0% found this document useful (0 votes)
32 views57 pages

Important Definitions Aikman

The document provides an overview of essential computer science concepts, including definitions of computers, input and output devices, data processing, and the Internet. It discusses various types of networks, their components, and protocols, as well as the System Development Life Cycle (SDLC) and applications of computers in different fields. Additionally, it covers network topologies, client/server versus peer-to-peer networks, and the significance of information technology in creating a 'global village.'

Uploaded by

aamirshazad3321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views57 pages

Important Definitions Aikman

The document provides an overview of essential computer science concepts, including definitions of computers, input and output devices, data processing, and the Internet. It discusses various types of networks, their components, and protocols, as well as the System Development Life Cycle (SDLC) and applications of computers in different fields. Additionally, it covers network topologies, client/server versus peer-to-peer networks, and the significance of information technology in creating a 'global village.'

Uploaded by

aamirshazad3321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 57

IMPORTANT DEFINITIONS AIKMAN

1. Computer.

CHAPTER 1

2 Computer les of aching that can take input from user, processes it, convert iamto information, and
stures it for further use

. Characteristics of the Computer

It is an electronic machine It receives data (Input).

It processes dura.

It gives information (Output) It stores data and information

3. Input devices;

The devices that are used to enter data and programs into the computer are called input devices

devices: 4. Types of Input Textual devices

Pointing devices

Scanning devices Audio loput devices

Video input devices


5. Output davices:

The hardware components that give results of processing are called output devices

6. Types of output devices:

There are two types of output devices: Hardcopy output devices: Printers, Plotters

Softcopy output devices: Monitors, Speakers

7. Information Technology: The technology developed by corpbuning computing with communications


links for tranamoning

data in the formation of text, sound, images, videos, etc, is called information technology 1. Data
Processing: There are four elements are include in data processing. These are

1. Data

2. Processing

3. Output

4. Storage

9. Main Memory:

The memory placed on main board (motherboard) is called the main memory,

10. Secondary Memory (Storage):


• The memory that stores data and programs permanently is called secondary memory

11. Function of Main Memory:

Main memory is used to store data and programs for processing by the processor.

12. Function of Secondary Memory:

Secondary memory stores data programs permanently for later use

13. Data Processing:

The computer system is used for data processing. It accepts data, processes it and output it in a useful &
meaningful form

14. Global Village:

Global Village means the entire world and its inhabitants. This term suggests that the information
technology has "shrunk" the world. The world has become a "village" in which all people know one
another as if they are actually living in a village.

15. Digital Convergence:

The integration of various industries and services with the help of information technology is called digital
convergence.

16. Direct Input:

In direct input, data is entered directly into the computer without using the keyboard. Scanners,
microphones, digital cameras get data and enter it directly into the computer.
17. Source Data Entry Devices:

Devices that receive data from sources other than the keyboard and enter it directly into the computer
system are called

source data entry devices

8. Examples of Source Data Entry Devices:

The most commonly used source input devices are scanner, microphones, and digital cameras.

10. Computer Applications: Some fields of computer applications are:

250

AnificialIntelligrace

Mobile Cominerce (M-Commerce)

20. Central Processing Unit (CPU):

Alkman COMPUTER SCIENCE-XI

Web-based applications

Computer animation

Electronic Commerce (i-Commerce)


Distributed computing

The central processing unit (CPU) is an electronic circuit that processes input data into useful
information. It is the hardware component that actually executes instructions given to the computer.

21, Secondary Storage:

The storage devices that store data and progruns outside the compater system are called secondary
storage devices A secondary storage. Hard disk, loppy diskette, USB storage, and compact disk (CD) are
examples of secondary storage

22. Keyboard:

The keybeard is the most commonly used input device. It is used to input textual data. It is an indirect
input device. Dota entered by pressing keys on the keyboard.

23. Escape key:

The Esc key is used to end the current command or task

24. Caps lock:

The Caps lock key is pressed to type test in Capital letters. 25. PageUp and PageDown:

Pagelip and PageDown keys are usually used in wond processing or other application programs to move
the screen up or down

The PageUp key moves one full screen backwards The PageDown key moves one full screen forwant

• 26 . Combination Keys:
The keys on the keyboard that are always med in combination with ether keys are called combination
keys. SHIFT, ALT and

CTRL. Keys are always used in combination with other on the keyboard

27. Pointing Devices:

• The devices that are used to control the position of pointer or cursor on the computer screen, are
called pointing devices.

28. Types of Pointing Devices:

Some commonly used pointing devices are:

Mouse

Touch screen

Trackball

Light pen

• Touchpad

• Graphic Tablet

Pointing Stick

Pen-based system
29. Mouse:

The mouse is a pointing device. It is rolled over a flat surface. Rolling of the mouse moves the pointer on
the computer

Screen 30. Trackball:

The trackball is a stationary pointing devices. It has a ball on its top. The ball is rotated to move the
pointer.

31 . Pointing Stick:

The pointing stick is a device positioned on the keyboard. Pushing the stick moves the pointer. It is
usually provided between

GHB keys

32. Light-Pen:

The light-pen is a light-sensitive pointing device. It is pointed at the screen to identify its position on the
screen.

