website, email, social media websites, online advertisements, etc. are
Marketing
A number of tasks are being done by computer including ticket booking to money transactions;
Normally, most of the businesses need to store and maintain huge data and other records;
manually, it is very difficult to maintain, but the use of computer not only increases the storage
capacity, but also facilitates the processing and retrieval of data anytime.
As most of the tasks in almost every industry has become automated, it has now become much
easier to manufacture a huge bulk of products in very less time. Through computer technology,
High Accuracy
There is hardly any scope of errors in an automated system; however, if any error occurs, it is
Data sharing has now become very simple just the way it is simple to link one computer system to
another.
Competition
The applicability of computer technology has increased competition; now, the customers can
Computer also helps keep the data of businesses secure. However, this security can face threats
too. For instance, if someone hacks the system or there is a virus attack, it can have the potential
A port is a physical docking point using which an external device can be connected to the
computer. It can also be programmatic docking point through which information flows from a
Characteristics of Ports
Ports are slots on the motherboard into which a cable of external device is plugged in.
Examples of external devices attached via ports are the mouse, keyboard, monitor, microphone,
speakers, etc.
Serial Port: Used for external modems and older computer mouse
25 pin model
PS/2 Port: Used for old computer keyboard and mouse. Also called mouse port Most of the old
computers provide two PS/2 port, each for the mouse and keyboard
Universal Serial Bus (or USB) Port): It can connect all kinds of external USB devices such as
external hard disk, printer, scanner, mouse, keyboard, etc. It was introduced in 1997.
Most of the computers provide two USB ports as minimum. Data travels at 12 megabits per
seconds.
Similar to the serial port connector. However, serial port connector has pins, VGA port has holes.
Power Connector
Three-pronged plug.
Connects to the computer's power cable that plugs into a power bar or wall socket.
Firewire Port: Transfers large amount of data at very fast speed. Connects camcorders and video
equipment to the computer. Data travels at 400 to 800 megabits per seconds. Invented by Apple.
It has three variants: 4-Pin FireWire 400 connector, 6-Pin FireWire 400 connector, and 9-Pin
Ethernet Port: Connects to a network and high speed Internet. Connects the network cable to a
computer. This port resides on an Ethernet Card. Data travels at 10 megabits to 1000 megabits per
Digital Video Interface, DVI port: Connects Flat panel LCD monitor to the computer's high-end
Sockets: Sockets connect the microphone and speakers to the sound card of the computer.
5. COMPUTER - NUMBER SYSTEM
When we type some letters or words, the computer translates them in numbers as computers can
understand only numbers. A computer can understand the positional number system where there
are only a few symbols called digits and these symbols represent different values depending on
The digit
The base of the number system (where the base is defined as the total number of digits available
The number system that we use in our day-to-day life is the decimal number system. Decimal
number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the
successive positions to the left of the decimal point represent units, tens, hundreds, thousands, and
so on.
Each position represents a specific power of the base (10). For example, the decimal number
1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position,
30 + 4 1234
Each position in a binary number represents a 0 power of the base (2). Example 20
Last position in a binary number represents a x power of the base (2). Example 2x where x
Each position in an octal number represents a 0 power of the base (8). Example 80
Last position in an octal number represents a x power of the base (8). Example 8x where x
Example
Letters represent the numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15
Each position in a hexadecimal number represents a 0 power of the base (16). Example, 160
Last position in a hexadecimal number represents a x power of the base (16). Example 16x where
Example
Step 2 19FDE16 ((1 x 164) + (9 x 163) + (15 x 162) + (13 x 161) + (14 x 160))10
Step 3 19FDE16 (65536+ 36864 + 3840 + 208 + 14)10
There are many methods or techniques which can be used to convert numbers from one base to
Step 1 − Divide the decimal number to be converted by the value of the new base.
Step 2 − Get the remainder from Step 1 as the rightmost digit (least significant digit) of the new
base number.
Step 3 − Divide the quotient of the previous divide by the new base.
Step 4 − Record the remainder from Step 3 as the next digit (to the left) of the new base number.
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in
Step 3.
The last remainder thus obtained will be the Most Significant Digit (MSD) of the new base
number.
Example
Step 1 29 / 2 14 1
Step 2 14 / 2 7 0
Step 3 7 / 23 1
Step 4 3 / 21 1
Step 5 1 / 20 1
As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that the
first remainder becomes the Least Significant Digit (LSD) and the last remainder becomes the
Step 2 − Multiply the obtained column values (in Step 1) by the digits in the corresponding
columns.
