BASICS OF COMPUTER AND
APPLICATION
Introduction
Computer architecture refers to the design and organization of a computer system, de ning how
hardware and software components interact. It involves processor design, memory hierarchy,
input/output systems, and instruction sets that determine a computer’s performance and
functionality.
Components of Computer Architecture
Computer architecture consists of three major components:
1. Central Processing Unit (CPU)
2. Memory (Primary and Secondary Storage)
3. Input and Output Devices
1. Central Processing Unit (CPU) S
TE
The CPU is the brain of the computer that performs calculations and executes instructions. It
O
consists of the following units:
N
a) Arithmetic Logic Unit (ALU)
I
AT
• Performs arithmetic (addition, subtraction, multiplication, division) and logical
AP
operations (AND, OR, NOT, XOR).
AJ
• Responsible for executing mathematical calculations.
PR
b) Control Unit (CU)
AN
• Manages and controls the execution of instructions.
AG
• Directs the ow of data between different components of the computer.
• Uses the instruction cycle (Fetch-Decode-Execute) to process commands.
G
c) Registers
• Small, high-speed storage areas inside the CPU.
• Used to store temporary data and instructions during execution.
fl
fi
• Types of registers:
◦ Accumulator (ACC): Stores results of arithmetic and logic operations.
◦ Program Counter (PC): Holds the address of the next instruction to be executed.
◦ Instruction Register (IR): Holds the current instruction being executed.
◦ Stack Pointer (SP): Points to the top of the stack memory.
◦ General Purpose Registers: Store temporary data for execution.
d) Cache Memory
• High-speed memory located inside or near the CPU.
• Stores frequently accessed data to improve processing speed.
• Levels of Cache: L1 (fastest), L2, L3 (larger but slower).
2. Memory System
a) Primary Memory (RAM & ROM)
• Random Access Memory (RAM):
S
TE
◦ Volatile memory (loses data when power is off).
O
◦ Stores currently active programs and data.
N
◦ Types: Static RAM (SRAM) and Dynamic RAM (DRAM).
I
AT
• Read-Only Memory (ROM):
AP
◦ Non-volatile memory (retains data even when powered off).
AJ
◦ Stores rmware and boot instructions (BIOS/UEFI).
PR
◦ Types: PROM, EPROM, EEPROM.
AN
b) Secondary Storage
AG
• Non-volatile storage devices for long-term data storage.
• Examples: Hard Disk Drives (HDDs), Solid-State Drives (SSDs), Flash Drives, Optical
G
Discs (CD/DVD), Magnetic Tapes.
• SSDs are faster and more ef cient than HDDs but more expensive.
c) Virtual Memory
• A portion of the hard drive used as RAM when physical memory is full.
fi
fi
• Helps run large applications smoothly by swapping data between RAM and disk.
3. Input and Output Devices
a) Input Devices
• Used to send data to the computer.
• Examples: Keyboard, Mouse, Scanner, Microphone, Camera, Touchscreen, Joystick,
Barcode Reader.
b) Output Devices
• Used to display or produce results from the computer.
• Examples: Monitor (LCD, LED, OLED), Printer, Speakers, Projector, Plotter.
Types of Computer Architecture
1. Von Neumann Architecture
• Proposed by John von Neumann in 1945.
• Uses a single memory for storing both data and instructions.
S
TE
• Follows the Fetch-Decode-Execute cycle.
O
• Found in most modern computers.
N
2. Harvard Architecture
I
AT
• Uses separate memory for instructions and data.
AP
• Provides faster execution by allowing simultaneous instruction and data fetching.
AJ
• Used in embedded systems, microcontrollers, and DSP processors.
PR
3. RISC vs. CISC Architecture
AN
• RISC (Reduced Instruction Set Computing):
AG
◦ Uses simple, small instruction sets.
G
◦ Focuses on faster execution with fewer cycles per instruction.
◦ Examples: ARM, MIPS, PowerPC.
• CISC (Complex Instruction Set Computing):
◦ Uses complex, multi-step instructions.
◦ Requires fewer lines of code but takes more execution time per instruction.
◦ Examples: Intel x86, AMD processors.
4. Parallel and Distributed Computing
• Parallel Computing: Uses multiple processors (cores) simultaneously to execute tasks
faster. Found in multi-core CPUs and GPUs.
• Distributed Computing: Spreads computations across multiple computers over a network
or cloud environment.
• Used in supercomputers, AI training, cloud computing (AWS, Google Cloud).
Computer Performance Factors
1. Processor Speed (Clock Speed)
• Measured in GHz (Gigahertz).
• Higher clock speed = faster performance.
• Modern CPUs use multi-core architecture (Dual-core, Quad-core, Octa-core, etc.).
2. Bus Architecture
S
TE
• The communication system that transfers data between different components.
O
N
• Types of buses:
I
◦ Address Bus (carries memory addresses)
AT
◦ Data Bus (transfers data)
AP
◦ Control Bus (carries control signals)
AJ
3. Pipelining
PR
• A technique used in modern processors to execute multiple instructions simultaneously.
AN
• Improves CPU ef ciency and speed.
AG
4. GPU (Graphics Processing Unit)
G
• Specialized processor for handling graphics and parallel computing tasks.
• Used in gaming, AI, machine learning, and video processing.
5. Quantum Computing (Future Technology)
fi
• Uses qubits instead of binary bits.
• Capable of performing complex calculations at unprecedented speeds.
• Companies like IBM, Google, and D-Wave are developing quantum processors.
Computer Architecture in India and Worldwide
India’s Contributions
• PARAM Supercomputers developed by C-DAC (Centre for Development of Advanced
Computing).
• TATA Swach Computing Platform for AI applications.
• Pratyush and Mihir – India’s high-performance weather forecasting supercomputers.
Global Advancements
• Intel, AMD, NVIDIA – Leading CPU and GPU manufacturers.