33. Touch Screen:

The touch screen is a touch-sensitive display. User interacts with the computer by touching areas directly
on the computer

Screen 34. Pen-based System:

The pen-based system is used as a normal pen. However, writing with his system appears directly on the
computer screen. It is turned off is called hardcopy output.
35. Hardcopy Output:

The output which is permanent and is not lost when the device generating

36. Softcopy Output:

•The output which is permanent and is lost when the device generating it is turned off is called softcopy
output. 37. Terminal:

• A terminal is a device that is used for input/output purposes. It consists of a keyboard and a monitor. It
is connected to the

Main computer through a network . It usually does not have any computing power.

38 . SDLC:

SDLC stands for System Development Life Cycle, It is a step-wise approach to system development.

39. Steps of SDLC: It consists of several steps:

Preliminary

Investigation

Analysis

Design

Coding > Testing


Implementation

 Maintenance

IMPORTANT DEFINITIONS

Preliminary Investigation:

It is an initial analysis of the system. The system is identified Its scope eix determined and alternative
solutions for developing

The system are examined 41. Feasibility Study:

12. Systems Analysis:

Is an analysis to find out whether a proposed system is affordable and acceptable

251

System analytis is the study of a system. Its purpose is to understand the existing system and to find out
how to improve 4. It system. It also makes recommendations for the new system.

3. Information through Interviews:

Interviews are held with system users to know their needs. This is a quick and simple method of knowing
the needs of the

Ystemutera 14. Logical Design:


The logical design describes the general functional capabilities of a system to be developed. It gives an
outline of major components of the proposed system

45. Coding:

Writing a computer program is called coding. Requirement statements, algorithms, flowcharts and
specifications are used to write programs. Programs are usually written parts. These Parts are then
combined to work like une system.

45. Two Ways of Testing a System:

System testing is done in two ways:

>Unit Testing 47. Unit Testing:

In unit testing, the parts of the system are tested separately. 43. System Testing:

System Testing

In system testing, all individual parts of the program are combined and tested. The system is tested first
with test data and then with actual data. Actual data is used to test working of the system in real
environment.

1. Internet:

CHAPTER 2

• The Intermet is a network of a large number of computer networks around the world

2. Function of the Internet:


The Internet is a data communication system. It has linked millions of computers which can exchange
data and information

Quickly and at very low cost, 3. Communication Media for the Internet:

The networks and computers use the following communication media to connect to the Internet

Telephone links

Fiber-optic cables Satellite communication

4 World Wide Web:

The World Wide Web is a collection of millions of documents stored on the computers that are
permanently connected to the Intermet. These documents are linked together and contain data and
information in the form of text, graphics, audios, an

Videos. 5. File Transfer Protocol (FTP):

• The file transfer protocol is used to transfer files from one computer to another over a network.

1. Downloading:

• The process of transferring a file from a remote computer to a local computer over the network is
called downloading.

7. Uploading:

• The process of transferring a file from a local computer to a remote computer over a network is called
uploading
2 Telnet:

Telnet is an abbreviation for Terminal Network. It is a software tool that enables a user to connect to a
remote computer.

Allows a user to use the data and resources of remote computers.

Gopher:

Gopher is a software application. It provides menu-based facilities for searching and downloading
documents on a compua

Network

10 • Intranet is a network of an organization. It uses the same technologies and protocols that are used
on the Internet. It is called an enterprise network.

. Intranet:

11 . Extranet:

An intranet that can be accessed by authorized users from outside is called extranet.

12. E-mail Address:

A typical e-mail address looks like this: name@site a

1
252

Name specifies the name of the person who is the owner of the e-mail

Alkman COMPUTER SCIENCE-XI

Site address specifies the address of the e-mail server that the user uses to send and receive emails. For
example, I have an e-mail account on G-mail. My user name is Aikman Book Company. The site address
for G-mallis gmail.com. Therefore, my e-mail address is [email protected]

13 . Advantages of Emalls:

Following are three advantages of e-maile: It reaches the destination quickly. It is cheap to use. One
message can be sent to

any number of persons

14. Components of Computer Networks:

The five components of a computer networks are

Interconnection Network Card

Bridge

Router

Gateway
15. Interconnection:

• Cables (or wireless communication) that are used to connect devices in a network are called
interconnection.

16 . Interconnection in LAN:

Low-cost LANs me twisted wire pairs. High speed LANs use coaxial or fiber optic cables. In wireless
communication

infrared or radio waves are used 17. Limitations of Wireless LANs:

A wireless LAN has two limitations. They have slower transmission rates. Distance between two devices
should be small

18. Bridge:

• A bridge is a netwerk component. It is used to connect similar networks.

19. Gateway:

A gateway is a network component, It consists of hardware and software. It allows a device on a network
to communicate with a device on another network. It is used to connect different types of networks.

20. Router:

A router is a network component. It determines the path on the network through which data is
transmitted from one device a

another, 21. Network Protocols:


The set of rules that mast be followed for exchange of data over the network is called network protocol

22. Ethernet Technique:

• The Ethernet uses carrier sense/multiple access/collision detection (CS/MA/CD) technique to transmit
data.

