0% found this document useful (0 votes)
157 views163 pages

Computer Notes by PositiveVibesPunjabBaljinder Sir Printable Form

The document provides an overview of computers, including their definition, history, and development across various generations. It details significant computing devices from the mechanical era, such as the abacus and Pascal's adding machine, to electronic computers like ENIAC and UNIVAC. Additionally, it covers computer architecture, components, and types of processors, highlighting the evolution of technology from vacuum tubes to microprocessors.

Uploaded by

avinodchoudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
157 views163 pages

Computer Notes by PositiveVibesPunjabBaljinder Sir Printable Form

The document provides an overview of computers, including their definition, history, and development across various generations. It details significant computing devices from the mechanical era, such as the abacus and Pascal's adding machine, to electronic computers like ENIAC and UNIVAC. Additionally, it covers computer architecture, components, and types of processors, highlighting the evolution of technology from vacuum tubes to microprocessors.

Uploaded by

avinodchoudhary
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 163

Note:- All rights reserved.

No part of this NOTES may


be reproduced or transmitted in any form or by any Introduction to Computer:-
means, photocopying , recording, or otherwise, without
the prior permission in writing of the Owner.(Positive  The term is derived from the word “ Compute”. The
Vibes Punjab). compute means to calculate
Therefore the term Computer can logically be
applied to any Calculating device.
The term ' computer' is derived from Latin
language

Q:The term computer is derived from Q: The word “Computer” comes from the
word “compute”, which means ______.
A) Latin language
B) Sanskrit language
(a) To assume
C) Greek language
D) German language (b) To input
(c) To combine
(d) To calculate
(e) To add

Definition of computer:-
Full Form Of Word Computer is:-
A computer is an electronics machine or devices that
automatically accepts data and process it and gives the
output result under the instruction.
Development of COMPUTERS Mechanical ERA
• The development of computers can be
broadly classified into twoeras: 1. Abacus
2. Pascaline
1. Mechanical era 3. Analytical Engine
4. Tabulating Machine
2. Electronic era 5. Mark - I

History of computer:- History of computer:-


Abacus: -(ਅਬੈਕੱਸ)-
Essentially there are three types of
This was first mechanical device developed in 3500 BC.
calculating devices viz manual, mechanical and
The type of Abacus most commonly used today
automatic.
was invented in China around the 16th century
Abacus: -(ਅਬੈਕੱਸ)-
The abacus also called a counting frame, is a calculating
tool.
 The known creator of the newer abacus Tim Cranmer.
He made it in 1962. The inventor of the first abacus is
unknown.

History of computer:-
Pascal‘s Adding machine: --
Q: Abacus was invented in _____?

A: England
B: America
C: Germany
D: China
History of computer:- History of computer:-
Pascal‘s Adding machine: --
First mechanical Adding Machine.
 To perform operations, it employed counter wheels.
A popular mechanical calculator, capable of performing
 There were two sets of six dials or counter wheels
addition, and subtraction.
to represent decimal numbers.
 developed by the great French philosopher and
scientist Blaise Pascal in 1642.  It was capable of performing addition and

Mechanical device included blaise PASCAL’s adding subtraction automatically.

machine (1642) which was operated by dialling wheels  It worked on the principle of pressure of liquid.

and dials.

History of computer:-
Charles Babbage analytical engine (1833-34):--
Q: Pascaline Calculator was invented by a
French scientist and mathematician named
as

1. Sir Mathew Maury


2. Sir Robert Bunsen
3. Sir Gideon Sundback
4. Blaise Pascal

History of computer:- History of computer:-


Charles Babbage analytical engine (1833-34):--
Charles Babbage, English mathematicians, designed a
 A processor capable of performing addition,
mechanical computing machine for automatic
subtraction, multiplication and division.
computation of mathematical tables.
 Memory Unit : It was constructed from decimal
He called this machine ‘DIFFERENCE ENGINE” .
counting wheels. Its capacity was 1000 numbers,
Charles Babbage, considered as the ‘father of the
each number consisting of 50 digits.
modern computer’.
 Several output devices like printer could be
connected.
MARK – I
• This was the first fully automatic calculating
machine designed by Howard Aiken of
Harward University in 1944.

 It was constructed in cooperation with IBM.


 Punched paper tape was used to program and
control the machine.
 It was first successful general purpose digital
computer.
ELECTRONIC ERA
Q: The first electro-mechanical computer
MARK-1 invented was by ______.
1. ENIAC

(a) Charles Pascal


2. EDVAC
(b) John W Mauchly
(c) Howard Aiken 3. UNIVAC

(d) Clifford Berry

ENIAC
Electronic Numerical Integrator andCalculator.
• Invention : it was developed by John W. Mauchly and
J. Presper Eckert.
 First electronic digital computer.
 ENIAC was the first electronic computer used for
general purposes, such as solving numerical
problems.
 ENIAC filled a 20 by 40 foot room, weighed 30 tons,
and used more than 18,000 vacuum tubes.

Q: What is the full form of the first Electronic Q: What was the first electronic computer in
Computer ENIAC? the world?

a. Electrical Numerical Integrator and Calculator (a) ENIAC


(b) EDSAC
b. Electronic Numeric Integrator and Calculator
(c) EDVAC
c. Electrical Numerical Integrated Computer (d) UNIVAC
d. Electro Numeric Integrity Computer
EDVAC
Q: Early computers like ENIAC, EDVAC, and
UNIVAC I all can be classified as _________. • Electronic Discrete Variable Automatic
Computer.
• Invention : this machine was based on stored
a. Third Generation Computers program concept which was first published by John
b. Second Generation Computers Von Neumann.

c. First Generation Computers


 It used binary numbers for its operation.
d. None of the above  Used a mercury delay lines for memory , vacuum
tubes for logic.
 It was used to perform complex scientific calculations.

Q: EDVAC stands for

a. Electronic Data Variable Automatic Computer


b. Electronic Discrete Variable Automatic Computer
c. Electronic Defined Variable Address Computer
d. Electronic Domain Variable Address Computer

UNIVAC
Universal Automatic Computer.
• Invention : It was invented by Eckert and JW Mauchly
in 1951.

 First general purpose electronic computer with large


amount of input and output data.
 UNIVAC was synonymous with "computer.“
 Storage was magnetic tape reels that held 1MB
Q: First Commercially available computer is? Q: UNIVAC is

(A). IBM a. Universal Automatic Computer


(B). MACK b. Universal Array Computer
(C). APPLE c. Unique Automatic Computer
(D). UNIVAC d. Unvalued Automatic Computer

Generations Of Computer-:

COMPUTER GENERATION Generation is term used to distinguished between varying hardware


technologies.
But now a days it includes both hardware & software which
together make up the entire system.

Depending upon the technology used, computers were


classified as follows:-

Generations Period Technology

First Generation 1946-1955 Vacuums Tube

Second Generation 1955-1965 Transistors

Third Generation 1965-1975 Integrated Circuits (ICs)

Forth Generation 1976-1988 Microprocessor/Large Scale


Integration
Fifth Generation Since 1988 Artificial Intelligence
First Generation(1940-1956)
 The first computers used vacuum tubes for circuitry .
 Very Large in Size.
 Air conditioning is required.
 The input of this system was based on punched cards
and paper tape; however, the output was displayed on
printouts.
 Use Machine Language .(Binary System)
 EDSAC, EDVAC, UNIVAC-I and ENIAC computers are
examples of first-generation computing devices.

Q- Chief component of first generation computer was

A) Transistors
B) Vacuum Tubes and Valves
C) Integrated Circuits
D) None of above

Second Generation(1956-1963)
• Transistors was used in this Generation.
• Transistors are made from silicon, Silicon is a
semiconductor.
• Faster than first Generation Computers.
• High Level Language were used, like FORTRAN, COBOL
• Less heat generated.
• Batch Operating System were used.
• IBM 7000 SERIES, HONEYWELL 200 are examples of
these type of computers.
Third Generation(1964-1971)

 Integrated Circuits(ICs) was used in the third generation


of computers.
 The IC was invented by JackKilby.
 This generation of computer was introduced with operating system,
keyboard and monitor.
 Portable.
 Time Sharing Operating System were used.
 More High Level Languages used like PASCAL, FORTAN,
COBOL.
 IBM-360, ICL-1900.

Q- Integrated Circuits (ICs) are related to which


generation of computers?

A) First generation
B) Second generation
C) Third generation
D) Fourth generation

Fourth Generation(1976-1999)
 Microprocessor was used in Fourth Generation.
 In this Generation Very Large Scale Integrated
Circuit( VLSI) are used.
 Third generation computer used keyboard for first time,
while fourth generation computer used mouse for the
first time.
 Operating System like Unix, Windows were used.
 Smaller in Size.
 Programming Language like C ,C++. were used.
 IBM-370, HP-3000
Fifth Generation(2000- onwards)
 Fifth generation computing devices, based on Artificial
Intelligence, are still in development, though there are
some applications, such as voice recognition, that are being
used today.
 ULSI( ULTRA LARGE SCALE INTEGRATION ) technology
were used.
 More User Friendly.
 Portable.
 Internet based applications were Used.
 Super Computer & Robot are the example of this generation.
WHAT IS COMPUTERARCHITECTURE
• Computer Architecture is concerned with the way hardware
components are connected together to form a computer
system.
• Computer Architecture helps us to understand the
functionalities of a system.

• father of computer architecture- John von Neumann

• Which deals with the basic components of a computer like CPU and
CPU organisation.

• It also gives a brief description of motherboard and instruction cycle.

Block Diagram of COMPUTER


Q- The basic operations performed by a computer are

A) Arithmetic operation
B) Logical operation
C) Storage
D) All the above

Various Components of Computer- Various Components of Computer-

Computer is an electronic device which performs tasks given by user with 1. Input unit – Input unit is a unit that accepts any input device. The input
extremely fast speed and accuracy. Like any other device or machine, a device is used to input data (Raw Facts) into the computer system.
computer system has also a number of parts. A computer system can be
blocked into mainly three parts: Function of input unit:
1. It converts inputted data into binary codes.
1. Input Unit
2. It sends data to main memory of computer
2. Central Processing Unit
3. Output Unit
Various Components of Computer-
Q- The brain of any computer system is
2. Central Processing Unit (CPU) – CPU is called the brain of a computer. Its
primary function is execute programs. The program which is to be executed
is a stored in the main memory. A program is a sequence of instructions to
A) ALU
perform a specified task.
B) Memory
CPU can be sub classified into three parts- C) CPU
i .Control unit (CU)
ii. Arithmetic & Logic unit (ALU) D) Control unit

ALU ALU
1. It is a part of CPU which performs most of the data operations. 6. These operations are performed by a special purpose math
processor called floating point unit (FPU).
2. Fundamental arithmetic operations (+, -, x,/)
7. Modern microprocessors contain FPU on the microprocessor chip
itself.
3. Logical operations (OR, AND, NOT, etc)

4. Comparison operations ( = , < , > , <=, >=)

5. Other mathematical operations is such as exponential, logarithmic,


trigonometric etc are not performed by ALU.

Control Unit Memory Unit


1. The control unit (CU) controls all the activities or operations which 1. The memory unit is an essential component in any digital computer
are performed inside the computer system. since it is needed for restoring the programs that are executed by
the CPU.
2. It receives instructions or information directly from the main
memory of the computer. 2. This unit supplies information to other units of the computer when
needed.
3. When the control unit receives an instruction set or information, it
converts the instruction set to control signals then; these signals
3. The memory unit consists of a primary memory and secondary
are sent to the central processor for further processing. memory.
4. The control unit understands which operation to execute,
accurately, and in which order.
The functions of a memory unit are-:
Microprocessor
1. Computer's Central Processing Unit (CPU) built on a single
a) It stores all the data and instructions required for Integrated Circuit (IC) is called a microprocessor.
processing.
2. It is a programmable, multipurpose, clock -driven, register-based
b) It stores intermediate results of a processing. electronic device that reads binary instructions from a storage

c) It stores final results of processing before these results are device called memory, accepts binary data as input and processes
released to an output device. data according to those instructions and provides results as output.
3. The first microprocessor was the Intel 4004, introduced in 1971 by
Ted Hoff and federico faggin.

Microprocessor
Types of Processors
1. First Generation (4 - bit Microprocessors)
2. Second Generation (8 - bit Microprocessor)
3. Third Generation (16 - bit Microprocessor)
4. Fourth Generation (32 - bit Microprocessors)
5. Fifth Generation (64 - bit Microprocessors)

Types of Processors Q- The CISC stands for ___________

• There are two major processor architectures


a) Computer Instruction Set Compliment
1. Complex instruction set computer (CISC) b) Complete Instruction Set Compliment
2. Reduced instruction set computer (RISC) c) Computer Indexed Set Components
d) Complex Instruction set computer
MOTHERBOARD
Q- What is motherboard ?
• A motherboard (also called mainboard, main circuit board, system
board, baseboard, planar board, logic board, or mobo) is the main
printed circuit board (PCB) in general-purpose computers and other a) Scanner and other things are part of motherboard.
expandable systems.
b) Keyboard otherwise known as motherboard.
• Motherboard connect CPU, memory, hard drives, optical drives,
sound cards and other ports and expansion cards directly or via c) A circuit board which connects all the elements.
cables.
d) It is a type of file server.
• It is considered as the backbone of a computer.

Bus Interfere Unit (BIU) Bus Interfere Unit (BIU)


• The BIU Provides a function for transferring data between the
execution unit of the CPU and other components of the computer
Address bus- an element in a computer CPU that transmits
system that lie outside the CPU. the location of stored information.
 The address bus allows the CPU to send the address to
• Every computer system has a three different types of buses to carry RAM.
information from one path to another. Data bus -allows the actual data transfer to the CPU. The
term bus itself refers to the connection between the two
a) Address bus devices that allows them to communicate.
b) Data bus Control bus-In computer architecture, a control bus is part
c) Control bus of the system bus, used by CPUs for communicating with
other devices within the computer.

PORTS
Q- BIU STAND FOR:
• External devices are connected to a computer using cables
and ports. · Ports are slots on the motherboard into which a cable of
a. Bus interface unit external device is plugged in.
b. Bess interface unit
Types of Ports
c. A and B 1. Parallel port
2. Serial port
d. None of these
3. USB port
4. Firewire port
5. Ethernet port
SERIAL PORT Parallel Port

• Serial port allows serial data transfer. In serial data transfer one bit of 1. A parallel port is basically a parallel communication
a data is a transmitted at a time. interface through which information transforms
multiple bits at a time.

2. A parallel interface is used to transfer data at faster rate for high


• It is one of the oldest type of interfaces. speed of peripheral such as a disc and tape

3. It is used for a printers and scanners.


• These are basically used for external modems.

These are also known as printer port.

USB Port FIREWIRE PORT

• Universal serial bus. • These Ports transfer large amount of data at a very high speed.

• Basically it can connect all types of external devices to the computer


• Camcorders and video equipment are connected to the computer
such as mouse, keyboard, printers, speakers etc. through these ports.
• It can connect all kinds of external USB devices such as external hard
disk, printer, scanner, mouse, keyboard etc.
• Minimum 2 ports are there in every computer system.
• USB devices can get power from USB port.

ETHERNET PORT
Q1-The main circuit board of the system unit is the

• It connects to a network and high speed internet.


1. Computer program
• This port resides on Ethernet card. 2. RAM
3. Motherboard
• Data travels at high speed depending upon the network bandwidth. 4. Control unit
5. None of these
Q2-The communication line between CPU memory
and peripherals is called • Q3-On the motherboard, the connection points for

chips are referred to as


1. Bus
2. Line 1. Slots
3. Media 2. Sockets
4. All of the above 3. Ports
4. Lines

• Q4- Which of the following company developed the


microprocessor?

1. Intel
2. IBM
3. Microsoft
4. Apple
5. Google

 A computer memory is just like a human


brain. It is used to store data and
instructions .
 Computer memory is the storage space in
computer where data is to be processed and
instructions required for processing are stored.
 Computer memory is divided into two types:

1. Primary Memory/Volatile Memory


2. Secondary Memory/Non Volatile Memory
Memory vs. Storage

Whereas memory refers to the location of short-term


data.
storage is the component within your computer that
allows you to store and access data on a long-term
basis.
Usually, storage comes in the form of a solid-state
drive or a hard drive.

MCQ?

Q- A place in the computer system where data


programs are temporarily stored

(A) Memory
(B) Portable
(C) Open
(D) Paste

MCQ? MCQ?

Q- The smallest unit of storage is Q- What is approximately a million bytes?

(A) Bug (A) Gigabyte


(B) Byte (B) Kilobyte
(C) Bit (C) Megabyte
(D) Nibble (D) Terabyte
MCQ? MCQ?

Q- A gigabyte is equal to Q- A half byte is known as_____.

(A) 1024 bytes (A) data


(B) 1024 megabytes (B)bit
(C) Million megabytes (C)half byte
(D) Thousand kilobytes (D)nibble

MCQ?
Q- Main memory of computer is –

(A) Internal
(B)External
(C)(A) and (B)both
(D)Auxiliary
(E)None of these

MCQ?
Q- How many types of memory does a
computer have?

(A) 1
(B) 2
(C) 4
(D) 8
MCQ?

Q- Which memory is the actual working


memory?

(A) RAM
(B) ROM
(C) Tab memory
(D) SRAM

MCQ?

