Section 2: Operating System
Introduction, Types, and Functions of Operating Systems
Operating systems are software that manage computer hardware and software resources
and provide common services for programs. Types include single-user, multi-user, real-
time, distributed, and embedded systems. Functions encompass process management,
memory management, file system management, device management, and security.
Input Output and Files: I/O devices and its organization, Principles of I/O
software and hardware, Disks, Files, and directories organization, File System
Implementation
I/O software abstracts the complexities of hardware devices. Hardware principles involve
buffering, interrupts, and polling, while software principles focus on device independence
and error handling. File systems organize data on disks and involve structures like inodes
and directories for efficient data retrieval.
Installation, backup, recovery, and optimization of operating systems: MS-DOS,
Windows Family of Products, Unix Family of Products, Linux Family of Products
Installation involves bootable media, configuration, and partitioning. Backup entails
copying critical files, often automated via utilities. Recovery uses backup data or recovery
disks to restore functionality. Optimization includes disk defragmentation and updating
system drivers.
Windows Networking, Windows Architecture, Linux Architecture,
Troubleshooting Windows & Linux, Managing Network Printing, Managing Hard
Disks and Partitions, Monitoring and Troubleshooting Windows, Users, Groups
and Permission on Linux and Windows, Sharing file, folder, printer, application,
etc.
Windows uses a modular kernel and GUI-focused architecture, while Linux employs a
monolithic kernel. Troubleshooting involves analyzing logs and running diagnostic tools.
Resource sharing requires enabling network discovery and permissions for shared
resources.
Identifying and managing Security Threats to Operating Systems
Threats include malware, phishing, unauthorized access, and system vulnerabilities.
Mitigation strategies involve regular updates, antivirus software, access control, and
employing firewalls and encryption.
Section 3: Computer Networks
Introduction to Computer Networks, Network architecture (LAN, MAN, WAN),
Client server and peer-to-peer model, LAN architecture/standards (Bus, Ring,
Star)
LAN connects local devices, MAN spans cities, and WAN covers large geographical areas.
Client-server models centralize resources, whereas peer-to-peer models enable direct
device communication. LAN topologies include bus (single cable), ring (connected in a loop),
and star (central hub).
Connectivity and media: Network cables and connectors
Common cables include Ethernet (Cat5e, Cat6), coaxial, and fiber optics. Connectors like
RJ45 are used for Ethernet, while SC/LC connectors are standard for fiber optics.
OSI Reference model, TCP/IP Reference model
The OSI model has seven layers, providing a detailed abstraction. TCP/IP simplifies into
four layers, emphasizing practical networking. Both models facilitate communication but
have different scopes and approaches.
Network Hardware (NIC, Repeater, Hub, Bridge, Access Points, Switch, Router,
and Gateway), their functions, features, and configuration
NICs interface devices with networks. Repeaters amplify signals, hubs broadcast data,
switches direct packets, and routers connect networks. Gateways translate protocols for
inter-network communication.
Common TCP and UDP ports, protocols, and their purpose
Examples include HTTP (80), HTTPS (443), FTP (20/21), and DNS (53). TCP ensures
reliability, while UDP is faster but less reliable.
Application of Network utilities (e.g., IPCONFIG, PING, TRACERT, NSLOOKUP)
IPCONFIG displays network configurations. PING checks connectivity. TRACERT tracks
packet routes. NSLOOKUP resolves domain names to IP addresses.
Network cabling and cable testing
Cabling involves physical installation of cables. Testing ensures connectivity using tools like
cable testers, verifying signal strength and integrity.
IP Addressing, subnet mask, gateway, DNS, WINS, static and automatic address
assignment
IP addressing uniquely identifies devices. Subnet masks define networks. Gateways route
traffic to external networks. Address assignment can be static (manual) or automatic
(DHCP).
Basic Switching and Routing Techniques
Switching involves forwarding packets within a network using MAC addresses. Routing
directs data between networks using IP addresses and routing protocols.
Multiplexing and de-multiplexing, UDP, TCP, flow control, principles of
congestion control, TCP congestion control
Multiplexing combines signals for transmission, while de-multiplexing separates them. TCP
ensures reliability with flow and congestion control, whereas UDP prioritizes speed.
Web and Web caching, FTP (File Transfer Protocol), Electronic mail, DNS
(Domain Name Service)
Web caching stores web data for faster retrieval. FTP transfers files. Email uses protocols
like SMTP, IMAP, and POP3. DNS resolves domain names to IP addresses.
Network security: Cryptography, Digital Signature, Firewalls, Virtual Private
Network (VPN), Data Encryption Standard, Disaster Recovery, Data Storage
Techniques: Clustering, NAS, SAN
Cryptography secures data. Digital signatures authenticate users. Firewalls block
unauthorized access. VPNs encrypt connections. NAS and SAN enhance storage.
Section 4: Multimedia Technology
Sound / Audio System, Image and Graphics, Video and Animation, Data
Compression, Teleconference, Data Synchronization
Multimedia includes sound systems for audio processing, image and video editing, and
animation creation. Compression reduces data size. Teleconferencing integrates audio and
video for communication. Synchronization ensures data consistency across systems.