Apfc Computer
Apfc Computer
Introduction to Computer
2 Characteristics of Computer
Computer are the foundation of business, travel and leisure of life today. The common
characteristics that makes computers of all sizes such a powerful machine are speed, accuracy and
reliability, storage capacity, ability to operate automatically, diligence, scientific approach and
versatility.
✓ Speed : Computer provide the processing speed required by all facets of society. The quick service
we expect at the bank, at the grocery store, on the stock exchange and on the Internet are
dependent on the speed of computers. The speed of a computer is measured in the following
time units for the access time or instructions per second.
3 Limitations of Computers
Following are certain limitations of computers:
✓ No I.Q. – A computer is a machine that has no intelligence to perform any task. Each instruction
has to be given to the computer. A computer cannot take any decision on its own.
✓ Prone to Virus – The computer sometimes malfunctions and results in loss of data if some virus
attacks.
✓ Dependency – It functions as per the user’s instruction; thus, it is fully dependent on humans.
✓ Environment – The operating environment of the computer should be dust free and suitable.
✓ No feeling – Computer have no feelings or emotions. It cannot make judgement based on feeling.
Taste, experience and knowledge unlike humans.
4 History of Computers
A Computer was intended for making a person capable of performing numerical calculations with
the help of a mechanical computing device.
Abacus
✓ Abacus was the first counting device which was developed in China. It consists
of a rectangular wooden frame and beads. The wooden frame contains
horizontal rods and the beads which are passed through the rods.
✓ The beads of counters represent digits. The device is used to perform simple
addition and subtraction.
Napier’s Bones
✓ It was a device which contained a set of rods made of bones. It was
developed by a Scottish Mathematician, John Napier.
✓ To perform multiplication and division, the device was developed.
Napier also invented logarithms.
Pascaline
✓ Pascaline was the first calculating device with a capability to perform
additions and subtractions on whole numbers. It was developed by
Blaise Pascal, a French Mathematician.
✓ The device made up of interlocked cog wheels having numbers 0 to 9 on
its circumference. When one wheel completes its rotation, the other
wheel moves by one segment.
• He conceptualized the Turing machine, a theoretical framework that laid the foundation
for modern computers.
• His work provided insights into the design and operation of digital computers, including
concepts such as the stored-program computer, which became a fundamental principle in
modern computer design.
• During World War II, Turing's work in breaking the Enigma code, a cryptographic device
used by the Germans, showcased the practical application of computing technology in
cryptanalysis.
Mark I Computer
✓ The first electro-mechanical computing device was developed by Howard
Hathaway Aiken. He used Hollerith’s punch card and Babbage’s statements
to develop Mark I computer with IBM.
✓ In Mark III computer, he used some electronic components and Magnetic
drum memory.
✓ In Mark IV computer, he used all electronic components and Magnetic
drum memory & Magnetic core memory.
5 Generation of Computers
First Generation Computers (1946 – 1959)
✓ The first-generation computers were used vacuum tubes as the electronic
components. They produce more heat, so needed cooling devices.
✓ They consumed huge electricity, occupied a very large space, huge cost etc.
✓ Machine languages are used as programming language.
✓ Examples – EDSAC, EDVAC, UNIVAC, IBM-701, IBM-650.
6 Types of Computers
Based on Operation
Based on Operation
Analog Computer
✓ An Analog computer stores data continuously in the form of physical
quantities and perform calculations with the help of measures.
✓ It produces output in the form of a graph. They are used in the
calculation of physical variables such as voltage, pressure, temperature,
speed, etc.
6.2.1 Digital Computer
✓ A Digital computer is the most commonly used type of computer and is
working with data represented in digital form, usually binary 0s and 1s.
✓ It can perform faster and give more accurate results. They are
extensively used for solving complex problems in the field of engineering
& technology, design, research and data processing.
Based on Configuration
Based on Configuration
Based on Utility
Quantum computers
These are a type of special-purpose computers designed to leverage the principles of quantum
mechanics to perform computations. Unlike classical computers, which use bits as the fundamental
unit of information (either 0 or 1), quantum computers use quantum bits, or qubits, which can exist
in multiple states simultaneously due to phenomena such as superposition and entanglement.
[email protected] 10 | P a g e http://www.edutap.co.in
6.5.3 Information Appliances
✓ Information appliances are the portable or handy devices designed to perform simple
operations like calculations, games, etc. They have limited memory and limited operations
capabilities and software. Example – Mobile phones, Tablets, etc.
6.5.4 Embedded Computers
✓ Embedded computers are used in other machines to serve limited requirements. It executes
program in the non-volatile memory to operate an intended machine or electronic device.
They cannot be rebooted unlike normal computers, required to operate continuously.
Embedded computers are used widely in day-to-day life. Example – Washing Machine, DVD
player, etc.
7 Uses of Computer
Computers are used to control large and small machines which in the past were controlled by
humans.
✓ Distance Learning – Distance learning is a new learning methodology. The computer plays the key
role in this kind of learning. Many institutes are providing distance learning programs. The student
does not need to come to the institute. The institute provides the reading material and the student
attends virtual classroom.
✓ Online Examination – The trend of online examination is becoming popular. Different examination
like GRE, GMAT and SAT are conducted online all over the world. The questions are marked by
computer. It minimizes the chance of mistakes. It also enables to announce the result in time.
✓ Computer Games – An important use of computers at home is playing games. Different types of
games are available. These games are a source of entertainment and recreation. Many games are
available that are specially developed to improve your mental capability and thinking power.
✓ Working from Home – People can manage the office work at home. The owner of a company can
checks the work of the employees from home. He can control his office while sitting at home.
✓ Banking sector – In banks, computers are used to access the customer data quickly. By using the
computer, transactions can be done easily. Online banking is very useful technology for people
who are unable to go to the bank. Now, customers can access information and process
transactions through online.
✓ Entertainment – People can find entertainment on the internet. They can watch movies, listen to
songs, and watch videos download different stuff. They can also watch live matches on the
internet.
✓ Information – People can find any type of information on the internet. Educational and
informative websites are available to download books, tutorials etc. to improve their knowledge
and learn new things.
