Information Technology Concepts
Information Technology Concepts
FUNDEMENTALS OF COMPUTER
1.What is Computer :
Computer is an electronic device that is designed to work with
Information. The term computer is derived from the Latin term ‘computare’, this
means to calculate or programmable machine. Computer cannot do anything
without a Program. It represents the decimal numbers through a string of binary
digits. The Word 'Computer' usually refers to the Center Processor Unit plus Internal
memory.
Charles Babbage is called the "Grand Father" of the computer. The First mechanical
computer designed by Charles Babbage was called Analytical Engine. It uses read-
only memory in the form of punch cards.
Computer is an advanced electronic device that takes raw data as input from the user
and processes these data under the control of set of instructions (called program) and
gives the result (output) and saves output for the future use. It can process both
numerical and non-numerical (arithmetic and logical) calculations.
2.Accuracy:
The degree of accuracy of computer is very high and every calculation is performed
with the same accuracy. The accuracy level is determined on the basis of design of
computer. The errors in computer are due to human and inaccurate data.
3.Diligence:
A computer is free from tiredness, lack of concentration, fatigue, etc. It can
work for hours without creating any error. If millions of calculations are to be
performed, a computer will perform every calculation with the same accuracy.
4.Versatility:
It means the capacity to perform completely different type of work. You may use
your computer to prepare payroll slips. Next moment you may use it for inventory
management or to prepare electric bills.
5.Power of Remembering:
Computer has the power of storing any amount of information or
data. Any information can be stored and recalled as long as you require it, for any
numbers of years. It depends entirely upon you how much data you want to store in a
computer and when to lose or retrieve these data.
6.No IQ:
Computer is a dumb machine and it cannot do any work without instruction from the
user. It performs the instructions at tremendous speed and with accuracy. It is you to
decide what you want to do and in what sequence. So a computer cannot take its own
decision as you can.
7.Storage:
The Computer has an in-built memory where it can store a large amount of data. You can
also store data in secondary storage devices such as floppies, which can be kept outside
your computer and can be carried to other computers.
FUNCTIONAL UNITS
The computer system is divided into three separate units for its operation. They are
Computers differ based on their data processing abilities. They are classified according
to purpose, data handling and functionality.
Mainframe Computer
A very large and expensive computer capable of supporting hundreds, or even
thousands, of users simultaneously. In the hierarchy that starts with a simple
microprocessor at the bottom and moves to super computers at the top, mainframes
are just below supercomputers. , mainframes are more powerful than supercomputers
because they support more simultaneous programs. But supercomputers can execute a
single program faster than a mainframe.
Mini Computer
A midsized computer. In size and power, minicomputers lie between workstations and
mainframes. In general, a minicomputer is a multiprocessing system capable of
supporting from 4 to about 200 users simultaneously.
Workstations
A terminal or desktop computer in a network. workstation is just a generic term
for a user's machine (client machine) in contrast to a "server" or "mainframe."
Computer System Architecture
A diagram that shows the flow of data between these units is as follows:
Input Unit
The input unit provides data to the computer system from the outside. So, basically it
links the external environment with the computer. It takes data from the input devices,
converts it into machine language and then loads it into the computer system.
Keyboard, mouse etc. are the most commonly used input devices.
Output Unit
The output unit provides the results of computer process to the users. It links the
computer with the external environment. The different output devices are
monitors, printers, speakers, headphones etc.
Storage Unit
Storage unit contains many computer components that are used to store data. It is
traditionally divided into primary storage and secondary storage.
Primary storage is also known as the main memory and is the memory directly
accessible by the CPU.
Secondary or external storage is not directly accessible by the CPU. The data from
secondary storage needs to be brought into the primary storage before the CPU can
use it. Secondary storage contains a large amount of data permanently.
The digital computes using electronic valves (Vacuum tubes) are known as first
generation computers. The first 'computer' to use electronic valves (ie. vacuum
tubes). The high cost of vacuum tubes prevented their use for main memory. They
stored information in the form of propagating sound waves.
The vacuum tube consumes a lot of power. These computers were large in size and
writing programs on them was difficult.
UNIVAC-1:
It was the first commercial computer.The UNIVAC was also the first computer to
come equipped with a magnetic tape unit and was the first computer to use buffer
memory.
Second Generation (1955-1964) :
The second-generation computer used transistors for CPU components & ferrite
cores for main memory & magnetic disks for secondary memory. They used high-
level languages such as FORTRAN (1956), ALGOL (1960) & COBOL (1960
- 1961). I/O processor was included to control I/O operations.
Transistors are smaller than Vacuum tubes and have higher operating speed.
They have no filament and require no heating. Manufacturing cost was also very
low. Thus the size of the computer got reduced considerably.
It is in the second generation that the concept of Central Processing Unit (CPU),
memory, programming language and input and output units were developed. The
programming languages such as COBOL, FORTRAN were developed during this
period.
iv)Fourth Generation :
An IC containing about 100 components is called LSI (Large Scale Integration) and
the one, which has more than 1000 such components, is called as VLSI (Very Large
Scale Integration). It uses large scale Integrated Circuits (LSIC) built on a single
silicon chip called microprocessors. They used Microprocessor (VLSI) as their main
switching element.
The personal computer (PC) that you see in is a Fourth Generation Computer Main
memory used fast semiconductors chips up to 4 M bits size. Hard disks were used
as secondary memory. Keyboards, dot matrix printers etc. were developed. OS-
such as MS-DOS, UNIX, Apple’s Macintosh were available. Object oriented
language, C++ etc were developed.
MEMORY DEVICES
Components of cpu:
• Control Unit
• It obtains the instructions from the memory, interprets them, and directs the
operation of the computer.
• Logic Section
Arithmetic Section
Function of arithmetic section is to perform arithmetic operations like addition,
subtraction, multiplication, and division. All complex operations are done by
making repetitive use of the above operations.
Logic Section
Function of logic section is to perform logic operations such as comparing,
selecting, matching, and merging of data.
MEMORY
A memory is just like a human brain. It is used to store data and instructions.
Computer memory is the storage space in the computer, where data is to be
processed and instructions required for processing are stored. The memory is divided
into large number of small parts called cells.
➢ Secondary Memory
Cache Memory
Cache memory is a very high speed semiconductor memory which can speed up
the CPU. It acts as a buffer between the CPU and the main memory. It is used to
hold those parts of data and program which are most frequently used by the CPU.
The parts of data and programs are transferred from the disk to cache memory by
the operating system, from where the CPU can access them.
Primary Memory (Main Memory)
Primary memory holds only those data and instructions on which the computer is
currently working. It has a limited capacity and data is lost when power is switched
off. It is generally made up of semiconductor device. These memories are not as fast
as registers. The data and instruction required to be processed resides in the main
memory. It is divided into two subcategories RAM and ROM.
• It is a non-volatile memory.
•
RANDOM ACCESS M EMORY:
RAM (Random Access Memory) is the internal memory of the CPU for storing
data, program, and program result. It is a read/write memory which stores data
until the machine is working. As soon as the machine is switched off, data is
erased.
