File 64477ffea2a9c
File 64477ffea2a9c
Compiled By
Aparna Samantaray
Syllabus
UNIT 1: Basic Internet skills: Understanding browser, efficient use of search engines,
awareness about Digital India portals (state and national portals) and college portals.
General understanding of various computer hardware components – CPU, Memory,
Display, Key- board, Mouse, HDD and other Peripheral Devices.
UNIT 2:
OS Installation (Linux and MS Windows), Unix Shell and Commands, vi editor.
UNIT 3:
HTML4, CSS, making basic personal webpage.
UNIT 4:
Office Tools: OpenOffice Writer, OpenOffice Spreadsheet(Calc), OpenOffice Impress.
Working: A computer can take data from the user through input devices (Input), process
the user given data (Processing), produces the result to the user through output devices
(Output)and stores data (Information) for future use
Block Diagram of
Computer
Flows
Components of
The computer is the Computer
combination of hardware and software.
Hardware is the physical component of a like
motherboard, memory
computerdevices, monitor, keyboard etc., while
software is the set of programs or instructions. Both hardware and
software together make the computer system to function.
Components of
Computer
What does a computer consist of?
Although every computer mainly
consists of two things hardware
and soft ware but the user who
access it also sometimes regarded
as computer components so we can
include its overall components are..
Hardware
Software
User
Components
C.P.U (Central
Processing Unit)
CPU is the major component which interprets and executes software Instructions. It also
control the operation of all other components such as memory, input and output units. It
accepts binary data as input, process the data according to the instructions and provide the
result as output.
The CPU has three components which are Control unit, Arithmetic and logic unit (ALU) and
Memory unit.
Arithmetic and Logic Unit: The ALU is a part of the CPU where various computing functions
are performed on data. The ALU performs arithmetic operations such as addition,
subtraction, multiplication, division and logical operations. The result of an operation is
stored in internal memory of CPU.
Control Unit: The control unit controls the flow of data between the CPU, memory and I/O
devices. It also controls the entire operation of a computer.
Memory Unit: To Store the result of all the processed data by ALU we need a temporary
storage place that is called as memory unit of CPU. It has various registers that are limited
in numbers to hold that data temporary for other process.
Unit Types
Types of CPU
1.Single-core CPU: it is the oldest type of CPU which
is available and employed in most of the personal
and official computers. ...
6. Deca-core processor.
Secondary)
Secondary)
Memory is the most essential element of a computing system because
without it computer can’t perform simple tasks. The Memory Unit is of two
types which are primary memory and secondary memory.
The primary memory is used to temporarily store the programs and data
when the instructions are ready to execute. The secondary memory is used to
store the data permanently.
The Primary Memory is volatile, that is, the content is lost when the power
supply is switched off. The Random Access Memory (RAM) is an primary-
volatile memory and Read Only Memory (ROM) is primary-non-volatile
memory.
The Secondary memory is non volatile, that is the content is available even
after the power supply is switched off. Hard disk, CD-ROM and DVD ROM are
examples of secondary memory.
Memory
Detail
It is also called as read write memory or the main memory or the primary memory. The
programs and data that the CPU requires during execution of a program are stored in this
memory. It is a volatile memory as the data loses when the power is turned off. RAM is
further classified into two types-
SRAM (Static Random Access memory) and DRAM (Dynamic Random Access Memory).
in Detail
Read Only Memory (ROM) –Stores crucial information essential to operate the system,
like the program essential to boot the computer. It has following features:
1. It is not volatile.
2. Always retains its data.
3. Used in embedded systems or where the programming needs no change.
4. Used in calculators and peripheral devices.
5. ROM is further classified into 4 types- ROM, PROM, EPROM, and EEPROM.
3. EEPROM (Electrically erasable programmable read only memory) – The data can
be erased by applying electric field, no need of ultra violet light. We can erase only
portions of the chip.
AND ROM
Hard Disk Drive (HDD)
A hard disk drive (HDD), hard
disk, hard drive, or fixed disk is an electro-
mechanical data storage device that stores
and retrieves digital data using magnetic
storage and one or more rigid rapidly
rotating platters coated with magnetic
material.
This device works like a Xerox machine. The scanner any converts type of printed or
written information including photographs into a digital format, which can be manipulated
by the computer.
Bar Code reader
Bar Code / QR Code Reader: A Bar code is a
pattern printed in lines of different thickness. The
Bar code reader scans the information on the
bar codes transmits to the Computer for further
processing. The bar code is 13 digits long and it
has four main divisions.