✓ Chatting & Social Media – People can chat with friends and family on the internet using different
software like Skype etc. One can interact with friends over social media websites like Facebook,
Twitter & Google Plus. They can also share photos and videos with friends
✓ Marketing – Marketing applications provide information about the products to customers. The
computer is also used to manage distribution system, advertising, and selling activities. Companies
can know more about their customers and their needs and requirements etc.
✓ Hospital Management System – Specialized hospital management software’s are used to
automate the day to day procedures and operations at hospitals. These tasks may be online
[email protected] 11 | P a g e http://www.edutap.co.in
appointments, payroll admittance and discharge records etc. and it can be used in Patients
Monitoring, Diagnosis Purpose.
[email protected] 12 | P a g e http://www.edutap.co.in
CONCEPT NOTES
1. Input Unit
2. Output Unit
3. Central Processing Unit
4. Memory Unit
System unit
It is a metal or plastic case that holds all the physical parts of the computer. The
components that process data are located in it.
Input Unit
✓ The Input Unit is used for giving instructions and data by using input devices.
✓ The computer accepts coded information through input unit by the user. This unit is used to
give required information to the computer. For example, keyboard, mouse, etc.
✓ An input unit performs the following functions:
• It accepts the instructions and data from the user.
• It converts these instructions and data to computer acceptable format.
• It supplies the converted instructions and data to the computer system for further
processing.
Registers
These are used to quickly accept, store and transfer data and instructions that are being used
immediately by the CPU. These registers are the top of the memory hierarchy and are the fastest
way for the system to manipulate data. The number and size of registers vary from processor-to-
processor
Memory Unit
✓ This unit is responsible to store programs or data on a temporary or permanent basis. It has
primary memory (main memory) and secondary memory (auxiliary memory).
Output Unit
✓ This unit sends the processed results to the user. It is mainly used to display the desired result
to the user as per input instructions.For example, monitor, printer, plotter, etc.
Data
✓ Data can be defined as a representation of facts, concepts, or instructions in a formalized
manner, which should be suitable for communication, interpretation, or processing by human
or electronic machine.
✓ Data is represented with the help of characters such as alphabets (A-Z, a-z), digits (0-9) or
special characters (+, -, /, *, <, >, = etc.)
Information
✓ Information is organized or classified data, which has some meaningful values for the receiver.
It is the end point or the final output of any processed work. Information is the processed data
on which decisions and actions are based.
✓ For the decision to be meaningful, the processed data must qualify for the following
characteristics –
• Timely − Information should be available when required.
• Accuracy − Information should be accurate.
• Completeness − Information should be complete.
Data Processing
✓ Data processing refers to the transformation of raw data into meaningful output. Data can be
done manually using a pen and paper, mechanically using simple devices e.g. typewriter or
electronically using modern data processing tools e.g. computers.
Process Time
Process time typically refers to the time taken by a specific process or task to complete within a
computer system. It may include various stages such as data processing, computation, and output
generation.
Data Collection
Performing
Decoding Storing data
instructions
Data Capture
Encoding
Data
Transform raw
Transmission Presenting data
data into Retrieve data
to user
information
Data
Communication
3 Interconnection of Units
CPU sends data, instruction and information to the components inside the peripheral device attached
to it.
A Bus is a set of wires used for interconnection where each wire can carry 1 bit of data. In other
words, bus is a set of electrical signal pathways that allows information and signals to travel between
component inside of outside of a computer.
Computer Bus
Internal Bus
✓ It connects the component inside the motherboard and system memory. It is also called the
system bus. The Internal bus includes the following buses:
• The command to access the memory or the Input Output devices is carried by the control
bus.
• The address of Input- Output devices or memory is carried by the address bus.
• The data to be transferred is carried by the data bus.
External Bus
✓ It connect the different external devices, peripherals, expansion slot, Input/Output ports and
drive connection to the rest of computer. It is also referred to as the expansion bus.
There are several types of computer bus interfaces, each serving a specific purpose. Here are
some common types:
4 Instruction cycle
A program residing in the memory unit of a computer consists of a sequence of instructions. These
instructions are executed by the processor by going through a cycle for each instruction.
Machine Language
Computers understand instruction only in terms of 0s and 1s, which is called machine language. Instruction
is divided into two parts operation (op-code) and operand. Op-code represents an action that the processor
must execute and the operand defines the parameter of the action and depends on the operation.
Each computer's CPU can have different cycles based on different instruction sets, but will be
similar to the following cycle -
[email protected] 10 | P a g e http://www.edutap.co.in
Fetch
✓ The CPU fetches the instruction from main memory via the data bus, and it is then placed into
the CIR. the Program Counter is instructed to contain the address of the next instruction.
Decode
✓ The instruction decoder interprets instructions. If an instruction has an indirect address, the
effective address is read from main memory. and any required data is fetches from main
memory to be processed and then placed into data registers.
Execute
✓ The CU passes the decoded information as a sequence of control signals to the relevant function
units of the CPU to perform the actions required by the instruction, such as reading values from
registers, passing them the ALU to perform mathematical or logic functions on them, and
writing the result back into a register. If the ALU is involved, it sends a condition signal back to
the CPU.
Store
✓ The result generated by the operation is stored in the main memory, or sent to an output
device. Based on the condition of any feedback from the ALU, Program Counter may be updated
to a different address from which the next instruction will be fetched. The cycle is then
repeated.
Execution time
It refers to the time taken by a computer to process a given set of instructions or a program.
It measures the duration from the start of program execution to its completion, including the
time spent on fetching instructions, decoding them, executing them, and storing the results.
Execution time is a critical performance metric used to evaluate the efficiency and speed of
computer systems and programs.
5 Computer Design
It is the structure in which components relate to each other. The designer deals with a particular level
of system at a time and there are different types of issues at different levels. At each level, the
designer is concerned with the structure and function. The structure is the skeleton of the various
components related to each other for communication. The function is the activities involved in the
system.
[email protected] 11 | P a g e http://www.edutap.co.in
Different types of Computer Architecture:
Architecture Description
1. Von Neumann • Uses a single shared memory for both data and instructions.
Architecture Instructions and data are stored in the same memory and
accessed via a single bus.