Access time in RAM is independent of the address, that is, each storage location
inside the memory is as easy to reach as other locations and takes the same amount
of time. Data in the RAM can be accessed randomly but it is very expensive.
RAM is volatile, i.e. data stored in it is lost when we switch off the computer or if
there is a power failure. Hence, a backup Uninterruptible Power System (UPS) is
often used with computers. RAM is small, both in terms of its physical size and in
the amount of data it can hold.
SRAM uses more chips for storage space, making the manufacturing costs
higher. SRAM is thus used as cache memory and has very fast access.
Dynamic RAM (DRAM)
DRAM, unlike SRAM, must be continually refreshed in order to maintain the data.
This is done by placing the memory on a refresh circuit that rewrites the data several
hundred times per second. DRAM is used for most system memory as it is cheap and
small. All DRAMs are made up of memory cells, which are composed of one
capacitor and one transistor.
READ ONLY MEMORY:
ROM stands for Read Only Memory. The memory from which we can only read
but cannot write on it. This type of memory is non-volatile. The information is
stored permanently in such memories during manufacture. A ROM stores such
instructions that are required to start a computer. This operation is referred to
as bootstrap. ROM chips are not only used in the computer but also in other
electronic items like washing machine and microwave oven.
Advantages of ROM
• Non-volatile in nature
• Easy to test
TYPES OF ROM:
PROM is read-only memory that can be modified only once by a user. The user
buys a blank PROM and enters the desired contents using a PROM program.
Inside the PROM chip, there are small fuses which are burnt open during
programming. It can be programmed only once and is not erasable.
EPROM (Erasable and Programmable Read Only Memory)
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104
keys or 108 keys are also available for Windows and Internet.
Typing Keys
1
These keys include the letter keys (A-Z) and digit keys (09) which
generally give the same layout as that of typewriters.
Numeric Keypad
The twelve function keys are present on the keyboard which are
3
arranged in a row at the top of the keyboard. Each function key has a
unique meaning and is used for some specific purpose.
Control keys
5
Keyboard also contains some special purpose keys such as Enter, Shift,
Caps Lock, Num Lock, Space bar, Tab, and Print Screen.
Mouse
Mouse is the most popular pointing device. It is a very famous cursor-control
device having a small palm size box with a round ball at its base, which senses the
movement of the mouse and sends corresponding signals to the CPU when the
mouse buttons are pressed.
Generally, it has two buttons called the left and the right button and a wheel is
present between the buttons. A mouse can be used to control the position of the
cursor on the screen, but it cannot be used to enter text into the computer.
Joystick
Joystick is also a pointing device, which is used to move the cursor position on a
monitor screen. It is a stick having a spherical ball at its both lower and upper
ends. The lower spherical ball moves in a socket. The joystick can be moved in all
four directions.
Light Pen
Light pen is a pointing device similar to a pen. It is used to select a displayed menu
item or draw pictures on the monitor screen. It consists of a photocell and an optical
system placed in a small tube.
When the tip of a light pen is moved over the monitor screen and the pen button is
pressed, its photocell sensing element detects the screen location and sends the
corresponding signal to the CPU.
Track Ball
Track ball is an input device that is mostly used in notebook or laptop computer,
instead of a mouse. This is a ball which is half inserted and by moving fingers on the
ball, the pointer can be moved.
Since the whole device is not moved, a track ball requires less space than a mouse.
A track ball comes in various shapes like a ball, a button, or a square.
Scanner
Scanner is an input device, which works more like a photocopy machine. It is used
when some information is available on paper and it is to be transferred to the hard
disk of the computer for further manipulation.
Scanner captures images from the source which are then converted into a digital
form that can be stored on the disk. These images can be edited before they are
printed.
Digitizer
Digitizer is an input device which converts analog information into digital form.
Digitizer can convert a signal from the television or camera into a series of numbers
that could be stored in a computer. They can be used by the computer to create a
picture of whatever the camera had been pointed at.
Microphone
Microphone is an input device to input sound that is then stored in a digital form.
Bar Code Reader scans a bar code image, converts it into an alphanumeric value,
which is then fed to the computer that the bar code reader is connected to.
An output device is any device used to send data from a computer to another device
or user. Most computer data output that is meant for humans is in the form of audio
or video. Thus, most output devices used by humans are in these categories.
Examples include monitors, projectors, speakers, headphones and printers
• Graphic Plotter
• Printer
Monitors
Monitors, commonly called as Visual Display Unit (VDU), are the main output
device of a computer. It forms images from tiny dots, called pixels that are
arranged in a rectangular form. The sharpness of the image depends upon the
number of pixels.
• Flat-Panel Display
Cathode-Ray Tube (CRT) Monitor
The CRT display is made up of small picture elements called pixels. The smaller
the pixels, the better the image clarity or resolution. It takes more than one
illuminated pixel to form a whole character, such as the letter ‘e’ in the word help.
A finite number of characters can be displayed on a screen at once. The screen can
be divided into a series of character boxes - fixed location on the screen where a
standard character can be placed. Most screens are capable of displaying 80
characters of data horizontally and 25 lines vertically.
Flat-Panel Display Monitor
The flat-panel display refers to a class of video devices that have reduced volume,
weight and power requirement in comparison to the CRT. You can hang them on
walls or wear them on your wrists.
Current uses of flat-panel displays include calculators, video games, monitors,
laptop computer, and graphics display.
1.monochrome
Monochrome is a older computer system monitors. Monochrome monitors
actually use two colors, one for the display image (the foreground) and one for the
background.
2.Gray scale
Many optical scanners are capable of gray scaling, using from 16 to 256 different
shades of gray. However, gray scaling is only useful if you have an output device -
- monitor or printer -- that is capable of displaying all the shades.
.
3. Color or RGB monitor
RGB-Short for red, green, blue monitor, a monitor that requires separate signals
for each of the three colors. This differs from color televisions, for example, which
use composite video signals, in which all the colors are mixed together. All color
computer monitors are RGB monitors.
An RGB monitor consists of a vacuum tube with three electron guns -- one each
for red, green, and blue -- at one end and the screen at the other end. The three
electron guns fire electrons at the screen, which contains a phosphorous coating.