Q- Which of the following memories must be


refreshed many times per second?

(A) EPROM
(B)ROM
(C)Static RAM
(D)Dynamic RAM

MCQ?

Q-The programs which are as permanent as


hardware and stored in ROM is known as

(A) ROM ware


(B) Firmware
(C) Software
(D) Hardware
MCQ?
Q- .............. is a type of memory circuitry that
holds the computer’s start-up routine.

a. RIM (Read Initial Memory)


b. RAM (Random Access Memory)
c. ROM (Read Only Memory)
d. Cache Memory

MCQ?

Q- Auxiliary memory is also called

(A) Secondary memory


(B) Primary memory
(C) Third memory
(D) Extra memory
MCQ?
The Magnetic disk and Optical disk are the storage devices that
provide a way to store data for a long duration. Both are categorized
Q- Storage that retains its data after the power under the category of secondary storage devices.
is turned off is referred to as
Magnetic disk:
The Magnetic disk is made of a set of circular platters.
It is covered with a magnetic coating and stores data in
(A) Direct storage
the form of tracks and sectors.
(B) Sequential storage Hard disks, zip disks, and floppy disks are common

(C) Volatile storage examples of magnetic disks.

(D) Non-volatile storage

Optical disk-
It is a storage device in which optical (light)
energy is used.
It is a computer storage disk that stores data
digitally and uses laser beams to read and write
data.
 Example-such as compact discs (CDs) and DVDs.

MCQ?

Q- Which storage device is mounted on ‘reels’?

(A) CD-ROM
(B) Magnetic tape
(C) Hard disk
(D) Floppy disk
MCQ?

Q- Capacity of hard disk is measured in

(A) Gigabytes
(B) Megabytes
(C) Kilobytes
(D) Bytes

floppy disk

 A floppy disk is a magnetic storage medium for computer systems.

 The floppy disk is composed of a thin, flexible magnetic disk

sealed in a square plastic carrier.

 In order to read and write data from a floppy disk, a computer

system must have a floppy disk drive (FDD).

 Since the early days of personal computing, floppy disks were

widely used to distribute software, transfer files, and create back-

up copies of data.

Types of Floppy Disk :

 According to the size, floppy


disks are generally
classified into two:
• 5 .25 -inch disk
• 3 .5- inch disk
 A normal 3½ inch disk can
store 1.44 megabytes of data
MCQ? MCQ?

Q- What is the shape of CDs? Q- The Compact Disk (CD) was invented by

(A) Circular a. Yoshiro Nakamatsu


(B) Hexagonal b. James Russell
(C) Rectangular c. Jean Bartik
(D) Quadrilateral d. Robert Dennard
MCQ?

Q- What is the full form of USB?

1. Universal secured box


2. Universal serial bus
3. Universal securitty block
4. None of the above
MCQ?

Q- Which among the following is the fastest


memory component in a computer?

a. Hard disk
b. Registers
c. Cache Memories
d.RAM

MCQ?
Q- Which of the following correctly lists
computer memory types from highest to
lowest speed?

a. Secondary Storage; Main Memory; Cache Memory; CPU Registers


b. CPU Registers; Cache Memory; Secondary Storage; Main Memory
c. CPU Registers; Cache Memory; Main Memory; Secondary Storage
d. Cache Memory; CPU Registers; Main Memory; Secondary Storage

MCQ? MCQ?
Q-1. The storage capacity of a dual layer blu- Q-2. Which of the following components is
ray disc is read- only?

a.20 GB a. DRAM
b.30 GB b. hard disk
c.40 GB c. RAM
d.50 GB d. ROM
Cache memory is an extremely fast memory type that acts as a It stores and retains data only until a computer is powered up.
buffer between RAM and the CPU.  Small amount of fast memory
Cache memory is used to reduce the average time to access data
 Sits between normally main memory and CPU
from the Main memory.
Cache memory is a small-sized type of volatile computer memory
that provides high-speed data access to a processor and stores
frequently used computer programs, applications and data.

 The CPU initially looks in the Cache for the data it needs
 If the data is there, it will retrieve it and process it
 If the data is not there, then the CPU accesses the system memory and
then puts a copy of the new data in the cache before processing it
 Next time if the CPU needs to access the same data again, it will just
retrieve the data from the Cache instead of going through the whole
loading process again
MCQs?
Q- What is the high speed memory between the main
memory and the CPU called?

a) Register Memory
b) Cache Memory
c) Storage Memory
d) Virtual Memory

MCQs? MCQs?
Q- Whenever the data is found in the cache memory it is Q- When the data at a location in cache is different from the
called as _________ data located in the main memory, the cache is called ___

a) HIT a) Unique
b) MISS b) Inconsistent
c) FOUND c) Variable
d) ERROR d) Fault

Word MCQs?
Q- The transfer between CPU and Cache is ______________
Word-

The memory stores binary information(1's and 0's) in groups a) Block transfer
of bits called words. A word in memory is an entity of bits that move b) Word transfer
in and out of storage as a unit. A memory word is a group of 1's and c) Set transfer
0's and may represent a number, an instruction code, one or more
d) Associative transfer
alphanumeric characters, or any other binary coded information.
MCQs? MCQs?
Q- Which of the following is more quickly accessed? Q- The performance of cache memory is frequently measured
in terms of a quantity called

a) RAM
a. Miss ratio
b) Cache memory
b. Hit ratio
c) DRAM
c. Latency ratio
d) SRAM
d. Read ratio

types of cache memory level COMPUTER REGISTERS


There are three general cache levels:
1. L1 cache, or primary cache, is extremely fast but relatively small, Registers are a type of computer memory used to quickly accept, store,

and is usually embedded in the processor chip as CPU cache. and transfer data and instructions that are being used immediately by

2. L2 cache, or secondary cache, is often more capacious than L1. ... the CPU.

3. Level 3 (L3) cache is specialized memory developed to improve the The registers used by the CPU are often termed as Processor registers.

performance of L1 and L2. A processor register may hold an instruction, a storage address, or any
data (such as bit sequence or individual characters).

COMPUTER REGISTERS TYPES Of COMPUTER REGISTERS

 Computer instructions are executed sequentially one at time.


 It stored in consecutive memory locations.
 Memory Address Registers (MAR):
 Control reads an instruction from specific address in memory It holds the address of the location to be accessed from memory. MAR
and execute it.
and MDR (Memory Data Register) together facilitate the
 Then it reads the next instruction in sequence and executes it, and so on.
communication of the CPU and the main memory.
MCQs? Accumulator:
Q- The register which holds the address of the location In a computer's central processing unit (CPU), the accumulator is a
to or from which data are to be transferred is called register in which intermediate arithmetic and logic results are stored.

A. Index register
Without a register like an accumulator, it would be necessary to write
B. Instruction register
the result of each calculation (addition, multiplication, shift, etc.) to
C. Memory address register main memory, perhaps only to be read right back again for use in the
D. Memory data register next operation. Access to main memory is slower than access to a
register like the accumulator because the technology used for the large
main memory is slower (but cheaper) than that used for a register

TYPES Of COMPUTER REGISTERS Program Counter (PC):


 Program Counter (PC): A program counter is a register in a computer processor that contains
Program Counter (PC) is used to keep the track of execution of the the address (location) of the instruction being executed at the current
program. time.

 It contains the memory address of the next instruction to be fetched. As each instruction gets fetched, the program counter increases its

 PC points to the address of the next instruction to be fetched from the stored value by 1.

main memory when the previous instruction has been successfully After each instruction is fetched, the program counter points to the

completed. next instruction in the sequence.


When the computer restarts or is reset, the program counter normally
reverts to 0.

MCQs? TYPES Of COMPUTER REGISTERS


Q- The size of program counter (PC) is  Instruction Register (IR):
The IR holds the instruction which is just about to be executed.
A.8 bits  The instruction from PC is fetched and stored in IR.
B.12 bits  As soon as the instruction in placed in IR, the CPU starts executing the
C.16 bits instruction and the PC points to the next instruction to be executed.
D.32 bits  General Purpose Registers:

These are numbered as R0, R1, R2….Rn-1, and used to store temporary data during
any ongoing operation
REGISTER NUMBER OF BITS REGISTER NAME FUNCTION MCQs?
SYMBOL
DR 16 Data registers Holds memory Q- The length of a register is called _______
operand
AR 12 Address register Holds address for
memory
AC 16 accumulator Processor register a) word limit
IR 16 Instruction Holds instruction
register code b) word size
PC 12 Program counter Holds address or
instruction c) register limit
TR 16 Temporary Holds temporary
register data d) register size
INPR 8 Input register Holds input
character
OUTR 8 Output register Holds input
character

MCQs?
Q- Which of the following is not a visible register?

a) General Purpose Registers


b) Address Register
c) Status Register
d) MAR

Explanation: MAR or the memory address register is not a visible register. This
register is user inaccessible. It contains the address of the memory block to be read or
written to.
MCQs?

Q- Which of the following information holds the


information before going to the decoder ?

A. Control register
B. Data register
C. Accumulator
D. Address register
INPUT & OUTPUT DEVICES

MCQ? INTRODUCTION

 An Input Devices is a piece of hardware that is used


Q- Which of the following groups consists of only input to enter data into a computer or content into a
computer system.
devices?

There are two types of input, they are :


A. Mouse, Keyboard, Monitor  Manual Input Devices

B. Mouse, Keyboard, Printer  Automatic Input Devices

C. Mouse, Keyboard, Plotter


 An output device is a piece of computer hardware that
D. Mouse, Keyboard, Scanner receives data from a computer and then translates that data
into another form like audio, visual, textual, or hard copy
such as a printed document.

Keyboard
MANUAL INPUT DEVICES
 Keyboard is the most common and widely
Examples of Manual Input Devices:
used for input devices.
 The standard computer keyboards typically
 Keyboard
 Tracker ball contain 101 keys for inputting character sets
 Mouse including alphabets, numbers, symbols, or
 Joystick functions
 Touch screen  Modern keyboard models contain a set
 Scanner number of total keys according to their given
 Digital cameras
standard, described as 101, 104, 105, etc.
 Graphics Tablet
 Microphone  Modern keyboards matching US conventions
typically have 104 keys while the
105 key layout is the norm in the rest of the
world.
KEYBOARD

Buttons on a keyboard are called Keys.

We can type letters, numbers by simply


pressing these keys.

The Keyboard - Standard Keyboard Layout

• Most keyboards use the QWERTY layout, named for Christopher Latham Sholes was an American inventor
the first six keys in the top row of letters. who invented the QWERTY keyboard.

Types of Keys
The different keys on the keyboard are:
1. Alphabetic Keys
2. Numeric Keys
3. Function Keys
4. Control Keys/Modifier Keys
5. Navigation Keys
NUMBER KEYS
ALPHABETIC KEYS
The keys marked with numbers from 0 to 9 are
These are marked with the English alphabets called Number Keys.

from A to Z. There are 26 Alphabetic Keys.

The number keys are also


placed at the right side of the
Keyboard known as Numeric
Keypad.
They are placed closely so that our fingers can reach there easily.

CONTROL KEYS

These keys works in combination with otherkeys


Spacebar Key
* Longest key on the keyboard.

* Used to give spaces between the words.

Cursor Movement keys Caps Lock Key


Used to move the cursor in four direction i.e. up, Used to type the letters in capitals
down, left and right.

UP
LEFT

When you press the Caps


Lock Key the light on the
keyboard will turn ON. If
RIGHT you press it again, the light
DOWN will turn OFF.
Backspace Key
Shift Key
Used to type the letters in capital or small case
without using Caps Lock key.
Used to delete the character to the left of the cursor

Also used to type symbols printed on the top of the


Number Keys.

Enter Key Delete Key

Used to tell the computer that you have Used to erase anything typed from the right side
finished a word or line. It brings the cursor of the cursor.

down to the next line.

MCQ?
Function Keys
Q- ________ keys are present on the top row of the
The Function keys are placed at the keyboard.
top row of the keyboard marked
with F1, F2.......F12 A. Function

They are used to perform special B. Type writer

functions. C. Numeric
D. Navigation
Tab Key The Keyboard - How a Keyboard Works

A key on the keyboard of a computer that is When you press a key:


used to move several spaces at a time or to

move to a particular position in a document The keyboard controller detects the keystroke.

• The controller places a scan code in the keyboard


buffer,indicating which key was pressed.

• The keyboard sends the computer an interrupt


request, telling the CPU to accept the keystroke.
Mouse Mouse
 Mouse is a hand-held pointing Input device. Types Of MOUSE-
A pointing input device enables the user to easily Mechanical mouse
control the movement of the pointer to select items on
a display screen.
Optical mouse
Mouse : the mouse is an input device that was
invented by Douglas engelbert in 1963. Wireless mouse

 A mouse has two buttons, a right and left


one and also a central wheel which
allows you to scroll up and down the
page.

MCQ? Tracker ball-


A trackball is a pointing input device.
Q- The wheel located between the two standard buttons A trackball is a computer cursor control
on a mouse is used to ____ device used in many notebook and laptop
computers

A. Click on web pages


B. Shutdown
Joystick-
 A joystick is an input device commonly used
C. Click and select items
to control video games.
D. Scroll  Joysticks consist of a base and a stick that
can be moved in any direction.
MCQ? MCQ?

Q- A joystick is primarily used to/for Q-Joysticks typically have a button on _______that


is used to select the option pointed by the cursor.
A. control sound on the screen
B. computer gaming. A. Bottom
C. enter text B. Left
D. draw pictures C. Right
D.Top

Digital Camera
 A digital camera takes pictures and
Microphone
can usually record video too.
 A microphone can be used to input sound.

 The pictures it takes and the videos  Microphone is an input


recorder are been stored in files. device to input sound that is then stored in a
digital form.
A digital camera may be considered both
 The microphone is used for various
an input and output device (I/O device) as it
applications such as adding sound to a
can both take pictures (input) and send them to
multimedia presentation or for mixing music.
your computer (output).

Scanners MCQ?
 A scanner is an input device that scans documents such
Q- A light sensitive device that converts drawing, printed
as photographs and pages of text. When a document is
text or other images into digital form is
scanned, it is converted into a digital format.

There are two type of scanners are : A. Keyboard

Flatbed Scanners B. Plotter


C. Scanner
Handheld Scanners
D.OMR
Graphics Tablet Touch screen-
 A touch screen is a computer display screen that serves
 Graphics tablets are often used by graphics designers . as an input device. When a touch screen is touched by a
 A graphics tablet (also known as a digitizer, drawing
finger or stylus, it registers the event and sends it to a
tablet, drawing pad, digital drawing tablet, pen tablet,
or digital art board) is a computer input device that enables a controller for processing..
user to hand-draw images, animations and graphics, with a
 Touch screens are easy to use and this often been found
special pen-like stylus, similar to the way a person draws
images with a pencil and paper. in public places, such as banks, ATMs, etc

Light Pen MCQ?


Light Pen (similar to the pen) is a pointing device which is
used to select a displayed menu item or draw pictures on the
Q- The _____________ pen is a small input device used to
monitor screen. select and display objects on a screen.

It consists of a photocell and an optical system placed in a


small tube. A. Ink
B. Magnetic
C. Light
D. None of the above

AUTOMATIC INPUT DEVICES Magnetic Ink Character Recognition (M.I.C.R)

 Magnetic Ink Character Recognition are often


Examples of Automatic Input Devices: use in bank to check the cheque number.

 This will been provides a high level of the security.


 Magnetic Ink Character Recognition (M.I.C.R)
 Optical Character Recognition (O.C.R)  The M.I.C.R will only recognize numbers printed in
 Optical Mark Reader (O.M.R)
a standard font by using the magnetic ink for checking.
 Magnetic Stripe Readers
 Barcode Readers The MICR line is a group of three numbers, which are the check
number, account number, and bank routing number.
MCQ? Optical Character Recognition (O.C.R)
 Optical Character Recognition, or OCR, is a technology
Q- In MICR, C stands for that enables you to convert different types of documents,
such as scanned paper documents, PDF files or images
A. code captured by a digital camera into editable and searchable
B. color data.
C. computer
D. character

Optical Mark Reader (O.M.R)


Barcode Readers
 Optical mark recognition (also called optical mark  A barcode reader (or barcode scanner) is an optical
reading and OMR). scanner that can read printed barcodes, decode the
 This popular recognition technology is used for collecting
data contained in the barcode and send the data to
data from “fill-in-the-bubble” forms such as educational tests,
surveys, assessments, evaluations, and many other multiple a computer. Like a flatbed scanner.
choice forms.

OUTPUT DEVICES
Magnetic Stripe Readers
Examples of Output Devices :
 Magnetic strips are usually found at the
back of most credit & debit cards.  Monitors
 Printers
 The Magnetic Strip Reader can read personal
 Laser Printers
details about the card number such as account
 Ink-Jet Printers
number and name.
 Dot-Matrix Printers

 Plotters

 Speakers
MCQ? Output Types:

1. Softcopy is an electronic copy of some type of


Q- Using output devices one can ____
data, such as file viewed on a computer's

A. Input data display like Monitor, LCD etc.


B. Store data 2. Hard copy- It is a paper that has the required
C. Scan data information mostly a printed version of
D. View or print data
information.
3. Printer is a device that can convert a soft
copy into a hard copy

Monitor Monitor

 A monitor (or screen) is the most common use for output  A monitor usually known as the visual display Unit (VDU)
devices.
 The display device in modern monitors is typically a thin
 A computer monitor is an output device that displays
information in pictorial form. film transistor liquid crystal display (TFT-LCD)

 Older monitors used a cathode ray tube (CRT).