• Historically, two types of computers existed: Fixed Program
Computers, which had specific functions and could not be
reprogrammed, and Stored Program Computers, which could
execute various tasks as programs were stored in their
memory.
• Modern computers follow the stored-program concept
introduced by John Von Neumann, where programs and data
are stored in separate memories and treated the same,
allowing for easier reprogramming.
2. Stack-Based • Primarily operates on a stack data structure. Instructions often
Architecture manipulate data directly on the top of the stack, simplifying
instruction formats.
• Uses a data structure called a stack for organizing data and
instructions. Operates on the Last In First Out (LIFO) access
method. ALU operations are performed directly on stack data,
requiring both operands to be on the stack.
• Resulting data is placed back onto the stack. The stack pointer
(SP) register stores the address of the topmost element of the
stack.
3. Harvard • Harvard Architecture is the computer architecture that
Architecture contains separate storage and separate buses (signal path) for
instruction and data.
• It was basically developed to overcome the bottleneck of Von
Neumann’s Architecture. The main advantage of having
separate buses for instruction and data is that the CPU can
access instructions and read/write data at the same time.
4. CISC (Complex • Features a rich instruction set with complex instructions
Instruction Set capable of performing multiple operations in a single
Computing) instruction.
5. RISC (Reduced • Employs a simplified instruction set with a smaller number of
Instruction Set instructions. Executes instructions in a single clock cycle,
Computing) leading to efficient execution.
6. Parallel • Utilizes multiple processing units to execute instructions
Architectures simultaneously, enabling parallelism and improved
performance.
7. Distributed • Involves multiple independent computers working together as
Computing a single system. Commonly used for tasks requiring high
Architectures scalability and fault tolerance.
[email protected] 12 | P a g e http://www.edutap.co.in
8. Neuromorphic • Inspired by biological neural networks, aims to mimic the
Computing parallelism, low power consumption, and adaptability of the
human brain using specialized hardware.
9. Single Accumulator • Contains a single accumulator register in the CPU, serving as
Architecture the primary location for arithmetic and logic operations.
Common in early computers and microprocessors.
Structure of Harvard
[email protected] 13 | P a g e http://www.edutap.co.in
CONCEPT NOTES
Computer Hardware
Computer hardware is the collection of physical parts of a computer system. This includes the
computer case, monitor, keyboard, and mouse. It also includes all the parts inside the computer
case, such as the hard disk drive, motherboard, video card, and many others. Computer
hardware is what you can physically touch.
All computers have a common structure. These components can be very different in terms of
expense, speed and quality, but every computer has them to one degree or another.The main
components are as follows:
✓ Form Factor - This is the physical configuration of the computer: desktop, laptop, tablet or
netbook.
✓ The Processor - This is the 'brain' of the computer
✓ Data Storage - This is where your data are stored, as well as all the programmes and other files
that your computer needs to run.
✓ The Operating System - The OS is the software that runs on computers - Windows, Macintosh or
Linux are the most popular.
✓ Monitor - This is the viewing screen that you use to operate the computer. It is a very important
part of the digital photography computer.
Motherboard
✓ The motherboard connects all the other components to one another, and is the physical
base on which everything is built. It contains a lot of the machine's core features, like the
number of USB, physical ports, and the number of expansion cards can put in (such as
video, sound, and Wi-Fi), and also partially determines how big a computer will be. Which
motherboard can be picked will depend on whether you want to build a low, medium, or
high-performance machine and how advanced of a user you are.
Case
✓ The case holds all of your computer's parts together. For the most part, a case is less about
features that affect how a computer runs and more about features that affect you and your
home that is, how quiet it is, how large it is, and of course, how it looks in the office/home.
RAM
✓ RAM, or Random Access Memory (or "Memory" for short), is like your computer's short-
term memory. It stores data that a computer needs quick access to help your programs run
faster and help to run more programs at one time. More the Ram more will be the speed.
[email protected] 6|Page http://www.edutap.co.in
In general, you want to have as much RAM in your computer as you can afford. If you are running a
32 bit operating system, then each program can make use 2GB to 3 GB of RAM. If you have a 64bit
OS, then each program can use as much RAM as you have available
Graphics Card
✓ The Graphics card, or GPU, is a processor specifically designed to handle graphics. It's what
you hook your monitor up to, and it's what draws your desktop and your windows on the
screen.
Optical Drive
✓ An optical drive, more commonly known as a CD or DVD drive, is what is required to read
CDs, DVDs, and even Blu-Ray discs.
Power Supply
✓ The power supply directs electricity to the other components in the machine.
Sound Card
✓ A sound card is an electronic circuit board that is mounted inside the computer to control
sound output to speakers or headphones, to record sound input from a microphone
connected to the computer, and to manipulate sound stored on a disk. Sound cards are
Ports
✓ A port is an interface on a computer to which you can connect a device. Personal
computers have various types of ports. Internally, there are several ports for connecting
disk drives, monitors, and keyboards. Externally, personal computers have ports for
connecting modems, printers, mouse, and other peripheral devices.
Firewire - It is used to connect audio and video multimedia devices like video camera it has data
transfer rate of upto 400 Mb/s.
Connector Description
HDMI (High-Definition Primarily used for connecting displays such as monitors, TVs, and
Multimedia Interface) projectors to computers and other devices.
Expansion card
✓ An expansion card is an electronic card/board that is used to add extra functionality to a
computer. It is inserted into an expansion slot on the motherboard of a computer.
Expansion cards contain edge connectors that are used to create an electronic link
between motherboard and card, thus enabling these two to communicate.
Input Devices
✓ Input devices serve as a link between a user and the computer. It allows users to feed
instructions and data to computers for processing, display, storage and/or transmission.
3.1.1 Keyboard
✓ A computer keyboard is an input device that allows a person
to enter letters, numbers, and other symbols (these are called
characters in a keyboard) into a computer. Using a keyboard to
enter lots of data is called typing. A keyboard contains many
mechanical switches or push-buttons called "keys".
✓ There are different types of keyboards such as QWERTY,
DVORAK and AZERTY.QWERTY keyboards contains 104 keys.