23 . Carrier Sense:

Before transmitting data over a network, a device checks the communication medium to ensure that it is
available for data transmission. The communication medium is called the carrier. The process of checking
for availability of communication medium for data transmission is called "carrier sense."

24. Multiple Access:

Usually many devices are attached to a network. These devices have equal access to use the network.
The arrangement in which many devices access and use network is called multiple access.

25. Collision in Network:

Collusion occurs when two devices connected to a network transmit data at the same time

26. Methods of Collision Resolution: The methods used for collision resolution in Ethernet networks are:
Collision Detection, Collision Avoidance, Carrier Sense,

and Collision Resolution

27. Token Ring Networks:

The token ring network has the following features: >It uses ring topology.
28. TCP/IP: TCP/IP is short for Transmission Control Protocol/Internet, Protocol. It is a set of protocols for
sending data over networks.

It uses token passing to transmit data. Maximum data transmission speed is 4 Mbps using unshielded
twisted pair-cables and up to 16 Mbps using shielded twisted pair cables.

29. Transmission in TCP/IP: TCP/IP transmitų data by breaking it up into packets. Each packet contains
data, information about the sender and the receiver, and information about sequencing information.
Each packet reaches the destination separately. The packets are then re-assembled by the receiver using
the sequencing information

30. ISDN:

ISDN is short per Integrated Services Digital Network. It is a set of standards for transmission of data over
telephone lines.

IMPORTANT DEFINITIONS

253

31. DSL:

DSL is ADSL for Digital Subscriber Line. It is a new technology. It allows telephone lines to transmit 32.
DSL and ADSL: data at high speed In DSL upload vel download speeds are equal. ADSL is type of DSL. La
ADSL, upkad and downiced speeds are different Download is given more bandwidth than upload.

S DSL LVIS ADSL

In ADSL upload and download speeds are different. Downicad is download more information than they
upload, ADSL, provides better we of telephone lines given more bandwidth than upload. As most users

34. UTP Cables: in UTP cables, cables are twisting to protect them from external interference.
35. WAN: WAN standa for Wide Area Network. It is a network of computers that are located over a large
arca. Computer in & WAN are connected through telephone lines, microwaves, or satellites

36. MAN: MAN stands for Metropolitan Area Network. It is a high-speed network that connects several
local area networks in a such as a city or a town.

Metropolitan area, ork Modal: Network 37.

The arrangement of computers, devices, and media in a nerwork is called the network modal. It is also
calku network architecture.

38. Cilent/Server Network:

In a client/server network, one or more computer act as a server. Other computers connect to the server
and act as clients The server manages network resources. It usually also does the processing, Clients
depend on the server and use its resources

39 for data processing . Fear-to-Peer Network:

The computer network in which all computers connected to the network are equal and no one computer
is in control is called

43. peer-to-peer network. Client/Server vs. Peer-to-Peer Networks:

In client/server network, une computer (called server) controls network resources and provides central
storage for programs

And data. In peer-to-peer network, all computers are equal and no one computer is in control. Each
computer uses its own resources,

Which the other computers on the network can also use 41. Disadvantages of Client/Server Networks:
The disadvantage of client/server network is its high cost:

The servers are costly,

The client/server operating system is expensive.

 Network administrator is required to run a client/server network.

The network that has the combined features of both the client/server and poel-to-peer networks is
called the hybrid network Each computer in a hybrid network uses the resources of the server and or its
peers. It also makes its resources available to its

42. Hybrid Network:

Peers 41. De Facto Standards:

De facto means “by fact” These standards were developed in the early days of computer networking.
They came into being

Without any formal plan. 44. De Jure Standards:

• De jure means “according to law.” There are the standards that were developed according to certain
principles by

Organizations that regulate data communications. 45. Network Topology:

The way is which a number of computer are connected together to form a network is called the network
topology. It is the

45. Bus physical layout or arrangement of computers in a network Topology:


• In bus topology, computers or nodes are connected to a common communication medium called the
backbone or the bus. The ends of the bus are closed with terminators. The terminators absorb signals.

47. Ring Topology:

In ring topology, each computer is connected to the next computer and the last computer is connected
to the first. This

Arrangement forms a ring. 48. Tree Topology:

The tree topology is made by combining bus and star topologies. The bus makes the backbone of the
network, Groups of star- configured computers are connected to the bus.

256

 For word processing and maintaining records.

In home appliances, such as microwave ovens, TVA

2. Office Use of Computer.

In effices, computers are used for

Word processing-writing letters

Alkman COMPUTER SCIENCE -MPORT

Database management maintaining data on people, industry, education, etc.

Networking for data communication


3. Business Use of Computers:

Businesses use computers to

Keep payroll records Maintain investories

Sell products 4. Industry Use of Computer.

In industry, computers are used to

Design products

Control manufacturing

➤Inventory control and human resource management

4. Office Automation:

The process of carrying out everyday office jobs with the help of computers is alled office automation.