Step 3 − Sum the products calculated in Step 2. The total is the equivalent value in decimal.
Example
Step 2 − Convert the decimal number so obtained to the new base number.
Example
Step 1 21 / 2 10 1
Step 2 10 / 2 5 0
Step 3 5 / 22 1
Step 4 2 / 21 0
Step 5 1 / 20 1
Step 1 − Divide the binary digits into groups of three (starting from the right).
Step 2 − Convert each group of three binary digits to one octal digit.
Example
Step 2 101012 28 58
Step 1 − Convert each octal digit to a 3-digit binary number (the octal digits may be treated as
Step 2 − Combine all the resulting binary groups (of 3 digits each) into a single binary number.
Example
Step 1 − Divide the binary digits into groups of four (starting from the right).
Step 2 − Convert each group of four binary digits to one hexadecimal symbol.
Example
Step 1 − Convert each hexadecimal digit to a 4-digit binary number (the hexadecimal digits may
Step 2 − Combine all the resulting binary groups (of 4 digits each) into a single binary number.
Example
Hexadecimal Number : 1516
machine.
Data is represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or special
What is Information?
Information is organized or classified data, which has some meaningful values for the receiver.
Information is the processed data on which decisions and actions are based.
For the decision to be meaningful, the processed data must qualify for the following
characteristics −
Data processing is the re-structuring or re-ordering of data by people or machine to increase their
usefulness and add values for a particular purpose. Data processing consists of the following
basic steps - input, processing, and output. These three steps constitute the data processing cycle.
Input − In this step, the input data is prepared in some convenient form for processing. The form
will depend on the processing machine. For example, when electronic computers are used, the
input data can be recorded on any one of the several types of input medium, such as magnetic
Processing − In this step, the input data is changed to produce data in a more useful form. For
example, pay-checks can be calculated from the time cards, or a summary of sales for the month
Output − At this stage, the result of the proceeding processing step is collected. The particular
form of the output data depends on the use of the data. For example, output data may be
pay-check
for employees.
6. COMPUTER - NETWORKING
A computer network is a system in which multiple computers are connected to each other to share
• Create files and store them in one computer, access those files from the other computer(s)
• Connect a printer, scanner, or a fax machine to one computer within the network and let
other computers of the network use the machines available over the network.
• Network Cables
• Distributors
• Routers
Network Cables: Network cables are used to connect computers. The most commonly used cable
Distributors
A computer can be connected to another one via a serial port but if we need to connect many
The solution is to use a central body to which other computers, printers, scanners, etc. can be
connected and then this body will manage or distribute network traffic.
Router
A router is a type of device which acts as the central point among computers and other devices
that are a part of the network. It is equipped with holes called ports. Computers and other devices
are connected to a router using network cables. Now-a-days router comes in wireless modes using
Network Card
connected over a network. It is also known as the network adapter or Network Interface Card
(NIC). Most branded computers have network card pre-installed. Network cards are of two types:
Motherboard has a slot for internal network card where it is to be inserted. Internal network cards
are of two types in which the first type uses Peripheral Component Interconnect (PCI) connection,
while the second type uses Industry Standard Architecture (ISA). Network cables are required to
to be inserted into the motherboard, however no network cable is required to connect to the
network.
USB card is easy to use and connects via USB port. Computers automatically detect USB card
and can install the drivers required to support the USB network card automatically.
Networking: A computer networking is a process of connecting two more than two computers
with the purpose to share data, provide technical support, and to communicate (especially for the
business purpose.
Internet is the technology that is used to connect different computer systems (located in different
geographic location). Networking technology has revolutionized the world and created a new
Advantages of Networking
Let us now discuss the advantages of networking. The advantages are described below −
Facility of Technical Support: Because of having computer networking, a person sitting in the
United States of America provides technical support to a person sitting in a remote part of India.
Easy Sharing of Data: With the help of networking, it is very simple to share all formats of
digital data from one computer system to another (irrespective of their geographic location).
Easy Sharing of Hardware Resource: With the help of networking, it has now become very
simple to share the expensive resources including storage space, processor, fax, etc.