[email protected] 9|Page http://www.edutap.co.in
Some important keys in a keyboard are:
✓ Toggle Keys – It is used to change the input mode of a group of keys on a keyboard. Caps
Lock, Num Lock, Scroll Lock are toggle keys.
• Caps Lock – Capitalizes all letters.
• Num Lock – Makes sure numbers are inputs from the keypad.
• Scroll Lock – Allows the arrow keys to scroll through the contents of a window.
✓ Modifier Keys – It is a special key (key combination) that temporarily modifies the normal
action of another key when pressed together. Shift, Alt, Ctrl, Fn are modifier keys.
• Shift – used for capitalizing letters and entering different types of symbols.
• Function (Fn) – Other functions such as brightness and volume control.
• Control (Ctrl) – used for entering keyboard shortcuts, such as Ctrl+S, Ctrl+P etc.
• Alt – used in combination with the numeric keys and the Control key for entering
keyboard shortcuts.
✓ Function Keys – A key on a computer keyboard, distinct from the main alphanumeric
keys, to which software can assign a function. F1 - F12 keys are known as function keys
and each key performs a different function. It may be used as single key commands
(e.g., F5) or combined with one or more modifier keys (e.g., Alt+F4).
✓ Escape Key – It is located in the upper left corner of a computer keyboard. It is often
used to quit, cancel, or abort a process which is running on a computer.
✓ Alphanumeric key- Includes the Alphbet keys (A, B, C…, Z) and Number key (0,1,2,…9).
✓ Numeric Key- there keys are located at the right side of the keyboard.
✓ Cursor Control Key/ Navigation Key- These include 4 directional arrow keys arranged
between alphanumeric and numeric keys. Apart from the arrow keys, it also include
Home, End, Page up and Page down.
✓ Other Keys
✓ Enter key- It is used to finish and begin and begin new entry in the document.
✓ Escape key- It allows a user to cancel or abort operation, which are executing at
present.
✓ Backspace key and Delete Key- It is used to erase anything type.
[email protected] 10 | P a g e http://www.edutap.co.in
✓ Window key- It is used to open the start menu.
3.1.2 Mouse
✓ It is a pointing and cursor-control device. A round ball at its base
senses the movement of a mouse and sends corresponding signals to
CPU when the mouse buttons are pressed. A mouse has two or three
buttons called Left, Right, and Middle button.
3.1.5 Scanner
✓ The scanner uses the pictures and pages of text as input. It scans the picture or a
document. The scanned picture or document then converted into a digital format or file
and is displayed on the screen as an output. It uses optical character recognition
techniques to convert images into digital ones. Some of the common types of scanners
are as follows:
3.1.5.1 Flatbed Scanner
✓ It has a glass pane and a moving optical CIS or CCD array. The light
illuminates the pane, and then the image is placed on the glass pane.
The light moves across the glass pane and scans the document and
thus produces its digital copy. You will need a transparency adapter
while scanning transparent slides.
3.1.5.2 Handheld Scanner
✓ It is a small manual scanning device which is held by hand and is rolled
over a flat image that is to be scanned. The drawback in using this
device is that the hand should be steady while scanning; otherwise, it
may distort the image. One of the commonly used handheld scanners
is the barcode scanner which you would have seen in shopping stores.
3.1.5.3 Sheetfed Scanner
✓ In this scanner, the document is inserted into the slot provided in the
scanner. The main components of this scanner include the sheet-
feeder, scanning module, and calibration sheet. The light does not
move in this scanner. Instead, the document moves through the
scanner. It is suitable for scanning single page documents, not for thick
objects like books, magazines, etc.
[email protected] 11 | P a g e http://www.edutap.co.in
3.1.5.4 Drum Scanner
✓ Drum scanner has a photomultiplier tube (PMT) to scan images. It
does not have a charge-coupled device like a flatbed scanner. The
photomultiplier tube is extremely sensitive to light. The image is
placed on a glass tube, and the light moves across the image, which
produces a reflection of the image which is captured by the PMT and
processed. These scanners have high resolution and are suitable for
detailed scans.
3.1.5.5 Photo Scanner
✓ It is designed to scan photographs. It has high resolution and color
depth, which are required for scanning photographs. Some photo
scanners come with in-built software for cleaning and restoring old
photographs.
3.1.10 Digitizer
✓ A digitizer is a hardware device that receives analog information, such
as sound or light, and records it digitally. Usually, the information is
stored in a file on a computing device. It allows users to draw and
manipulate graphics on the screen. It is also known as a graphics tablet.
These kinds of tablets typically designed for CAD/CAM professionals.
[email protected] 12 | P a g e http://www.edutap.co.in
3.1.11 Touch Screen
✓ It is a computer display screen that serves as an input device. A touchscreen can be
touched by a finger or stylus. Touchscreen records the event and sends it to a controller
for processing.
3.1.12 Microphone
✓ Microphone translates sound vibrations in the air into
electronic signals. It enables many types of audio recording
devices for purposes including communications, music and
speech recording.
3.1.13 Web Camera
✓ It captures and stores images in digital form. The stored images can be can be archived
on a photographic compact disc or external hard disk.
Output Devices
✓ An output device is any piece of computer hardware equipment which converts
information into human-readable form. It can be text, graphics, tactile, audio, and video.
3.2.1 Monitor
✓ It is also known as Visual Display Unit (VDU). The monitor is provided
alongwith the computer to view display the result.
✓ An image on the monitor is created by a configuration of dots, also known
as pixels.
A monitor is of two kinds; monochrome display monitor and colour display monitor.
A monochrome display monitor uses only one colour to display text and colour display monitor can
display 256 colours at a time.
[email protected] 13 | P a g e http://www.edutap.co.in
3.2.1.1 Cathode-Ray Tube (CRT)
✓ The CRT works in a same way as a television. CRT has a vacuum tube. The screen of
CRT is covered with a fine layer of phosphorescent elements, called phosphores. CRT
tube creates an image on the screen using a beam of electrons.
3.2.2 Printer
✓ Printers are output devices that prints information in the form of text/images on a
paper. Impact Printers and Non-impact printers are the two types of printers.