 The picture on a monitor is made up of thousands of tiny
colored dots called pixels.  Monitors are connected to the computer via VGA (Video

 The higher the number of pixels, the better quality of the Graphics Array)
output.

Printers- 2. Non Impact Printer- Non-Impact printers don't uses any


A printer is an output device that prints paper documents. direct contact between ink ribbon and paper.
This includes text documents, images, or a combination of
They used technologies such as laser, electrostatic,
both.
chemical, and inkjet.
There are two types of printers −
examples of the Non-Impact Printers are Inkjet printers
1. Impact Printers-Impact printers form images and and Laser printers.
characters by striking a mechanism such as a print
hammer or wheel against an inked ribbon

 examples of the Impact Printers are Dot-matrix printers,


Daisy-wheel printers, and line printers.
Laser Printers
MCQ?
 Laser printers are used in many workplaces
because they can print a large number of sheets
Q- Which of the following produces high-quality output?
very quickly and they produce high quality
documents.
A. Impact printer  Laser printers are quite expensive too because
B. Non-impact printer there produce a high quality of output and quiet fast.
C. Plotter  A laser printer is a popular type of personal
D. Both '1' and '2' computer printer that uses a non-impact (keys don't
strike the paper), photocopier technology.

MCQ?
Dot-Matrix Printers- A dot matrix printer is an
impact printer that prints using a fixed number of pins or
Q- Laser printers belong to
wires
 Dot-Matrix are the first type of printers that
A. line printer
had been used at homes and schools but now
B. page printer
as the technology goes on they are not used
C. band printer
much now a days.
D. dot matrix printer
 Dot-matrix printer are noisy and low quality

Ink-Jet Printers Plotters


 An inkjet printer is a popular choice for
A plotter is a computer hardware
home printing needs. device much like a printer that is
used for printing vector graphics.
 They create images by precisely spraying thousands of
tiny ink droplets onto paper, similar to how TV and
 Plotters are a type of printer which
computer screens render images through clusters of is able to draw a high quality images
on a very large pieces of paper. The
thousands of pixels.
paper were about 3 foot wide and
. . 10 foot long.

 Plotter are been used by the engineers, architects and


map-makers to draw plans of buildings, diagrams of
machines or large scale maps
Speakers MCQ?
 Speakers are one of the most common output
Q- What type devices are computer speakers or
devices used with computer systems.
headphones?
 Speakers are transducers that convert electromagnetic
waves into sound waves. ...
A. Input
 The speakers receive audio input from a device such B .Input/Output
as a computer or an audio receiver. C. Software
D. Output

MCQ?

Q- Who invented Computer Mouse?

A. Charles Babbage
B. Worten Eagle
C. Douglas Engelbart
D. Vannevar Bush

MCQ?
Classification of computers
Q-1.Which of the following is not a
There are basically two main ways type of computer on the basis of
to classify computers. These are: operation?

By Type
a) Remote
b) Hybrid
By Size/ Capacity
c) Analog
d) Digital
By Type- There are three main Digital computers
types of computers under this • These are computers that
class.
represent data /information
They include:
in a binary form.
1. Digital computers
2. Analog computers • That is they represent
3. Hybrid computers signals in just two states 0s
and 1s are used during
data communication.

Examples of digital computers Analog computers


o Desktop computers • These computers represent
o Laptop computers data/information in a
continuous form.
o Mobile phones • That is there are no breaks
o iPads during signal transmission.
o iPhones • It can accept data in the
o Scientific calculators form of Voltage (V) and
Current (I) signals and convert
them to numeric values.
Examples of analog computers

Speedometer

Thermometer

Conventional watch

Hybrid computers
• In this type of Computers,
have the features of both
digital & analog Computers.
• These are very useful in
scientific research and to
perform specific jobs.
• Example- Robot, ECG,ATM.

Examples of hybrid computers MCQ?


o Automated teller machine (ATM) Q- This type of computer is mostly
used for automatic operations.

a) remote
b) hybrid
c) analog
d) digital
Macro Computers
By Size/Capacity They are the largest of all the
The capacity of a computer computers in terms of price,
refers to the volume of data memory size, power and
or information it can process speed of processor.
or store and the speed at Characteristics:
which it works.
 Very expensive
The three main computers
 Generate a lot of heat
under this group are:
 Large memory size
1. Macro Computers
 Wider variety of peripheral
2. Mini Computers
support.
3. Micro Computers
 Supports multiple users

Mainframe Computers Examples of Macro Computers


Mainframe
 These are large andpowerful
computers, which are used for
complex and lengthy
computation, used in scientific
and engineering application.
 These computers can support
large number of input and
outputdevices.
 Mainframe computers can
provide all the processing power
needed by an organization from
acentral site.

Super computer Super computer


 The most powerful computers are •The newly crowned world's fastest supercomputer is being deployed
the super computers. in the fight against the coronavirus.
 Many processing units are integrated
together to perform billion of •Japan's Fugaku supercomputer claimed the top spot on Monday,
scientific and arithmetic operations carrying out 2.8 times more calculations per second than an IBM
every second.
machine in the US
 Super computers play a vital role in
areas of defense, molecular structure •India's first supercomputer, the PARAM 8000 in 1991 by C-DAC.
analysis, medicines, industry and space
•Japanese supercomputer Fugaku (442 petaflops) and IBM’s
exploration.
 speed Of Summit (148.8 petaflops) are the two most powerful
supercomputers is measured in supercomputers in the world, according to the Top500 list.
FLOPS ("floating-point operations
• Pratyush is the fastest supercomputer in India
per second"),
supercomputer MCQ?

Q- ______________ are used for


solving complex application such as
Global Weather Forecasting.

a) Super Computers
b) Public computers
c) Mobile computers
d) Hybrid computers

Micro computers Examples of Micro Computers


They are the smallest of all the
Desktop computers
computers. They are also
called Personal Computers Laptops
because they are used by one Workstations
person at a time. IPads
Characteristics: Mobile phones
 Small in size
 Used by one person
 Generate less heat
 Not expensive

Personal computers Lap Top Computers


 The Personal Computer
has all the functional LapTop Computer is a brand of
microcomputer, which can be
element found in a large
accommodated in a small bag
system like CPU, the
and electricity .
Input/output devices
 Apart of this, computerworks
connected to the CPU and
like LCD monitor.
storage devices to storethe
 Lap Top is generally used in
data.
training programs, industrial
 There are the computers establishments and exhibitions
which are used in the day where it is not possible tobring
today functioning . the other forms ofcomputer.
MCQ?
Wearable computer
Q- They can operate on batteries and
 Wearable computing
hence are very popular with travelers. devices can range from
providing specific, limited
features like Heart Rate
a) Mainframes Monitoring and pedometer
capabilities to advance
b) Laptops “smart” function and
c) Microprocessors features similar tosmart
phone or smartwatch.
d) Hybrid

MCQ?
Palm computer
Q- PDA stands for?
 The small computer that
literally fits in yourpalm.
 Compared to full size
a) personal digital applications
computer, palmtops are
practical for certain b) private digital applications
function.
 Palmtops use pen rather c) personal digital assistants
than a keyboard forinput.
d) private digital assistants
 palmtops also called PDAs
and hand held computers

MCQ? Mini Computers


Q- PDAs are also called? • A mini computer is one
whose size, speed and
a) PCs capacity lies between
b) Laptops those of macro computers
c) Tablets and micro computers
d) Handheld
Minicomputer, Computer that is smaller, less expensive,
and less powerful than a mainframe or supercomputer,
Mini Computers but more expensive and more powerful than a personal
computer. Minicomputers are used for scientific and
 The Mini Computer was engineering computations, business-transaction
bigger than the micro processing, file handling, and database management, and
Computers and issupposed
to be more powerful. are often now referred to as small or midsize servers.
 Mini Computers aregenerally
designed to simultaneously
handle the needs of many
users.
 They can support alarger
numberof users at a time
with the concept of time
sharing.

MCQ? MCQ?

Q- ______computers are lower to Q- What is the name of first super computer


mainframe computers in terms of speed of India ?
and storage capacity.

a) Mini 1. Saga 220


b) Super 2. PARAM 8000
c) Mainframes
d) Hybrid 3. ENIAC
4. PARAM 6000

*OBJECTIVES:
TO UNDERSTAND WHAT IS COMPUTER LANGUAGE.

TO UNDERSTAND LOW LEVEL AND HIGH LEVEL


LANGUAGE.

TO DIFFERENTIATE BETWEEN LOW LEVEL AND HIGH LEVEL


LANGUAGE.

Language Translators
•The computer language is defined as code or syntax which The term programming language usually refers to
is used to write programs or any specific applications.
high-level languages such as BASIC, C, C++,
COBOL, FORTRAN, Pascal, Java, Oracle, ASP.NET,
•The computer language is used to communicate
VB.NET and C#.
with computers.

•A computer language is an artificial language Each language has a unique set of keywords (words
that it understands)
designed to work for different applications in
different environments.
•Human languages are known as natural languages.
Unfortunately, computers can not understand natural
languages, as a result we must communicate with
computers using computer languages.
•These languages are:
High Level Languages.
Low Level Languages/Machine Language

There are many high level languages


It is a set of words and symbol which a Some Examples:
programmer uses to write a program
•High-level languages are much closer to human language. COBOL Business applications
•A programming language such as C, FORTRAN or Pascal FORTRAN Engineering & Scientific Applications
that enables to write programs which is understandable to PASCAL General use and as a teaching tool
programmer (Human) and can perform any sort of task, General Purpose - currently
C & C++
•such languages are considered high-level because they are most popular.
closer to human languages.
PROLOG Artificial Intelligence
•High level language must use interpreter, compiler or JAVA General all purpose programming
translator to convert human understandable program to
computer readable code (machine code). .NET General or web applications.

Advantages of High level language over low level lang:


MCQ?
• They are near to English language, that is they are easier to read,
Q- C is known as write and maintain.

• High-level languages make complex programming simpler.


a. Low level programming language
• High level languages is portable, i.e., they can work on different
b. High level programming language operating system.

c. Machine language • Length of the program is also small compared with low level.

d. None of the above


• Many real time problems can be easily solved with high level
language.
A computer low level language that deals with hardware registers by name is
known as assembly language.
• They need to be translated for the computer to
Assembly language is the best example of low level language, it is in
understand, hence work slower than machine between machine language and high- level language.
code.
A low-level language does not need a compiler or interpreter to run
the program, the processor run low-level code directly.

•Machine code or machine language is a system of


It uses mnemonic codes (short forms) for
instructions and data executed directly by a computer's
instructions .
CPU.

For Example: •The lowest-level programming language that only be


understood by computers.
Addition - ADD
Multiplication- MUL •Computer language that is directly executable by a
Divide-DIV computer without the need for translation by a compiler
Data move-MOVE. etc.
or an assembler.

•The native language of the computer, •There are four models of execution of program
by processor in high-level languages:
•The set of symbolic instructions in binary that is used to
represent operations and data in a machine called machine
• INTERPRETER
code • COMPILER
• ASSEMBLER
•Machine Language: “0110101100101000” • TRANSLATOR
•machine language is a collection of binary digits or
bits that the computer reads and interprets.

.
MCQ?
Q- Which of the following is language processor?

a. Assembler
b. Interpreter
c. Compiler
d. All of the above

MCQ?
Q- A program that can execute high-level language programs.

a) Compiler
b) Interpreter
c) Sensor
d) Circuitry

MCQ?
Q- _______ converts an assembly language program into
machine language.

a. Assembler
b. Interpreter
c. Compiler
d. All of the above
Computer Software & its Types

Software Types Of Software


• There are two types of software on the basis of their functionality:
• “ Software is a collection of instructions and data that tell
the computer how to work. ” 1. System Software
2. Application Software
• The computer will not work without software.

• Software is also called Program.


• Different software's are used to solve different problems.

System Software
• System Software is set of programs to control and manage
the operations of a computer hardware.
•System software is software designed to provide a platform for
other software's.
•It can communicate with peripheral devices such as printers etc.
•Example of System Software will be Operating System.
MCQ? MCQ?
Q- Which of the following is designed to control the operations Q- A person who designs the programs in a software package is
of a computer? called :

a) Application Software a) User


b) System Software
b) Software Manager
c) Utility Software
c) System Developer
d) User
d) System Programmer

Operating System (OS)


• An operating system (OS) is a collection of software that
manages computer hardware resources and provides
common services for computer programs.
• The operating system is a vital component of the system
software in a computer system.
• Application programs usually require an operating system
to function.

Examples
• Examples of System Software's are:
1. Operating Systems
2. Utility Programs
3. Device Drivers
Application software (app for short)
•Application software (app for short) is a program or group of programs
designed for end-users.
•It is software that performs specific tasks for an end-user.
•Applications software includes database programs, word processors,
browsers and spreadsheets.
•It is also known as application package

Examples MCQ?
Microsoft Word Q- ___________________ is designed to solve a specific

Microsoft Excel problem or to do a specific task.

 Photoshop etc
a) Application Software
b) System Software
c) Utility Software
d) User

Utility program Device Driver


• Utility programs, commonly referred to as just "utilities," • A Device Driver is a computer program that
are software programs that add functionality to your computer or operates or controls a particular type of
help your computer perform better. device that is attached to a computer such as a
• Utility program is a system software that allows a user to printer
analyze, configure and Maintain the computer.
• More commonly known as a driver, a device
• These include antivirus, backup, disk repair, file management,
driver or hardware driver is a group of files that enable
security, and networking programs.
one or more hardware devices to communicate with
the computer's operating system
MCQ? MCQ?
Q- Errors in a computer program are referred to as Q- Which of the following is not a programming language ?

a. Bugs a. Pascal
b. Mistakes b. Microsoft Office
c. Item overlooked c. Java
d. Crash d. C++

Microsoft Introduction
Word…
Microsoft Word (often called Word) is a graphical word processing program
that users can type with. It is made by the computer company Microsoft. The
purpose of the MS Word is to allow the users to type and save documents.

Title bar
Menu bar
…is the word processing component of
the Microsoft Office Suite.

It is used primarily to enter, edit, format, Document window

save, retrieve and print documents.

Scroll bar
Q.MS word is software of Q. The valid format of MS Word is

(A) Apple (A) .exe


(B) Android (B) .doc
(C) Google (C) .png
(D) Microsoft (D) .jpeg

Which is not an edition of MS Word?


Q. Microsoft word is software.
(A) MS Word 2003
(A) Application (B) MS Word 2007
(B) Compiler (C) MS Word 2010
(C) System (D) MS Word 1020
(D) Programming

Q. The name of a word document


The area outlined in red is called the displays in
title bar.
(A) Ribbon
It displays the names of the open (B) Title bar
program (in this case Microsoft Word) (C) Status bar
and the name of the current file. (D) Home tab
Creating and saving a file

Create new file (ctrl+N) This file has not yet been saved so its
name is Document1.

Files created in Microsoft Word are often


referred to as documents and have the
file extension .doc or .docx
Save file(ctrl+s)

The area outlined in red contains the


minimize, maximize/restore and close
buttons for the program window.

Q._ button reduces the window to


When you click the close button the an icon but word still remains active.
program will ask you if you want to save
the changes if you have made any
(A) Close
changes. Once you have responded to
(B) Restore
this question the program will close.
(C) Maximize
(D) Minimize
Editing and formating a document Font Face Font Size
Font colour
Alignment of text

Bold Italic Under Line

Normal

Editing and Formatting Text


Q. Arial, Cambria, Times New  Advanced word processors include special tools that
help you easily edit and format documents.
Roman are the name of
 Word processors can:
 cut, copy, and paste text
(A) Highlights  undo and redo actions
(B) Font face  justify or re-align text
 change font parameters
(C) Text  change paragraph spacing
(D) Alignment  various other editing and formatting functions.

Undoing Mistakes

The area outlined in red is called the Sometimes, you want to reverse the last
quick access toolbar. action you performed. For this, you can
use the Undo button:
It contains the most commonly used
Similarly, you can use the Redo button
commands in Microsoft Word:
to repeat the last action:
1. Save
2. Undo
3. Redo
Searching a word and replacing it
by another word Type word you want to replace

It will find
Type new It will your word
word you It will replace replace all in
want to add selected word the same document
word from
document

Q.User can use _ commands to search Q.Press to open ‘Replace’


for and correct words in a document. dialog box.
(A) Copy and Paste
(A) Alt + H
(B) Find and Replace
(C) Header and Footer (B) Ctrl + H
(D) Print and Print preview (C) Ctrl + Alt + H
(D) Tab + H

Ribbon

Microsoft Office 2007 & 2010 use what is Click on them


to view options
referred to as the “Ribbon” interface. The
area outlined in red comprises the
Ribbon.
The ribbons we are going to go over
today are the default ribbons.
The Home Tab Groups contain the commands
The Words File, Home, Insert, etc… most commonly associated with the formatting and
outlined in red are referred to as tabs. editing of text.
Each tab has several Groups attached to
it.
Clipboard Font Paragraph

Styles Editing

Home
The Insert Tab Groups contain the commands
most commonly associated with adding
something to the document.