They use the technology of firing ink by heating it so that it explodes towards the paper
in bubbles or by using piezoelectricity in which tiny electric currents controlled by
electronic circuits are used inside the printer to spread ink in jet speed. An Inkjet printer
can spread millions of dots of ink at the paper every single second
Peripheral Devices
A peripheral device, also sometimes called an auxiliary device, is any connected
device (internal or external) that provides a computer with additional
functionality.
Peripheral devices fall into three main categories:
1. Input devices, which send data to the computer.
2. Output devices, which receive data from the computer.
3. Input/output devices, such as storage devices
Motherboard
Motherboard
supporting
varies
various
greatly
types
in
components. of
UNIT-1 LECTURE -2
COMPUTER LANGUAGES
Contents of UNIT: 1
When a user wants to give any instruction to the computer the user needs a specific
language and that language is known as a computer language. The user interacts with
the computer using programs and that programs are created using computer
programming languages like C, C++, Java, etc.,
In short we can say that Computer languages are the languages through which the user
can communicate with the computer by writing program instructions. Every computer
programming language contains a set of predefined words and a set of rules (syntax) that
are used to create instructions of a program.
classification
Over the years, computer languages have been evolved from Low-Level to
middle level to now High-Level Languages. In the earliest days of computers,
only Binary Language was used to write programs.
classification
When writing a program in a high-level language, then the whole attention needs to
be paid to the logic of the problem not the process.
Languages like COBOL, FORTRAN, BASIC, C, C++, JAVA, etc., are examples of high-level
languages.
High level language
Continue…
Advantages of a high-level language:
The programming languages like C, C++, Java, etc., are written in High-level language
which is more comfortable for the developers.
A high-level language is closer to the users, so it is easy to read, write, and maintain as
it is written in English like words.
Assembler is a translator which takes assembly code as input and produces machine
code as output. Computer cannot understand middle-level
language, so it needs to be translated into a low-level language to make it
understandable by the computer. So, Assembler is used to translate middle-
level language into low-level language.
Continue…
Advantages of a Assembly level language:
Computer can understand any thing in two bits either 0 or 1 so, machine language can
only be represented by 0s and 1s. For example: To write 12 in the computer system
its representation is 1100. So it is very difficult to learn. To overcome this problem
the assembly language is invented.
Machine language is also known as the Machine Code. CPU directly understands the
binary language instructions, it does not require any translator. CPU directly
starts executing the binary language instructions and takes very less time to
execute the instructions as it does not require any translation. Low-level
language is considered as the First Generation Language (1GL).
Low level language
Continues..
Advantages of a low level language:
Low-level language instructions require very less time for their execution.
In low-level language, there is more chance for errors and it is very difficult to
find errors, debug and modify.
together?
INTRODUCTION TO IT SYSTEMS
Subject Code- 2002203
UNIT-1 LECTURE-3
Basic Internet Skill, Computer and
Communication
Contents of UNIT: 1
File Transfer: the ability to move a file from one computer to another. Transferring text files between
machines is straight forward although it may be necessary to select a translation option to ensure
the end of line character is treated properly.
File Access: the ability to read or write a file on another computer. For example this allows a group
of workstations to be connected together but to attach all the disks to just one member which
would then provide the file store for the rest of the group.
Mail: This is a natural extension to the service provided to a group of users on a single computer to a
group of users on a network of computers.
Remote Login: i.e. connecting a user's terminal or workstation to a remote computer so that the user
can use that computer as if it were his local one.
Computer Network:
Communication
A computer network is an interconnection of various computers to
share software, hardware, resources and data through a
communication medium between them. The computers on a
computer network may be linked through cables, telephone lines,
radio waves, satellites, or infrared light beams.
Network and internet
Evolution of Networking
1. ARPANET:
ARPANET was established by the
Advanced Research Projects Agency
(ARPA) in 1969 for two main reasons:
3. Internet
Internet is a world-wide global system of
interconnected computer networks.
The History of the Internet Began with the launch of the Evolution of Research
Network (ERNET) in 1986.
The first publicly available Internet Service in India was launched by state -owned
videsh Sanchar Nigam Limited (VSNL) on 14thAugust 1995
Internet Uses in Current
time
Internet allows us to communicate with
the people sitting at remote locations.