When the phosphors are excited by the electron beams, they glow. Depending on
which beam excites them, they glow red, green, or blue. Ideally, the three beams
should converge for each point on the screen so that each pixel is a combination of
the three colors
Characteristics of a monitor:
a) Size:
The most important aspect of a monitor is its size. Screen sizes are measured in
diagonal inches, the distance from one corner to another opposite corner
diagonally.
b) Resolution:
The resolution of a monitor indicates how density the pixels are packed. Pixel
is short for picture element. A pixel is a single point in a graphic image. Graphic
monitors display pictures by dividing the display screen into millions of pixels
arranged in rows and columns. The quality of a display monitor largely depends
on its resolution.
c) Band Width:
The amount of data that can be transmitted in a fixed amount of time. For
digital devices, the band width is usually expressed in bits or bytes per second
(bps). For analog devices it is expressed in cycle per second or Hertz (Hz).
d) Refresh Rate:
Display monitors must be refresh many times per second. The refresh rate
determines how many times per seconds the screen is to be red drawn. The refresh
rate of a monitor is measured in Hertz. The faster the refresher is, the less the
monitor flickers.
e) Interlacing:
It is a technique in which instead of scanning the image one line at a time, it
scans alternately i.e. alternate lines are scanned at each pass. It is used to keep
band width down. Since inter leaked displaced have been reported to be more
flickery, with better technology available, most monitors are non interlaced now.
g) Dot Pitch:
A measurement that indicates the vertical distance between each pixel on a
display screen. It is measured in millimeter. The dot pitch is one of the principle
characteristics that determine the quality of display monitors.
h) Convergence:
It refers to how sharply an individual colour pixel on a monitor appears.
Each pixel is composed of three dots namely a red, a green and a blue. If the dots
are badly mis-converged, the pixel will appear blurry.
Printers
• Impact Printers
• Non-Impact Printers
Impact Printers
Impact printers print the characters by striking them on the ribbon, which is then
pressed on the paper.
• Line printers
Character Printers
Character printers are the printers which print one character at a time.
These are further divided into two types:
• Daisy Wheel
Line Printers
Line printers are the printers which print one line at a time.
These are of two types −
• Drum Printer
• Chain Printer
Drum Printer
This printer is like a drum in shape hence it is called drum printer. The surface
of the drum is divided into a number of tracks. Total tracks are equal to the size of
the paper, i.e. for a paper width of 132 characters, drum will have 132 tracks. A
character set is embossed on the track. One rotation of drum prints one line. Drum
printers are fast in speed and can print 300 to 2000 lines per minute.
Chain Printer
In this printer, a chain of character sets is used, hence it is called Chain Printer.
A standard character set may have 48, 64, or 96 characters.
Non-impact Printers
Non-impact printers print the characters without using the ribbon. These printers print
a complete page at a time, thus they are also called as Page Printers.
• Laser Printers
• Inkjet Printers
Laser Printers
These are non-impact page printers. They use laser lights to produce the dots
needed to form the characters to be printed on a page.
Inkjet Printers
Inkjet printers are non-impact character printers based on a relatively new
technology. They print characters by spraying small drops of ink onto paper.
Inkjet printers produce high quality output with presentable features.
They make less noise because no hammering is done and these have many styles of
printing modes available. Color printing is also possible. Some models of Inkjet
printers can produce multiple copies of printing also.
SECONDARY MEMORY DEVICES:
➢ Removable.
FIXED DEVICES:
1. Pen Drive
Pen drive is a portable memory device that uses solid state memory rather than
magnetic fields or lasers to record data. It uses a technology similar to RAM, except
that it is nonvolatile. It is also called USB drive, key drive or flash memory.
COMPUTER SOFTWARE
1. SOFTWARE:
• Application Software
System Software
The system software is a collection of programs designed to operate,
control, and extend the processing capabilities of the computer itself. System
software is generally prepared by the computer manufacturers. These software
products comprise of programs written in low-level languages, which interact with
the hardware at a very basic level. System software serves as the interface
between the hardware and the end users.
Application Software
Application software products are designed to satisfy a particular need of a
particular environment. All software applications prepared in the computer lab can
come under the category of Application software.
Application software may consist of a single program, such as Microsoft's notepad
for writing and editing a simple text. It may also consist of a collection of programs,
often called a software package, which work together to accomplish a task, such as a
spreadsheet package.
2. PROGRAMMING LANGUAGE
Introduction:
Computer language means an artificial language used to write instructions that can
be translated into machine language and then executed by a computer.
1) Machine Language
2) Assemble Language
Machine Language:
The language (in the form of 0’s and 1’s called binary numbers) understood directly
by the computer. It is machine dependent. It is difficult to learn and even more
difficult to write programs.
Assemble Language
The language where the machine codes comprising of 0’s and 1’s are substituted by
symbolic codes (called mnemonics) to improve their understanding. it is the first
step to improve programming structure.
There are five different types of high level Languages are given below.
1) BASIC ( Beginner All Purpose symbolic Instruction Code)
Definition
An operating system is a program that acts as an interface between the user and the
computer hardware and controls the execution of all kinds of programs.
An operating system is a software which performs all the basic tasks like file
management, memory management, process management, handling input and
output, and controlling peripheral devices such as disk drives and printers.
Features:
• An operating system is a program that acts as an interface between the
software and the computer hardware.
• Memory Management
• Processor Management
• Device Management
• File Management
• Security
• Job accounting
Main memory provides a fast storage that can be accessed directly by the CPU.
For a program to be executed, it must in the main memory.
Processor Management
In multiprogramming environment, the OS decides which process gets the
processor when and for how much time. This function is called process
scheduling. An Operating System does the following activities for processor
management −
• Keeps tracks of all devices. Program responsible for this task is known as
the I/O controller.
• Decides which process gets the device when and for how much time.
• Allocates the device in the efficient way.
• De-allocates devices.
File Management
A file system is normally organized into directories for easy navigation and usage.
These directories may contain files and other directions.
Job Accounting
Keeps track of time and resources used by various jobs and/or users.
Interaction with the Operators:
Interaction may take place via the console of the computer in the form of
instructions. The Operating System acknowledges the same, does the
corresponding action, and informs the operation by a display screen.
Error-detecting Aids :
Production of dumps, traces, error messages, and other debugging and error- detecting
methods.
What is Database
The database is a collection of inter-related data which is used to retrieve, insert
and delete the data efficiently. It is also used to organize the data in the form of a
table, schema, views, and reports, etc.
For example: The college Database organizes the data about the admin, staff,
students and faculty etc.
Using the database, you can easily retrieve, insert, and delete the information.
Database Management System
➢ Database management system is a software which is used to manage the
database. For example: MySQL, Oracle, etc are a very popular commercial
database which is used in different applications.
➢ DBMS provides an interface to perform various operations like database
creation, storing data in it, updating data, creating a table in the database
and a lot more.
o Data Updation:
It is used for the insertion, modification, and deletion of the actual data in
the database.
o Data Retrieval:
It is used to retrieve the data from the database which can be used by
applications for various purposes.
o User Administration:
It is used for registering and monitoring users, maintain data integrity,
enforcing data security, dealing with concurrency control, monitoring
performance and recovering information corrupted by unexpected failure.
Characteristics of DBMS
Advantages of DBMS
o Controls database redundancy:
It can control data redundancy because it stores all the data in one
single database file and that recorded data is placed in the database.
o Data sharing:
In DBMS, the authorized users of an organization can share the data
among multiple users.
o Easily Maintenance:
It can be easily maintainable due to the centralized nature of the
database system.
o Reduce time:
It reduces development time and maintenance need.
o Backup:
It provides backup and recovery subsystems which create automatic
backup of data from hardware and software failures and restores the data if
required.
o multiple user interface:
It provides different types of user interfaces like graphical user
interfaces, application program interfaces
Disadvantages of DBMS
Cost of Hardware and Software:
It requires a high speed of data processor and large memory size to
run DBMS software.