Easy Sharing Software: Through the networking system, it is easy to share and install the
Easy to Decentralize Data Processing: Through the networking system, it is very simple to
decentralize the data processing system. It ultimately helps to control, secure, and manage the
important data.
Easy to Communicate: With the help of networking, the communication system has now
become highly efficient, frugal, and fast. The different modes of communication are text chatting,
Easy to Communicate
Types of Network
In this section, we will discuss the different types of network. The types are described below −
Local Area Network or simply LAN: is the technique of interconnecting a few computers
located in a given premise. It is normally used for a single business office or a residential
apartment.
However, in such connectivity, some other devices can also be attached such as laser printers, fax
machine, etc.
It provides high speed Internet services throughout the area covered within the network.
Wide Area Network: Wide Area Network or simply WAN is a system of network that covers a
The services of WAN are provided by public (government) agencies as well as private agencies.
The network also provides the facility to access databases located remotely.
The WAN system is highly beneficial for MNCs and other big corporate companies (offering
online services).
A Network Topology is the arrangement with which computer systems or network devices are
connected to each other. Topologies may define both physical and logical aspect of the network.
Both logical and physical topologies could be same or different in a same network.
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
If the hosts are connected point-to-point logically, then may have multiple intermediate devices.
But the end hosts are unaware of underlying network and see each other as if they are connected
directly.
Bus Topology
In case of Bus topology, all devices share single communication line or cable. Bus topology may
have problem while multiple hosts sending data at the same time. Therefore, Bus topology either
uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of
the simple forms of networking where a failure of a device does not affect the other devices. But
failure of the shared communication line can make all other devices stop functioning.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a
point-to-point connection. That is, there exists a point to point connection between hosts and hub.
Star Topology
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all
other hosts fails. Every communication between hosts, takes place through only the hub. Star
topology is not expensive as to connect one more host, only one cable is required and
configuration is simple.
Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or send message to a host which is not
adjacent to it, the data travels through all intermediate hosts. To connect one more host in the
existing structure, the administrator may need only one more extra cable.
Ring Topology
Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in
point-to-point connection with every other host or may also have hosts which are in point-to-point
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point
Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for
every new host n(n-1)/2 connections are required. It provides the most reliable network structure
Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to
each other in some arbitrarily fashion. This topology exists where we need to provide reliability
Tree Topology
Also known as Hierarchical Topology: this is the most common form of network topology in use
presently. This topology imitates as extended Star topology and inherits properties of bus
topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is access-layer where
computers are attached. The middle layer is known as distribution layer, which works as mediator
between upper layer and lower layer. The highest layer is known as core layer, and is central point
of the network, i.e. root of the tree from which all nodes fork.
Tree Topology
All neighboring hosts have point-to-point connection between them. Similar to the Bus topology,
if the root goes down, then the entire network suffers even.though it is not the single point of
failure. Every connection serves as point of failure, failing of which divides the network into
unreachable segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts. Means, if the end hosts in daisy chain are
Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments. Every intermediate host works as relay for its immediate hosts.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid topology.
Hybrid topology inherits merits and demerits of all the incorporating topologies.
Hybrid Topology
The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by
means of Dual-Ring topology and networks connected to them are mostly Star topology networks.
Internet
A special computer DNS (Domain Name Server) is used to provide a name to the IP Address so
that the user can locate a computer by a name. For example, a DNS server will resolve a name
website is hosted.
Intranet
Intranet is the system in which multiple PCs are connected to each other. PCs in intranet are not
available to the world outside the intranet. Usually each organization has its own Intranet network
and members/employees of that organization can access the computers in their intranet.
Each computer in Intranet is also identified by an IP Address which is unique among the
Intranet sites are accessible via the web browser in a similar way as websites in the internet.
However, only members of Intranet network can access intranet hosted sites.
In Intranet, own instant messengers can be used as similar to yahoo messenger/gtalk over the
internet.
Internet is general to PCs all over the world whereas Intranet is specific to few PCs.
Internet provides a wider and better access to websites to a large population, whereas Intranet is
restricted.
Internet is not as safe as Intranet. Intranet can be safely privatized as per the need.
The fast computerization of every work and gradual dependency on computer based work has
Information technology has also helped in research and development and has further developed
In recent times, a number of jobs have come up that are done with the assistance of computer. We
will discuss the different job titles performing computer related jobs −
Programmer
A person who is qualified enough to write a creative code for the computer program is known as
Programmer. The codes written by programmer are the instructions given to the computer over
There are dozens of languages, which are written by the different programmers. E.g. Java, C,
System Analyst
The job of a system analyst is highly classified and also very crucial.