Pages Table Illustrations

Header/Footer
Font Paragraph
Styles Editing Links Text
Dialogue Dialogue
Dialogue Dialogue Symbols
Box Box
Box Box

Insert

Then select the Clipart you want to insert


Inserting Clipart, Wordart, and
Picture

Clipart Wordart Picture

Inserts new Through this we


page, cover page Inserts table of can insert
or breaks the defined rows and pictures from our
page into two columns. gallery, or taken
halves. screen shots.

Then select the Picture you want to insert

PageLayout

The Page Layout Groups contain the  It customizes page layout; its margins,
indentation size and spacing.
commands most commonly associated with
 It also has coloring and effects options to
settings that would affect the entire page or make the document esthetically beautiful.
document.

Themes Page Page


Setup Background

Paragraph Arrange
Page Layout
What is the blank space outside
the printing area on a page?

(A) Clipart
(B) Margins
(C) Header
(D) Footer

Q. What is gutter margin?

Set Margins
(A) Margin is added to the outside of the page when printing

(B) Margin that is added to the binding side of page when printing

(C) Margin that is added to right margin when printing

(D) Margin that is added to the left margin when printing

Preview

Q.Gutter position can be set in following positions?

1.Left & Right


2.Left & Top
3.Left & Bottom
4.Left Only
Which of the following is an example Q. Portrait and Landscape are?
of page orientation?
(A) Page Layout
(A) Landscape
(B) Paper Size
(B) Subscript
(C) Page Orientation.
(C) Superscript
(D) A4
(D) All of above

The References Groups contain the The Mailings Tab groups contain the
commands most commonly associated with commands most commonly associated with
writing a research paper, essay, term paperor documents and files created for mass mailing.
similarly formal documents.
Table Footnotes Citations & Create Start Mail Merge
of Contents Bibliography
Write & Insert Fields
Preview
Captions Index Table of Results
Authorities

Q. are advanced features that can


The View Tab groups contain the commands speed up editing or formatting you may
most commonly associated with the variety of perform often in a word document.
ways you can “look at” a document or
documents. (A) Comment
(B) Track changes
Document Show Zoom (C) Ribbon
Views (D) Macros

Window Macros
Q. The document can be zoom maximum upto

(A) 150%
(B) 200%
(C) 400%
(D) 500%

Q.Which of the following are valid minimum and maximum zoom


sizes in MS Word?

(A) 0, 100
(B) 0, 1000
(C) 10, 500
(D) 10, 100

Full Screen

A link from a hypertext document to


another location, activated by clicking
on a highlighted word or image

Header are located on top of page, footer at the


bottom and page number can be customized
anywhere.

Inserting Header and Footer and


page number Q. Information such a title, page number of
the document?

(A) Auto Correct


(B) Header and Footer
(C) Thesaurus
(D) Insert Table
Insert Footer

Printing Your File Copy + Paste

 To print out your


1. Select
Hold down the left mouse button and drag the cursor OR
document click on the Hold down SHIFT and use the arrow keys on the keyboard.
Office Button, andthen
click Print.
1. Copy
 This prints one copy of You can find the Copy and Paste commands under the
Home Tab.
your file using the default
settings.
1. Paste
 When you need to, you You can also copy and paste by clicking with the
can modify the settingsof right mouse button on a word you have selected
your print job in the Print to pull up a shortcut menu.
dialog box.
Q.To move data from one part of the
Q. Select all the text in MS Word
document to another, following is used.
document by
(A) Cut and Delete
(A) Ctrl +S
(B) Cut and Paste
(C) Copy and Paste (B) Ctrl+ 1
(D) Copy and Undo (C) Ctrl+ A
(D) Ctrl+ V

Cut + Paste
The works with the standard
Copy and Paste commands.
Using Cut + Paste is like moving text
from one location to a new one.
(A) View tab
(B) Paragraph dialog box The cut command is located:
(C) Office Clipboard  in the Home Tab
or in a shortcut menu when you
(D) All of these right-click on a selected word

Formatting Text
In the Font dialog box, you can
make changes to the type, style,
To show the font dialog box
size, and color of font used in
the document.
press
Size
Font
You can change the
“handwriting” of your text.
(A) Ctrl+ P
Font style (B) Ctrl+ D
Put a word in bold or italicsfor
emphasis.
Effects
(C) Ctrl+ B
Will let you addunderlining,
shadows, or details like
(D) Ctrl+ Q
strikethrough.
Subscript and Superscript

Subscript Superscript
Superscript example: Per m3

Subscript example: Rate per month (1)

Success!
Type the text Select the text Click the subscript

Formatting Text Alignment


You can specify the arrangement of
objects, text, and graphics, in predetermined
positions using the alignment settings.
You can align the selected text to the left,
Font Size Color right, or center by using the left, right, and
center alignment buttons.

Many of these text


options can also be
found on your Home
Ribbon in the Font
Group.

Q.The center the selected text, the shortcut


Q. Which of the following to justification
key is
align the text on both the sides-left and
right of margin?
(A) Ctrl + C
(B) Ctrl + E
(A) Balanced
(C) Ctrl + U
(B) Right
(D) Ctrl + O
(C) Justify
(D) Balanced
Option : CTRL + R – Align right.
CTRL + J – Justify.
Tables and Pictures Inserting Table in file

Visually
select the
size of table

Or click
“ insert table”

Tables and Pictures Q.Which file are contents readymade styles that can
be used for a word document?

(A) Presentation
(B) Letters
(C) Magic wands
(D) Templates

Spelling and Grammar Check Checking Spelling and


Grammer
• Wavy red lines=spelling
errors
• Wavy green
lines=grammatical
mistakes
• You can check the
spelling and grammar of
the entire document by
clicking the Spelling and
Grammar Button on the
Review Tab.
Spelling and Grammar Check
 Spelling suggestions

 ChangeAll

 AutoCorrect

 Grammar suggestions

 Custom dictionary

 Ignoring instances

Q.Which of the following function key Q. Thesaurus tool in MS Word is used for?
activates the speller?
1.Grammar options
1. F2
2. F4 2.Spelling suggestions
3. F5 3.Synonyms and Antonyms words
4. f7
4.All of above

Questions
Q.Superscript, subscript, are known as
Q1. If you want to redo an action in a
document, then press?
Options
(A) Ctrl + R
a. font styles
(B) Ctrl + U
(C) Ctrl + X b. font effects
(D) Ctrl + Y c. text effects
d. none of these

MS EXCEL 1
MCQ??
Spreadsheet
A spreadsheet is a grid of rows and columns in which
you enter text, numbers, and the results of
Q1. A _____ is a grid with labeled
calculations.
columns and rows?
In Excel, a computerized spreadsheet is called a
worksheet.The file used to store worksheets is called
A. Dialog box
a workbook.
B. Worksheet
Cells are arranged in rows and columns with each C. Clipboard
row being identified by a number and each column by D.Toolbar
a letter to make it easier to find and use the
stored information.

Starting Excel Spreadsheet

Cell
Row

Column

The cell in the worksheet in which you can type Q- You can activate a cell by
data is called the active cell.

The Name Box, or cell reference area, displays a. Pressing the Tab key
the cell reference of the active cell.
b. Clicking the cell
The Formula Bar displays a formula when a c. Pressing an arrow key
worksheet cell contains a calculated value.
d. All of the above
A formula is an equation that calculates a new
value from values currently in a worksheet.
Selecting a Group of Cells

 A group of selected
cells is called a
range. The range is
identified by its range
reference, for
example, A3:C5.
CELL REFERENCE ???
Entering Data in a Cell
 Worksheet cells can contain text, numbers, or
formulas.
Q. The cell reference for cell range
of G2 to M12 is ?  Text is any combination of letters and
numbers and symbols.
A. G2.M12  Numbers are values, dates, or times.
 Formulas are equations that calculate a
B. G2;M12 value.
C. G2:M12
 You enter data in the active cell.
D. G2-M12

Q- Which of the following methods Q- Which of the following is not a valid


cannot be used to enter data in a cell data type in Excel?

a. Pressing an arrow key A. Number


b. Pressing the Tab key B. Character
c. Pressing the Esc key
C. Label
D. Date/Time
d. Clicking on the formula bar

Searching for Data


There are Three types of data in cells:
 The Find command locates data in a worksheet,
labels, values, and formulas. Labels (text) which is particularly helpful when a worksheet
are descriptive pieces of information, such contains a large amount of data. You can use the Find
as names, months, or other identifying command to locate words or parts of words.
statistics, and they usually include
alphabetic characters. Values (numbers)
are generally raw numbers or
dates. Formulas are instructions for Excel
to perform calculations.
Searching for Data Zooming a Worksheet
You can change the magnification of a
 The FIND function in Excel is used to return the position of
worksheet using the Zoom controls on
a specific character or substring within a text string
the status bar.

The default magnification for a workbook


is 100%.

Zooming a Worksheet
By default, everything on screen is displayed at Q- Which of the following is not a valid
100% in MS Excel. You can change the zoom data type in Excel?
percentage from 10% (tiny) to 400% (huge).
A. Number
B. Character
C. Label
D. Date/Time

O VERVIEW OF EXCEL MCQ??


 Microsoft excel consists of workbooks.
Within each workbook, there is an
Q2.The activecell:
infinite number of worksheets.
A. is defined by a bold border around the cell.
 Each worksheet contains Columns and
Rows. B. Receives the data the userenters.
C. It is the formula bar.
 Where a column and a row intersect is
D.Only A and B.
called a cell. For e.g. cell D5 is
located where column D and row 5
meet.

 The tabs at the bottom of the screen


represent different worksheets within
a workbook. You can use the scrolling
buttons on the left to bring other
worksheets into view.
MS EXCEL 2
OFFICE BUTTON CONTAINS..
NEW-TO OPEN NEW WORKBOOK.
MCQ?? (CTRL+N)
OPEN-TO OPEN EXISTING DOCUMENT
(CTRL+O)
Q3. The cell address in the Microsoft Office Excel
document is ? SAVE-TO SAVE ADOCUMENT.
(CTRL+S)

SAVE AS-TO SAVE COPYDOCUMENT.


A) Column Name (F12)

B) Row Name PRINT-TO PRINT ADOCUMENT.


(CTRL+P)
C) First Row then Column Name PREPARE-TO PREPARE DOCUMENT FOR DISTRIBUTION.

D) First Column then Row Name SEND-TO SEND A COPYOF DOCUMENTTO OTHER PEOPLE.
PUBLISH-TO DISTRIBUTE DOCUMENT TO OTHER PEOPLE.
CLOSE-TO CLOSE A DOCUMENT (CTRL+W).

MS EXCEL 6

THE THREE PARTS


R I B B O NS OF THE RIBBONARE WO RKING WITH CELLS
TABS

GROUPS

COMMANDS

TABS:THEREARE SEVEN TABSACROSS THE TOPOF


1
THE EXCEL WINDOW.

2 GROUPS: GROUPS ARE SETS OF RELATED TO COPY AND PASTE CONTENTS:


COMMANDS,DISPLAYED ON TABS. 1. Select the cell or cells you wish to copy.
COMMANDS: A COMMAND IS A BUTTON,AMENU 2.Click the Copy command in the Clipboard group on the Home tab.
3 OR A BOX WHERE YOU ENTERINFORMATION. 3.Select the cell or cells where you want to paste the information.
4.Click the Paste command.
The copied information will now appear in the new cells.
MS EXCEL 1/19/2013 7 MS EXCEL 8

WO RKING WITH CELLS FORMATTING TEXT

TO CHANGE THE FONT SIZE: TO ADD ABORDER:


Select the cell or cells you want to Select the cell or cells you want to
To Cut and Paste Cell Contents: format. format.
Select the cell or cells you wish to cut. Click the drop-down arrow next to the
Left-click the drop-down arrow next
Click the Cut command in the Clipboard group on the Home tab. to the Font Size box on the Home tab. Borders command on the Home tab. A
Select the cell or cells where you want to paste the information. Select a font size from the list. menu will appear with border options.
Click the Paste command.
The cut information will be removed and now appear in the new cells.
MS EXCEL 1/19/2013 9 MS EXCEL 1/19/2013 10
CELL REFERENCE
MCQ??
A RELATIVE
CELL
REFERENCE AS
(A1) IS BASED
Q. What is the smallest and largest font size ON THE
available in Font Size tool on formatting RELATIVE
toolbar? POSITION OF
CTION IS USED.
IN CELL (C1) SUM FUNC THE CELL. IF
THEN FUNCTION FROM CELL (C1) IS COPY TO CELL(D3). THE POSITION
A. 6 and 72 WHEN THE POSITION O F THE CELL IS CHANGED FROM
OF THE CELL
B. 6 and 68 (C1) TO (D3),THEN THE REFERENCE IS ALSO CHANGED
FROM (A1,B1) TO (B3,C 3).
THAT
C. 8 and 72 CONTAINS THE
D. 7 and 72 REFERENCE
CHANGES, THE
REFERENCE
ITSELF IS
CHANGED.
MS EXCEL 1/19/2013 13

CELL REFERENCING

AN ABSOLUTE MCQ??
CELL
REFERENCE AS
($A$1) ALWAYS Q. Which of the following is the absolute
REFERS TO A
CELL IN A cell reference?
SPECIFIC
IN CELL (C1) SUM FUNCTION ISUSED.
LOCATION. IF
THEN FUNCTION FROM CELL (C1) IS COPY TO CELL (D3).
THE POSITION 1.!A!2
WHEN THE POSITION OF THE CELL IS CHANGED FROM (C1)
OF THE CELL
TO (D3),THEN THE ABSOLUTE REFERENCE REMAINS THE
SAME(A1,B1).$ IS USED FOR CONSTANT ROW OR COLUMN. THAT CONTAINS 2.@A@2
THE FORMULA
CHANGES, THE 3.$A$2
ABSOLUTE
REFERENCE 4.*A*2
REMAINS THE
SAME.
14

Formulas and Functions


A MIXED
REFERENCE HAS • A formula is an expression which calculates the value of a
EITHER AN cell. Functions are predefined formulas and are already available
ABSOLUTE in Excel.
COLUMN AND •For example, cell A3 below contains a formula which adds the value of
RELATIVE ROW OR cell A2 to the value of cell A1.
IN CELL (C1) SUM FUNCTION ISUSED. ABSOLUTE ROW
THEN FUNCTION FROM CELL (C1) IS COPY TO CELL (D3). AND RELATIVE
WHEN THE POSITION OF THE CELL IS CHANGED FROM COLUMN. AN
(C1) TO (D3),THEN ROW REFERENCE IS CHANGED(FROM1 ABSOLUTE
TO 3) BUT COLUMN REFERENCE REMAINS SAME(A,B). COLUMN
REFERENCE TAKES
THE FORM $A1,
$B1.AN ABSOLUTE
ROW REFERENCE
TAKES THE FORM
A$1, B$1.
16
OTHER FUNCTIONS
MCQ??
USES OF FUNCTIONS

Q. Formulas in Excel start = NOW RETURNS CURRENT DATEAND TIME.

with?
= TODAY RETURNS CURRENT DATEONLY.

A. % = MOD RETURNS THE REMAINDERAFTER ANO.


IS DIVIDED BYADIVISOR.
B. =
= LEN RETURNS THE NO. OF CHARACTERS INA
C. + TEXT STRING.

D. – = SUM ADD ALL THE NUMBERS.

MS EXCEL 1/19/2013 19

MCQ?? MCQ??

Q. How do you displaycurrent


date only in MS Excel?
Q. How do you displaycurrentdate and
time in MS Excel?
A. date ()
A. date () B. Today ()
B. Today ()
C. now () C. now ()
D. time () D. time ()

Part-2 SORTING AND FILTERING

A Microsoft Excel spreadsheet can contain a great


deal of information. Sometimes you may find that
you need to reorder or sort that information, create
groups, or filter information to be able to use it most
effectively

MS EXCEL 1
SORTING
Sorting lists is a common spreadsheet task that
allows you to easily re-order your data. The most
common type of sorting is alphabetical ordering,
which you can do in ascending or descending order.

To sort in alphabetical order


• Select a cell in the column you want to sort (In this
example, we choose a cell in column A).
• Click the Sort & Filter command in
the Editing group on the Home tab.
• Select Sort A to Z. Now the information in the
Category column is organized in alphabetical order.
• You can Sort in reverse alphabetical order by
choosing Sort Z to A in the list

What is filtering
• Filtered data displays only the rows that
meet criteria that you specify and hides
rows that you do not want displayed.
After you filter data, you can copy, find,
edit, format the subset of filtered data
without rearranging or moving it.
Click the drop-down arrow in the Column Sort
by field, then choose one of the options—in this
example, Category.
LEARN ABOUT CHARTS
• Charts are used to display series of numeric data
in a graphical format to make it easier to
understand large quantities of data and the
relationship between different series of data.
• To create a chart in Excel, you start by entering the
numeric data for the chart on a worksheet. Then
you can plot that data into a chart by selecting the
chart type that you want to use on the Office
Fluent Ribbon (Insert tab, Charts group).
Conditional Formatting
• Makes spreadsheets of complex data easier to
read by formatting cells based on the data
Conditional formatting in Excel contained.
Highlight text in cells

Click here for


Conditional Formatting
Cursor over option
Highlight Cell Rules
Home tab

Highlight column to
apply formatting to

As the column
contains Type text to format in this box
text, click Text
Click here to choose formatting
that Contains….