Size:
It occupies a large space of disks and large memory to run
them efficiently.
Complexity:
Database system creates additional complexity and requirements.
Higher impact of failure:
Failure is highly impacted the database because in most of the
organization, all the data stored in a single database and if the database is damaged
due to electric failure or database corruption then the data may be lost forever.
There are several types of database management systems. Here is a list of seven
common database management systems:
1. Hierarchical databases
2. Network databases
3. Relational databases
4. Object-oriented databases
5. ER model databases
6. Document databases
7.
Hierarchical Databases
To retrieve a field’s data, we need to traverse through each tree until the record is
found
The hierarchical database system structure was developed by IBM in early 1960s.
While hierarchical structure is simple, it is inflexible due to the parent-child one-
to-many relationship. Hierarchical databases are widely used to build high
performance and availability applications usually in banking and
telecommunications industries.
The IBM Information Management System (IMS) and Windows Registry are two
popular examples of hierarchical databases.
Network Databases
Network database management systems (Network DBMSs) use a network
structure to create relationship between entities. Network databases are mainly used
on a large digital computer. Network databases are hierarchical databases but
unlike hierarchical databases where one node can have one parent only, a network
node can have relationship with multiple entities. A network database looks more
like a interconnected network of records.
In network databases, children are called members and parents are called
occupier. The difference between each child or member can have more than one
parent.
Data in a network database is organized in many-to-many relationships. Some of
the popular network databases are Integrated Data Store (IDS), IDMS (Integrated
Database Management System).
Relational Databases
In relational database management systems (RDBMS), the relationship
between data is relational and data is stored in tabular form of columns and rows.
Each column if a table represents an attribute and each row in a table represents a
record. Each field in a table represents a data value.
Relational databases work on each table has a key field that uniquely
indicates each row, and that these key fields can be used to connect one table of
data to another. Relational databases are the most popular and widely used
databases. Some of the popular DDBMS are Oracle, SQL Server, MySQL,
SQLite, and IBM DB2.
Object-Oriented Model
Some OODBMs were designed to work with OOP languages such as Delphi,
Ruby, C++, Java, and Python.
UNIT-4
NETWORKS
What is Network?
Types of Networks
A LAN is used to connect the computers and other network devices so that the
devices can communicate with each other to share the resources. The resources to
be shared can be a hardware device like printer, software like an application
program or data. The size of LAN is usually small. The various devices in LAN are
connected to central devices called Hub or Switch using a cable.
Now-a-days LANs are being installed using wireless technologies. Such a system
makes use of access point or APs to transmit and receive data.
One of the computers in a network can become a server serving all the remaining
computers called Clients. LAN offers high speed communication of data rates of 4
to 16 megabits per second (Mbps).
MAN (Metropolitan Area Networks)
MAN stands for Metropolitan Area Networks .A MAN is a relatively new class
of network. MAN is larger than a local area network and as its name implies, covers
the area of a single city. MANs rarely extend beyond 100 KM and frequently
comprise a combination of different hardware and transmission media. It can be
single network such as a cable TV network, or it is a means of connecting a number
of LANs into a larger network so that resources can be shared LAN to LAN as well
as device to device.
The two most important components of MANs are security and standardization.
Security is important because information is being shared between dissimilar
systems. Standardization is necessary to ensure reliable data communication.
The Metropolitan Area Networks (MAN) protocols are mostly at the data link level
(layer 2 in the OSI model).
WAN (Wide Area Networks)
Computers connected to a Wide Area Networks are often connected through public
networks, such as the telephone system. They can also be connected through leased
lines or satellites. The largest WAN in existence is the Internet. Some segments of
the Internet, like VPN based extranets, are also WANs in themselves. Finally, many
WANs are corporate or research networks that utilize leased lines.
Numerous WANs have been constructed, including public packet networks, large
corporate networks, military networks, banking networks, stock brokerage
networks, and airline reservation networks.
Organizations supporting WANs using the Internet Protocol are known as Network
Service Providers (NSPs). These form the core of the Internet.
By connecting the NSP WANs together using links at Internet Packet Interchanges
(sometimes called "peering points") a global communication infrastructure is
formed.
WANs (wide area networks) generally utilize different and much more expensive
networking equipment than do LANs (Local Area Networks). Key technologies
often found in WANs (wide area networks) include SONET, Frame Relay, and
ATM.
NETWORK TOPOLOGIES:
Types of Topologies
While making a selection of a particular topology we consider the relative status of
different devices that are to be linked.
In this relationship, all the devices in the network have equal status in
sharing the link. For example, Ring & Mesh topology.
2. Primary-Secondary:
In this, one device controls the traffic and all other devices transmit
through primary device. e.g. Star topology.
Basic Network Topology
The three simple Topology that are combined to form a basic Network Topology.
They are,
1.Bus Topology,
2.Ring Topology and
3.Star Topology.
Bus Topology
The physical Bus Network Topology is the simplest and most widely used of the
network designs. It consists of one continuous length of cable (trunk) that is shared
by all the nodes in the network and a terminating resistor (terminator) at each end
that absorbs the signal when it reaches the end of line. Without a terminator the
electrical signal would reach the end of copper wire and bounce back, causing
errors on the network.
Data communication message travels along the bus in both directions until it is
picked up by a workstation or server NIC. If the message is missed or not
recognized, it reaches the end of the cabling and dissipates at the terminator. Bus
Network Topology requires a multipoint connection .
All nodes on the bus topology have equal access to the trunk. This is accomplished
using short drop cables or direct T-connectors. The number of devices and the
length of the trunk can be easily expanded.
Bus networks are easy to assemble and expand. They only require a small amount
of cable, compared to other network topologies. However, bus networks can suffer
cable breakage, loss of information in the connectors and deficiencies in the
necessary wiring length, often difficult to resolve. Any physical problem in the
network, such as a loose connector, can ground the entire bus network. When bus
topology networks do not close properly, the network tends to experience rebounds
in signal transmission. If the bus topology used, the physical aspects of the network
should always be checked to avoid any problems. Problems with connectors, cables,
and terminators often abound in this type of network.
Ring Topology
The physical ring Topology is a circular loop of point-to-point links. Each
device connects directly to the ring or indirectly through and interface device or drop
cable. Message travel around the ring from node to node in a very organized manner.
Each workstation checks the message for a matching destination address. If the address
doesn't match the node simply regenerates the message and sends it on its way. If the
address matches, the node accepts the message and sends a reply to the originating
sender.
In ring topology, the various nodes are connected in form of a ring or circle
(physical ring), in which data flows in a circle, from one station to another station.
It has no beginning or end that needs to be terminated. In this topology, each device
or node has a dedicated point to point line configuration with only two devices on
either side of it.