5. Reprography: The process of reproducing, reprinting, or copying graphic material especially by


mechanical, photographic, or electrons

Advan

Desk

T
1. CBT

ATM

1. Adv

Means is called reprography. 7. Document Management System (DMS):

Retrieval

8. Software for Office Automation:

2 Con

RAI

A document management system provides facilities for word processing, desktop publishing, and
document storage and

Vo

Following software are used for office autemation: >

Document Management System Message Handing System

DF

Office Support System


9. E-Commerce:

E-Commerce stands for electronic commerce. It includes buying, selling and marketing of products and
services over the 4 SB Internet

10. Services of E-commerce:

Following services are commonly used in e-commerce:

SD

E-mail

Video conferencing

Electronic shopping Electronic banking

11. Video Conferencing:

Video conferencing is a meeting between two or more persons located at different places who can see
each other on the screen and talk to each other through speakers and microphones

12. Electronic Banking:

Managing a bank account by using the website of the bank is called electronic banking. It can be used to
transfer money,
Make payments of credit card and utility bill, etc.

13. Robot:

A robot is a programmable machine that moves and performs mechanical tasks. Movements of a robot
are programmed and controlled by the computer. RO

14. Uses of Robots:

12

Robots are used to perform:

Repetitive tasks Hazardous tasks

Task where accuracy is needed

15. Computer Aided Design (CAD):

• Computer Aided Design (CAD) is a computer system that is used to design products. It provides
facilities to prepare design drawings, parts lists, and other design-related elements of products.

16 . Computer Alded Manufacturing (CAM):

Computer Aided Manufacturing (CAM) is a system in which computer controls manufacturing process.

IMPORTANT DEFINITIONS

17. Advantages of CAM:


257

With computer aided manufacturing Products can be made accurately Machines can be run around the
clock Product design can be changed easily.

2. Desktop Publishing:

19. CBT:

The process of typing, editing, adding graphics, and formatting a document for printing is called desktop
publishing CBT stands for Computer Based Training. It is the use of computers in education and training.
It consists of tutorials, drill and practice, and computer based testing

20. ATM:

ATM stands for Automatic Teller Machine. It is a machine that provides facilities to draw cash using a
credit card or s bankcard

21. Advantage of ATM:

ATM stands for Automatic Teller Machine. Its main advantage is that cash can be drawn at any time of
the day and night.

12. Computer Simulation:

Representation of a real world system in the computer is called computer simulation.

1. RAM:
RAM stands for Random Access Memory. It is also called primary memory or main memory. It is used to
store the program

CHAPTER 5

2. Being executed by the computer. It also stores the data being Volatile Memory:

Processed by the computer. RAM cannot store data and instructions permanently. When the computer
power is turned off, all programs and data stored in its memory are erased. It is, therefore, called volatile
memory.

3. DRAM:

DRAM stands for Dynamic Random Access Memory. DRAM stores data in the form of an electric charge.
This charge decreases with time. In order to maintain the charge, the DRAM is recharged frequently
using a small amount of electrical

Current 4. SRAM:

SRAM stands for Static Random Access Memory. SRAM consists of memory cells made from digital gates.
These gates can hold data without any need for frequent recharging.

4. DRAM vs. SRAM:

DRAM stores data in the form of an electric charge. As the charge decreares with time, DF AM is
recharged frequently

During the recharging process, the processor cannot access DRAM. This slows down the speed of
computer operations. ➤ SRAM does not need any recharging. No time is wasted and the SRAM is always
available for read and write operations.

5. Read Only Memory (ROM):


• The type of memory from which information can only be read is called Read Only Memory.

6. Non-volatile Memory:

ROM stores data and instructions permanently. When the power is turned off, the instructions stored in
the ROM are not lost.

7. Cache Memory:

A cache (pronounced as cash) memory is a small but very fast memory within the CPU. It is used for
speeding up transfer of data between the RAM and the CPU.

8. Types of ROM:

• Following are the various types of ROM used in computer systems: ROM PROM EPROM EEPROM

9. Bus Interconnection:

The internal communication channel of the computer system through which various devices exchange
data is called the bus

Interconnection. 11. Types of Computer Buses:

• The computer system has three types of buses. These are system bus, address bus, and expansion bus.

12. Data Bus:

• The part of the computer bus that is used to transmit information from one device to another is called
data bus.
13. Address Bus:

The part of the computer bus that is used to specify the source or destination of the data being
transmitted on the data bus is called address bus.

F10

258

14. Control Bus:

The part of the computer has that is used by the CPU tu control the sequence e of operations while a
program is being exec

Is called control bes 15. System Bus vs. Expansion Bus:

Aikman COMPUTER SCIENCE

Al devices connected to the computer system. Expantionhus allows the processor to communicate with
external d

Of the computer system System bus coects the processor with the main memory and under coтролетта

16. Register Aster is a special purpose high-speed memory inside the CPU. It is small in size. It is used for
temporary storage of day 12.
IMPOR

31

And instrations during execution of a progr 17. Size of a Register:

The site of registers is usually 8, 16, 24, or 32 bits. Is more advanced computers, the size of registers is
16-bit, 24-bit, 32-4 33.

18. Types of Registers

Main registers used in the processor

Accumulator Register

Stack Control Register

Feruction Printer Register

Flag Register Address or Segment Register

19. Purposes of Ragister. Registers are used for

Temporary Harage of mersery addresses

Temporary storage of instructions during program execution

Decoding and execution of instructions Temporary storage of data being worked upen by the CPLU
 20. Instruction Register.