• Apple M-Series Chips – High-performance ARM-based processors.
• IBM and Google – Leading in quantum computing research.
• ARM Architecture – Used in smartphones, tablets, IoT devices.
S
TE
O
Input and Output Devices
N
I
Introduction
AT
AP
Input and output (I/O) devices are essential components of a computer system that facilitate
communication between the user and the computer. Input devices allow users to enter data and
AJ
commands, while output devices display or deliver results from processing. These devices play a
crucial role in human-computer interaction.
PR
AN
1. Input Devices
AG
Input devices are used to send data to the computer for processing. They convert human actions into
signals that a computer can interpret.
G
Types of Input Devices
a) Keyboard
• Primary input device for typing text, numbers, and commands.
• Types of keyboards:
◦ Mechanical Keyboard – Uses individual switches under each key.
◦ Membrane Keyboard – Uses pressure pads instead of mechanical switches.
◦ Virtual Keyboard – Software-based keyboard on a touchscreen.
◦ Ergonomic Keyboard – Designed for comfortable and injury-free typing.
• Example: Standard QWERTY keyboard, gaming keyboards with mechanical switches.
b) Mouse
• A pointing device used to control the cursor and interact with graphical elements.
• Types of mouse devices:
◦ Optical Mouse – Uses an LED light and sensor to detect movement.
◦ Laser Mouse – Uses a laser for higher precision.
◦ Wireless Mouse – Uses Bluetooth or RF technology.
◦ Trackball Mouse – Stationary device with a rolling ball.
• Example: Logitech, Razer gaming mice.
c) Touchscreen
• Acts as both input and output device.
S
TE
• Common in smartphones, tablets, and laptops.
O
• Types of touchscreens:
N
◦ Resistive – Uses pressure-sensitive layers.
I
AT
◦ Capacitive – Uses electrical conductivity of the human body.
AP
◦ Infrared & Optical – Detects touch using light sensors.
AJ
• Example: Smartphone screens, ATM machines, kiosks.
PR
d) Scanner
AN
• Converts physical documents into digital format.
AG
• Types of scanners:
◦ Flatbed Scanner – Used for scanning books, documents.
G
◦ Barcode Scanner – Reads product barcodes in retail stores.
◦ QR Code Scanner – Reads QR codes for digital payments.
◦ Handheld Scanner – Portable device for scanning documents.
• Example: Canon, Epson atbed scanners.
e) Microphone
• Captures audio input for recording or voice commands.
• Used in speech recognition, virtual assistants, and gaming.
• Types of microphones:
◦ Dynamic Microphone – Used for live performances.
◦ Condenser Microphone – Used in studios for high-quality sound.
◦ Lavalier Microphone – Small clip-on mic for interviews.
• Example: Blue Yeti, Rode condenser microphones.
f) Webcam
• Captures real-time video input.
S
TE
• Used for video calls, live streaming, and security surveillance.
O
• Example: Logitech HD Webcam, in-built laptop webcams.
N
g) Joystick & Game Controller
I
AT
• Used for gaming and ight simulations.
AP
• Types:
AJ
◦ Joystick – Used in ight simulators and arcade games.
PR
◦ Game Controller – Used in consoles like PlayStation and Xbox.
AN
• Example: Xbox, PlayStation controllers.
AG
h) Biometric Devices
G
• Used for authentication and security.
• Types:
◦ Fingerprint Scanner – Used in smartphones, attendance systems.
◦ Facial Recognition – Used in security systems.
fl
fl
fl
◦ Iris Scanner – Used in high-security environments.
• Example: Aadhar biometric scanners in India.
2. Output Devices
Output devices are used to display, print, or project the processed data from a computer.
Types of Output Devices
a) Monitor (Display Screen)
• Primary output device that displays text, images, and videos.
• Types of Monitors:
◦ LCD (Liquid Crystal Display) – Energy ef cient, widely used.
◦ LED (Light Emitting Diode) – Improved version of LCD.
◦ OLED (Organic LED) – Superior picture quality, used in smartphones and high-end
TVs.
◦ Touchscreen Displays – Act as both input and output devices.
• Example: Dell, Samsung LED monitors.
b) Printer
S
TE
• Converts digital documents into physical printouts.
O
• Types of Printers:
N
◦ Inkjet Printer – Uses ink cartridges, suitable for home use.
I
AT
◦ Laser Printer – Uses toner, faster and more ef cient.
AP
◦ Dot Matrix Printer – Uses impact printing, used in bill printing.
AJ
◦ 3D Printer – Creates three-dimensional physical objects.
PR
• Example: HP, Canon inkjet printers.
AN
c) Speakers
AG
• Converts digital audio signals into sound.
G
• Types of Speakers:
◦ Stereo Speakers – Common for music playback.
◦ Surround Sound Systems – Used in home theaters.
fi
fi
◦ Bluetooth Speakers – Wireless connectivity.
• Example: JBL, Bose, Sony speakers.
d) Headphones & Earphones
• Personal audio output devices.
• Types:
◦ Over-Ear Headphones – Large, covers entire ears.
◦ On-Ear Headphones – Smaller, rests on ears.
◦ In-Ear Earphones – Fits inside the ear canal.
• Example: Apple AirPods, Sony headphones.
e) Projector
• Displays output on a large screen or wall.
• Used in classrooms, of ces, and movie theaters.
• Example: Epson, BenQ projectors.
f) Braille Display
• Output device for visually impaired users. S
TE
• Converts digital text into Braille characters.
O
N
• Used in assistive technology.
I
AT
• Example: Refreshable Braille Displays.
AP
3. Input-Output (I/O) Devices
AJ
PR
Some devices serve both input and output functions.
• Touchscreen – Receives input via touch and displays output.
AN
• External Hard Drives & USB Drives – Allow data storage and retrieval.