Choose the option for how you want Click OK


to format the data
All of the cells within the
highlighted range now have
the chosen formatting

Cursorover
Click here to go Clear Rules
to next example

Data Validation in Excel

Select Clear
Rules from
Entire Sheet
Q- Which file format can be added to
a PowerPoint show ?

A. .gif
B. .jpg
C. .wav
D. All of above
Q- Shortcut to insert new slide in the
current Presentation is ?

A. CTRL+O
B. CTRL+M
C. CTRL+F
D. CTRL+N
Q- Special effects used to introduce
slides in a presentation are known as ?

A. transitions
B. effects
C. custom animations
D. annotations

Q- Which PowerPoint view works best for


adding slide transitions ?

A. Slide show view


B. Slide sorter view
C. Slide view
D. Notes view
Q- Which of the following will not advance
the slides in a slide show view ?

A. The mouse button


B. The enter key
C. The space bar
D. The esc key

Q- Which of the following can you use to


Q- Which option can be used to set custom
add times to the slides in a presentation ?
timings for slides in a presentation ?

A. Rehearse timing button


A. Slider Timings
B. Slice Show menu
B. Rehearsal
C. Slide transition button
C. Slider Timer
D. All of above
D. Slide Show Setup
Q- Which key do you press to check spelling ?

A. F3
B. F5
C. F7
D. F9

Q- Which of the following is not one of


PowerPoint view ?

A. Slide show view


B. Slide view
C. Presentation view
D. Outline view
Q- Which key can be used to view Slide
show ?

A. F5
B. F2
C. F7
D. F9

Q- What is maximum Zoom percentage in


Microsoft PowerPoint ?

A. 100%
B. 200%
C. 300%
D. 400%
Q-1.Several computers linked to a server to
share programs and storage space.
A. Library
B. Network
C. Grouping
D. Integrated system

 A computer network is an interconnection of


two or more computers that are able to
exchange information.  The computer network may be located in a room,
building, city, country, or anywhere in the world.
 The computer may be connected via any data
communication link, like copper wires, radio  Computer networks have opened up an entire
links, etc.
frontier in the world of computing called the
 They may be personal computers client/server model.
or large main frames.

Q. _______ is the most important/powerful computer


in a typical network.

A. Desktop
B. Network server
C. Network client
D. Network switch
 FILE SHARING – Networks offer a quick and
easy way to share files directly.

 RESOURCE SHARING – All computers in the network can


share resources such as printers, fax
machines,scanners

 COMMUNICATION –Those on the network can


Communicate with each other
via e-mail, messages, etc.

 Flexible Access - Networks allow their users


to access files from computers throughout
the network.

 Sharing of Information - Computer networks enable


us to share data and information with the
computers that are located
geographically large distance apart.

The different types of network are based on Q. A ____ typically connects personal computers within
following:
a very limited geographical area, usually within a single
Size of the network – Refers to the area building.
over which the network is spread.

Connection – Refers to the transmission media A. LAN


and protocols used for connecting.
B. WAN
Networktopology – Arrangement of C. MAN
computers on the network.
D. NONE
 LAN is a computer network widely used for local
communication.

 LAN connects computers in a small area like a room,


building, office, or a campus spread up to a few
kilometers.

 They are privately owned networks,


to exchange information.

 Star, Bus, and Ring are some of the common LAN


networking topologies.

 LAN runs at a speed of 10 mbps to 100 mbps.

 A LAN based on wifi wireless network technology


is called wireless
local area network(WLAN).

METROPOLITIAN MAN is a computer network spread over a city.

AREA The computers in a MAN are connected using cables.

NETWORK
MAN connects several LAN spread over a city.

It covers the distance upto 30-50 km.

(MAN) Example- Cable television network.


WIDE AREA
NETWORK
(WAN)

 The need to be able to connect any number of


 WAN is a network that connects computers over long
computers at any number of sites, results in WAN
distances like cities, countries, or world wide.
technology to be different from the LAN technology.

 WAN uses public, leased, or private communication links to


spread over long distances.  It is slower and less reliable than a LAN.

 WAN uses telephone lines, satellite link  INTERNET is a common example of WAN.
and radiolink to connect.

Q. The Internet is

A. A communication system for some states of India


B. A communication system for the Indian government
C. An internal communication system for a business
D. A large network of networks
A personal area network (PAN) connects electronic devices within a
user's immediate area.
 The size of a PAN ranges from a few centimeters to a few meters.
 One of the most common real-world examples of a PAN is the
connection between a Bluetooth earpiece and a smart phone.
PANs can also connect laptops, tablets, printers, keyboards, and
other computerized devices.
PAN network connections can either be wired or wireless.

Q. Bluetooth is an example of

A. Personal area network


B. Local area network
C. Virtual private network
D. Wide area network
 It is the physical way in which computers are
interconnected.

 Five basic network structures are :

This structure is very popular for local area networks.


In Bus topology a single network cable runs in
When a node wants to send a message over the network,
the building or campus and all nodes are
it puts a message over the network, All the stations
linked along with this communication line with
available in the network will receive the message whether
two endpoints called the bus or backbone.
it has been addressed or not.
The bus topology is designed in such a way
The most common access method of the bus topologies
that all the stations are connected through a
is CSMA (Carrier Sense Multiple Access).
single cable known as a backbone cable.

CSMA CD: CSMA CD (Collision detection) is an access


method used to detect the collision.
CSMA CA: CSMA CA (Collision Avoidance) is an access
method used to avoid the collision by checking whether the
transmission media is busy or not
 Devicesare connected to a central computer called
HUB or a switch.
 A Star network is particularly appropriate for
organizations that require a centralized data base
or a centralized processing facility.
For example, a star network may be used in
banking for centralized record keeping in an on-
line branch office environment.

 It is easy to add new and remove nodes.  Ring topology is like a bus topology, but with
connected ends.
 A node failure does not bring let down
the entire network.  The node that receives the message from the

 It is easier to diagnose network problems previous computer will retransmit to the next node.
through a central hub.  The data flows in one direction, i.e., it is
unidirectional.
 In Ring topology the network cable passes
from one node to another until all nodes are
connected in the form of a “loop or ring”.
 The most common access method of the ring
topology is token passing.
 Token passing: It is a network access method in
which token is passed from one node to another
node.

There are two types of the Ring Topology based


on the data flow:

1. Unidirectional.

2. Bidirectional.
 Mesh topology is a type of network topology in which
each computer is connected to every other computer in
the network.
 It is the most fault tolerant network topology as it has
multiple connections.
 In mesh topology each computer is connected to the
other computer by a point to point link

 Tree topology connects one star network to the


other star network.
 It is an extension of star topology.
 Tree topology combines the characteristics of bus topology
and star topology.

 A tree network, or star-bus network, is a hybrid network


 A tree topology is a type of structure in which all the computers
topology in which star networks are interconnected via bus
are connected with each other in hierarchical fashion.
 The top-most node in tree topology is known as a root node. networks

 There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchical.
1. Protocol is a set of

a) Formats
b) Procedures
c) Formats & Procedures
d) None of the mentioned

 A network protocol defines TCP (Transmission Control Protocol)


rules and conventions for
communication between IP (Internet Protocol)
network devices.
HTTP (Hyper Text Transfer Protocol)
 Protocols specify
interactions between the FTP (File Transfer Protocol)
communicating entities.
HTTPS (Hyper Text Transfer Protocol Secure)
Packet Switching Technique–

The message is divided into small


 It provides reliable transport service i.e. it ensures packets.
that messages sent from sender to receiver are
properly routed and arrive at the destination. Each packet contains address and
 TCP converts messages into a set of packages at the
information.
source which are then reassemble back into messages
at the destination. For this, TCP operates with the The address is used to route the packet
packet switching techniques. to its destination.

Q-Which protocol ensures reliable delivery


 IP allows different computers to
A. TCP communicate.
B. UDP
 IP handles the dispatch of packets over the
C. Both of above
network.
D. None of above
 It handles the addressing of packets, and
ensures that a packet reaches its destination
travelling through multiple networks.

TCP/IP protocol makes it possible for any pair


of computers connected to internet to  The File Transfer Protocol (FTP) is a
communicate, despite their hardware standard network protocol used to
differences. transfer computer files from one
host to another.

Types of files may include program files,


multimedia files, text files, and documents,
etc.
Q-Which protocol ensures reliable delivery

A. TCP  HTTP stands for HyperText Transfer Protocol.


 It is a protocol used to access the data on the World Wide
B. UDP
Web (www).
C. Both of above  The HTTP protocol can be used to transfer the data in the
form of plain text, hypertext, audio, video, and so on.
D. None of above
 This protocol is known as HyperText Transfer Protocol
because of its efficiency that allows us to use in a
hypertext environment where there are rapid jumps from
one document to another document.

Q. The term HTTP stands for?  For example, when you enter a URL in your browser,
this actually sends an HTTP commands to the Web
A. Hyper terminal tracing program server directing it to fetch and transmit the requested
Web page.
B. Hypertext tracing protocol
C. Hypertext transfer protocol
D. Hypertext transfer program

Web Server: WWW

A web server is software and hardware that uses HTTP (Hypertext


Transfer Protocol) and other protocols to respond to client requests  WWW stands for World Wide Web.
 The World Wide Web is a way of exchanging information
made over the World Wide Web. The main job of a web server is to
between computers on the Internet.
display website content through storing, processing and delivering  It is an information system where documents and other web
webpages to users. Besides HTTP, web servers also support SMTP resources are identified by Uniform Resource Locators (URLs,
such as https://example.com/), which may be interlinked by
(Simple Mail Transfer Protocol) and FTP (File Transfer Protocol), used for
hypertext, and are accessible over the Internet.
email, file transfer and storage.
Web Browser:

A web browser (commonly referred to as a browser) is a


software application for accessing information on the
World Wide Web. When a user requests a web page from
a particular website, the web browser retrieves the
necessary content from a web server and then displays
the page on the user's device.

Q. What does HTTPS stand for?

 HTTPS stands for Hyper Text Transfer Protocol


A. Hypertext Transfer Protocol Secure over SSL(Secure Socket Layer). It is used by Web
servers to transfer and display web content
B. Hyper Text Protocol Secure
securely.
C. Hidden Text Transfer Protocol Station
 HTTPS used by any website that is collecting
D. Hypertext Transfer Protocol Station
sensitive customer data such as banking
information or purchasing information

SMTP
SMTP stands for Simple Mail Transfer Protocol.
SMTP is a set of communication guidelines that allow software to transmit an
electronic mail over the internet is called Simple Mail Transfer Protocol.
It is a program used for sending messages to other computer users based on e-mail
addresses.
It provides a mail exchange between users on the same or different computers, and
it also supports:
It can send a single message to one or more recipients.
Sending message can include text, voice, video or graphics.
It can also send the messages on networks outside the internet.
Q. SMTP connections secured by SSL are known as Q. POP stands for:

A. Post Office Protocol


A. SMTPS
B. Peer Object Protocol
B. SSMTP
C. Primary Object Protocol
C. SNMP
D. Purchased Object Protocol
D. none of the mentioned

POP Protocol
What is POP3 ?
The POP protocol stands for Post Office Protocol. As we know that SMTP is used as a
message transfer agent. When the message is sent, then SMPT is used to deliver the
Post Office Protocol version 3 (POP3) is a standard mail
message from the client to the server and then to the recipient server. But the protocol used to receive emails from a remote server to a
message is sent from the recipient server to the actual server with the help of the local email client. POP3 allows you to download email
Message Access Agent. The Message Access Agent contains two types of protocols, messages on your local computer and read them even
i.e., POP3 and IMAP(The Internet Message Access Protocol (IMAP)) when you are offline. Note, that when you use POP3 to
connect to your email account, messages are downloaded
locally and removed from the email server

Q. Which of these is not a Protocol?

A. TCP/IP
B. DCHP
C. HTTP
D. HTTPS
MCQ?

Q- OSI stands for __________?

a) open system interconnection


b) operating system interface
c) optical service implementation
d) open service Internet

MCQ?
Q- The number of layers in ISO OSI reference
model is __________

a) 4
b) 5
c) 6
d) 7
MCQ?
Q- Which layer provides the services to user?

a) application layer
b) session layer
c) presentation layer
d) physical layer
MCQ?
Q- Which layer is responsible for process to
process delivery in a general network model?

a) network layer
b) transport layer
c) session layer
d) data link layer

MCQ?
Q- Transmission data rate is decided by ____________

a) network layer
b) physical layer
c) data link layer
d) transport layer
WIRELESS TECHNOLOGY

INTRODUCTION WIRELESS CAN BE DIVIDED INTO


 Wireless is a term used to describe communications in which  Fixed Wireless
electromagnetic waves are used for communication purpose.
1.Mobile wireless
 The first wireless transmitters went on the air in the early 20th 2.Portable wireless
century using radiotelegraphy.

 As modulation made it
 IR Wireless
possible to transmit voices
and music via wireless.
1. IR (infrared) radiation

EXAMPLES OF WIRELESS

1.Cellular phones and pagers

2.Cordless computer peripherals TYPES OF


TECHNOLOGIES
3.Global Positioning System (GPS)
INTRODUCTION: How Wi-Fi Works?
 Basic concept is same as Walkie talkies.
 Wireless Technology is an alternative to
Wired Technology, which is commonly
used, for connecting devices in wireless
 A Wi-Fi hotspot is created by installing an access point
mode.
to an internet connection.

 Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE


802.11 communications standard for Wireless Local Area Networks  When Wi-Fi enabled device encounters a hotspot the
(WLANs). device can then connect to that network wirelessly.

 Wi-Fi Network connect computers to each other, to the internet  Many access points can be connected to each other via
and to the wired network.
Ethernet cables to create a single large network.

 Bluetooth is a wireless technology for transferring data


between two devices that are in close proximity with each
other.

 When you click on an icon for a device and you are linked to
it, automatically.

MCQs LOGO EVOLUTION OF 1G TO 5G TECHNOLOGY

1. The G in 5G stands for?

A. Gigabit
B. Gigahertz
C. Generation
D. Good to Go
LOGO
WIRELESS APPLICATIONS LOGO WIRELESS SERVICES

Wireless applications are those


which we use free space as the Wireless solution for:
transmission medium & do not Business and Industry
involve cabling like fibre or
copper cables. Schools , Colleges

Doctors , Pilots

Police and Vehicles etc.

LOGO INTRODUCTION LOGO 1G TECHNOLOGY

WHAT IS WIRELESS ? 1G refers to the first generation of wireless telephone


The word wireless is dictionary defined “having no wires ” . technology, mobile telecommunications which was first
introduced in 1980s and completed in early 1990s.
In networking terminology , wireless is the term used to
describe any computer network where there is no physical First time launched by Nippon Telegraph and
wired connection between sender and receiver, but rather the Telephone (NTT) in Tokyo in 1979.
network is connected by radio waves and or microwaves to It's Speed was upto 2.4kbps.
maintain communications. It allows the voice calls in 1 country.
Wireless networking utilizes specific equipment such as 1G network useAnalog Signal.
NICs and Routers in place of wires (copper or optical fibre). AMPS was first launched in USA in 1G mobile
systems.

LOGO 1G TECHNOLOGY MCQs

1G mobile devices sent only the “analogue voice


Q1. 1G or First Generation Mobile
information” via amplitude modulation (AM)
The most important 1G system were:=
Network is _____?

1. Advanced Mobile Phone System (AMPS) A) Analog


2. Nordic Mobile Telephone (NMT)
B) Digital
C) Sequential
3. Total Access Telephone System (TACS)
D) Fuzzy
MCQs MCQs

Q2. Who launched the first commercial Q3. What are main problems in 1G
1G network in the world? technology?

A) NTT, Japan A) Noise


B) NMT, Netherlands B) Security
C) TACS, UK C) Poor Battery backup
D) AMPS, America D) All the above

MCQs LOGO DRAWBACKS OF 1G

Q4. The terminology "Cellular" was Poor Voice Quality


first used by ______ network. Poor Battery Life
Large Phone Size
A) TACS No Security
B) AMPS Limited Capacity
C) NMT Poor Handoff Reliability
D) C-450 1G Wireless System

LOGO 2G TECHNOLOGY LOGO DRAWBACKS OF 2G

 2G technology refers to the 2nd generation which is  2G requires strong digital signals
based on GSM. to help mobile phones work. If there
 It was launched in Finland in the year 1991.
 2G network use digital signals. is no network coverage in any specific
 It’s data speed was upto 64kbps. area , digital signals would weak.

Features Includes:
 These systems are unable to
 It enables services such as text messages, handle complex data such as Videos.
picture messages and MMS (multi media message). 2G Wireless System

 It provides better quality and capacity .