[email protected] 14 | P a g e http://www.edutap.co.in
✓ Daisy Wheel Printer- Their operation revolves around a daisy-shaped wheel featuring
embossed characters. When a character needs printing, the mechanism aligns the
corresponding petal with the print position, striking it against an ink ribbon and paper to
leave an impression. Despite their crisp output, daisy wheel printers are slow and
limited to single fonts and sizes unless the wheel is replaced.
✓ Line Printer – A line printer is an impact printer which can print one line of text at a time.
It is also known as a bar printer. They can be of two types Chain Printer or Drum Printer.
[email protected] 15 | P a g e http://www.edutap.co.in
✓ Inkjet Printers – Inkjet printers work by spraying ink on a sheet of paper. The type of ink
used in an inkjet printer is wet.
Resolution of Printer
It refers to the level of detail that a printer can reproduce in its output. It's usually measured in dots
per inch (DPI). A higher resolution means more dots per inch, resulting in finer detail and smoother
curves in printed images and text.
3.2.3 Plotter
✓ A plotter is an output device used to produce hard copies of large graphs and designs on
paper, such as construction drawings, architectural plans, and business charts. Drum
plotters and Flatbed plotters are the types of plotters.
✓ Drum plotter – It is a pen plotter that wraps the paper around a drum with a pin feed
attachment. The drum then rotates the paper as pens move across it and draw the image.
It is used to produce continuous output, such as plotting of earthquake activity. It is also
known as Roller Plotter.
✓ Flatbed plotter - It plots on paper that is spread and fixed over a rectangular flatbed table.
It is used in the design of cars, ships, aircrafts, buildings, highways etc. It is also known as
Table Plotter.
3.2.4 Speaker
✓ Speaker is one of the output devices used with computers. They are transducers that
convert electromagnetic waves into sound waves.
[email protected] 16 | P a g e http://www.edutap.co.in
3.2.5 Digital Projectors
✓ Projector is a device that connects with a computer and projects the output onto a
white screen or wall.
[email protected] 17 | P a g e http://www.edutap.co.in
getting CPU time, the time it spends executing on the CPU, and any time it spends waiting
for input/output operations to complete.
• Burst time: Burst time is the amount of time that a process requires to execute on the CPU
without any interruptions. It represents the time taken by a process to complete its CPU-
bound execution phase before it might need to wait for input/output operations or other
system events.
[email protected] 18 | P a g e http://www.edutap.co.in
Memory Organization
2 Memory Hierarchy
The memory is characterized on the basis of two keys factors; capacity and access time. The
lesser the access time, the faster is the speed of memory. The computer uses a hierarchy of
memory that is organized in a manner to enable the fastest speed and largest capacity of
memory.
3 Memory Management
Following are the memories of a computer:
✓ Register Memory
✓ Cache Memory
✓ Primary memory
✓ Secondary memory
RAM SRAM
Cache Memory
SDRAM
Primary Memory
MROM
PROM
ROM
EPROM
EEPROM
Memory
Floppy Disk
Zip Disk
Winchester Disk
Magnetic Memory
Hard Disk
Tape Cassette
Magnetic Tapes
Secondary Memory
CD
Optical Memory
DVD
Register Memory
✓ Register memory is the smallest and fastest memory in a computer. It is not a part of the
main memory and is located in the CPU in the form of registers, which are the smallest
data holding elements. A register temporarily holds frequently used data, instructions, and
memory address that are to be used by CPU.
Cache Memory
✓ Cache memory is a type of memory used to hold frequently used data. Cache memory is a
very high speed semiconductor memory, which can speed up the CPU.
✓ It act as the buffer between the CPU and the main memory. Most web browsers use a
cache to load regularly viewed web pages fast. The most important type of cache memory
is the CPU cache.
✓ Once the data is stored in cache, it can be used by accessing the cached copy rather than
recomputing the original data.
✓ Cache memory provides backup storage for instructions and data that are not currently being
used by the processor. Cache memory is faster to access than RAM and ROM, making it ideal
for temporarily storing frequently accessed instructions and data to improve the overall
performance of the system.
Primary Memory
✓ Primary memory is also called as the main memory or internal memory of the computer as
it communicates directly with the CPU.
✓ It holds only those data and instruction on which computer is currently working. Its
generally made up of semiconductor device.
✓ It is divided into two subcategories: RAM and ROM
Flash Memory
It is a kind of semiconductor based non volatile rewritable memory used in digital camera, mobile
phone, printer etc. Flash Memory is an example of quite recent type of storage technology known
as solid device.
These are regarded as being robust and reliable because they have no moving parts with the data
stored in the semiconductor chips, this technology already exists in the forms of flash memory used
to store the Basic Input/Output system (BIOS) of a motherboard.
2. Zip Disks
3. Magnetic Tape
✓ Magnetic Tape was often used for digital data storage, because of its
low cost and ability to store large amounts of data.
✓ The technology essentially consisted of a magnetically thin coated piece
of plastic wrapped around wheels.
✓ Its relative slowness and unreliability compared to other data storage
solutions has resulted in it now being largely abandoned as a media.
5. Winchester disk
✓ It is also known as Winchester drive or Winchester disk drive, is an early form of hard
disk drive (HDD) technology that revolutionized data storage in computers. A
Winchester disk is a Disk Stack. The term Winchester comes from an early type of disk
drive developed by IBM that had 30MB of fixed storage and 30MB of removable
storage.
6. Tape Cassette
✓ It is also known as a music cassette. It is a rectangular flat container
in which the data is stored in an analog magnetic tape. It is generally
used to store audio recordings.
It is the process of configuring data-storage devices like hard drives, floppy disks, and flash drives for
initial usage or when additional storage space is needed. It's often necessary when a new operating
system is being installed or when there's a need for more storage capacity. Formatting a disk erases
all existing files on it, making it ready for new data to be stored.
3. Blu-ray Disc
✓ The upgraded version of CD and DVDs and drives are the Blu-ray discs.
Blu-ray refers to the blue laser used to read the disc which allows the
information to be stored at a greater density.
✓ The Maximum capacity of BD disc is 25GB if single layer and 50 GB if dual
layer.