Signal is passed along the ring in one direction from one station to another until it
reaches destination. Each device in ring incorporates a repeater. When a device
receives a signal intended for another device, its repeater regenerates the bits and
passes them along.
Star Topology
The physical star Topology uses a central controlling or hub with dedicated legs
pointing in all directions – like points of a star. Each network device has a dedicated
point-to-point link to the central hub. There is no direct link between these
computers and the computers can communicate via central controller only. This
strategy prevents troublesome collisions and keeps the lines of communications
open and free of traffic. Since in the star topology each computer on the network
uses a different cable connection, this type of topology is expandable, only limited
by the number of ports available in the hub (although it is possible to join several
hubs to increase the number of ports ). The expansion of a star topology network
does not present any difficulty, since adding another computer to the network
means nothing more than placing a cable between the computer and the hub. In fact,
the rest of the network users will not even notice the extension.
The routing function is performed by the central controller which centrally controls
communication between any two computers by establishing a logical path between
them. It means that if one computer A wants to send data to another computer B,
Computer A sends the data to the controller & this controller then sends the data to
computer B.
This Topology, obviously, require a great deal of cabling. This design provides an
excellent platform for reconfiguration and trouble-shooting. Changes to the network
are as simple as plugging another segment into the hub and a break in the LAN is
easy to isolate and doesn't affect the rest of the network.
Mesh Topology
The mesh network topology uses redundant connections between the node
on the network, applying a fault tolerance strategy. Each node included in the
network connected to the rest of the node, which explains why this type of topology
requires extensive wiring. This type of topology can cope with the failure of one or
two segments of the network without interrupting traffic since it has redundant
lines.
Mesh networks are more expensive and difficult to install than other types of
network topologies due to the large number of connections they require. In most
cases, networks that use this redundant connection strategy included within the
broader hybrid networks. In a hybrid network, only the most essential and crucial
servers and computers configured with redundant connections. In this way, the
fundamental segments of the corporate network protected without using multiple
lines for each of the computers connected to the network.
MICROWAVE TRANSMISSION:
In order to maximize the strength of such a high frequency signal and, therefore, to
increase the distance of transmission at acceptable levels, the radio beams are
highly focused. The transmit antenna is centered in a concave, reflective metal dish
which serves to focus the radio beam with maximum effect on the receiving
antenna. The receiving antenna, similarly, is centered in a concave metal dish,
which serves to collect the maximum amount of incoming signal.
A satellite is a body that revolves around the earth just in same way earth
revolves around the sun.
The paths in which satellites move are called orbits. The orbit can be equatorial,
inclined or polar. The period of a satellite, i.e. the time required for a satellite to
make a complete trip around the earth.
The signal which is being transmitted back to the receiving earth station is called as
the downlink. Thus, downlink frequency is the frequency used to transmit the
signal from satellite to earth station.
Computer Network Architecture is defined as the physical and logical design of the
software, hardware, protocols, and media of the transmission of data. Simply we
can say that how computers are organized and how tasks are allocated to the
computer.
The two types of network architectures are used:
1. Peer-To-Peer network
2.Client/Server network
Peer-To-Peer network
Peer-To-Peer network is a network in which all the computers are linked together with
equal privilege and responsibilities for processing the data.
➢ Peer-To-Peer network is useful for small environments, usually up to 10
computers.
➢ Peer-To-Peer network has no dedicated server.
Special permissions are assigned to each computer for sharing the resources, but
this can lead to a problem if the computer with the resource is down.
Advantages of Peer-To-Peer Network:
Client/Server Network
Client/Server network is a network model designed for the end users called clients,
to access the resources such as songs, video, etc. from a central computer known
as Server. The central controller is known as a server while all other computers in
the network are called clients.
➢ A server performs all the major operations such as security and network
management.
➢ A server is responsible for managing all the resources such as files,
directories, printer, etc.
➢ All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to
the server for the permission. The server sends the response to the client 1 to
initiate its communication with the client 2.
Advantages of Client/Server network:
➢ A Client/Server network contains the centralized system. so we can back
up the data easily.
➢ A Client/Server network has a dedicated server that improves the
overall performance of the whole system.
➢ Security is better in Client/Server network as a single server administers the
shared resources.
➢ It also increases the speed of the sharing resources.
Disadvantages of Client/Server network:
➢ Client/Server network is expensive as it requires the server with
large memory.
➢ A server has a Network Operating System to provide the resources to the
clients.
➢ The cost of NOS is very high.
Data communication refers to the exchange of data between a source and a receiver
via form of transmission media such as a wire cable. Data communication is said to
be local if communicating devices are in the same building or a similarly restricted
geographical area.
The device that transmits the data is known as source and the device that
receives the transmitted data is known as receiver. Data communication aims at the
transfer of data and maintenance of the data during the process but not the actual
generation of the information at the source and receiver. Data can exist in a variety
of forms such as numbers, text, bits and bytes.
Components of data communication system
2. Sender:
1. Data sequencing.
It refers to breaking a long message into smaller packets of fixed size. Data
sequencing rules define the method of numbering packets to detect loss or
duplication of packets, and to correctly identify packets, which belong to same
message.
2. Data routing.
Data routing defines the most efficient path between the source and destination.
3. Data formatting.
Data formatting rules define which group of bits or characters within packet
constitute data, control, addressing, or other information.
4. Flow control.
A communication protocol also prevents a fast sender from overwhelming a
slow receiver. It ensures resource sharing and protection against traffic
congestion by regulating the flow of data on communication lines.
5. Error control.
These rules are designed to detect errors in messages and to ensure transmission of
correct messages. The most common method is to retransmit erroneous message
block. In such a case, a block having error is discarded by the receiver and is
retransmitted by the sender.
These rules ensure that all the nodes get a chance to use the communication lines
and other resources of the network based on the priorities assigned to them.
These rules define how connections are established, maintained and terminated
when two nodes of a network want to communicate with each other.
8. Data security.
Providing data security and privacy is also built into most communication
software packages. It prevents access of data by unauthorized users.
9. Log information.
1. Bandwidth.
The two wires are typically ``twisted'' together in a helix to reduce interference
between the two conductor.
To reduce interference, the twisted pair can be shielded with metallic braid. This
type of wire is known as Shielded Twisted-Pair (STP) and the other form is known
as Unshielded Twisted-Pair (UTP).
The oldest and the most popular use of twisted pair are in telephony. In LAN it is
commonly used for point-to-point short distance communication (say, 100m) within
a building or a room.
COAXIAL CABLE:
Coaxial cables are the guided media that carries the signal
of higher frequency range compared to twisted pair cable. Coaxial cables are also
called coax. Two types of coaxial cables are widely used: 50 ohm cable and 75 ohm
cable. 50 ohm cable is used for digital transmission and 75 ohm cable is used for
analog transmission.