The instruction register decodes instructions for

21. Memory Buffer Register: The memory buffer register holde data coming from or going to the
memory

Execution by

The CPU

22. Memory Address Register:

The memory address register (MAR) holds address of the main memory location being accessed by the
CPU

23. Accumulator:

The accumulator is a general purpose registre. It is used to bold values during aritufictic, logical, and dass
transfer operaticp

24. Segment Registers:

The segment registers in a CPU are code segment (CS), data segment, (05), extra segment (ES), and stack
segment (55)

25. CPU Instructions:

The CPU carits-out the following four types of Instruction Data Transfer Instructions
Arithmetic and Logical Instructions

Ispatoutput Instructions Control Transfer Instructions

26. Arithmetic and Logic Instructions:

Arithmetic and logic instructions are used to perform arithmetic and logic operations. Arithmetic
operations include addition subtraction, multiplication and division operations Legical operations include
comparison of two data items. Tex

Instructions are executed by the ATAU 27 . Control Transfer Instructions:

The mstructions that are used to transfer the execution control from one part of the program to another
during program execution are called control transfer instructions.

28. Micro-operations:

CPU carries out an operation in a series of steps. Each step is very simple and accomplishes very little.
For example, one step may be to

Transfer data between registers.

Increment a register,

Combine two registers to add or subtract their contents.

Each of these simple steps is called a micro-operation. CPU carries out a number of micro-operations to
execute on operating

29. Instruction Code Formats:


Following is the lat of various instruction code formats: Zero Address Instruction

F9

F10

F11

F12

PrtScr Insert

Delete

Backspace

IMPORTANT DEFINITIONS

One Address Instriction Two Address Instruction

These Address instruction 30. Zaro-address Instructions:

25

The zero-address instructions are usually writen to manipulace a stack. Such instructions do not specify
any address. For example, the instruction ADD can be used without specifying any address in this format,
it takes two values from the rack,

Adds them and returns the result to the stack 31. Instruction Execution by CPU:

The CPU carries out Fetch-Decode-Execute steps to execute instructions


32. Fetch Instruction:

Instructions

CPU instructions that bring a program instruction from the main memory to the CPU registers for
execution ars called fetch

33. Decode Instruction:

Called decode instructions

CPU instructions that interpret a program instruction fetched from the main memory to the CPU
registers for execution are

34. Execute Instruction:

Instructions are called execute instruction

CPU instructions that instruct various components of the computer system to take actions according to
the decoded program

35. Functions of Operating Systems:

Following are the main functions of operating systems:

Starting the computer

Managing hardware resources


Memory management

Scheduling

Providing user interface

35. Types of User Interfaces:

The two types of user interfaces provided by operating systems are: command-line interface and
graphical user interface (GUI)

37. Interpreter:

An interpreter is a type of translators. It executes a source program by translating one instruction at a


time

38 . Compiler:

A compiler is a type of translators. It translates a source program written in a high level language into the
machine language

As a whole.

CHAPTER 6

1. Boot Sector:

The first sector on a disk is called the boot sector. When the computer is turned on, the program in the
boot sector is automatically loaded into the computer memory. This program then loads the operating
system.
2. Boot Sector Virus:

Boot sector viruses reside in the boot sector of a disk. They change the boot sector in such a way that
they are loaded into the memory whenever the computer is turned on. From memory, they spread to
every disk that the system uses. These viruses. Usually attack executable files, ie, file with exe, .com or dil
extensions.

3. Logic Bombs:

Logic bombs are viruses that execute on a certain date or in response to a certain action.

4. Trojan Horse Virus:

• A Trojan horse virus is a computer program that executes without the knowledge of the computer user.
It provide

Unauthorized access to the infected computer when the computer connects to the Internet.

5. Protection from Computer Viruses:

Some of the ways to safeguard the computer against viruses are:

Never open emails from unknown sources.

Use antivirus software.

Do not use removable media for data transfer.

6 . Antivirus Software:
Commonly used antivirus software are:

260

Norton Antivirus

MacAfee Antivirus

6. Data Security:

Alkman COMPUTER SCIENCE-X

Data security is the practice of ensuring that data is only accensed and used by people who have the
right to use it

B . Chernobyl Virus:

• The Chemoby! Virus deletes all Microsoft office files. It also deletes the partition information from the
disk

10. Virus Activation:

The execution of virus program on infected computer is called activation of the virus. A virus program
unually executes activates) in response to some action by the computer uier. Some viruses are activated
on a specified date

11. Virus Activata:

Different types of viruses activate differently. A virus can

Ron all the time on the he computer


 Activate on < a cretin date

Activate when a file is copied

12. Types of Threats to Data:

Two types of threats to data are

Accidental threats

Deliberate or intentions, threats

13. Accidental Loss of Data:

Accidental loss of data can occur because of Failure of computer hardware

<

Failure of computer software. Some mistake of a computer operator.

Sudden breakdown wn of power supply.

14. Deliberate Loss of Data:

Deliberate loss of data occurs when data is deleted or changed by

An angry employee. A computer hacker


A criminal or a terrorist.