There are various apps available on the
Apart from communication and source
of information, internet also serves a
medium for entertainment.
web that uses Internet as a medium for
communication. Online Television
Online Games
One can find various social networking Songs
sites such as: Videos
Social
Facebook Networking
Twitter Apps
Instagram
Gmail Internet allows
Whatsapp etc. us to use many
services
One can surf for any kind of information like:
over the internet with the help of a search Internet Banking
engine. Online
Educational
Services
Online Shopping
Basic Tools of Internet
In order to access the various services of internet we need to have two main
components and these are called basic tools for accessing internet.
1. Hardware components
2. Software components
Internet
The World Wide Web abbreviated as WWW or
the Web. It is an information space
where documents and other web resources are
identified by Uniform Resource Locators
(URLs), interlinked by hypertext links, and can be
accessed through the Internet. Scientist Tim
Berners Lee invented the World Wide Web in
1989. He introduced the first web browser
computer program in 1990 . the browsers
available in general public on the Internet in
August 1991 .
Web Browser
A Web Browser is an application software that
allows us to view and explore information on the
web. A web browser also called browser. It is a
software application for retrieving, presenting
and traversing information resources on the
World Wide Web. Browsers are primarily use the
World Wide Web, they can also be used to
access information provided by web servers
in private networks or files in file systems
1.3 Familiar Web
Browser
Looking for information on the internet is called surfing or browsing. To
browse the internet, a software called the web browser or browser is used.
E-commerce, social media, and many other things we take for granted
today would be impossible without internet browsers. Web browsers
translates HTML documents of the website and allows to view it on the
screen.
Web pages are called Static when they remain the same whenever it is visited. Examples
of static Websites are website owned by Small business organizations, School websites.
Websites that displays marks of Public Examinations and Entrance Examinations changes
when different register numbers are given. Such websites are called as Dynamic
Websites. Eg,. Websites of Government and Entrance Exams.
e
A 'web search engine' or search engine is a
software system that is designed to search for
information on the World Wide Web. Search
engines, sometimes called search services, allow
an individual to search the contents of pages and
files on the World Wide Web.
Primary Search Engines: Such search engines use web crawlers or spiders to
traverse the web and scan websites for key words, phrases, to generate database of
web pages having some indexing or classification. Google and Alta Vista are examples
of primary search engines.
(B) Web directory: Web directories organize information into categories and
subcategories or directories. You can search a web directory for all those entries
that contain a particular set of keywords. Directories differ from search engines in
the way they organize information. Yahoo is an example of web directory.
(C) Meta search engines: Such search engines pass your queries to many search
engines and web directories and present summarized results to the users. Some
of the examples of meta search engines are — Dogpile, Infind, Metacrawler,
Metafind and Meta-search.
Search Engine
Spidering or Web crawling: Spider or Web crawler is a computer program that browses the web
pages of WWW in a systematic, automated manner. Search Engines use spider for getting up-to-
date data on web sites. They are used to create a copy of the pages visited by them for later
processing to create Index.
Indexing: Once, the spiders have completed the task of finding information about Web pages,
the search engine must store the information in such way that you are able to use it. The search
engine may provide some information relating to relevance of information may be in the form of
Ranking. Thus, a search engine may store the keywords of a web page, number of times
that word appeared on the page, the URL of the page. This is one of the reasons that
a search for the same word on different search engines will produce different results. Since, the
data that is to be stored for indexing is large, therefore, search engine may encode it. The Index is
created with the sole purpose, that is, it allows you to find the information on the Internet quickly.
Searching: When a user enters a query into a search engine, the engine examines its index and
provides a listing of best-matching web pages according to its ranking criteria. This short list,
usually, have a short summary containing the tile of the document and small part of the text.
Most search engines support Boolean search. Some simple example of a search is given below: To
find website which contains ―java tutorial‖, you may type Java tutorial in the search box of the
browser. The search will look for keywords ―Java‖ AND ―Tutorial‖; the search expression will
retrieve all those records where both the terms occur.
Continues..
Continues..
Domain Name
Domain Name:
A domain name is an identification a string that
defines a area of administrative autonomy, authority
or control within the Internet. Domain names are
formed by the rules and procedures of the Domain
Name System (DNS).
However, to enable the use of simple textual address, you will require a service that will
map these text based names to respective IP addresses automatically. Such a service was
designed in 1983 by the University of Wisconsin with the name Domain Name System
(DNS).