A system analyst fundamentally designs, develops, and implements new systems or adds some
additional features in the existing system to give instructions to perform additional tasks.
System analyst also specializes in fields such as engineering, science & technology, finance,
Database Administrator
A database administrator or simply DBA is a trained person who is accountable for the storage of
Network Administrator
system. Likewise, he manages the local area network, wide area network, the Internet system or
The job of a network administrator is a very crucial one as almost every network in an
He places the images, contents, and other such information on right places to make the website
This is one of the most significant jobs under which an Information Security Analyst designs,
Other fields include: Software engineers, data scientists, health information system experts etc.
9. SECURITY
Advancement of computer technology has radically changed the world; resultantly, most of the
works whether it is matter of nation’s security system or buying a shoe online everything
depends on computer.
Such increased dependency also raises the issue of security, as most of the data is now stored in
Computer Security
Your computer systems store various sorts of data and hence if it is not secured, then you might
Let us now see why do we need Computer security. It is required for the following major reasons
• Likewise, security system keeps the computer system safe by protecting the installed
• Use a firewall.
Further, if you use internet, then you need to take greater precaution. Consider the following
• Do not click on any link that you don’t know (as it may be dangerous for your computer
- virus attack).
• Do not open unauthorized an unlawful website (it may damage your computer system).
What is Defragmentation?
Frequent saving and deleting of file (data) from the hard disk creates problems in performance
and also reduces the space; therefore, defragmentation again clean-up the drive and restore the
Defragmentation
Disk Cleanup
While browsing websites (on internet), many of the files get stored in the hard disk automatically
(actually these stored files later help to reopen the website faster); besides some other cookies
also get stored in the hard disk. All these stored files create problem along with eating space.
So, disk cleanup process cleans all these files and releases the space occupied by these unwanted
files.
THREAT
Threat in a computer system is a possible danger that might put your data security on stake. The
COMPUTER THREAT
Definition
“Any circumstance or event with the potential to adversely impact an IS through unauthorized
or physical damage.
Types of Threat
Some other threats include error in use, abuse of rights, denial of actions, eavesdropping, theft of
Sources of Threat
Common Terms
Following are the common terms frequently used to define computer threat −
Virus Threats
A computer virus is a program designed to disrupt the normal functioning of the computer
Spyware Threats
Spyware is a computer program that monitors user’s online activities or installs programs without
Hackers
Hackers are programmers who put others on threats for their personal gain by breaking into
Hackers
Phishing Threats
It is an illegal activity through which phishers attempt to steal sensitive financial or personal data
Following are the significant tips through which you can protect your system from different types
of threat −
VIRUS
A virus is a computer code or program, which is capable of affecting your computer data badly by
Computer virus has the tendency to make its duplicate copies at a swift pace, and also spread it
across every folder and damage the data of your computer system.
A computer virus is actually a malicious software program or "malware" that, when infecting
your system, replicates itself by modifying other computer programs and inserting its own code.
Computer Virus
Infected computer programs may include data files, or even the "boot" sector of the hard drive.
Types of Virus
Worms
This is a computer program that replicates itself at a swift pace. Unlike a computer virus, it is
self-contained and hence does not need to be part of another program to propagate itself.
Trojan Horse
A Trojan Horse is also a sort of destructive program that remains disguised in a normal software
program. It is not exactly a virus, as it cannot replicate itself. However, there is possibility that
Bombs
It is similar to Trojan Horse, but Logic bombs have some specialty; these include a timing device
Let us discuss in what ways a virus can affect your computer system. The ways are mentioned
below
Impact of Virus
• Destructs data.
Virus Detection
The most fundamental method of detection of virus is to check the functionality of your computer
However, if there is antivirus software in your computer system, then it can easily check
Let us now see the different virus preventive measures. A computer system can be protected from
• Use of Firewalls.
Following are the most popular and effective antivirus from which you can choose one for your
personal computer −
• Kaspersky Anti-Virus
• Avira Antivirus
• Emsisoft Anti-Malware
10. MOBILE
Mobile computers are the systems, which are physically not remain connected to specific place
rather these are mobile in nature, as one can carry anywhere anytime.