15. Hacker:

A person who gets access to a computer system illegally is called a hacker.

16. Information Theft

MPOR

Adr

Mu

Getting personal or confidential information about a person without his or her knowledge or consent is
called information

Theft

17. Privacy:

Privacy is the right of a person to keep his or her personal information away from other people.

18. Ensuring Data Privacy:

The privacy of data is enbured by data protection laws.

19. Data Protection:


Data protection means that data kept by an organization:

>is never disclosed to unauthorized persons under any circumstances.

Is used only for the purpose it has been gathered

20. Data Protection Law:

Data protection law defines rules for protection of datz. They also ensure privacy of data.

21. Copyright Act

Copyright is the exclusive right to use and get benefit from a creative work. It allows the creator to
benefit from his work

22. Intellectual Property:

• The ideas and creative works in literature, engineering, music, films, etc. are called intellectual
properties.

23. Copyright Laws:

Copyright laws protect intellectual property rights. They prohibit use of intellectual properties without its
owner’s

Permission

10
11

13

CHAPTER 7

1. Multi-processing:

• The capability of an operating system to use two or more processors in parallel in a single computer
system is called multiprocessing

F12

PrtScr

Insert

Delete

IMPORTANT DEFINITIONS

2. Advantage of Multiprocessing:

3. Multitasking:

261

• In multiprocessing, a task is divided into a number of independent sub-tasks. These sub-tasks are run
on-several processort In this way the task is completed more quickly
In a multitasking, several taska can be performed at the same time

4. Advantage of Multitasking:

Multitasking saves time in doing a job on the, computer. R. It also enables maximum utility of [computer
resources.

5. Multi-user Operating System: A multi-user operating system allows more than one user to use
the computer system at the same time or at different times.

6. Plug and Play:

System 7. Features of Windows Operating System:

• Plug and play is the capability of an operating system to automatically detect and install a device
attached to the computer

The Windows operating system in

➤ Multitasking

Multiprocessing Multiuser

Plug & Play

 Networking Supporting

7. Desktop:
• The background area on the computer screen when window operating system is running is called the
desktop

8. Purpose of Desktop:

The desktop provides an entry point into the Windows operating system. It contains all objects of the
Windows operating system: icons, application programs, dialog boxes, tool bars, etc.

9. Displaying Contents of Disks:

The My Computer object can be used to display contents of a disk attached to the computer.

10. Recycle Bin:

The Recycle Bin is a special folder. It is used to temporarily hold items that have been deleted from the
hard disk. When an item is deleted, it goes to the recycle bin. From where, it can be either deleted
permanently or restored.

11. Windows Explorer:

The Windows Explorer is a utility program. It is used to browser contents of directories and to manage
files and folder on

Disks. 13. Internet Explorer:

The Internet Explorer is a web browser. It is used to access and view websites when the computer is
connected to the
Internet 14. Control Panel:

• The Control Panel folder contains tools for management and maintenance of the Windows operating
system. These tools are

Used to configure the operating system and various devices attached to the computer.

15. Start Menu:

The Start Menu provides access to all the available resources of the computer system

16. Mouse Event:

The action that is started with the mouse is called mouse event.

17. Types of Mouse Events:

• There are three types of mouse events: Pointing, Clicking, and Dragging

18. Click Event:

The left click is used to execute a command associated with an object. For example, it is used to:

Select an object such as a file

Press a button such as the start button

 Close, open and minimize/maximize a window


19. Keyboard Event: A keyboard event is an action that is caused by using the keys on the keyboard.
Since the keys on the keyboard can only be pressed or released, the keyboard events are associated with
pressing and releasing of keys.

20. Primary Partition:

The partition of a hard disk that can be used to install operating system is called primary partition. An
operating system starts from a primary partition. Primary partition is usually the first division of a hard
disk. If a hard disk has no partitions, the

Entire disk becomes the primary partition.

21. Extended Partition:

The partition of the hard disk that can contain other partitions is called the extended partition.

262

22. Disk Management Utility:

Aikman COMPUTER SCIENCE-XI

The disk management utility is used for maintenance of disks installed on the computer system. It
provides tools for carrying out such tasks as viewing the status of disks, creation and deletion of
partitions, formatting of disks, etc

1. MS Word Menu Bar:

CHAPTER 8
The bar that contains buttons for drop-down menus is called menu bar. It is placed below the title bar. It
contains drop down menus. The dropdown menus contain all the commands that are available in the
software.

2. MS Word Status Bar:

The bar at the bottom of Word application window is called status bar. This bar provides some basic
information about the current document, such as current page number, total pages in the document,
position of cursor, etc.

3. Text Editing:

Typing and making changes in a text document is called text editing. It includes, correcting spelling,
adding new text

Deleting existing text, etc. 4. Modes of Text Editing:

• The Word allows the entry of text in a document in two modes: Insert mode and Overtype mode.

5 . Overtype Mode:

⚫In Overtype Mode, new text that is typed is written over the existing text. In other words, new text
replaces the existing text

7. Text Selection: Text is selected to

Apply formatting, such as font size, font type, font color

Copy, cut, or move text.

8. Text Selection through Keyboard:


To select text using the keyboard: Bring the cursor at the start of the text.