✓ The variation in the format includes BD-ROM(Read only), BD-R(BD
Recordable), BD-RW(Rewritable), BD-RE(Rewritable)
Throughput
In the context of data storage and transfer, throughput refers to the rate at which data can be read from
or written to a memory storage device within a given unit of time. It measures the efficiency and speed of
data transfer between the storage device and other components of a computer system, such as the central
processing unit (CPU) or random access memory (RAM).
Throughput is typically measured in units such as bytes per second (B/s), kilobytes per second (KB/s),
megabytes per second (MB/s), or gigabytes per second (GB/s), indicating the amount of data that can be
transferred in one second.
Higher throughput values indicate faster data transfer rates and better performance of the storage device.
[email protected] 10 | P a g e http://www.edutap.co.in
2. SD Card
✓ It is known as a Secure Digital Card. It is generally used with electronic
devices like phones, digital cameras, etc. to store larger data. It is portable
and the size of the SD card is also small so that it can easily fit into
electronic devices. It is available in different sizes like 2GB, 4GB, 8GB, etc.
3. Memory Card
✓ It is generally used in digital cameras, printers, game consoles, etc. It is also used to
store large amounts of data and is available in different sizes. To run a memory card on
a computer you require a separate memory card reader.
[email protected] 11 | P a g e http://www.edutap.co.in
Cloud Storage
• Cloud Storage is a specific aspect of cloud computing. Cloud storage services provide scalable
and reliable storage solutions without the need for users to manage physical hardware.
• Cloud storage is like having a virtual hard drive that you can access from anywhere with an
internet connection. Instead of storing your files, photos, or videos on your computer's hard
drive or a physical storage device like a USB drive, you can store them securely on servers
maintained by a cloud storage provider.
[email protected] 12 | P a g e http://www.edutap.co.in
Some Next Generation Memories
4 Memory Measurement
The data is measured in term of bits in the memory.
Name Size
1 bit Single digit 0 or 1
1 nibble 4 bits
1 byte 8 bits
1 Kilobyte (KB) 1024 Bytes
1 Megabyte (MB) 1024 KB
1 Gigabyte (GB) 1,024 MB
1 Terabyte (TB) 1,024 GB
1 Petabyte (PB) 1,024 TB
1 Exabyte (EB) 1,024 PB
1 Zetta byte (ZB) 1,024 EB
1 Yotta Byte (YB) 1,024 ZB
1 Brontobyte (BB) 1,024 YB
1 Geop Byte 1,024 BB
[email protected] 13 | P a g e http://www.edutap.co.in
CONCEPT NOTES
Computer Software
Device drivers
Language Translators
System Software
✓ The system software is the main software that runs the computer. It consists of several
programs that are directly responsible for controlling, integrating, and managing the
individual hardware components of a computer system. It serves as an interface
between a computer user, computer hardware, and application software. The
application programs are also controlled by system software.
✓ Based on the functionality, there are four types of system software
SYSTEM SOFTWARE
Language
Operating System Utility Programs Device drivers
Translators
1.1.2.5 Anti-virus
✓ It is the utility which is used to scan a computer for viruses and prevent the computer
system files from being corrupt, e.g. Kaspersky, AVG, McAfee, Avira, etc.
Testing involves running the software and checking its behavior to identify any bugs or issues. This process
helps ensure that the software functions correctly and meets its requirementinto machine language know as
Object code.
1.1.4.1 Assembler
✓ It converts assembly language programs into machine language( i.e 1 or 0).
Code
Code written into high level language or Assembly Language know as Source Code and the converted code
into machine language know as Object code.
1.1.4.2 Compiler
✓ It converts the program from a high-level language into low-level language and reports
all the errors of the program along with the line numbers. C, C++ use compilers.
Source Program Object Code
Compiler
(HLL) (Machine Language)
1.1.4.3 Interpreter
✓ It converts the programs in a high-level language to low-level language. It translates
line by line and reports the error once after completing the translation process. It gives
better error diagnostics than a compiler. Python, BASIC, and Ruby use interpreters.
Source Program Object Code
Interpreter
(HLL) (Machine Language)
Object Code
Execution
Linker
Results
External
Libraries
Loader
It is a kind of system software responsible for loading and relocation of executable programs in the main
memory.
Essentially, a loader is responsible for loading the program residing in the disk into memory so that it can
be executed by the processor into machine language know as Object code.
Application Software
✓ Application software is a program or group of programs designed for end users. It
enables the user to complete tasks, such as creating documents, spreadsheets,
databases, and publications, doing online research, sending emails, designing graphics,
etc.
Application Software
Programming Software
✓ It is a set or collection of tools that help developers in writing other software or programs.
It assists them in creating, debugging, and maintaining software or programs or
applications.
✓ We can say that these are facilitator software that helps translate programming language
such as Java, C++, Python, etc., into machine language code. So, it is not used by end-users.
For example, compilers, linkers, debuggers, interpreters, text editors, etc. This software is
also called a programming tool or software development tool.
✓ Some examples of programming software include:
• Eclipse – It is a java language editor.
• Coda – It is a programming language editor for Mac.
• Notepad++ - It is an open-source editor for windows.
• Sublime text – It is a cross-platform code editor for Linux, Mac, and Windows.
2 Algorithm
The word Algorithm means a set of finite rules or instructions to be followed in calculations or
other problem-solving operations
A procedure for solving a mathematical problem in a finite number of steps that frequently
involves recursive operations.
[email protected] 10 | P a g e http://www.edutap.co.in
Need for Algorithm
✓ Algorithms are necessary for solving complex problems efficiently and effectively.
✓ They help to automate processes and make them more reliable, faster, and easier to
perform.
✓ Algorithms also enable computers to perform tasks that would be difficult or impossible for
humans to do manually.
✓ They are used in various fields such as mathematics, computer science, engineering,
finance, and many others to optimize processes, analyze data, make predictions, and
provide solutions to problem.
Characteristics of Algorithm
3 Flowcharts
Flowchart are nothing but the graphical representation of the data or the algorithm for a better
understanding of the code visually.
A flowchart is a type of diagram that represents a workflow or process. A flowchart can also be
defined as a diagrammatic representation of an algorithm, a step-by-step approach to solving a
task.