The mobile computer technology carries battery back; therefore, it does not require consistent
electric power.
Mobile Computer: Mobile computers can be connected with Internet through wire or the
portable, self-powered (because of inbuilt battery), and infused with wireless technology
computing device.
computing work.
Smart Phone: A smart phone is a fully equipped cell phone with most of the computing features.
Personal Digital Assistant (PDA): It is a computer device more popular as pocket computer. It is
largely used in calculation, accessing the Internet, sending and receiving E-mails, scanning bar
codes, use as a radio or stereo, playing computer games, video recording, typewriting and word
processing, use as an address book, making and writing on spreadsheets, Global Positioning
Portable Data Terminal (PDT): It is a computer device, which is largely used to enter or
Mobile Data Terminal(MDT): It is a computer device, which is used in police cars, taxi-cabs,
military logistics, service trucks, commercial trucking fleets, courier vehicles, fishing fleets, etc.
In this chapter, we will discuss how the Computer Multimedia works. If a system presents, some
information through more than two media, it is known as multimedia. For example, TV presents
audio and video; book presents text, image, and graphs, computer, etc.
The information presented through multimedia has better quality and capability, as it can be
understood easily.
Computer Multimedia
Likewise, Multimedia is the field of Computer Science that integrates different forms of
information and represents in the form of audio, video, and animation along with the traditional
Multimedia computer system has high capacity to integrate different media including text, image,
The multimedia computer system stores, represents, processes, manipulates, and makes available
to users.
Its Central Processing Unit (CPU) is very fast, as it needs to process large amount of data.
It has huge memory power that helps in running heavy data programs.
It has high capacity graphic card that helps in displaying graphics, animation, video, etc.
With all these features (discussed above), a computer system is known as high end multimedia
computer system.
However, all the features listed above are not essentially required for every multimedia computer
system, but rather the features of a multimedia computer system are configured as per the need of
respective user.
Multimedia Components
Text
It contains alphanumeric and some other special characters. Keyboard is usually used for input of
text; however, there are some internal (inbuilt) features to include such text.
Graphics
It is technology to generate, represent, process, manipulate, and display pictures. It is one of the
by a different software.
Animation
and displaying a set of images (technically known as ‘frames’). Animation gives visual effects
or motion very similar to that of a video file (see image given below).
Animation Audio: This technology records, synthesizes, and plays audio (sound). There are many
learning courses and different instructions that can be delivered through this medium
appropriately.
Video
This technology records, synthesizes, and displays images (known as frames) in such sequences
(at a fixed speed) that makes the creation appear as moving; this is how we see a completely
developed video. In order to watch a video without any interruption, video device must display 25
to 30 frames/second.
Multimedia Application
Let us now see the different fields where multimedia is applied. The fields are described in brief
below
Presentation
E-books
Digital Library
The need to be physically present at a library is no more necessary. Libraries can be accessed
from the Internet also. Digitization has helped libraries to come to this level of development.
E-learning
Today, most of the institutions (public as well as private both) are using such technology to
education people.
Movie making
Most of the special effects that we see in any movie, is only because of multimedia technology.
Video games
Video games are one of the most interesting creations of multimedia technology. Video games
fascinate not only the children but adults too.
Animated films
Along with video games, animated film is another great source of entertainment for children.
Multimedia conferencing
People can arrange personal as well as business meetings online with the help of multimedia
conferencing technology.
E-shopping
Shift + Home Highlights from the current place to the beginning of line.
Shift + End Highlights from the current place to the end of line.
F5 Refreshes contents.
Ctrl + Plus (+) Key Automatically adjusts widths of all columns in Windows Explorer.
Holding Shift During Boot-up Enables boot safe mode or bypass system files.
Ctrl + Shift + C Display a shortcut menu for column headings in a note list.
13. ABBREVIATIONS
In this chapter, we will discuss the different abbreviations in Computer Science. The following
Abbreviation Full-name
A/D Analog-to-Digital
AI Artificial Intelligence
CD Compact Disk
CD-R CD-Recordable
CD-RW CD Read/Write
CL Command Language
D/A Digital-to-Analog
FM Frequency Modulation
GB Giga Bytes
HP Hewlett Packard
IC Integrated Circuit
IP Internet Protocol
KB Kilo Bytes
MB Mega Bytes
OS Operating System
PC Personal Computer
TB TeraBytes
VOD Video-On-Demand