LOGO WIRELESS MODELS OF 1G & 2G LOGO 2.5G TECHNOLOGY

1G WIRELESS SYSTEMS 2G WIRELESS SYSTEMS 2.5G is a technology between the second (2G) and
third (3G) generation of mobile telephony.
2.5G is sometimes described as 2G Cellular
Technology combined with GPRS.
i.e. General Packet Radio Service

Features Includes:
 Phone Calls
 Send/Receive E-mail Messages
 Web Browsing
 Speed : 64-144 kbps
 Camera Phones
Take a time of 6-9 mins. to download a 3 mins. Mp3
song

LOGO 3G TECHNOLOGY LOGO FEATURES OF 3G TECHNOLOGY

3G technology refer to third generation which was  Providing Faster Communication


introduced in year 2000s.
 Send/Receive Large Email Messages
Data Transmission speed increased from
144kbps- 2Mbps. High Speed Web / More Security

Video Conferencing / 3D Gaming


Typically called Smart Phones and
features increased its bandwidth
and data transfer rates to accommodate  TV Streaming/ Mobile TV/ Phone Calls
web-based applications and audio
and video files.  GPS (Global Positioning System)

 11 sec – 1.5 min. time to download a 3 min Mp3 song.

LOGO DRAWBACKS OF 3G TECHNOLOGY MCQs

 Expensive fees for 3G Licenses Services


Q5. Which of the following is not an
It was challenge to build the infrastructure
for 3G
application of third generation
network?
 High Bandwidth Requirement

 Expensive 3G Phones. a) Global Positioning System (GPS)


b) Video conferencing
 Large Cell Phones c) Mobile TV
d) Downloading rate upto 1 Gbps
LOGO 4G TECHNOLOGY (Anytime ,Anywhere) MCQs

Q6. 4G is ____ times faster than


3G?

A. 5
B. 10
C. 15
D. 20

LOGO 4G TECHNOLOGY (Anytime ,Anywhere) LOGO 4G (Anytime, Anywhere)

4G technology refer to or short name of fourth Generation The next generations of wireless technology that promises
which was started from late 2000s. higher data rates and expanded multimedia services.
Capable of providing 100Mbps – 1Gbps speed. Capable to provide speed 100Mbps-1Gbps.
One of the basic term used to describe 4G is MAGIC. 4G LTE-LTE, sometimes known as 4G LTE, is a type
MAGIC: of 4G technology
 LTE stands for Long Term Evolution
Mobile Multimedia
Anytime Anywhere
Global Mobility Support Features Include:
Integrated Wireless Solution  More Security
Customized Personal Services  High Speed
Also known as Mobile Broadband Everywhere.  High Capacity
 Low Cost Per-bit etc.

MCQs LOGO DRAWBACKS OF 4G

Battery uses is more


Q7. What does LTE stands for?
Hard to implement

A) Level Telecom Advanced Need complicated hardware


B) Long Terminal Advanced Expensive equipment required
C) Long Term Evolution to implement next generation
D) Long Time Evolution network.
LOGO COMPARISON BETWEEN 3G Vs 4G LOGO WIRLESS MODELS OF 3G & 4G

The basic difference between 3G and 4G is in data transfer and signal  3G WIRELESS SYSTEM  4G WIRELESS SYSTEM
quality.

Technology 3G 4G
Data Transfer Rate 3.1 MB/sec 100 MB/sec

Internet Services Broadband Ultra Broadband

Mobile - TV Resolution Low High

Bandwidth 5-20 MHz 100MHz

Frequency 1.6-2 GHz 2-8 GHz

Download and upload 5.8 Mbps 14 Mbps

LOGO
5G TECHNOLOGY LOGO
BENEFITS OF 5G TECHNOLOGY

5G technology refer to short name of fifth Generation High Speed, High Capacity
which was started from late 2010s. 5G technology providing large broadcasting of data in
Gbps .
Complete wireless communication Multi - Media Newspapers, watch T.V programs with the
with almost no limitations. clarity
as to that of an HD Quality.
It is highly supportable to WWWW Faster data transmission that of the
(Wireless World Wide Web). previous generations.
Large Phone Memory, Dialing Speed,
clarity in Audio/Video.
Support interactive multimedia , voice,
streaming video, Internet and other
5G is More Effective and More Attractive.

LOGO
BENEFITS OF 5G TECHNOLOGY

5G NR-
5G NR (New Radio) is a new radio access technology
(RAT) for the 5G (fifth generation) mobile network

Internet of Things (IoT) in 5G Wireless Communications


5G, or the fifth generation of mobile technology , and
the internet of things (IoT) are two macro technology used
for real-world applications
Q- Bluetooth is the wireless technology for __________
“Things that think…
don’t make sense unless they link.”
a) local area network
b) personal area network
Welcome to the World of Bluetooth c) metropolitan area network
-imagine the world without wires
d) wide area network

:Overview of Bluetooth: Overview of Bluetooth


• What is Bluetooth? • When does it appear?
– Bluetooth is a short-range wireless communications
The Bluetooth specification was first developed in 1994 by Sven Mattison and
technology. Jaap Haartsen, who were working for Ericsson Mobile Platforms in Sweden.
– 5 companies (Ericsson, Nokia, IBM, Intel & Toshiba) joined to form the
–Bluetooth is a short-range and low power Bluetooth Special Interest Group (SIG) in 1998.
– First specification released in July 1999.
wireless technology originally developed for
•Effective range of Bluetooth devices is 10 meters.
exchanging data over short distances from fixed
and mobile devices, creating personal area •It was originally conceived as a wireless alternative to
data cables.
networks (PANs).
LOGO
History LOGO Technology Review

 The word "Bluetooth" is taken from the 10th century Danish


King Harald Bluetooth, united Norway and Denmark into a  Bluetooth uses a radio technology called
single kingdom
frequency-hopping spread spectrum.
 Bluetooth was named so because
 Supports data rate of 1 Mb/s(originally).
Bluetooth technology is able to unite differing industries
such as the cell phone, computing, and automotive markets.
 The Bluetooth specifications are developed
and licensed by the Bluetooth Special Interest
Group (SIG).

LOGO Classes Of Bluetooth


Q- Bluetooth uses __________

a) frequency hopping spread spectrum


b) orthogonal frequency division multiplexing
c) time division multiplexing
d) channel division multiplexing

LOGO Value proposition of Bluetooth


• Bluetooth will support wireless point-to-point and
Cordless point-to-multipoint (broadcast) between devices
headset in a piconet.

mouse • Point to Point Link


Cell – Master - slave relationship
Data access
phone point – Bluetooth devices can function as masters or
slaves

Internet access • Piconet


Cable replacement
– It is the network formed by a Master and one
or more slaves (max 7)
– Each piconet is defined by a different hopping
channel to which users synchronize to
– Each piconet has max capacity (1 Mbps)

Ad hoc networking
Piconet
Piconet is a Bluetooth network that consists of one primary
(master) node and seven active secondary (slave) nodes.
• Thus, piconet can have up to eight active nodes (1 master and 7
slaves) or stations within the distance of 10 meters.
• There can be only one primary or master station in each piconet.
• The communication between the primary and the secondary can
be one-to-one or one-to-many
• All communication is between master and a slave. Salve-slave
communication is not possible.

Scatternet
Q-An interconnected collection of piconet is called ___?
Scattemet is formed by combining various piconets.
• A slave in one piconet can act as a master or primary in other
a) scatternet piconet.
b) micronet • Such a station or node can receive messages from the master in

c) mininet the first piconet and deliver the message to its slaves in other
piconet where it is acting as master. This node is also called bridge
d) multinet
slave.
• Thus a station can be a member of two piconets.
• A station cannot be a master in two piconets

Q- In a piconet, one master device ________

a) can not be slave


b) can be slave in another piconet
c) can be slave in the same piconet
d) can be master in another piconet
Q- Bluetooth transceiver devices operate in ______ band.

a) 2.4 GHz ISM


b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM

GPS triangulation

GPS Receivers Use Trilateration


•Using a simple two-dimensional example, let’s
imagine we have three GPS satellites each with a
•triangulation (which measures angles)
known position in space.
•Trilateration involves measuring distances.

•How does the GPS system pinpoint your


location using trilateration?
What happens when your GPS receives a second signal?
Again, this distance is equally broadcasted in all directions until it
first satellite broadcasts a signal that eventually hits your GPS receiver. This means that the distance could be
hits your GPS receiver. We don’t know the angle, anywhere on that circle.
but we do know the distance. That’s why this But this time, we have two known distances from two satellites.
With two signals, the precise position could be any of the two
distance forms a circle equal in all directions. points where the circles intersect.
This means that your GPS position could
be anywhere on this circle at this specific radius.

Because we have a third satellite, it reveals your Trilateration


true location where all three circles intersect.
Using three distances, trilateration can pinpoint a
precise location. Each satellite is at the center of a
sphere and where they all intersect is the position
of the GPS receiver.
As the position of the GPS receiver moves, the
radius of each circle (distance) will also change

Trilateration
Q-What is the minimum number of satellites you need to One satellite is useless, because you have nothing to
get in your GPS receiver to get a relatively accurate compare it with.
location? Two will place you somewhere on a circle where two
spheres around the satellites intersect.
Ans- 4 satellites
Since this circle will intersect the earth at two points,
In order for a GPS receiver to compute accurate
you could be at either of those two points. Or you could
position and time, it needs to be in good view of
be anywhere else along that circle, such as in an airplane,
at least 4 satellites in the sky. This is called a GPS lock
spacecraft, or underground
or fix.
Add a third satellite, and you will be able to narrow
down your position to a single point,

 However, because the spheres around the Concept of GPS


satellites really do intersect at two points, your The Global Positioning System (GPS) is a satellite
GPS receiver could place you at that other point based navigation system that can be used to locate
positions anywhere on earth.
several thousand kilometers above or below the
Designed and operated by the U.S. Department of
surface of the earth. Defense, it consists of satellites, control and monitor
stations, and receivers.
It requires a fourth satellite to determine your
The GPS project was started by the U.S.
latitude, longitude, Department of Defense in 1973, with the
first prototype spacecraft launched in 1978 and the
full constellation of 24 satellites operational in
1993.
MCQ?
GPS receivers take information transmitted from the
satellites and uses triangulation to calculate a user’s exact
location.
Concept of GPS (Cont.) Concept of GPS (Cont.)
GPS is used on incidents in a variety of ways, such as: Official name of GPS is navigational Satellite
To determine position locations; for example, you Timing And Ranging Global Positioning System
need to radio a helicopter pilot the coordinates of (NAVSTAR GPS)
your position location so the pilot can pick you up. Global Positioning Systems (GPS) is a form of
To navigate from one location to another; for Global Navigation Satellite System (GNSS)
example, you need to travel from a lookout to the fire
First developed by the United States Department
perimeter.
of Defense
To create digitized maps; for example, you are
assigned to plot the fire perimeter and hot spots. Consists of two dozen GPS satellites in medium
Earth orbit (The region of space between 2000km
To determine distance between two points or how far
you are from another location. and 35,786 km)

Concept of GPS (Cont.) GPS Functionality


Figure: Trilateration GPS systems are made up of 3 segments
 Space Segment (SS)
 Control Segment (CS)
 User Segment (US)

Concept of GPS (Cont.) Space Segment (Satellites orbiting the earth)

The space segment consists of 24-32 satellites circling the

earth every 12 hours at 12,000 miles in altitude.

The baseline satellite constellation consists of 24

satellites positioned in six earth-centered orbital planes

with four operation satellites and a spare satellite slot in

each orbital plane.


MCQ?
This high altitude allows the signals to cover a greater

area.

The satellites are arranged in their orbits so a GPS

receiver on earth can receive a signal from at least four

satellites at any given time. Each satellite contains

several atomic clocks.

MCQ? MCQ?

Q-What is the number of GPS satellites used? Q-What is the approximate time taken by the GPS for one
complete orbit?

a) 54
b) 12
a) 11 minutes
c) 5
b) 45 minutes
d) 24
c) 5 hours
d) 12 hours

Control Segment (The control and monitoring stations) Master Control Station
The control segment tracks the satellites and
then provides them with corrected orbital and time Located at Colorado Springs, the Master Control
Station (MCS) is the central control node for
information.
the GPS satellite constellation
The control segment consists of five unmanned
monitor stations and one Master Control Station. •Hawaii,
The five unmanned stations monitor GPS •Ascension Island (South Atlantic),
satellite signals and then send that information to •Diego Garcia (Indian Ocean),
the Master Control Station where anomalies are •Kwajalein (North Pacific).
corrected and sent back to the GPS satellites
through ground antennas.
User Segment
(The GPS receivers owned by civilians and military)

The user segment consists of the


users and their GPS receivers.
The number of simultaneous users
is limitless.

ਧੰਨਵਾਦ ਜੀ
A geofence is a virtual perimeter for a real-world
A geo-fence could be dynamically generated—as
geographic area.
A perimeter is either a path that in a radius around a point location, or a geo-fence
encompasses/surrounds/outlines a shape (in two
can be a predefined set of boundaries (such as
dimensions).
The perimeter of a circle or an ellipse is called school zones or neighborhood boundaries).
its circumference.
The use of a geofence is called geofencing.

 It is location-based service (LBS) user entering Geo-fencing (geofencing) is a feature in a software


or exiting a geo-fence then, This activity could
program that uses the Global Positioning System (GPS) or
trigger an alert to the device's user as well as
radio frequency identification (RFID) to define
messaging to the geo-fence operator.
geographical boundaries.
This info, which could contain the location of the
device, could be sent to a mobile telephone or an Geo-fencing allow an administrator to set up triggers so

email account. when a device enters (or exits) the boundaries defined by

the administrator, an alert is issued


How does it Work?
COVID-19 Quarantine Alert System: Geo
Fencing application to locate Quarantine
Violators-

The Department of Telecommunications


has issued Standard Operating Procedure
for the use of COVID-19 Quarantine Alert
System (CQAS). The CAQS is an application
used to track COVID-19 patients who have
violated quarantine.

Q-1. What does GPS stand for? Q- 2. When was the first GPS satellite launched?

A. 1776
A. Going Places Sometimes B. 1978
B. Global Positioning Satellites C. 1994
C. Government Positioning Satellites D. 1963
D. Global Positioning System
Q-3. How many GPS satellites were there when Q-4. What is the minimum number of GPS
the system was originally set up? satellites you need to receive information from
in order to get a fix on your horizontal position?
A. 36
B. 10
C. 24 A. 3
D. 50 B. 2
C. 5
D. 1
E. 4.

Q-5. Original Name of the GPS system?

A. GSTAR
B. NAVSTAR
C. GAVSTAR
D. NONE

Introduction
Malware is a malicious software that gets installed in
your device and performs unwanted tasks.

Mainly designed to transmit information about your


web browsing habits to the third party
Q-Malware is short form of ?
Types of Malware
A. malicious hardware
 Viruses
B. malicious software
 Worms C. Both A and B
 Trojan Horse D. None of the above
 Spyware
 Adware

What is a computer virus ?

Computer viruses are small software or code that


can cause damage to your data and software on a
computer.

Why do People Create Computer


History of Virus Viruses?

Any programmer can make a virus to:


 Term was Coined by Frederick Cohen in early 1980 ‘s
 The first Network virus was called ‘Creeper’ in 1970’s.  To take control of a computer and use it
for specific tasks.
 It was invented by Bob Thomas.
 To steal sensitive information (credit
 The first PC Virus was ELK Cloner in 1982.
card numbers, passwords, personal
 The first LINUX Virus was BLISS in 1997. details, data etc.)
 VIRUS: Vital Information Resources Under Seize
How do viruses spread? How do viruses spread?

 From removable media.  From downloads off the Internet.

Q- Which of them is not an ideal way


How do viruses spread?
of spreading the virus?

a) Infected website
b) Emails
c) Official Antivirus CDs
 And from e-mail attachments. d) USBs

How to detect a Virus How to detect a Virus


Some signs that may indicate that your Some signs that may indicate that your
computer is infected include: computer is infected include:

 Your computer functions slower than  You see uncommon error messages.
normal.
 Applications won't start.
 Your computer responds slowly and
freezes often.  Your antivirus has disappeared, and
firewall is disabled
 Your computer restarts itself often.
Anti virus software

 An antivirus software is a computer program that


identify and remove computer viruses, and other
malicious software like Worms and Trojans from an
infected computer.

 Also an antivirus software protects


the computer from further virus attacks.

How to Protect your System Against How to Protect your System Against
Virus? Virus?
To Protect your system against Viruses
To Protect your system against Viruses you have to follow these steps :
you have to follow these steps :
Install a good Anti-Virus software
on your computer.

 Update Anti-Virus regularly.

How to Protect your System Against Worms


Virus?
To Protect your system against Viruses  A Computer Worm is a type of Malware that Spreads
you have to follow these steps : copies of itself from Computer to Computer.

Be careful while Downloading files or  A Worm Can Replicate itself without human
programs from the internet. interaction.
 They make the working of your device slower
Always scan your floppies, CDs, flash
drives before using them.
.
ਟ੍ਰੋਜਨ -ਇੱਕ ਖੋਖਲੀ ਲੱ ਕੜ ਦਾ ਘੋੜਾ, ਜਜਸ ਨੂੰ
Trojan Horse ਯਨਾਨੀਆਂ ਨੇ ਟ੍ਰੋਜਨ ਯੱਧ ਦੇ ਦੌਰਾਨ ਵਰਜਿਆ ਸੀ.
 Trojan Horse Definition: It is a program that looks ਟ੍ਰੋਜ਼ਨ ਨੇ ਸੋਜਿਆ ਜਕ ਘੋੜਾ ਇੱਕ ਿੋਹਫਾ ਹੈ, ਉਸ ਨੇ ਇਸ
like a harmless application.
ਨੂੰ ਸਵੀਕਾਰ ਕਰਨ ਲਈ ਆਪਣੇ ਸ਼ਜਹਰ ਨੂੰ ਖੋਲਹ ਜਦੱਿਾ,
 Trojan viruses do not copy themselves, but they can
ਜਜਸ ਨਾਲ ਯਨਾਨੀਆਂ ਨੂੰ ਟ੍ਰੋਜਨਾਂ ਉੱਿੇ ਹਮਲਾ ਕਰਨ ਦਾ
work as gateway.
ਮੌਕਾ ਜਮਲ ਜਿਆ
 Entering a computer, it performs various tasks like
corrupting files and sending out personal
information.