Coaxial cables do not produce external electric and magnetic fields and are not
affected by them. This makes them ideally suited, although more expensive, for
transmitting signals. This cable is suitable for point to point or point to multipoint
applications. In fact this is the most widely used medium for local area networks.
These cables are costlier than twisted pair cables but they are cheaper than the optical
fiber cables.
Applications of Co-axial Cables:
(3) Cable TV
Fibre Optic
Fiber optic cable is a cable that uses electrical signals for communication. It is a
cable that holds the optical fibers coated in plastic that are used to send the data by
pulses of light. The plastic coating protects the optical fibers from heat, cold,
electromagnetic interference from other types of wiring. Fibre optics provide faster
data transmission than copper wires.
Basic elements of Fibre optic cable:
Core:
The optical fibre consists of a narrow strand of glass or plastic known as a core. A
core is a light transmission area of the fibre. The more the area of the core, the more
light will be transmitted into the fibre.
Cladding:
The concentric layer of glass is known as cladding. The main functionality of the
cladding is to provide the lower refractive index at the core interface as to cause the
reflection within the core so that the light waves are transmitted through the fibre.
Jacket:
The protective coating consisting of plastic is known as a jacket. The main purpose of
a jacket is to preserve the fibre strength, absorb shock and extra fibre protection.
Advantages of pfiber otic cable :
Greater Bandwidth:
The fibre optic cable provides more bandwidth as compared copper.
Therefore, the fibre optic carries more data as compared to copper cable.
Faster speed:
Fibre optic cable carries the data in the form of light. This allows the fibre
optic cable to carry the signals at a higher speed.
Longer distances:
The fibre optic cable carries the data at a longer distance as compared to
copper cable.
Better reliability:
The fibre optic cable is more reliable than the copper cable as it is immune to any
temperature changes while it can cause obstruct in the connectivity of copper cable.
Thinner and Sturdier:
Fibre optic cable is thinner and lighter in weight so it can withstand more pull
pressure than copper cable.
INTERNET
When you type in “http:// .com” into your browser, your browser somehow
needs to know that this URL (i.e. uniform resource locator) actually means the
ip address. So what the browser does is that it contacts the DNS (domain name
service) and looks up the ip address for that url. You can think of the DNS as a
phone book.
Once the ip address is retrieved, your browser attempts to connect to the web server
by opening up a socket connection. Without getting into the details, think of this as
you physically calling the tall building (i.e. web server) and seeing if they’re still
open. If someone responds, then you know they’re open and you’re connected.
Now that your browser and the server have a open connection with each other, your
request to a specific article on ESPN can be made. But before your request can be
sent over the internet, it has to follow a set of rules that describe how the request
must be formatted. These set of rules are known as TCP/IP and the HTTP protocol.
Every request made by your browser and every response sent by a web server must
first be chopped up into small packets of data.
Along the way, there are routers (and other similar devices) that basically act as
traffic cops and direct the packets to the correct path leading to the ip address.
Once all the packets of data arrive at the web server, the web server will look for
the specific article, similar to how you’d look for a file in a cabinet drawer. Once
the file has been located, the web server will chop up the response into data packets
again, and send them back to your browser.
Finally, when all the data packets arrive back at your browser, your browser will
reassemble all packets into the HTML, CSS, JavaScript, and image files that
represent the article. Once these files are processed, and see the article displayed on
screen.
INTERNET ADDRESSING
IP ADDRESS:
Every machine on a network has a unique identifier. Just as you would
address a letter to send in the mail, computers use the unique identifier to send data to
specific computers on a network. Most networks today, including all computers on the
Internet, use the TCP/IP protocol as the standard for how to communicate on the
network. In the TCP/IP protocol, the unique identifier for a computer is called its IP
address.
There are two standards for IP addresses: IP Version 4 (IPv4) and IP Version 6
(IPv6). All computers with IP addresses have an IPv4 address, and many are
starting to use the new IPv6 address system .
How does your computer get its IP address?
An IP address can be either dynamic or static. A static address is one that you
configure yourself by editing your computer's network settings. This type of address
is rare, and it can create network issues if you use it without a good understanding
of TCP/IP. Dynamic addresses are the most common. They're assigned by the
Dynamic Host Configuration Protocol (DHCP), a service running on the network.
DHCP typically runs on network hardware such as routers or dedicated DHCP
servers.
Dynamic IP addresses are issued using a leasing system, meaning that the IP
address is only active for a limited time. If the lease expires, the computer will
automatically request a new lease. Sometimes, this means the computer will get a
new IP address, too, especially if the computer was unplugged from the network
between leases. This process is usually transparent to the user unless the computer
warns about an IP address conflict on the network (two computers with the same IP
address). An address conflict is rare, and today's technology typically fixes the
problem automatically.
DOMAIN NAME:
Domain names work because they provide computer users with a short name that is
easy to remember. Users enter web addresses into the URL field at the top of their
browser's page from left to right. The domain name itself is read from right to left
according to the naming hierarchy discussed below. This link provides directions to
the network, which ultimately results in a successful page load at the client end of
the transaction.
Many servers use a three-letter naming convention for top-level domains, and they
are separated from sub-domains by a dot. The significance of the top-level domain is
the most important for new users to grasp. It identifies the highest part of the naming
system used on the Internet. This naming system was originally created to identify
countries and organizations as well as categories.
The most common categories are easily recognized by new computer users, and
they include:
• .com
• .org
• .edu
• .net
• .mil
A significant expansion of the top-level domains occurred, and they now include:
• .biz
• .museum
• .info
• .name
Country codes are also easily recognizable to new users because the abbreviations
are the same ones used for other purposes. The organization of the domain name
hierarchy and the ability to reserve them for only one purpose has already
undergone several modifications. Discussions and debates concerning the
availability and affordability of domain names can be expected to continue.
Sub-domains are organized to the left of the top-level domain, and this is the part of
the domain system that is most recognizable to humans. It is common to see several
levels of sub-domains, and some countries developed specific conventions of
organization to communicate information within their internal naming systems.
URL (Uniform Resource Locator):
End users use URLs by typing them directly into the address bar of a browser or by
clicking a hyperlink found on a webpage, bookmark list, in an email or from
another application.
•a query or search parameters used -- commonly found in URLs for search results.
Parts of a URL
• Host name or domain name. The unique reference the represents a webpage.
For this example, whatis.techtarget.com.
• Port name. Usually not visible in URLs, but necessary. Always following
a colon, port 80 is the default port for web servers, but there are other options.
For example, :port80.
• Path. A path refers to a file or location on the web server. For this
example, search/query.
The WWW is the brainchild of Tim Berners Lee a CERN who had the idea
of creating an electronic web of research information. The web is currently the
fastest growing Internet information system, with new resources being added
regularly.
The web relies on a set of protocols, conventions and software to operate. The web
is a distributed system of delivering linked documents over the Internet.
From the user's point of view web consists of a vast worldwide collection of
documents called web pages. These web pages reside on different sites or machines
all over the world.