AG
• Virtual Reality (VR) Headsets – Receive input (head movements) and provide immersive
G
output.
• Network Cards & Modems – Facilitate data transfer between computers.
4. Role of Input and Output Devices in India and the World
fi
India’s Advancements in I/O Devices
• Aadhar Biometric System – Uses ngerprint and iris scanners for authentication.
• EVM (Electronic Voting Machine) – Used for elections.
• Digital Payment Devices – Biometric and QR code scanners for UPI transactions.
• ISRO’s Use of I/O Devices – Joysticks and control panels in space missions.
Global Advancements in I/O Technology
• Voice Assistants – AI-powered devices like Amazon Alexa, Google Assistant.
• AI-based Smart Cameras – Used in surveillance and facial recognition.
• Haptic Feedback Devices – Used in VR and gaming for immersive experience.
• Self-Driving Cars – Use multiple sensors and cameras for input-output processing.
Storage Devices
Introduction
S
Storage devices are hardware components used to store and retrieve digital data. They can be
TE
categorized based on storage type, capacity, speed, and portability. Storage devices are essential
for operating systems, software, and user data, playing a critical role in computing systems.
O
N
1. Types of Storage Devices
I
AT
Storage devices are primarily classi ed into:
AP
1. Primary Storage (Volatile Memory) – Fast, temporary storage used by the CPU.
AJ
2. Secondary Storage (Non-Volatile Memory) – Permanent storage used for data retention.
PR
3. Tertiary Storage – Used for backup and archival purposes.
AN
4. Cloud Storage – Online storage services provided over the internet.
AG
2. Primary Storage Devices (Volatile Memory)
G
Primary storage devices provide fast, temporary storage for quick data access by the CPU.
a) Random Access Memory (RAM)
fi
fi
• Stores data temporarily while the system is running.
• Faster than secondary storage.
• Types of RAM:
◦ SRAM (Static RAM) – Used in CPU cache, faster but expensive.
◦ DRAM (Dynamic RAM) – Used in system memory, cheaper but slower.
• Example: DDR4, DDR5 RAM modules (Kingston, Corsair, Crucial).
b) Cache Memory
• Small, ultra-fast memory located inside the CPU.
• Stores frequently accessed data for quick retrieval.
• Improves system performance.
• Example: L1, L2, and L3 caches in Intel and AMD processors.
c) Registers
• Smallest and fastest memory inside the CPU.
• Stores instructions and temporary calculations.
• Example: Accumulator, Program Counter in processors.
S
TE
d) Read-Only Memory (ROM)
O
• Non-volatile memory used to store rmware and system instructions.
N
• Types of ROM:
I
AT
◦ PROM (Programmable ROM) – Can be programmed once.
AP
◦ EPROM (Erasable Programmable ROM) – Can be erased using UV light.
AJ
◦ EEPROM (Electrically Erasable PROM) – Can be erased electrically.
PR
• Example: BIOS rmware in computers.
AN
3. Secondary Storage Devices (Non-Volatile Memory)
AG
Secondary storage retains data permanently, even after power loss.
G
a) Hard Disk Drive (HDD)
• Magnetic storage device used in desktops and laptops.
fi
fi
• Spinning platters store data, accessed using a read/write head.
• Capacities: 500GB to 16TB.
• Example: Western Digital, Seagate HDDs.
b) Solid State Drive (SSD)
• Flash-based storage, faster than HDDs.
• No moving parts, reducing failure risks.
• Types of SSDs:
◦ SATA SSD – Traditional SSD, slower than NVMe.
◦ NVMe SSD – High-speed SSD connected via PCIe.
• Example: Samsung 970 EVO, Crucial MX500.
c) Hybrid Drive (SSHD)
• Combines HDD and SSD for better performance and storage capacity.
• Example: Seagate FireCuda SSHD.
d) Optical Discs
• Used for storing multimedia and software. S
TE
• Types:
O
◦ CD (Compact Disc) – Up to 700MB storage.
N
◦ DVD (Digital Versatile Disc) – Up to 4.7GB.
I
AT
◦ Blu-ray Disc – Up to 100GB.
AP
• Example: Sony, Verbatim DVDs.
AJ
e) USB Flash Drive (Pen Drive)
PR
• Portable storage device using ash memory.
AN
• Capacities: 4GB to 1TB.
AG
• Example: SanDisk, Kingston USB drives.
G
f) Memory Card (SD Card)
• Small, portable storage used in smartphones, cameras.
• Types: SD, microSD, SDHC, SDXC.
fl
• Example: Samsung EVO, SanDisk Extreme microSD cards.
g) External Hard Drives
• Portable version of HDDs or SSDs for backup and storage expansion.
• Example: Seagate, WD My Passport.
4. Tertiary Storage Devices (Backup & Archival Storage)
Tertiary storage is used for long-term storage and backup.
a) Magnetic Tape Storage
• Used for data backup and archival.
• High capacity but slow access speed.
• Example: LTO (Linear Tape-Open) cartridges.
b) Cloud Storage
• Online storage service accessed via the internet.
• Examples: Google Drive, OneDrive, Dropbox, Amazon S3.
S
5. Storage Devices in India and the World
TE
O
India’s Advancements in Storage Technology
N
• ISRO’s Satellite Data Storage – Uses SSDs and magnetic tapes.
I
AT
• Aadhar Database Storage – Stores biometric data in secure servers.
AP
• Digital India Initiative – Promoting cloud-based storage for e-Governance.
AJ
• Indian Institutes Working on Storage Tech – IITs developing next-gen SSDs.
PR
Global Developments in Storage
AN
• DNA Storage – Researchers storing data in DNA molecules.
AG
• Quantum Storage – Future tech for ultra-fast data storage.
G
• Holographic Storage – Uses 3D holograms for high-capacity storage.