Spyware
 Spyware or snoopware is a term used to describe
a software program that is intentionally installed on a
computer.
 Spyware is used to monitor what other users of the
same computer are doing.
 It monitors the user’s activities on the internet and
transmits that information to the third party.

Spyware
Adware
 Spyware is a term used to describe a program designed  adware is a program installed without a user's
to gather information about a user's activity secretly. consent or knowledge during the install of
another program.
Spyware programs are often used to track users' habits  Much like spyware, adware tracks
to target them with advertisements better. Spyware is individuals Internet activities and habits to help
companies advertise more efficiently.
usually installed on a user's machine without their
knowledge after clicking a link (intentionally or  It automatically downloads to your device while
browsing any website.
unintentionally) that redirects the user to a malicious
website.  It is used by companies for marketing purposes.
DATABASE MANAGEMENT
SYSTEM

Thank You (DBMS)

Basic Definitions

 “Data” – are raw facts

 “Database” –collection of logically interrelated data


 “Database Management”-the creation &
maintenance of a collection of organized data.
 “Database Management System (DBMS) ” - It is
a software package designed to define, manipulate,
retrieve and manage data in a database.

• What is Data? • DataBase Overview

• Data is a collection of a distinct small unit of • A database is a systematic collection of data.

information. It can be used in a variety of • A database is an organized collection of data,

forms like text, numbers, media, bytes, etc. it so that it can be easily accessed and managed.

can be stored in pieces of paper or electronic • A database management system stores data in
memory, etc. such a way that it becomes easier to retrieve,
manipulate, and produce information.
Users :- DBMS Architecture:-

 Administrators
• A 3-tier architecture
Designers
separates its tiers from
 End Users
each other
1. DataBase(Data)
2. Application(interface)
3. User(Presentation)

•User (Presentation) Tier − End-users operate on this


tier and they know nothing about any existence of the
database beyond this layer. At this layer, multiple views
of the database can be provided by the application.
•Application (Middle) Tier − At this tier reside the
application server and the programs that access the
database.
•Database (Data) Tier − At this tier, the database resides along
with its query processing languages. We also have the relations
that define the data and their constraints at this level.
Data Models:- Entity-Relationship Model

Entity-Relationship (ER) Model is based on the notion of


•Data models define how the logical structure of a
real-world entities and relationships among them. While
database is modeled.
formulating real-world scenario into the database model,
•Data models define how data is connected to the ER Model creates entity set, relationship set, general
each other and how they are processed and attributes and constraints.
stored inside the system. ER Model is best used for the conceptual design of a
database.

Entity-Relationship Model
Entity − An entity in an ER Model is a real-world entity

ER Model is based on − having properties called attributes. Every attribute is

Entities and their attributes. defined by its set of values called domain. For example,

Relationships among entities. in a school database, a student is considered as an


entity. Student has various attributes like name, age,
class, etc.
Relationship − The logical association among entities is
called relationship. Relationships are mapped with
entities in various ways.

Mapping cardinalities − Relational Model


The most popular data model in DBMS is the
1. one to one
Relational Model. It is more scientific a
2. one to many
model than others.
3. many to one
The main highlights of this model are −
4. many to many •Data is stored in tables called relations.
•Each row in a relation contains a unique
value.
•Each column in a relation contains values
from a same domain.
Entity- Attributes

An entity can be a real-world object, either animate or Entities are represented by means of their
inanimate, that can be easily identifiable. For example, in a properties, called attributes. All attributes have
school database, students, teachers, classes, and courses values. For example, a student entity may have
offered can be considered as entities. All these entities
have some attributes or properties that give them their
name, class, and age as attributes.
identity. There exists a domain or range of values that can
An entity set is a collection of similar types of entities. An be assigned to attributes. For example, a student's
entity set may contain entities with attribute sharing name cannot be a numeric value. It has to be
similar values. For example, a Students set may contain all alphabetic. A student's age cannot be negative, etc.
the students of a school; likewise a Teachers set may
contain all the teachers of a school from all faculties. Entity
sets need not be disjoint.

Types of Attributes Derived attribute − Derived attributes are the attributes


that do not exist in the physical database, but their
Simple attribute − Simple attributes are atomic values,
values are derived from other attributes present in the
which cannot be divided further. For example, a
database. For example, average_salary in a department
student's phone number is an atomic value of 10 digits.
should not be saved directly in the database, instead it
Composite attribute − Composite attributes are made of
can be derived. For another example, age can be derived
more than one simple attribute. For example, a
from data_of_birth.
student's complete name may have first_name and
last_name.

Single-value attribute − Single-value attributes ER Diagram Representation

contain single value. For example − Entity

Social_Security_Number. Entities are represented by means of rectangles.


Rectangles are named with the entity set they
Multi-value attribute − Multi-value attributes
represent.
may contain more than one values. For example,
a person can have more than one phone number,
email_address, etc.
ER Diagram Representation ER Diagram Representation

Attributes If the attributes are composite, they are further


divided in a tree like structure. Every node is then
Attributes are the properties of entities. Attributes connected to its attribute. That is, composite
are represented by means of ellipses. Every ellipse attributes are represented by ellipses that are
represents one attribute and is directly connected to connected with an ellipse.
its entity (rectangle).

ER Diagram Representation ER Diagram Representation

Multivalued attributes are depicted by double Derived attributes are depicted by dashed ellipse.
ellipse.

Q. A collection of unprocessed items Q. ____ represents raw facts,


is ____ whereas
___ is data made meaningful.
(A) Reports
(B) Memory
(C) Data (A) Data, information
(D) Information (B) Information, reporting
(C) Information, bits
(D) Records, byte
Types of Databases
DATABASE MANAGEMENT
1. Centralized Database:
SYSTEM
Part-2
(DBMS)

Introduction

Based on Database location(s) 5. Database Languages

2. Distributed Database:
• Data Definition Language (DDL)
Create, Alter, Drop
• Data Manipulation Language (DML)
Insert, Select, Update, Delete
• Data Control Language (DCL)
Grant, Revoke
• Transaction Control Language (TCL)
Commit, Rollback.

Application of DBMS Introduction To SQL

 Banking  Credit and Transactions


•SQL stands for Structured Query Language
•SQL is a programming language for Relational Databases
•SQL lets you access and manipulate databases
 Airline
•SQL can execute queries against a database
 Sales
•SQL can retrieve data from a database
•SQL can insert records in a database

 Universities •SQL can update records in a database

 Human resourc e •SQL can delete records from a database


Introduction To SQL Introduction To SQL

•SQL can create new databases •Using the data definition properties of SQL, one can design
•SQL can create new tables in a database and modify database schema, whereas data manipulation
•SQL can create stored procedures in a database properties allows SQL to store and retrieve data from database.
•SQL can create views in a database
•SQL can set permissions on tables, procedures, and views Data Definition Language

•SQL comprises both data definition and data manipulation SQL uses the following set of commands to define database
languages schema −
CREATE
. DROP
ALTER

Introduction To SQL

Data Manipulation Language

SQL is equipped with data manipulation language (DML). DML


modifies the database instance by inserting, updating and
deleting its data. DML is responsible for all forms data
Types of Keys in
modification in a database. SQL contains the following set of
commands in its DML section −
Database Management System
• SELECT/FROM/WHERE
• INSERT INTO/VALUES
• UPDATE/SET/WHERE
• DELETE FROM/WHERE

Types of Keys in Database


Why we have Keys in DB?
• A Key is an attribute or a set of attributes in a • 1. Primary Key
relation that identifies a tuple (record) in a
relation. • 2. Candidate Key
• The keys are defined in a table to access or • 3. Alternate Key
sequence the stored data quickly and
smoothly.
• 4. Super Key
• They are also used to create relationship • 5. Composite Key
between different tables. • 6. Foreign Key
• 7. Unique Key
Primary Key
Primary Key
• Which is Unique & Can’t be have • It is a candidate key that is chosen by the
Employee NULL Value database designer to identify entities with in an
EmployeeID • Is the column you choose to entity set.
EmployeeName maintain uniqueness in a table at
• Primary key is the minimal super keys. In the ER
SSN row level.
diagram primary key is represented by
DeptID • Here in Employee table we can
underlining the primary key attribute.
DOB choose either EmployeeID or SSN
column for a PK. • Ideally a primary key is composed of only a
• EmployeeID is preferable choice
single attribute.
because SSN is a secure (PII) value. • But it is possible to have a primary key
composed of more than one attribute.
To define a field as primary key,
following conditions had to be met :
Candidate Key
• 1. No two rows can have the same primary key Employee
• Are individual columns in a table
value. EmployeeID that qualifies for uniqueness of
• 2. Every row must have a primary key value. EmployeeName
each row/tuple.
• Here in Employee table
• 3. The primary key field cannot be null. SSN
EmployeeID & SSN are eligible
• 4. Value in a primary key column can never be DeptID
for a Primary Key and thus are
modified or updated, if any foreign key refers DOB Candidate keys.
to that primary key.

Alternate Key Super Key


• If you add any other Column / Attribute
Employee
to a Primary Key then it become a
Employee • Candidate column other the Super Key,
EmployeeID
Primary column, like EmployeeID like EmployeeID + EmployeeName is
EmployeeName a Super Key.
SSN if EmployeeID is set for a PK EmployeeName
• Super key stands for superset of a key.
DeptID then SSN would be the Alternate
DOB key.
SSN
• A Super Key is a set of one or more
DeptID attributes that are taken collectively
and can identify all other attributes
DOB
uniquely.
Composite Key Foreign Key
Employee
Employee • If a table do have a single column EmployeeID Department

EmployeeID
that qualifies for a Candidate key, EmployeeName
DeptID
then you have to select 2 or more SSN
DeptName
EmployeeName columns to make a row unique. DeptID
• Like if there is no EmployeeID or DOB
SSN
SSN columns, then you can
DeptID make EmployeeName + • Here in above tables DeptID of Department
DateOfBirth (DOB) as Composite table is Primary Key where as DeptID of
DOB Primary Key. But still there can be Employee is an Foreign key.
a narrow chance of duplicate rows.
• It means it has referred to another table. This
concept is also know as Referential Integrity.

Unique Key Normalization

Employee
• Unique key is same as •Normalization is the process of organizing the data in the
EmployeeID
primary with the difference database.
EmployeeName
being the existence of null. •Normalization is used to minimize the redundancy from a relation
SSN
• Unique key field allows one or set of relations. It is also used to eliminate the undesirable
EmailID
value as NULL value. characteristics like Insertion, Update and Deletion Anomalies.
DOB
•Normalization divides the larger table into the smaller table and
links them using relationship.
•The normal form is used to reduce redundancy from the database
table.

Types of Normal Forms

Note- Boyce-Codd Normal Form


Boyce-Codd Normal Form (BCNF) is an extension of Third Normal Form on strict
terms.
Overview
 Need of Cyber Law
Cyber Law in India  Cyber Crime
Need & Importance
 Introduction of Cyber law
 IT Act-2000
 IT Act Amendment-2008

 World & Cyber Law

 Importance of Cyber Law in Present Era

Need of Cyber Law Need of Cyber Law


 Internet has dramatically changed the way we
"The modern thief can steal more with a computer than think, the way we govern, the way we do commerce
with a gun. Tomorrow's terrorist may be able to do more and the way we perceive ourselves.
damage with a keyboard than with a bomb".
 Information technology is encompassing all walks

National Research Council, U S A "Computers at Risk”.1991 of life all over the world.

 Cyber space creates moral, civil and criminal


wrongs. It has now given a new way to express
criminal tendencies.

Need of Cyber Law Cyber Law ?


 Cyberspace is open to participation by all

 Cyber Law is the law governing cyber space.


 “IT” has brought Transition from paper to paperless
world
 Cyber space includes computers, networks, software's, data
 The laws of real world cannot be interpreted in the storage devices (such as hard disks, USB disks etc), the
light of emerging cyberspace to include all aspects Internet, websites, emails and even electronic devices such
relating to different activities in cyberspace as cell phones, ATM machines etc.

 Internet requires an enabling and supportive legal


infrastructure in tune with the times
Cyber space Cyber Law Deals with
The virtual space created by interconnected computers and
 Cyber Crimes
computer networks on the Internet. Cyberspace is a
conceptual electronic space unbounded by distance or other  Electronic or Digital Signatures
physical limitations. William Gibson coined the term in
his novel Neuromancer (1982) to describe an advanced  Intellectual Property
virtual reality network.
 Data Protection and Privacy

Cyber Crime ? Categories of Cyber Crime

 Any crime with the help of computer and  Cybercrimes against persons.
telecommunication technology.
 Cybercrimes against property.
 Any crime where either the computer is used as
an object or subject.  Cybercrimes against government.

Against a Person Against Property


 Cyber stalking
 Unauthorized Computer Trespassing

 Impersonation  Computer vandalism

 Transmission of harmful programmes


 Loss of Privacy
 Siphoning of funds from financial institutions
 Transmission of Obscene Material.
 Stealing secret information & data

 Harassment with the use of computer.  Copy Right


Against Government Some Other Crimes

 Logic Bombs
 Hacking of Government websites
 Spamming

 Cyber Terrorism  Virus, worms, Trojan Horse

 Computer Viruses  E-Mail Bombing

Statistics of Cyber Crimes IT Act-2000


• United Nations Commission on International Trade Law
Year 2008 2009 2010 2011
Enacted IT ACT 2000 on 9th June 2000
Cyber Crimes 267 411 1322 2213

Cyber Crime in India  The Information Technology Act, 2000 (IT Act), came

2500 into force on 17 October 2000.


2000

1500
 The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate
1000
filing of electronic records with the Government.
500

0
1 2 3 4  Information Technology Act 2000 consisted of
94 sections segregated into 13 chapters and 4 Schedules

IT Act-2000 : Objectives IT Act-2000 : Objectives


 To provide legal recognition for transactions  To amend the Indian Penal Code 1980

 To facilitate electronic filing of documents with


the Government agencies. SECTION 292: Sale of obscene books.

 To amend the Indian Penal Code, The Indian SECTION 294: Obscene Acts and Songs in Public Place
Evidence Act, 1872, The Banker's Book Evidence Act,
1891 and the Reserve Bank of India Act, 1934. SECTION 464: Making False Documents

 Aims to provide the legal framework to all


electronic records.
IT Act-2000 : Objectives IT Act-2000 : Objectives
 The Indian Evidence Act, 1872  The Banker's Book Evidence Act, 1891

All Documents Including Electronic • Cash Books


Records produced before Court • Account Books etc
for Inspection

IT Act-2000 : Objectives IT Act-2000


Section 66A: Punishment for sending offensive messages through
 Reserve Bank of India Act, 1934
communication service etc.
Section 67: Punishment for publishing or transmitting obscene
SECTION 58(2): Regulation of Funds material in electronic form.
Section 67 A: Punishment for publishing or transmitting of
Transfer through Electronic means
material containing sexually explicit act, in electronic form.
between Banks or other Financial Section 67B: Punishment for publishing or transmitting of
material depicting children in sexually explicit act, in electronic
Institutions. form

IT Act-2000 IT Act Amendment-2008


Snapshot of Important Cyber Law
Provisions in India
 The Information Technology Amendment Act, 2008 (IT
Offence Section under IT Act
Act 2008) has been passed by the parliament on
Tampering with Computer source documents
(without the permission of incharge) Sec.43 23rd December 2008.

Publishing obscene information Sec.67


 It received the assent of President of India on
Un-authorized access to protected system Sec.70
5th February, 2009.
Breach of Confidentiality and Privacy
Sec.72

 The IT Act 2008 has been notified on October 27, 2009.


Publishing false digital signature certificates Sec.73
IT Act Amendment-2008 World & Cyber laws
 ITA-2008, is a new version of IT Act 2000.  The Great firewall of China monitors every movement
in cyber space and protect to publish any offensive
 Provides additional focus on Information content.
Security.

 China have a hold on every content which is harmful of


 Added several new sections on offences
dangerous for the government of China.
including Cyber Terrorism and Data Protection.

 124 sections and 14 chapters and 2 schedules.  Brazil is considered world’s biggest airport for Hackers.

 Schedule I and II have been replaced &  Iran is also a dangerous country for the Netizens. He
Schedules III and IV are deleted. also have a Crime Police unit for crime in Cyber Space.

Importance of Cyber Law Importance of Cyber Law


 We are living in highly digitalized world.  Most people are using email, cell phones and SMS
messages for communication.
 All companies depend upon their computer networks
and keep their valuable data in electronic form.  Even in "non-cyber crime" cases, important evidence
is found in computers /cell phones e.g. in cases of
divorce, murder, kidnapping, organized crime,
 Government forms including income tax returns,
terrorist operations, counterfeit currency etc.
company law forms etc are now filled in electronic
form.
 Since it touches all the aspects of transactions and
activities on and concerning the Internet, the World
 Consumers are increasingly using credit cards for
Wide Web and Cyberspace therefore Cyber Law is
shopping.
extremely important.