In the present day, Internet, Domain Name System (DNS) should keep track of address of
each computer or any other internet device and email addresses. The name servers
translates the web address or email address to respective IP address.
For example, the name server translates address like www.ignou.ac.in into a computer
understandable IP address. It sounds simple, but remembers on Internet you are dealing
with million of addresses and every day this list is increasing. All these computers have a
unique address. Therefore, DNS follows a hierarchical naming scheme that is supported
by distributed database system to ensure no duplicate names are issued at all.
Internet, Intranet and
Extranet
Domain Name System(DNS), is The heart of intranets and the internet through
which computers can contact each other and do things such as exchange
electronic mail or display Web pages. The Internet Protocol (IP) uses this
Internet address information and the DNS to deliver mail and other
information from computer to computer
URL
Uniform Resource Identifier or URI is a
unique identifier to identify a resource
located on the web. URI identifies a
resource (hardware or software) either by
its location or by its name or by both. URL is
Uniform Resource Locator and provides the
location and mechanism (protocol) to access
the resource. Examples of URI identifying
resources using location (i.e., URL) are: In the above URL, http is the protocol name,
https://www.mhrd.gov.in it can be https, http, FTP, Telnet, etc. www is
http://www.ncert.nic.in, a subdomain. ncert.nic.in is the domain
http://www.airindia.in,etc. name. Note: These days it is not mandatory
to mention protocol and subdomain while
URL is sometimes also called a web entering a URL. The browser automatically
address. However, it is not only the domain prefixes it
name but contains other information that
completes a web address, as depicted
below:
URL continues..
A URL is also like an address that shows
where a particular page can be found
on the World Wide Web. Every server
on the internet has an IP number, a
unique number consisting of four parts
separated by dots. The IP number is the
server’s address
165.113.245.2
128.143.22.55
At times the number keeps changing
hence it is harder for people to
remember number than to remember
word combinations. So, addresses are
given “word-based” addresses called
URL. The URL and the IP number are
one and the same.
Email
Electronic mail or email is information stored on a computer that is exchanged between
the two users over telecommunications. Email is a message that may contain text, files,
images or any other attachments sent through a network to a specified individual or
group of individuals .
Working of Email
Advantages of Email
The To field is where you type the e-mail address of the person who is the recipient of
your message.
The From field should contain your e-mail address, If you are replying to a message,
the To and From fields are automatically filled out; if it's a new message, you'll need
to enter them manually.
The Subject should consist of a few words describing the e-mail's contents. The
Subject lets the recipient see what the e-mail is about, without opening and
reading the full e-mail. This field is optional.
The CC (Carbon Copy) field allows you to specify recipients who are not direct
addressees (listed in the "To" field). This field is optional.
The BCC (Blind Carbon Copy) field is similar to CC, except the recipients are secret.
Each BCC recipient will receive the e-mail, but will not see who else received a
copy. The addressees (anyone listed in the "To" field) remain visible to all
recipients. This field is optional.
Finally, the Message Body is the location you type your main message. It often
contains your signature at the bottom; similar to a hand-written letter.
Structure of E-mail
Internet Threat
It’s a dangerous world out there in the World Wide Web. Just as your mother may have told
you to never talk to strangers, the same advice holds true for the virtual world. You may
know to be wary of giving strangers your business bank account details. But can you be
sure the website you’re logging into is that of your bank and not a forgery created by a
cybercriminal? Cybercriminals use many different methods to lure you into parting with
your confidential personal or business information. Hence you ought to be aware of the
issues and be extra vigilant when online and offline..
1. Computer virus: A computer virus is a small piece of software that can spread from one
infected computer to another. The virus could corrupt, steal, or delete data on
your computer.
2. Malware: Malware is short for “malicious software.” Malware is used to mean a
“variety of forms of hostile, intrusive, or annoying software or program code.” Malware
could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious
rootkits—all of which are defined below.
3. Trojan horse: Users can infect their computers with Trojan horse software simply by
downloading an application they thought was legitimate but was in fact malicious.
4. Malicious spyware: Malicious spyware is used to describe the Trojan application that
was created by cybercriminals to spy on their victims.
5. Computer worm: A computer worm is a software program that can copy itself from one
computer to another, without human interaction.
Internet Threat
Botnet: A botnet is a group of computers connected to the Internet that have been
compromised by a hacker using a computer virus or Trojan horse. An individual computer
in the group is known as a “zombie“ computer.