Hold down the shift key on the keyboard and use the right arrow key to select the text. B. Keys to Delete
Text: Two keys on the keyboard are used to delete text. These keys are: Del key and Backspace key.

9. Delete and Backspace Keys:

• The Delete key deletes characters to the right up the cursor. The Backspace key deletes characters to
the left of the cursor.

10. Undo Command:

Canceling or reversing an action is called undoing of an action. The command or option that is used to
cancel an action in called undo command.

11. Text Formatting:

The appearance of text on the screen or on the printout is called text formatting. It includes typeface of
font, size of font

Character spacing, line spacing, indents, etc. 12. Document Formatting:

The layout of a page of a document on the screen or the printout is called document formatting. It is also
called page formatting. It consists of page size, page margin, page orientation, headers & footers, etc.

12. Characteristics of Fonts: Some basic characteristics of fonts used in text formatting are font size,
font style, font color, and font effects

13. Font Size:


Font size is measured in points. One point is equal to 1/72th of an inch. It is the maximum height of a
character. For example a character in 12 points font size has a maximum height of /6th of an inch.

14. Italic Text:

In italics, characters are displayed as leaning towards right.

15. Paragraph Formatting:

. The formatting applied to a paragraph includes: text alignment, tabs &indents, line spacing, and
paragraph spacing 17. Indent:

The distance between a margin and all lines of text of a paragraph is called indent.

18. Text Alignment:

The arrangement of lines of a paragraph with respect to the margin is called text alignment.

19. Types of Text Alignment:

20. Page Formatting:

There are four types of alignments. These are: Left alignment, Right alignment, Center alignment, and
Justified alignment.

The size of page, its orientation, borders, headers & footers, and page margins are called page formatting

Es

COMPUTER
PRACTICAL

IMPORTANT DEFINITIONS

263

21. Footer.

The information that is printed in the bottom margin of a page in a text document called footer. It usually
contains page numbers and footnotes

Page Margins: 22.

The blank spaces on all sides of the paper are called margins. These are used to print page numbers,
headers, footers, footnotes, etc.

24. Portrait Page Orientation:

In portrait page orientation the text is printed across the shorter side of the paper

25. Cilpboard:

The clipboard is the temporary storage location in the computer memory. When a selected text or an
object is copied or cut, it is placed in the clipboard. When paste command is used, the contents of the
clipboard are placed into the document

26. Bitmap Graphics:

• Graphics that are made up of pixels are called bitmap graphics or bitmaps. These are like painted
pictures
27. Vector Graphics:

• Graphics that are made up of lines and curves are called vector graphics. They are like drawings.

1. Spreadsheet Program:

CHAPTER 9

A spreadsheet program is an application program for entering, calculating, manipulating and presenting
numerical data

2. Important Spreadsheet Programs: Two commonly used spreadshect programs are: MS Excel and
Lotus 123.

3. Spreadsheet:

A spreadsheet is a grid of rows and columns. Each row is assigned a number (1, 2, 3,) and cach column a
letter (A, D, C….). The Intersection of a row and a column is called a cell. Data is stored In cells.
Mathematical operations can be

Performed on data entered in cells. 4. Worksheet:

• In MS Excel, the spreadsheet is called worksheet. It is a grid of rows and columns in which data is
entered and processed

4. Workbook:

In MS Excel, a collection of related worksheets is called a workbook


5. Cell in a Worksheet:

The intersection of a column and a row in a worksheet is called a cell. It is the basic unit in a worksheet.
Data is entered into

The cells of a worksheet.

6. Cell Address:

The location of a cell in a worksheet is specified by its cell address. It is specified by the column letter,
and the row number of cell. For example, the cell at the intersection of column B and row 9 has the cell
address B9

The 8. Functions in Spreadsheet:

A function is used to evaluate values and perform certain operations. For example, a function is used to
find out average of values

9. Linking of Worksheets:

• Two worksheets are linked when a formula in one worksheet uses a value from another worksheet.

10. SUM Function:

The SUM function is used to find the sum of values in cells. The addresses of cells whose sum is to be
computed are

Specified as argument of the function. For example-SUM(A1:A9) finds sum of all values in cells A1, A2, A9

12. AVERAGE Function:


The AVERAGE function is used to find the average of values in cells. The addresses of cells whose average
is to be computed are specified as argument of the function. For example AVERAGE(A1:A9) finds average
of all values in cells, ALA2,…, A9.

13. MAX Function: The MAX function is used to find the maximum value in cells. The addresses of
cells whose maximum is to be found are specified as argument of the function. For example -
MAX(AI:A9) finds the maximum value in cells A1, A2, A

14. MIN Function:

The MIN function is used to find the minimum value in cells. The addresses of cells whose minimum
value is to be found are specified as argument of the function. For example -MIN(A1:A9) finds the
minimum value in cells A1, A2,…, A9.

15. Absolute Cell Reference:

The absolute reference of a cell does not change when a formula is copied to another cell.