Q- The use of the Internet or other electronic means to Q- .......... refers to sending email to thousands and
harass an individual, a group of individuals, or an thousands of users-similar to a chain letter.
organization is termed:

(a)Email spamming
(a)Cyberspace
(b)Email bombing
(b)Cyber stalking
(c)Trojan attack
(c) Pornography
(d)None of these
(d)None of these
Thank You

What is email? What you need


⚫Short for electronic mail - Email
⚫a computer with internet access
⚫Send & receive messages over the internet
⚫Must have an email account on-line. ⚫an email account with a service
provider such as Yahoo, Gmail,
Hotmail, etc

Choosing an email provider Setting up your account


⚫Parts of an email address:
⚫Most common are Hotmail (Microsoft),
⚫Username and domain
Gmail (Google), Yahoo Mail (Yahoo!) ⚫Example
[email protected]
⚫user name : PositiveVibesPunjab - you create
your own - each must be unique
⚫@ symbol : unique to email addresses (Shift key
+ 2) Separates user name from domain
⚫email provider’s name: Gmail, yahoo etc
⚫domain : .com - others could be .net or .org
Password Parts of an email
⚫Something easy to remember, but difficult to guess ⚫To : Enter the exact email address of your recipient
⚫Do NOT use sensitive information, such as bank ⚫Remember: [email protected]
PIN, etc. ⚫Example:- [email protected]
⚫Usually a combination of letters and numbers is ⚫For multiple recipients, separate each address
best with a comma (semi colon)
⚫Verification questions in case you forget your
password may be required on accounts. ⚫CC : carbon copy

⚫BCC : BLIND carbon copy

E-Mail Address
E-mail
Each user of email is assigned a unique name for
Email is a service which allows us to send the his email account. This name is known as E-mail
message in electronic mode over the internet. It address. Different users can send and receive
offers an efficient, inexpensive and real time mean messages according to the e-mail address.
of distributing information among people ⚫Example
[email protected]

E-Mail Address
E-mail Message Components

1. The username and the domain name are E-mail message comprises of different
separated by @ (at) symbol. components: E-mail Header, Greeting, Text, and
2. E-mail addresses are not case sensitive. Signature. These components are described in the
3. Spaces are not allowed in e-mail address following diagram:
E-mail Message Components E-mail Header
The first five lines of an E-mail message is called E-
mail header. The header part comprises of
following fields:
From
Date
To
Subject
CC
BCC

From Subject
The From field indicates the sender’s address i.e. The Subject field indicates the purpose of e-mail. It
who sent the e-mail.
Date should be precise and to the point.
The Date field indicates the date when the e-mail CC
was sent. In email sending, CC is the abbreviation for “carbon copy.” Back in
To the days before internet and email, in order to create a copy of the
The To field indicates the recipient’s address i.e. to letter you were writing, you had to place carbon paper between the
whom the e-mail is sent.
one you were writing on and the paper that was going to be your
copy.

BCC Greeting
BCC stands for “blind carbon copy message. Just Greeting is the opening of the actual message. Eg.
Hi Sir or Hi Guys etc.
like CC, BCC is a way of sending copies of an email Text
to other people. The difference between the two is It represents the actual content of the message.
Signature
that, while you can see a list of recipients when CC This is the final part of an e-mail message. It
is used, that's not the case with BCC includes Name of Sender, Address, and Contact
Number.
E-mail Protocols SMTP

SMTP stands for Simple Mail Transfer Protocol.


E-mail Protocols are set of rules that help the
It was first proposed in 1982. It is a standard
client to properly transmit the information to or
protocol used for sending e-mail efficiently and
from the mail server. Here, we will discuss
reliably over the internet.
various protocols such as SMTP, POP, and IMAP.
Key Points:
•SMTP is application level protocol.
•SMTP is connection oriented protocol.

SMTP SMTP
Key Points: Key Points:
•SMTP is text based protocol. •When you send e-mail, your e-mail client sends it
•It handles exchange of messages between e- to your e-mail server which further contacts the
mail servers over TCP/IP network. recipient mail server using SMTP client.
•Apart from transferring e-mail, SMPT also •These SMTP commands specify the sender’s and
provides notification regarding incoming mail. receiver’s e-mail address, along with the message
to be send.

SMTP MIME
Key Points: Multipurpose Internet Mail Extension (MIME) is a
•The exchange of commands between servers is standard which was proposed by Bell
Communications in 1991 in order to expand
carried out without intervention of any user. limited capabilities of email.
•In case, message cannot be delivered, an error MIME is a kind of add on or a supplementary
protocol which allows non-ASCII data to be sent
report is sent to the sender which makes SMTP a through SMTP. It allows the users to exchange
reliable protocol. different kinds of data files on the Internet: audio,
video, images, application programs as well.
Why do we need MIME? IMAP
Limitations of Simple Mail Transfer Protocol – IMAP stands for Internet Message Access
•SMTP has a very simple structure Protocol. It was first proposed in 1986. There exist
•It cannot be used for languages that do not support 7-bit
five versions of IMAP as follows:
ASCII format such as- French, German, Russian, Chinese
Original IMAP
and Japanese, etc. so it cannot be transmitted using SMTP. IMAP2
So, in order to make SMTP more broad we use MIME. IMAP3
IMAP2bis
•It cannot be used to send binary files or video or audio
IMAP4
data.

IMAP IMAP
Key Points: Key Points:
•IMAP allows the client program to manipulate •IMAP enables the users to search the e-mails
the e-mail message on the server without
downloading them on the local computer.
.

•It enables us to take any action such as


downloading, delete the mail without reading the
mail.

POP E-mail System


POP stands for Post Office Protocol. It is generally E-mail system comprises of the following three
used to support a single client. There are several components:
versions of POP but the POP 3 is the current •Mailer
standard •Mail Server
Key Points •Mailbox
•POP is an application layer internet standard
protocol.
•In order to access the messaged, it is necessary to
download them
.
E-mail System E-mail System
Mailer Mailboxes
It is also called mail program, mail
application or mail client. It allows us to manage, Mailbox is generally a folder that contains emails
read and compose e-mail.
Mail Server and information about them.
The function of mail server is to receive, store and
deliver the email. It is must for mail servers to be
Running all the time because if it crashes or is .

down, email can be lost.

Working of E-mail Working of E-mail


•Email working follows the client server approach. •Suppose person A wants to send an email message to

In this client is the mailer i.e. the mail application person B.


•Person A composes the messages using a mailer
or mail program and server is a device that
program i.e. mail client and then select Send option.
manages emails.
•The message is routed to Simple Mail Transfer
.
Protocol to person B’s mail server.
•The mail server stores the email message on disk in an
area designated for person B.
.

Working of E-mail Working of E-mail


•Now, suppose person B is running a POP client and •The disk space area on mail server is called mail spool.
knows how to communicate with B’s mail server.
•It will periodically poll the POP server to check if any new
.
email has arrived for B.As in this case, person A has sent
an email for person B, so email is forwarded over the
network to B’s PC. This is message is now stored on
person B’s PC.
Creating Email Account Creating Email Account
•There are various email service provider available such
as Gmail, hotmail, ymail, rediff mail etc. Here we will
learn how to create an account using Gmail.
•Open gmail.com and click create an account.
•Now a form will appear. Fill your details here and
click Next Step

Creating Email Account Creating Email Account


Now a welcome window appears. Click Continue to Key Points:
Gmail.
Now you will see your Gmail account as shown in Gmail manages the mail into three categories
the following image:
namely Primary, Social and Promotions.
Compose option is given at the right to compose an email
.
message.
Inbox, Starred, Sent mail, Drafts options are available on
the left pane which allows you to keep track of your
emails.

Composing and Sending Email


You should specify the correct email address; otherwise it
Before sending an email, we need to compose a message.
will send an error back to the sender.
When we are composing an email message, we specify
Reading Email
the following things:
Every email program offers you an interface to
Sender’s address in To field access email messages. Like in Gmail, emails are
Cc (if required)
Bcc (if required) stored under different tabs such as primary,
Subject of email message
Text social, and promotion. When you click one of tab,
Signature
it displays a list of emails under that tab.
Deleting Email
Replying Email
If you don’t want to keep email into your inbox, you can
After reading an email, you may have to reply that email.
delete it by simply selecting the message from the
To reply an email, click Reply option shown at the bottom
message list and clicking delete or pressing the
of the opened email.
Forwarding Email appropriate command.
Attachment
It is also possible to send a copy of the message that you
Ability to attach file(s) along with the message is one of
have received along with your own comments if you
the most useful features of email. The attachment may
want. This can be done using forward button available in
be a word document, PowerPoint presentation,
mail client software.
audio/video files, or images.

Address Book Email etiquette


Address book feature of a mail program allows the users The term etiquette refers to conventional rules of
to store information about the people whom they personal behavior. But while communicating via email,
communicate regularly by sending emails we cannot know about the body language and tone of
voice etc. Therefore a set of guidelines for acceptable
behavior on email that have been evolved is known
as Email etiquette.

.
.

Email etiquette Email etiquette


Here are set of guidelines that should be followed while •The subject heading of a message should be clear and
working with email: descriptive.
•Try to make your message as short as possible. It will •While sending mails to multiple persons, specify
make your message easy to read and understood. their email addresses in the BCC: field so that the
•Be careful about spelling and grammar while typing a
spammers cannot come to know about addresses
message.
of other recipients to whom you have sent a copy.
•Use emoticons, smiles when required.
•Keep size of attachment as small as possible.
•Email address entered must be correct.
•Always add your signature at the end of email.
E-mail Hacking E-mail Hacking
Email hacking can be done in any of the following Spam
E-mail spamming is an act of sending Unsolicited
ways:
Bulk E-mails (UBI) which one has not asked for.
1. Spam
Email spams are the junk mails sent by
2. Virus
commercial companies as an advertisement of
3. Phishing
their products and services.
.

E-mail Hacking E-mail Hacking


Virus Phishing
Some emails may incorporate with files containing Email phishing is an activity of sending emails to a user

malicious script which when run on your claiming to be a legitimate enterprise. Its main purpose is to
steal sensitive information such as usernames, passwords,
computer may lead to destroy your important
and credit card details.
data.
Such emails contains link to websites that are infected with
. malware and direct the user to enter details at a fake
website whose look and feels are same to legitimate one.

E-mail Spamming and Junk Mails


Email spamming is an act of sending
Unsolicited Bulk E-mails (UBI) which one has
not asked for. Email spams are the junk mails
sent by commercial companies as an
advertisement of their products and services.

.
Mobile Computing is a technology that allows
transmission of data, voice and video via a
Working of Mobile Phones and personal digital Gadgets computer or any other wireless enabled device
without having to be connected to a fixed physical
link. The main concept involves

•Mobile hardware
•Mobile software

Mobile Hardware These devices will have a receptor medium that is capable
Mobile hardware includes mobile devices or device of sensing and receiving signals. These devices are
components that receive or access the service of mobility. configured to operate in full- duplex, whereby they are
They would range from portable laptops, smartphones, capable of sending and receiving signals at the same time.
tablet Pc's, Personal Digital Assistants They don't have to wait until one device has finished
communicating for the other device to initiate
communications.
Above mentioned devices use an existing and established
network to operate on. In most cases, it would be a wireless

network.

Mobile software Mobile computing - is not only limited to mobile


Mobile software is the actual program that runs on the mobile phones, but there are various gadgets available in
hardware. It deals with the characteristics and requirements
the market that are built on a platform to support
of mobile applications. This is the engine of the mobile
mobile computing. They are usually classified in
device. In other terms, it is the operating system of the
the following categories −
appliance. It's the essential component that operates the
mobile device.
Personal digital assistant

• A personal digital assistant (PDA), also known as


a handheld PC.
• It is a variety mobile device which functions as a
personal information manager.
• The main purpose of this device is to act as an
electronic organizer or day planner that is portable,
easy to use and capable of sharing information with
your computer systems.

• The most common mobile Operating Systems (OS) used


Smartphones
by modern smartphones include Google's Android,

• This kind of phone combines the features of a PDA with that Apple's iOS, Microsoft's Windows Phone.

of a mobile phone or camera phone.


• It has a superior edge over other kinds of mobile phones.
• These phones include high-resolution touch screens, web
browsers that can access and properly display standard
web pages rather than just mobile-optimized sites, and
high-speed data access via Wi-Fi and high speed cellular
broadband.

Tablet PC and iPads They offer the same functionality as portable computers.
• This mobile device is larger than a mobile phone or
a PDA and integrates into a touch screen and is
operated using touch sensitive motions on the
screen.
• They are often controlled by a pen or by the touch of
a finger.
• They are usually in slate form and are light in
weight.
• Examples would include ipads, Galaxy Tabs,
Blackberry Playbooks etc.
E-readers Who invented cell phones?
E-book readers—also called e-readers—are similar to
tablet computers, except they are mainly designed for
reading e-books (digital, downloadable books).
Notable examples include the Amazon Kindle, which
is easier to read than a traditional computer display.

Photo: Martin Cooper's original radio telephone system (cellphone)


design, submitted as a patent application in 1973. Note how the mobile
part forms an entirely separate system (shown in blue, on the right) that
communicates with the existing public network

History of mobile phones and the first mobile • These early mobile phones are often referred to
phone
as 0G mobile phones, or Zero Generation mobile
• The very first mobile phones were not really mobile
phones.
phones at all.
• Most phones today rely on 3G or 4G mobile technology.
• They were two-way radios that allowed people like taxi
• Mobile telephony has a long history that started off with
drivers and the emergency services to communicate.
experiments of communications from and to moving
• Motorola, on 3 April 1973 were first vehicle rather then handheld devices.
company to mass produce the the first 1926: The first successful mobile telephony service was
offered to first class passengers the route between Berlin
handheld mobile phone.
and Hamburg.
1946: The first calls were made on a car radiotelephone in
Chicago.

1956: The first automated mobile phone system for private Martin Cooper changed the world when he made

vehicles launched in Sweden. The device to install in the car the first cell phone call 40 years ago.
used vacuum tube technology with rotary dial and weighed The former Motorola vice president and division
40Kg. manager made the call on the company's

1973: Dr Martin Cooper general manager at DynaTAC phone while standing in front of the
New York Hilton on Sixth Avenue. His first call: to
Motorola communications system division
the head of research at Bell Labs, a company
made the first public mobile phone call on a
that also was attempting to build the first cell
device that weighed 1.1Kg.
phone.
1987: The Technical specifications for the GSM How Do Cell Phones Work?
In the most basic form, a cell phone is essentially a two-
standard are approved.
way radio, consisting of a radio transmitter and a radio
1992: The world’s first ever SMS message was receiver. When you chat with your friend on your cell
sent in the UK. Neil Papworth, aged 22 at the phone, your phone converts your voice into an electrical
time was a developer for a telecom contractor signal, which is then transmitted via radio waves to the

tasked with developing a messaging service for nearest cell tower. The network of cell towers then
relays the radio wave to your friend’s cell phone, which
Vodafone. The text message read “Merry
converts it to an electrical signal and then back to sound
Christmas” and was sent to Richard Jarvis, a
again. In the basic form, a cell phone works just like a
director at Vodafone, who was enjoying his office walkie-talkie.

Christmas party.
Radio Antenna
Waves
Cell phones use radio waves to communicate. Radio waves transport
digitized voice or data in the form of oscillating electric and magnetic
• Cell phones contain at least one radio antenna in order
fields, called the electromagnetic field (EMF). The rate of oscillation is
to transmit or receive radio signals. An antenna
called frequency. Radio waves carry the information and travel in air at
the speed of light. converts an electric signal to the radio wave
Cell phones transmit radio waves in all directions. The waves can be (transmitter) and vice versa (receiver). Some cell
absorbed and reflected by surrounding objects before they reach the phones use one antenna as the transmitter and
nearest cell tower. For example, when the phone is placed next to your
receiver while others, such as the iPhone 5, have
head during a call, a significant portion (over half in many cases) of the
multiple transmitting or receiving antennas.
emitted energy is absorbed into your head and body. In this event, much
of the cell phone’s EMF energy is wasted and no longer available for • Many modern smart phones also contain more than
communication. one type of antenna. In addition to the cellular antenna,
they may also have Wi-Fi, Bluetooth and/or GPS

Connectivity There are three common technologies


used by cell-phone networks for
As mentioned earlier, a cell phone is a two-way wireless communication transmitting information:
device and needs both the inbound signal (reception) and the outbound
signal (transmission) to work. The magnitude of the received signal from
•Frequency division multiple access (FDMA)
the cell tower is called the “signal strength”, which is commonly indicated
•Time division multiple access (TDMA)
by the “bars” on your phone. The connectivity between a cell phone and
its cellular network depends on both signals and is affected by many •Code division multiple access (CDMA)
factors, such as the distance between the phone and the nearest cell •GSM: Global System for Mobile Communications
tower, the number of impediments between them and the wireless
technology (e.g. GSM vs. CDMA). A poor reception (fewer bars) normally
indicates a long distance and/or much signal interruption between the cell
phone and the cell tower.
SMS :- Short Message Service...

MMS:- Multimedia Messaging Service

SIM:-Subscriber Identification Module

IMEI :- International Mobile Equipment Identity

You might also like