• AI-driven Storage Optimization – Predicts and manages storage needs ef ciently.
fi
Networking
Introduction
Networking refers to the practice of connecting multiple computing devices to share resources and
data. It is the foundation of communication in IT infrastructure, enabling devices to connect locally
and globally.
1. Types of Networks
Networking can be classi ed based on geographical coverage and function:
a) Local Area Network (LAN)
• Covers a small area, such as a home, of ce, or school.
• Uses Ethernet cables or Wi-Fi for connection.
• Example: A network in a corporate of ce where all computers are connected to a central
server.
b) Metropolitan Area Network (MAN)
• Larger than a LAN, typically spans a city or large campus. S
• Uses ber optics or microwave links.
TE
• Example: A city-wide Wi-Fi network or cable TV network.
O
N
c) Wide Area Network (WAN)
I
AT
• Covers large distances, connecting multiple LANs and MANs.
• Uses public or private communication channels ( ber optics, satellites, etc.).
AP
• Example: The Internet is the largest WAN.
AJ
PR
d) Personal Area Network (PAN)
• Covers a small personal space, usually a few meters.
AN
• Example: Bluetooth devices connecting to a smartphone.
AG
e) Virtual Private Network (VPN)
G
• Provides secure remote access over the Internet.
• Uses encryption to protect data.
fi
fi
fi
fi
fi
• Example: A company employee accessing of ce les securely from home.
2. Network Devices
Networking requires various hardware devices to function ef ciently.
a) Router
• Connects different networks and directs data packets.
• Example: Home Wi-Fi router.
b) Switch
• Connects multiple devices within a LAN.
• Example: Used in of ce networks to connect computers.
c) Modem
• Converts digital data to analog for Internet access.
• Example: DSL modem for broadband connection.
d) Hub
• Broadcasts data to all devices in a network. S
• Example: Used in small home networks.
TE
e) Repeater
O
N
• Ampli es signals to extend network range.
I
AT
• Example: Used in large buildings to extend Wi-Fi coverage.
AP
f) Gateway
AJ
• Connects networks using different communication protocols.
PR
• Example: A VoIP gateway that converts telephone signals to IP packets.
AN
3. Network Protocols
AG
Protocols de ne the rules for data communication over a network.
G
a) Transmission Control Protocol/Internet Protocol (TCP/IP)
fi
fi
fi
fi
fi
fi
• Standard for Internet communication.
• Example: Web browsing and email services use TCP/IP.
b) HyperText Transfer Protocol (HTTP/HTTPS)
• Used for web communication.
• HTTPS adds encryption for security.
• Example: Accessing websites.
c) File Transfer Protocol (FTP)
• Transfers les between systems.
• Example: Uploading les to a web server.
d) Simple Mail Transfer Protocol (SMTP)
• Sends emails.
• Example: Used by Gmail and Outlook.
e) Internet Protocol version 4 & 6 (IPv4 & IPv6)
• Assigns unique IP addresses to devices.
• Example: IPv4 uses 32-bit addresses, IPv6 uses 128-bit addresses for a larger range.
S
f) Domain Name System (DNS)
TE
• Converts domain names into IP addresses.
O
N
• Example: Translating "www.google.com" into an IP address.
I
AT
4. Types of Network Topologies
AP
Network topology refers to the physical or logical arrangement of devices.
AJ
PR
a) Bus Topology
• All devices connected to a single backbone cable.
AN
• Example: Used in small of ce networks.
AG
b) Star Topology
G
• All devices connected to a central hub/switch.
fi
fi
fi
• Example: Common in LANs.
c) Ring Topology
• Devices connected in a circular loop.
• Example: Used in some ber optic networks.
d) Mesh Topology
• Every device connects to every other device.
• Example: Used in military and critical communication networks.
e) Hybrid Topology
• Combination of different topologies.
• Example: Enterprise-level networks.
5. Network Security
With increasing cyber threats, securing networks is critical.
a) Firewall
• Monitors and controls incoming and outgoing traf c.
S
TE
• Example: A rewall blocking unauthorized access.
O
b) Encryption
N
• Protects data by encoding it.
I
AT
• Example: End-to-end encryption in WhatsApp.
AP
c) Antivirus & Anti-malware
AJ
• Protects against malicious attacks.
PR
• Example: Norton, McAfee.
AN
d) Multi-Factor Authentication (MFA)
AG
• Adds extra security layers.
G
• Example: OTP-based login systems.
e) Intrusion Detection Systems (IDS)
fi
fi
fi
• Detects unauthorized access attempts.
• Example: Cisco IDS.
6. India’s Networking Advancements
• BharatNet Project – Providing broadband in rural India.
• 5G Deployment – India launched 5G services in 2022.
• National Supercomputing Mission – Enhancing India's computing infrastructure.
• ISRO’s GSAT Satellites – Enabling satellite communication networks.
• NICNET – Government’s secure network for of cial communication.
7. Global Networking Trends
• 6G Research – Future ultra-fast mobile networks.
• IoT Networking – Connecting smart devices globally.
• Cloud Networking – Virtualized networks for scalable computing.
• Quantum Networking – Future technology using quantum mechanics.
S
• Arti cial Intelligence in Networking – Automating network management.
TE
O
N
I
AT
AP
Operating System
AJ
Introduction
PR
An Operating System (OS) is system software that manages computer hardware and software
resources, providing essential services for applications. It acts as an interface between the user and
AN
the computer.
AG
1. Functions of an Operating System
G
The OS performs several key functions, including:
a) Process Management
fi
fi
• Manages running applications (processes).
• Allocates CPU resources ef ciently.
• Example: Windows Task Manager allows users to monitor processes.
b) Memory Management
• Controls RAM allocation to processes.
• Prevents memory leaks and fragmentation.
• Example: Virtual memory in Windows uses part of the hard disk as extra RAM.
c) File System Management
• Organizes data storage and retrieval.
• Supports different le systems (FAT32, NTFS, ext4).