To draw a flowchart, certain rules need to be followed which are followed by all professionals
to draw a flowchart and are widely accepted all over the countries.
[email protected] 11 | P a g e http://www.edutap.co.in
Flowchart symbols
[email protected] 12 | P a g e http://www.edutap.co.in
4 Computer Language
A Computer Language is the means by which instructions and data are transmitted to
computers. Languages are divided into two categories:
[email protected] 13 | P a g e http://www.edutap.co.in
• Code reusability present in object-
• Code reusability absent in procedural
oriented programming.
programming,
• Examples: C, FORTRAN, Pascal, Basic, • Examples: C++, Java, Python, C#, etc.
etc.
4.2.1.1 BASIC
✓ Beginner's All-purpose Symbolic Instruction Code (BASIC) was developed for students
to write simple computer programs. It was designed by John Kemeney and Thomas
Kurtz in 1963.
4.2.1.2 ALGOL
✓ ALGOL is a short form of ALGOrithmic Language. It is a family of portable programming
languages for scientific computations.
4.2.1.3 PROLOG
✓ Prolog is used widely for artificial intelligence applications, particularly expert systems.
4.2.1.4 PASCAL
✓ It is used to teach programming techniques. It was developed by Niklaus Wirth.
4.2.1.5 FORTRAN
✓ It is a programming language designed for numeric computation and scientific
computing. FORmula TRANslation is an acronym of FORTRAN.
4.2.1.6 COBOL
✓ Common Business Oriented Language is the full form of COBOL. It is used for business
and administrative purposes. It can be read like regular English.
4.2.2.1 Java
✓ Java is used for developing Mobile, Desktop, web, server-side and dynamic web
applications.
[email protected] 14 | P a g e http://www.edutap.co.in
4.2.2.2 JavaScript
✓ JavaScript is designed for styling HTML Pages, interactivity to HTML Pages, Server-Side
Scripting Operation, executing query related to DB on Serve.
4.2.2.3 Python
✓ Python is a general-purpose programming language. It is used for developing complex
scientific, numeric applications, data analysis, and visualization.
4.2.2.4 C++
✓ C++ is a general-purpose language was designed by Microsoft to be used for
developing apps on the Microsoft platform.
4.2.2.5 PHP
✓ PHP stands for Hypertext Pre-processor. It is a scripting language used for the
development of web applications.
4.2.2.6 .Net
✓ Net is a programming framework developed by Microsoft, which can be used to build
different types of applications such as Windows, Web application and Mobile based
applications etc.
Visual Basic
Visual Basic is an approachable language with a simple syntax for building type-safe, object-oriented
apps.
4.3.2 Syntax
✓ The set of rules that define the structure of valid statements and expressions in the
programming language. This includes rules for keywords, identifiers, operators,
punctuation symbols, and the order in which they can appear.
4.3.3 Variable
✓ Variable is a character or group of characters assign by the programmer to a single
memory location and used in the program as the name of that memory location in
order to access the value stored in it. e.g. int a, char a
4.3.4 Constant
✓ It has fixed value. String constant is simply a sequence of character. The numeric
constant can be integer representing whole quantities or a number. e.g. int A=10; char
A= „hello‟;
[email protected] 15 | P a g e http://www.edutap.co.in
4.3.5 Statements
✓ Instructions that perform actions or control the flow of execution within a program.
Examples of statements include variable declarations, assignments, control structures
(e.g., if statements, loops), function calls, and input/output operations.
4.3.6 Expressions
✓ Every computer language specify as in which various arithmetic operators are
evaluated in a given expressions. An expression may contain operators such as *, +, -,
/, (), ^. e.g. 2+4*8(4-6/3)
4.3.7 Functions/Methods
✓ Named blocks of code that perform specific tasks or operations. Functions can accept
parameters (input) and return results (output), encapsulating reusable and modular
code.
4.3.9 Comments
✓ Annotations in the source code that provide explanations, documentation, or notes to
developers. Comments are ignored by the compiler or interpreter and serve to
improve code readability and maintainability.
[email protected] 16 | P a g e http://www.edutap.co.in
• Cold Booting : When you turn the computer off and back on, you're performing what's
called a cold booting. During a cold boot, the computer runs self-tests on its hardware
and loads its operating system before it's ready for you to use.
• Warm Booting : When you restart the system without interrupting power, it's a warm
booting. We also call it a RESTART.
✓ Firmware: Firmware is a software program that is written to a hardware device. It allows the
hardware to be updated. The contents are saved when a hardware device is turned off or
loses its external power source.
✓ Middleware: Middleware is a software layer situated between applications and operating
systems. It enables communication and data management for distributed applications.
✓ Power On Self Test: A power-on self-test is a process performed by firmware or software
routines immediately after a computer or other digital electronic device is powered on. The
results of the POST may be displayed on a panel that is part of the device, output to an
external device, or stored for future retrieval by a diagnostic tool.
✓ Server Programs: Server programs are dedicated computer programs that run as services
and serve the needs or request of other programs. These services may run on a dedicated
hardware or on the same computer as the requesting programs.Some common example of
server programs is:
• Web Server – For hosting websites.
• Print Server – manage multiple print requests for multiple printers
• File server – manages the storage and retrieval of shared computer files
• Database Server – provide database services to another computer programs
• Mail server – managed and transfers electronic mail messages
✓ User Interface (UI): The means by which a user interacts with a software application,
typically through graphical elements such as menus, buttons, and windows.
✓ User Experience (UX): The overall experience a user has when interacting with a software
application, including usability, accessibility, and satisfaction.
✓ Open Source Software (OSS): Software with its source code made available and licensed in a
way that allows users to modify and distribute the software freely.
✓ Closed Source Software: Software whose source code is not made available to the public,
and typically requires a license or purchase to use.
✓ Freeware: Software that is available for use at no cost, but may have restrictions on
distribution or modification.
[email protected] 17 | P a g e http://www.edutap.co.in
✓ Shareware: It is a software distribution model where users can try a limited version of the
software for free before purchasing the full version. It typically includes a trial period, limited
functionality during the trial, and requires users to pay for the full version if they decide to
continue using it.
✓ Beta Version: A pre-release version of software made available to a select group of users for
testing and feedback before the final release.