264

16. Relative Cell Reference:

Alkman COMPUTER SCIENCE-XI

In relative cell reference, the address of referenced cell changes when formula is copied

17. Coll Reference:

To enter an absolute cell reference of a cell, 5 (the dollar sign) is used before and after column ictter of
cell address, For example, in the formula -C3+5D$3, SD$3 is absolute cell reference to cell whose address
is D3.
18. Range of a Worksheet:

A group of adjacent cells in a worksheet is called a range

18 . Range Reference:

A range is referred by its:

First and last cell, if it contists of a single row or column.

 Upper left and lower right comer cells, if it consists of several rows and columns.

>For example, a range of cells consisting of cells D3, D4, D5, D6 is referred to as D3 D6. Similarly, a range
of cells consisting of cells D3, E3, D4, E4 is referred to as D3:E4.

19. Function:

A function is a built-in tool that is used to perform an operation and return a value. A function gets one
or more values as input and retums a single value as output.

20. Passive Cell:

The cell in a worksheet that is not currently selected is called a passive cell.

21. Active Cell:

A cell in a worksheet that is currently selected is called the active cell. The active cell has a dark border.
Data is entered in the

Active cell of a worksheet


22. Value of a Cell:

• 23. Label of a Cell:

The value of a cell is the number entered in it. It can be a whole number, decimal, negative number,
currency, etc.

The title given to a cell is called its label. It is used to identify a cell or range of cells in a worksheet.

23. Relative Reference:

The address of a cell used in a formula that is relative to the location of the formula cell is called the
relative cell reference. The relative address changes when the formula is copied to another cell.

24. Absolute Reference:

The address of a cell used in a formula that does not change when the formula is copied to another cell
is called the absolute cell reference.

CHAPTER 10

1. First Computer Networks:

The two early networks of computers were ARPA Net and NSF Net.

2. Internet:

• The Internet is a collection of millions of computers and networks linked together to form a network of
networks.
3. Connect to the Internet:

A home computer can connect to the Internet through:

A phone line and a modem A phone line and a DSL modem

A cable

4. Normal Phone Line vs. T1 Line:

A T1 line can handle approximately 1.5 million bits per second of data. While a normal phone line using a
modem can

Usually handle 30,000 to 50,000 bits per second. 5. Internet Addressing Schemes:

• Two types of addressing schemes are used on the Internet. These are: IP Addressing and DNS
Addressing.

5. IP Address:

Each computer on the Internet is assigned a unique identifier. This unique identifier or number is called
the IP address. 7. Description of IP Addresses:

In IP address consists of 32 bits. These bits are subdivided into four groups of 8 bits each. A group of 8-
bits is called an octet. For example, an IP address many look like this:

00010000

00001001
-ries

IMPORTANT DEFINITIONS

& Decimal Notation in IP Addresses:

265

Series

To make the represented by itseque, they are usually represented in dotted decimal betation. In this
notation, cach octet of an IP address is its equivalent decimal number. The decimal number of each octet
is separated by using a dot For example, an IP address in this notation is written as: 1981680

DNS Addressing :

DNS stands for Domain Name System. In this system an IP address is associated with a domain name This
information is stored on a DNS server. When a user uses a domain name, the DNS serverledes the
domain name into its associated IP

Address 10. Advantages of DNS:

There are two advantages of using DNS. These are > They are easy to remember

 IP address of a domain can be changed without changing the domain name. When an IP address
changes, new IP address is specified in domain name server

11. World Wide Web: Millions of linked documents stored on computers permanently connected to the
Internet throughout the world is called the Wide Web.
12. Web Server:

World The computers permanently connected to the Internet that can be accessed by users are called
servers. The servers on which World Wide Web documents are stored are called web servers.

11. Webpage:

A webpage is a document written in hypertext markup language (HTML). It is also called a hypertext
document.

14. Website:

A collection of related web pages is called a website.

URL: Every web page on the World Wide Web has a unique address. It is called the URL. It stands for
Uniform Resource Locator

18. Uploading: The process of copying data from one’s computer to a remote computer is called
uploading

16. Downloading: The process of copying data from a remote computer to one’s computer is called
downloading

18 Web Publishing:

The process of developing a webpage and placing it on a web server so that users can assess it on the
World Wide Web is called web publishing.

19. Language for Writing Webpage:

• A webpage is created in the Hypertext Markup Language (HTML).


20. Facilities of Internet:

Some of the facilities available on the Internet are: WWW, E-mail, FTP, and Telnet.

21. ISP:

⚫ISP stands for Internet Service Provider. It is a company that provides facilities to connect a computer
to the Internet.

22. Web Browsing:

• The process of finding information on the World Wide Web and displaying it on the user’s computer is
called web browsing.

21. Search Engine:

A search engine is a website that provides facilities for finding information on the World Wide Web.

14. Email: • Email stands for electronic mail. It is a message that is sent and received through the
Internet.

25. Emall Attachment: A computer file enclosed or attached to an e-mail message is called an
attachment. It can be a word document, excel

Spreadsheet, audio file, video clip, etc.

• A newsgroup is a discussion group where people exchange ideas, opinion and views. It is like a big
message board on which

4. Newsgroup:
People post questions, news, and comments.

26. News Server. A news server is a host computer that exchanges articles with other computers. It
uses Network News Transfer Protocol

(NNTP) for communication.

You might also like