• Example: Linux uses the ext4 le system for better performance.
d) Device Management
• Handles input/output (I/O) devices like printers, keyboards, and USB drives.
• Uses drivers to enable hardware communication.
• Example: Plug-and-play support for USB devices. S
TE
e) Security & Access Control
O
N
• Protects data with authentication methods (passwords, biometrics).
I
• Prevents unauthorized access using rewalls and encryption.
AT
• Example: Windows BitLocker encrypts disk data.
AP
AJ
f) User Interface
PR
• Provides graphical user interfaces (GUI) or command-line interfaces (CLI).
• Example: Windows has a GUI, while Linux supports both GUI and CLI (terminal).
AN
AG
2. Types of Operating Systems
G
Operating systems can be classi ed into different types based on their functionality and use cases.
a) Single-User OS
• Designed for one user at a time.
fi
fi
fi
fi
fi
• Example: Windows 10, macOS.
b) Multi-User OS
• Supports multiple users simultaneously.
• Example: Unix, Linux.
c) Real-Time OS (RTOS)
• Processes data in real-time for critical applications.
• Example: Used in medical systems, robotics, and aircraft control (VxWorks, RTLinux).
d) Batch Processing OS
• Executes batches of jobs without user interaction.
• Example: IBM Mainframe OS.
e) Distributed OS
• Uses multiple machines as a single system.
• Example: Google’s cloud-based OS infrastructure.
f) Mobile OS
• Designed for smartphones and tablets.
S
TE
• Example: Android, iOS.
O
N
3. Popular Operating Systems
I
AT
a) Microsoft Windows
AP
• Most widely used desktop OS.
AJ
• Supports extensive software and hardware.
PR
• Versions: Windows XP, 7, 10, 11.
AN
b) macOS
AG
• Exclusive to Apple computers.
G
• Known for stability and security.
• Latest Version: macOS Sonoma.
c) Linux
• Open-source OS used in servers and personal computers.
• Variants: Ubuntu, Fedora, Kali Linux.
• Preferred for cybersecurity and programming.
d) Unix
• Used in enterprise environments.
• Basis for Linux and macOS.
• Example: IBM AIX, HP-UX.
e) Android
• Most popular mobile OS.
• Example: Runs on Samsung, OnePlus, and Google Pixel devices.
f) iOS
• Apple’s mobile OS.
• Known for security and optimized performance.
• Example: Used in iPhones and iPads.
S
TE
4. Operating Systems in India and the World
O
N
India’s Contributions to OS Development
I
• BOSS (Bharat Operating System Solutions) – A Linux-based OS developed by C-DAC
AT
for government use.
AP
• Indus OS – A regional mobile OS supporting Indian languages.
AJ
• ISRO’s Space OS – Used in satellites and space missions.
PR
Global Trends in Operating Systems
AN
• Cloud-Based OS – Google Chrome OS offers cloud-centric computing.
AG
• AI-Integrated OS – Windows Copilot and AI-driven automation in macOS.
G
• Quantum Computing OS – Research on OS for quantum processors.
• IoT-Based OS – TinyOS, FreeRTOS for smart devices.
MS Of ce (Microsoft Of ce)
Introduction
Microsoft Of ce (MS Of ce) is a suite of productivity applications developed by Microsoft. It
includes software for word processing, spreadsheets, presentations, email management, and more.
First introduced in 1989, MS Of ce has become one of the most widely used of ce software suites
worldwide.
1. Key Applications in MS Of ce
MS Of ce consists of multiple programs designed for various tasks. Below are the most commonly
used applications:
a) Microsoft Word
• Used for: Word processing and document creation.
• Features:
◦ Text formatting, spell check, and grammar check.
◦ Table, charts, and images support.
◦ Mail merge for bulk document generation.
S
TE
◦ Collaboration tools for team editing.
O
• Example: Writing reports, resumes, letters, and research papers.
N
b) Microsoft Excel
I
AT
• Used for: Data organization, analysis, and calculations.
AP
• Features:
AJ
◦ Formulas and functions for complex calculations.
PR
◦ Pivot tables for data analysis.
AN
◦ Charts and graphs for visualization.
AG
◦ Macros for automation.
G
• Example: Financial budgeting, sales analysis, and attendance tracking.
c) Microsoft PowerPoint
fi
fi
fi
fi
fi
fi
fi
fi
• Used for: Creating presentations and slideshows.
• Features:
◦ Customizable themes and templates.
◦ Slide transitions and animations.
◦ Multimedia integration (images, audio, and video).
◦ Presenter mode and slide recording.
• Example: Business presentations, academic lectures, and training materials.
d) Microsoft Outlook
• Used for: Email communication and calendar management.
• Features:
◦ Email organization with folders and lters.
◦ Calendar scheduling and meeting invitations.
◦ Task and contact management.
◦ Integration with Microsoft Teams.
• Example: Of ce email management, scheduling meetings, and maintaining professional
contacts.
e) Microsoft Access
S
TE
• Used for: Database management and application development.
O
• Features:
N
◦ Table-based data storage.
I
AT
◦ Query system for data retrieval.
AP
◦ Forms and reports for user interaction.
AJ
◦ Integration with SQL databases.
PR
• Example: Library catalog systems, customer records, and inventory management.
AN
f) Microsoft OneNote
AG
• Used for: Digital note-taking and collaboration.
• Features:
G
◦ Handwritten notes and drawing tools.
fi
fi
◦ Cloud synchronization across devices.
◦ Multimedia attachments (audio, video, and images).
◦ Collaborative editing and sharing.
• Example: Lecture notes, business meeting summaries, and personal journals.
g) Microsoft Teams
• Used for: Online collaboration and communication.
• Features:
◦ Video conferencing and screen sharing.
◦ Chat-based collaboration and le sharing.
◦ Integration with other Of ce apps.
◦ Task and work ow management.