Spam: Spam in the security context is primarily used to describe email spam. Unwanted
messages in your email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter
your mailbox as well as potentially take up space on your mail server.
Rootkit: A rootkit is a collection of tools that are used to obtain administrator-level access
to a computer or a network of computers. A rootkit could be installed on your computer
by a cybercriminal exploiting a vulnerability or security hole in a legitimate application on
your PC and may contain spyware that monitors and records keystrokes.
Safe Internet rules
1. Don’t give out your personal information – Don’t put personal details such as your home
address, telephone numbers or parent’s work address online as cybercriminals can use
this information to create a fake profile with your details
2. What goes online, stays online – Use privacy settings to make sure only your friends and
family can see photos you post. Avoid posting holiday plans as criminals have been
known to track your movements
3. Check your security and privacy settings – Make sure your social network
privacy settings are secured so only your friends can see your personal information and
use your privacy settings to restrict who can see your posts, videos and photos.
4. Password safety – Sharing your password with your parents is a sensible idea, but avoid
sharing your password with your friends, even if they promise they won’t tell
anyone! Also, when setting your password, make sure it isn’t something people may
guess such as your pet’s name. Use a mixture of letters, numbers and upper and
lower case characters
5. Always protect your mobile device – Make sure your mobile phone is pin-protected so all
your personal information stored on it is safe. Download a security app which allows
you to remotely wipe any personal data, should your mobile be lost or stolen.
Safe Internet rules
6. Don’t talk to strangers online or offline – Don’t meet up with strangers and let your
parents, know if a stranger has tried to get in contact with you online.
7. Listen to the adults who know – Adults will always be worried about you. Help set their
mind at rest and avoid chatting online with strangers.
8. Be wary of unsecured or unknown websites – When shopping online, use reputable and
known retailers.
9. Be careful what links you click on – Avoid clicking links in an email, Instant Message or
on your social network unless you are sure the message is from someone you know
INTRODUCTION TO IT SYSTEMS LAB
Subject Code- 2002207
https://en.wikipedia.org/wiki/Computer_hardware
Topic: Lab work 2
LAB 2
Connect various peripherals (printer, scanner, etc) to computer, explore
various features of peripheral and their device driver software.
Topic: Lab work 2
LAB 2
Connect various peripherals (printer, scanner, etc.) to computer, explore
various features of peripheral and their device driver software.
2
Topic: Lab work 2
Connect various peripherals (printer, scanner, etc.) to computer,
explore various features of peripheral and their device driver software.
Topic: Lab work 2
LAB 2
Connect various peripherals (printer, scanner, etc.) to computer, explore
various features of peripheral and their device driver software.
Topic: Lab work 3
LAB 3
Browser features, browsing, using various search engines and writing search
queries.
Topic: Lab work 3
LAB 3
Browser features, browsing, using various search engines and writing search
queries.
A navigational query is a search query entered with the intent of finding a particular
website or webpage. For example, a user might enter "youtube" into Google's search
bar to find the YouTube site rather than entering the URL into a browser's navigation bar
or using a bookmark. In fact, “facebook” and “youtube” are the top two searches on
Google, and these are both navigational queries.
Topic: Lab work 3 LAB 3
Browser features, browsing, using various search engines and writing search
queries.
DigiLocker: It serves as a platform to enable citizens to securely store and share their
documents with service providers who can directly access them electronically.
National Scholarships Portal (NSP): It provides a centralized platform for application and
disbursement of scholarship to students under any scholarship scheme.
DARPAN: It is an online tool that can be used to monitor and analyze the implementation
of critical and high priority projects of the State.
LAB 4
PRAGATI (Pro-Active Governance And Timely Implementation): It has been aimed at
starting a culture of Pro-Active Governance and Timely Implementation. It is also a robust
system for bringing e-transparency and e-accountability
Common Services Centres 2.0 (CSC 2.0): It is being implemented to develop and provide
support to the use of information technology in rural areas of the country. The CSCs enabled
kiosks with broadband connectivity to provide various Governments, private and social
services at the doorstep of the citizen
Mobile Seva: It provides government services to the people through mobile phones and
tablets.
Jeevan Pramaan: It is an Aadhaar based Biometric Authentication System for Pensioners. The
system provides authenticity to Digital Life Certificate without the necessity of the pensioner
being present in person before his/ her Pension Dispensing Authority (PDA).