Each web page can contain link to other pages anywhere in the world. By clicking
on such link user can access another web page. This kind of link can be in form of
string of text or picture, sound, movie clip etc. Such a text or image that enables the
user to link to another web page is called hyperlink.
The string of text that points to another web page is called hypertext. The
difference between the normal text and hypertext is that, when you take the mouse
pointer over it, it changes into a hand shaped cursor. Such a text is sometime,
underlined and blue is colour.
Hypermedia is enhanced form of a hyperlink which not only links to the other
pages or other sections within the same page but can also link with various medium
like sound, animation, movie clip etc, Hypermedia is grouping of different media
like sound, graphics, animations and text in a single file.These hyperlinks are
created with the help of specialized language called Hypertext Mark up Language
(HTML).
In order to access these web pages on different sites, each of these pages has a
specific address called Uniform Resource Locator (URL).These Web pages are
viewed with a program called a browser.
WEB BROWSER:
A web browser is a software program that allows a user to locate, access, and
display web pages. In common usage, a web browser is usually shortened to
"browser." Browsers are used primarily for displaying and accessing websites on
the internet, as well as other content created using languages such as Hypertext
Markup Language (HTML) and Extensible Markup Language (XML).
Browsers translate web pages and websites delivered using Hypertext Transfer
Protocol (HTTP) into human-readable content. They also have the ability to display
other protocols and prefixes, such as secure HTTP (HTTPS), File Transfer Protocol
(FTP), email handling (mailto:), and files (file:).
In addition, most browsers also support external plug-ins required to display active
content, such as in-page video, audio and game content. A variety of web browsers
are available with different features, and are designed to run on different operating
systems.
Common browsers include Internet Explorer from Microsoft, Firefox from Mozilla,
Google Chrome, Safari from Apple, and Opera.
INTERNET PROTOCOLS
TCP/IP
TCP / IP is a suite, or family, of protocols that govern the way data is transmitted
across networks. TCP / IP protocols work together to break the data into small
pieces tht can be efficiently handled by the network, communicate the destination of
the data to the network, verify the receipt of the data on the other end of the
transmission, and reconstruct the data in its original form.
FTP (File Transfer Protocol) is the protocol, or set of rules, which enables files to
be transferred from one computer to another. It is part of the TCP / IP protocol
suite. Files that are available for FTP are stored on computers called FTP servers.
An FTP client program is an interface that allows the user to locate the
file(s) to be transferred and initiate the transfer process. It is a good idea to have
current virus checking software and compression / decompression software before
downloading files. Through anonymous FTP, users have access to many types of
files including shareware, freeware, upgrades and documents.
HTTP is an acronym for Hypertext Transfer Protocol. HTTP is the set of rules, or
protocol, that enables hypertext data to be transferred form one computer to
another, and is based on the client / server principle. Hypertext is text that is coded
using the Hypertext is text that is coded using the Hypertext Markup Language
(HTML). HTTP enables users to retrieve a wide variety of resources such as text,
graphics, sound, animation and other hypertext documents, and allows hypertext
access to other Internet protocols.
WAIS is an Internet search tool that has the capability of searching many databases
at one time. The databases to be searched can be determined by the user. When
WAIS completes a search, it is actually searching an index of the database. A
WAIS database index is created by a person.
WAIS retrieves all items from the chosen databases that contain many of
the words in the search phrase, provided that the words in the search phrase appear
in the indexes of the selected databases. A relevancy ranking is assigned to each
retrieved item to help the user determine which items may be most useful. WAIS
can be accessed via Telnet, Gopher or a WAIS client program, and increasingly
WAIS indexed databases are accessible through the World Wide Web.
HYPER TEXT TRANSFER PROTOCOL
HTTP stands for HyperText Transfer Protocol.It is a protocol used to access the
data on the World Wide Web (www).The HTTP protocol can be used to transfer the
data in the form of plain text, hypertext, audio, video, and so on.This protocol is
known as HyperText Transfer Protocol because of its efficiency that allows us to
use in a hypertext environment where there are rapid jumps from one document to
another document.
HTTP is similar to the FTP as it also transfers the files from one host to another
host. But, HTTP is simpler than FTP as HTTP uses only one connection, i.e.,
no control connection to transfer the files.HTTP is used to carry the data in the
form of MIME-like format.
HTTP is similar to SMTP as the data is transferred between client and server. The
HTTP differs from the SMTP in the way the messages are sent from the client to
the server and from server to the client. SMTP messages are stored and forwarded
while HTTP messages are delivered immediately.
Features of HTTP:
Connectionless protocol:
Stateless:
HTTP is a stateless protocol as both the client and server know each other only
during the current request. Due to this nature of the protocol, both the client and
server do not retain the information between various requests of the web pages.
HTTP Transactions
The above figure shows the HTTP transaction between client and server. The client
initiates a transaction by sending a request message to the server. The server
replies to the request message by sending a response message.
Messages
HTTP messages are of two types: request and response. Both the message
types follow the same message format.
Request Message:
The request message is sent by the client that consists of a request line,
headers, and sometimes a body.
Response Message:
The response message is sent by the server to the client that consists
of a status line, headers, and sometimes a body.
E.mail
Email is a service which allows us to send the message in electronic mode over the
internet. It offers an efficient, inexpensive and real time mean of distributing
information among people.
E-Mail Address:
Each user of email is assigned a unique name for his email account.
This name is known as E-mail address. Different users can send and receive
messages according to the e-mail address.
The first five lines of an E-mail message is called E-mail header. The header part
comprises of following fields:
From
The From field indicates the sender’s address i.e. who sent the e-mail.
Date
The Date field indicates the date when the e-mail was sent.
To
The To field indicates the recipient’s address i.e. to whom the e-mail is
sent.
Subject
The Subject field indicates the purpose of e-mail. It should be precise and to the
point.
CC
CC stands for Carbon copy. It includes those recipient addresses whom we want to
keep informed but not exactly the intended recipient.
BCC
BCC stands for Black Carbon Copy. It is used when we do not want one or more
of the recipients to know that someone else was copied on the message.
Greeting
Text
It represents the actual content of the message.
Signature
This is the final part of an e-mail message. It includes Name of Sender, Address,
and Contact Number.
Advantages:
Reliable
Many of the mail systems notify the sender if e-mail message was undeliverable.
Convenience
There is no requirement of stationary and stamps. One does not have to go to
post office. But all these things are not required for sending or receiving an mail.
Speed:
E-mail is very fast. However, the speed also depends upon the underlying
network.
Inexpensive:
The cost of sending e-mail is very low.
Printable:
It is easy to obtain a hardcopy of an e-mail. Also an electronic copy of an e-mail
can also be saved for records.
Global:
E-mail can be sent and received by a person sitting across the globe.
Generality:
It is also possible to send graphics, programs and sounds with an e-mail.
Disadvantages
Forgery
E-mail doesn’t prevent from forgery, that is, someone impersonating the sender,
since sender is usually not authenticated in any way.
Overload
Convenience of E-mail may result in a flood of mail.