• Example: Remote work collaboration, virtual meetings, and team discussions.
2. Versions and Cloud Integration
a) Microsoft Of ce Versions S
TE
MS Of ce has evolved over the years, with different versions available for different user needs:
O
• MS Of ce 2010, 2013, 2016, 2019, 2021 – Standalone versions with one-time purchase.
N
• Microsoft 365 (formerly Of ce 365) – Subscription-based model with cloud integration
I
AT
and regular updates.
AP
• MS Of ce Online – Free web-based version with limited features.
AJ
b) Cloud Integration with OneDrive
PR
• Microsoft 365 integrates with OneDrive, allowing users to store and access les from
anywhere.
AN
• Enables real-time collaboration with multiple users.
AG
• Example: Team members editing a Word document simultaneously from different locations.
G
3. MS Of ce in India and the World
Usage in India
fi
fi
fi
fi
fl
fi
fi
fi
fi
fi
• Widely used in government of ces, educational institutions, and businesses.
• Microsoft India provides regional language support, making Of ce accessible to non-
English speakers.
• Microsoft Teams played a crucial role during the COVID-19 pandemic for remote work
and online education.
Various Data Representation in Computers
Introduction
Data representation in computers refers to how data is stored, processed, and transmitted digitally.
Since computers operate using binary (0s and 1s), all types of data—numbers, text, images, audio,
and video—must be converted into a binary format for processing.
1. Types of Data Representation
Computers represent different types of data using speci c encoding techniques. Below are the key
types of data representation:
a) Number Representation
Numbers in computers are represented in different numeral systems:
S
i) Binary Number System (Base-2)
TE
• Uses only two digits: 0 and 1.
O
N
• The fundamental system for all computer operations.
I
• Example: Decimal 5 is represented as 101 in binary.
AT
ii) Decimal Number System (Base-10)
AP
AJ
• Uses digits from 0 to 9.
PR
• Commonly used by humans but internally converted into binary.
• Example: 125 remains the same in decimal but is 1111101 in binary.
AN
iii) Octal Number System (Base-8)
AG
• Uses digits 0 to 7.
G
• Used in older computing systems (e.g., UNIX le permissions).
fi
fi
fi
fi
• Example: Binary 101110 is 56 in octal.
iv) Hexadecimal Number System (Base-16)
• Uses digits 0-9 and A-F (where A=10, B=11, ..., F=15).
• Widely used in computer memory addressing and color representation.
• Example: Binary 11001101 is CD in hexadecimal.
b) Text Representation
Computers represent text using different encoding standards:
i) ASCII (American Standard Code for Information Interchange)
• Uses 7 or 8 bits per character.
• Supports 128 characters, including letters, digits, and symbols.
• Example: 'A' is 65 in ASCII (Binary: 01000001).
ii) Unicode
• Supports multiple languages and symbols.
• Uses 16-bit, 32-bit, or variable-length encoding (UTF-8, UTF-16, UTF-32).
• Example: 'अ' (Devanagari) in Unicode is U+0905.
S
TE
iii) EBCDIC (Extended Binary Coded Decimal Interchange Code)
O
• Used in IBM mainframes.
N
I
• Example: 'A' is 11000001 in EBCDIC.
AT
c) Image Representation
AP
Images are represented using pixel-based color models:
AJ
PR
i) Bitmap (Raster Images)
• Uses a grid of pixels.
AN
• Common formats: JPEG, PNG, BMP, GIF.
AG
• Example: A 1920x1080 image contains 2,073,600 pixels.
G
ii) Vector Graphics
• Uses mathematical equations instead of pixels.
• Common formats: SVG, AI, EPS.
• Example: Logos and illustrations use vector graphics.
iii) Color Models
• RGB (Red, Green, Blue): Used in digital screens.
• CMYK (Cyan, Magenta, Yellow, Black): Used in printing.
• Example: White in RGB is (255, 255, 255).
d) Audio Representation
Sound is stored as digital signals using sampling techniques:
i) Pulse Code Modulation (PCM)
• Converts analog audio into digital using sampling.
• Used in CDs and WAV les.
ii) MP3 Compression
• Uses lossy compression to reduce le size.
• Example: A song in WAV format (50 MB) can be compressed into MP3 (5 MB).
e) Video Representation
S
TE
Videos are stored as a sequence of images (frames) with audio:
O
i) Frame-Based Representation
N
I
• Each frame is a still image (24-60 FPS commonly used).
AT
• Example: A 60 FPS video shows 60 images per second.
AP
ii) Video Codecs
AJ
PR
• Compression techniques reduce le size.
• Common codecs: H.264, HEVC (H.265), VP9.
AN
• Example: 4K video in H.264 is about 20 GB per hour.
AG
G
2. Data Storage in Computers
Data is stored in different formats based on size and requirements:
fi
fi
fi
Storage Unit Equivalent Example
Smallest unit (0 or Boolean values (True/
1 Bit
1) False)
1 Byte 8 bits One ASCII character
1 KB (Kilobyte) 1024 Bytes A short document le
1 MB
1024 KB A high-resolution image
(Megabyte)
1 GB (Gigabyte) 1024 MB A full HD movie
1 TB (Terabyte) 1024 GB Storage for large databases
3. Importance of Data Representation in Computing
• Ef cient Storage: Optimized formats reduce storage space.
• Faster Processing: Binary format ensures quick computation.
• Cross-Platform Compatibility: Standardized encoding (Unicode, ASCII) supports multiple
systems.
• Data Compression: Reduces le size while maintaining quality (JPEG, MP3, H.264).
• Error Detection: Error detection codes (parity bits, checksums) ensure data integrity.
4. Data Representation in India and the World S
India's Initiatives
TE
• Regional Language Computing: Unicode is used to support Indian scripts like Hindi,
O
Tamil, and Bengali.
N
• Digital India Initiative: Promotes data-driven services using ef cient representation
I
techniques.
AT
• ISRO’s Chandrayaan Missions: Uses advanced data encoding for space communications.
AP
AJ
PR
Internet and Email
AN
1. Introduction
AG
The Internet is a global network connecting millions of computers for communication, data
G
exchange, and services. It enables access to the World Wide Web (WWW), emails, online
banking, social media, and cloud computing.
fi
fi
fi
fi
An Email (Electronic Mail) is one of the most widely used Internet services, allowing users to
send and receive messages over a network.
2. Internet
a) What is the Internet?
• A global network of interconnected computers.
• Uses TCP/IP (Transmission Control Protocol/Internet Protocol) for data transfer.
• Provides access to services like web browsing, email, online streaming, and cloud
computing.
b) History of the Internet
• 1969 – ARPANET (Advanced Research Projects Agency Network) was developed by the
U.S. Department of Defense.
S
• 1983 – TCP/IP became the standard for communication.
TE
• 1991 – Tim Berners-Lee invented the World Wide Web (WWW).
O
N
• 1995 – The Internet became available for commercial use.
I
AT
• 2020s – The Internet is widely accessible via broadband, ber optics, and 5G.
AP
c) How the Internet Works?
AJ
• Servers store and distribute data.
PR
• Clients (users) access data using devices like computers and smartphones.
• Internet Service Providers (ISPs) provide access to the Internet.
AN
• Protocols (TCP/IP, HTTP, FTP, etc.) govern data transmission.
AG
d) Internet Services and Uses
G
Service Description Example
Google Chrome, Mozilla
Web Browsing Accessing websites
Firefox
Email Sending and receiving messages Gmail, Outlook
Social Media Online networking and sharing Facebook, Instagram, Twitter
E-Commerce Online shopping Amazon, Flipkart
Watching videos, music, and
Streaming YouTube, Net ix, Spotify
games
Cloud Storage Saving les online Google Drive, OneDrive
fi
fl
fi
Online
Managing nancial transactions SBI Net Banking, Paytm
Banking
e) Internet in India and the World
• India has the second-largest number of Internet users (after China).
• Jio revolutionized Internet accessibility in India with affordable 4G.
• Digital India initiative promotes online services.
• Global Internet Usage: Over 5 billion users worldwide.
3. Email (Electronic Mail)
a) What is Email?
Email is a digital messaging system that allows users to exchange messages instantly over the
Internet.
b) How Email Works?
S
1. Sender composes an email using an email client (e.g., Gmail, Outlook).
2. The email is sent to the mail server. TE
O
N
3. The server routes the email to the recipient’s email provider.
I
4. The recipient retrieves the email from their inbox.
AT
c) Components of an Email
AP
AJ
• Email Address: A unique ID (e.g., [email protected]).
PR
• Subject Line: The topic of the email.
• Body: The main content.
AN
• Attachments: Files, images, or documents.
AG
• CC (Carbon Copy): Copies the email to additional recipients.
G
• BCC (Blind Carbon Copy): Hides recipients from each other.
d) Email Protocols
Protocol Function Example
SMTP (Simple Mail Transfer
Sends emails Used by Gmail, Yahoo
Protocol)
fi
IMAP (Internet Message Access Accesses emails from multiple Used by Outlook,
Protocol) devices Thunderbird
Downloads emails to a single
POP3 (Post Of ce Protocol) Used by older mail clients
device
e) Popular Email Services
• Gmail (Google)
• Yahoo Mail (Yahoo)
• Outlook (Microsoft)
• Rediffmail (India-based service)
f) Uses of Email
• Personal Communication: Sending messages to friends and family.
• Business Communication: Of cial correspondence in of ces.
• Marketing: Promotional emails and newsletters.
• Education: Sharing assignments, study materials, and announcements.
• Government Services: Aadhaar updates, tax noti cations, etc.
g) Email Security S
• Use Strong Passwords to prevent hacking.
TE
• Enable Two-Factor Authentication (2FA) for extra security.
O
N
• Beware of Phishing Emails that ask for personal information.
I
AT
• Use Spam Filters to block unwanted emails.
AP
• Encrypt Emails for privacy
AJ
PR
Websites and Web Browsers
AN
1. Introduction
AG
The World Wide Web (WWW) is a system of interlinked web pages that can be accessed via the
G
Internet. Websites are digital locations where information, services, and multimedia content are
hosted. Web browsers are software applications used to access and interact with websites.
fi
fi
fi
fi
2. Websites
a) What is a Website?
A website is a collection of web pages hosted on a server and accessible via a unique web address
(URL - Uniform Resource Locator). Websites are built using web technologies like HTML, CSS,
and JavaScript.
b) Types of Websites
Type Description Example
Personal blogs, portfolio
Static Websites Fixed-content sites with minimal interaction
websites
Content updates automatically based on user
Dynamic Websites Facebook, YouTube
input
E-commerce
Used for online shopping Amazon, Flipkart
Websites
Government
Provides government-related services India Post, IRCTC
Websites
Educational
Learning and academic content Coursera, NCERT
Websites
News Websites Provides news articles and updates BBC, Times of India
Social Media
Enables social networking Instagram, Twitter
Websites
c) Website Components
• Domain Name – The web address (e.g., www.google.com).
S
TE
• Hosting Server – Stores website data and serves it to users.
O
• Frontend (Client-Side) – The visible part of the website.
N
• Backend (Server-Side) – Handles data processing.
I
AT
d) How Websites Work?
AP
1. User enters a website URL in the browser.
AJ
2. The browser sends a request to the web server.
PR
3. The server processes the request and sends the web page back.
AN
4. The browser displays the webpage using HTML, CSS, and JavaScript.
AG
e) Popular Websites
G
• Google – Search engine.
• Wikipedia – Online encyclopedia.
• YouTube – Video streaming platform.
• Amazon – E-commerce platform.