Misdirection
It is possible that you may send e-mail to an unintended recipient.
Junk
Junk emails are undesirable and inappropriate emails. Junk emails are sometimes
referred to as spam.
No Response
It may be frustrating when the recipient does not read the e-mail and respond on a
regular basis.
Working of E-mail
Email working follows the client server approach. In this client is the mailer
i.e. the mail application or mail program and server is a device that manages emails.
E-mail System
• Mailer
• Mail Server
• Mailbox
Mailer
Mailbox is generally a folder that contains emails and information about them.
Working principle:
• Person A composes the messages using a mailer program i.e. mail client and
then select Send option.
• The message is routed to Simple Mail Transfer Protocol to person B’s mail
server.
• The mail server stores the email message on disk in an area designated for
person B.The disk space area on mail server is called mail spool.
• It will periodically poll the POP server to check if any new email has arrived
for B.As in this case, person B has sent an email for person B, so email is
forwarded over the network to B’s PC. This is message is now stored on
person B’s PC.
Web Page
Web page is a document available on world wide web. Web Pages are
stored on web server and can be viewed using a web browser.A web page cans
contain huge information including text, graphics, audio, video and hyper links.
These hyper links are the link to other web pages.
Static web pages are also known as flat or stationary web page. They are loaded on
the client’s browser as exactly they are stored on the web server. Such web pages
contain only static information. User can only read the information but can’t do any
modification or interact with the information.
Static web pages are created using only HTML. Static web pages are only used
when the information is no more required to be modified.
Scripting Laguages
Scripting languages are like programming languages that allow us to write
programs in form of script. These scripts are interpreted not compiled and executed
line by line.Scripting language is used to create dynamic web pages.
Client-side Scripting
Client-side scripting refers to the programs that are executed on client-side.
Client- side scripts contains the instruction for the browser to be executed in response
to certain user’s action.
Client-side scripting programs can be embedded into HTML files or also can be
kept as separate files.
1. JavaScript
It is a prototype based scripting language. It inherits its naming
conventions from java. All java script files are stored in file having .js extension.
2. ActionScript
3. Dart
It is an open source web programming language developed by Google. It
relies on source-to-source compiler to JavaScript.
4. VBScript
It is an open source web programming language developed by
Microsoft. It is superset of JavaScript and adds optional static typing class-based
object oriented programming.
Server-side Scripting
Server-side scripting acts as an interface for the client and also limit the
user access the resources on web server. It can also collects the user’s
characteristics in order to customize response.
1. ASP
Active Server Pages (ASP)is server-side script engine to create
dynamic web pages. It supports Component Object Model (COM) which enables
ASP web sites to access functionality of libraries such as DLL.
2. ASP.net
4. Java
Java Server Pages are used for creating dynamic web applications. The
Java code is compiled into byte code and run by Java Virtual Machine (JVM).
5. Python
It supports multiple programming paradigms such as object-oriented, and
functional programming. It can also be used as non-scripting language .
UNIT-5
Applications &computer security
Computer at Home
Computer can be used at home in the many different ways. Computer can be used
at home in the following ways:
1. Home Budget
You can easily calculate your expenses and income with the help of a software like
Microsoft Excel. In MS Excel you can prepare a simple worksheet to calculate
your daily expenses and income.
2. Computer Games
You can watch movies, hear songs and find information on Internet. Video and
audio songs, movies, TV shows or dramas are some of the entertainment media
that can be accessed by internet enabled computer.
4. Information
You can find any type of information from Internet. You can download books to
improve your knowledge. You can use search engine, specially the giant Google
Search Engine, to find information you want. Internet is a huge database of
knowledge on every topic.
5. E-Mail
You can chat with your friends on Internet by instant messaging. You can also
talk with them.
7. Searching For Jobs
You can search jobs sitting at home and browsing internet on your computer.
There are many job searching websites. Most of these websites provide daily Email
in your inbox with the jobs postings of your interest.
8. Online Shopping
With the help of your computer and internet, you can buy any thing online and pay
by credit cards.
9. Online Banking
E-Banking or online banking is the great facility for maintaining your financial
transactions online. Moreover, you can pay your utility bills from your account
while sitting at home.
10. Starting Home Based Business
You can use computer with internet to start and run a home based business or
you can use computers for online jobs staying at home.
Computers In Education:
Many web sites provide online education. You can read or download educational
material and books. For example, Virtual University of Pakistan is an Online
Educational Institution. Students use internet to access VU website. The students
log in to their accounts and e-mail boxes. They interact with different teachers
online. They receive and submit their assignments and work through internet to
their teachers. Email systems or online chat systems are used for instant
communication between students and teachers.
4. Research
Computers are also used for research work. Internet is a huge source of
information on any topic. Students of any level can use internet to access useful
information about their projects and research work. Moreover different researchers
can share their research work with other researchers using computers and Internet.
Researchers use computers to organize and store their research materials in
computers.
5. Institute Administration
Computers are being used to perform many tasks in educational institutions, easily
and quickly:
Hospital Administration
Computer can be used to store the medical history of the patients. Medical history
is very important for patients as well as doctors. Doctors may better prescribe the
medicines on the basis of the medicines used in past for a particular patient and the
results obtained. Database Management System software is used to store Patient
records efficiently.
Patient records and history are stored on computer databases in the medical field.
The medical history of a patient includes physical symptoms, diagnoses,
treatments, and even family medical history.
Details of the medications prescribed are stored together with details of any that
can not be prescribed, such as an allergy to penicillin.
Appointments are scheduled using a computer database.
Billing information is also stored.
Hospitals and surgeries depend on computers for administrative and financial
functions.
Monitoring Systems
Many computerized devices are used to monitor the blood pressure, heartbeat and
brain of the patients. Computers guide in some surgical operations, too. For
example in laparoscopic surgery, the surgeon inserts the medical tools and a small
camera, and conducts the operation with the help of computers and monitors.
Computers also monitor heart rates, pulse rates and brain readings. Therefore, we
conclude that computers make this possible to deal with such complicated
operations. It would be virtually impossible for a human to do this.
Diagnosis of Diseases
Computers are being used to diagnose diseases with the help of software. There
are some Medical Software to diagnose diseases and prescribe medicine on the
basis of symptoms.
Life Support system
Life support systems are used to help disabled persons, for example hearing aid
device for deaf people. Latest life support devices use computer technology to help
the disable people, to overcome their disabilities.
Faster and Cheaper Communications
Doctors and other staff can use internet to communicate to doctors in other parts of
the world, for sharing information on medical topics or even about a particular
patient case. They can exchange pictures, reports and other documents, too.
Clinical Image Processing
Confidentiality
It is similar to Trojan Horse, but Logic bombs have some specialty; these
include a timing device and hence it will go off only at a particular date and time.
Does Virus How Affect?
A virus can affect your computer system. The ways are mentioned below −
• By downloading files from the Internet.
Impact of Virus
• Destructs data.
Virus Detection
• Use of Firewalls.