• Gmail – Email service by Google.
• IRCTC – Indian railway booking system.
3. Web Browsers
a) What is a Web Browser?
A web browser is a software application that allows users to access and interact with websites on
the Internet. It processes web pages and displays them in a readable format.
b) Popular Web Browsers
Browser Developer Key Features
Google
Google Fast, secure, and supports extensions
Chrome
Mozilla Firefox Mozilla Privacy-focused, open-source
Integrated with Windows, supports AI
Microsoft Edge Microsoft
features
Safari Apple Optimized for Apple devices
Opera
Opera Built-in ad blocker and VPN
Software
Brave
Brave Focuses on privacy and security
Software
c) How Web Browsers Work?
1. User enters a URL (e.g., www.google.com).
2. The browser sends an HTTP/HTTPS request to the web server.
3. The web server responds with HTML, CSS, and JavaScript les.
4. The browser renders and displays the web page.
d) Components of a Web Browser
• Address Bar – To enter website URLs.
• Rendering Engine – Processes and displays web pages.
• JavaScript Engine – Runs scripts for dynamic interactions.
fi
• Cache Memory – Stores website data for faster loading.
• Security Features – Includes HTTPS support and pop-up blocking.
e) Internet and Browser Usage in India
S
• Jio and Fiber Networks have increased Internet accessibility.
TE
• Google Chrome is the most used browser in India.
O
N
• Government Websites like Digilocker and Aadhar services are accessed via browsers.
I
AT
AP
AJ
Computer Viruses
PR
1. Introduction
AN
A computer virus is a type of malicious software (malware) designed to replicate itself and spread
from one system to another, often causing damage to les, stealing data, or slowing down system
AG
performance. Viruses usually attach themselves to legitimate programs or les and activate when
the host program runs.
G
2. Characteristics of Computer Viruses
• Self-replicating – A virus can create copies of itself.
• Attaches to Files/Programs – Requires a host le to spread.
• Can be Dormant or Active – Some viruses remain hidden until triggered.
• Causes Harm – Can delete les, steal data, or slow down a system.
• Spreads through various means – USB drives, emails, downloads, etc.
3. Types of Computer Viruses
Type Description Example
Boot Sector Infects the boot sector of a disk and activates when the
Michelangelo Virus
Virus system starts.
File Infector Attaches itself to executable les and spreads when they CIH (Chernobyl
Virus run. Virus)
Embedded in macro-enabled documents like MS Word/
Macro Virus Melissa Virus
Excel.
Polymorphic
Changes its code structure to avoid detection. Storm Worm
Virus
fi
fi
fi
fi
fi
Disguised as a legitimate program but contains harmful
Trojan Horse Zeus Trojan
code.
Worms Self-replicating malware that spreads across networks. Mydoom
Ransomware Encrypts user data and demands a ransom. WannaCry
Spyware Secretly monitors user activities and collects information. DarkHotel
Adware Displays unwanted ads and redirects web traf c. Fireball
S
TE
4. How Computer Viruses Spread
O
N
• Email Attachments – Malicious les sent via email.
I
• USB Drives & External Devices – Infected devices transferring les.
AT
• Malicious Websites – Downloading infected les unknowingly.
AP
• Software Cracks & Pirated Software – Often contain hidden malware.
AJ
• Infected Advertisements (Malvertising) – Ads spreading viruses on trusted sites.
PR
• File Sharing Networks & Torrents – Spreading malicious les among users.
AN
AG
5. Effects of Computer Viruses
G
• System Slowdown – Consumes CPU and RAM resources.
• Data Corruption – Deletes, modi es, or encrypts les.
• Unauthorized Access – Hackers steal personal and nancial information.
• Network Congestion – Worms and botnets overload networks.
• Financial Loss – Ransomware demands payments to unlock les.
6. Famous Computer Virus Attacks
Virus Year Impact
ILOVEYOU 2000 Spread via email, caused billions in damages.
Mydoom 2004 Fastest-spreading email worm at that time.
Ransomware attack affecting hospitals and businesses
WannaCry 2017
worldwide.
Stuxnet 2010 Targeted Iran’s nuclear facilities.
Michelangelo
1991 Damaged systems worldwide on March 6.
Virus
fi
fi
fi
fi
fi
fi
fi
fi
fi
7. Preventing and Removing Computer Viruses
a) Prevention Strategies
• Use Antivirus Software – Install and regularly update antivirus programs (e.g., Windows
Defender, Norton, McAfee, Kaspersky).
S
• Enable Firewalls – Blocks unauthorized access to the system.
TE
• Avoid Clicking Unknown Links – Do not open suspicious emails or links.
O
• Use Strong Passwords – Prevent unauthorized access to sensitive data.
N
• Keep Software Updated – Security patches x vulnerabilities.
I
AT
• Backup Important Data – Helps recover lost les due to virus attacks.
AP
• Scan External Devices – Always scan USB drives before opening les.
b) Virus Removal Techniques AJ
PR
• Safe Mode Scan – Boot the system in Safe Mode and scan for viruses.
AN
• Use a Bootable Antivirus Disk – Remove viruses that prevent normal booting.
AG
• Uninstall Suspicious Programs – Remove unknown or untrusted software.
G
• Delete Temporary Files – Some viruses hide in cache and temp folders.
• Restore System to a Previous State – If infected, use System Restore.
8. Computer Viruses in India
• India ranks among the top 10 countries affected by cyber threats.
• 2017 WannaCry attack impacted several companies and government systems.
• India’s CERT-In (Computer Emergency Response Team) handles cyber threats and
attacks.
• Digital India movement has led to increased cybersecurity a wareness.
• Ransomware and Banking Trojans are major threats to Indian online banking users.
TELEGRAM- @kbknznn OR SEARCH SSC RAILWAY PDFS
YOUTUBE- https://www.youtube.com/@gagan143
fi
fi
fi