✓ Patch: A software update designed to fix issues or vulnerabilities in a program, typically
released after the initial software version.
✓ Upgrade: A newer version of software that provides additional features, improvements, or
fixes compared to the previous version.
✓ Software as a Service (SaaS): A software distribution model where applications are hosted
by a third-party provider and made available to customers over the internet.
✓ Software Development Kit (SDK): A set of tools and resources used by developers to create
software applications for a specific platform or framework.
✓ Integrated Development Environment (IDE): Software that provides comprehensive tools
for software development, including code editing, debugging, and project management.
✓ Version Control: The management of changes to documents, computer programs, large
websites, and other collections of information. It is commonly used in software development
to track and manage changes to source code.
✓ Data Structure: A data structure is a group of data which can be processed as a single unit.
This group of data may be of similar or dissimilar data types. Data Structures are very useful
while programming because they allow processing of the entire group of data as a single
unit. Data structures are of two types: Linear and Non - Linear. In a linear data structure, the
elements are stored in a sequential order. On the other hand, in a non linear data structure
no sequential order is followed. It is a sort of multilevel data structure. Arrays, lists, stacks,
queues, linked lists etc. are examples of linear data structure while tree, graph etc. is a non -
linear data structure.
• Stack: A stack is a data structure whose elements are accessed according to the Last-In
First-Out (LIFO) principle. This is because in a stack, insertion and deletion of elements
can only take place at one end, called top of the stack.
• Queue: Another most common data structure found in computer algorithm(s) is queue.
A queue is a container of elements, which are inserted and removed according to the
first-in first-out (FIFO) principle.
• Array: An array is a data structure that stores a collection of elements of the same type
in contiguous memory locations. Each element in the array is accessed using an index.
[email protected] 18 | P a g e http://www.edutap.co.in
Operating System
Examples – Linux (Ubuntu), Windows (Windows XP, Windows 7, Windows 8, Windows 10 etc.),
DOS, Apple IOS (MacOS 10.15), etc.
Kernel
✓ A kernel is the central part of an operating system. It manages the operations of the
computer and the hardware, most notably memory and CPU time.
[email protected] 5|Page http://www.edutap.co.in
Memory management
✓ It manages both the primary and secondary memory such as RAM, ROM, hard disk, pen
drive, etc. It checks and decides the allocations and deallocation of memory space to
different processes.
✓ When a user interacts with a system, the CPU is supposed to read or write operations, in
this case, OS decides the amount of memory to be allocated for loading the program
instructions and data into RAM.
✓ After this program is terminated, the memory area is again free and is ready to be allocated
to other programs by the OS.
Processor Management
✓ It facilitates processor management, where it decides the order for the processes to access
the processor as well as decides the processing time to be allocated for each process.
✓ Besides this, it monitors the status of processes, frees the processor when a process is
executed then allocates it to a new process.
Device/Hardware management
✓ The operating system also contains drivers to manage devices. A driver is a type of
translation software that allows the operating system to communicate with devices, and
there are different drivers for different devices as each device speaks a different language.
✓ Run software applications: It offers the environment to run or use software applications
developed to perform specific tasks, for example, MS Word, MS Excel, Photoshop, etc.
Data management
✓ It helps in data management by offering and displaying directories for data management.
You can view and manipulate files, folders, e.g., you can move, copy, name, or rename,
delete a file or a folder.
Storage Management
✓ The storage management function of an operating system involves organizing and
controlling access to data storage resources such as hard drives and memory. It oversees
tasks like allocating storage space, managing file systems, ensuring data integrity, and
optimizing performance for efficient storage utilization and retrieval.
User Interface
✓ An operating system provides an interface between the computer user and the hardware.
We will Discuss this in detail in coming part of this concept notes.
Time Management
✓ It helps CPU in time management. The Kernel OS keeps checking the frequency of
processes that requests CPU time.
✓ When two or more processes that are equally important compete for the CPU time, then
the CPU time is sliced into segments and allocated to these processes in a round-robin
fashion to prevent a single process from monopolizing the CPU.
Unix Time
Unix time, also known as Epoch time, is a system for tracking time in computing. It is defined as the
number of seconds that have elapsed since midnight on January 1, 1970, UTC (Coordinated Universal
Time). Many operating systems, including Unix-like systems and POSIX-compliant systems, use Unix
time internally for time representation into machine language know as Object code.
Deadlock Prevention
✓ Sometimes a resource that is supposed to be shared by two or more processes is held by
one process due to which the resource cannot continue. This situation is known as
deadlock.
✓ The OS does not let this situation arise by carefully distributing the resources among the
different processes.
Interrupt Handling
✓ OS also responds to interrupts, which are signals generated by a program or a device to
seek the attention of the CPU.
✓ The OS checks the priority of the interrupt, and if it is more important than the currently
running process, it stops the execution of the current process and preserves this state of
CPU then executes the requested process. Thereafter the CPU returns to the same state
where it was stopped.
Response time
Response time is the time elapsed from when a request is submitted until the first response is produced. In the
context of process management in an operating system, it represents the time it takes for a process to start
executing after it arrives in the system.
✓ The interaction between a user and the computer does not occur in this system. The user is
required to prepare jobs on punch cards in the form of batches and submit them to the
computer operator.
✓ The computer operator sorts the jobs or programs and keeps similar programs or jobs in
the same batch and run as a group to speed up processing.
✓ It is designed to execute one job at a time. Jobs are processed on a first-come, first-serve
basis, i.e., in the order of their submission without any human intervention.
2. Multiprogramming Operating System UNIX, Linux, Windows 95/98 (to some extent)
5 User Interface
An operating system provides an interface between the computer user and the hardware.
The user interface is one of the most important parts of any operating system because it allows
users to easily access and communicate with the applications and the hardware.
The user can interact with the computer by using mainly different kinds of interfaces.
[email protected] 10 | P a g e http://www.edutap.co.in
programs stored on the computer and windows represent running programs that the user
has launched through the operating system.
✓ The first graphical user interface was designed by Xerox Corporation in 1970s. GUIs can be
found in handheld devices such as MP3 players, portable media players, gaming devices,
etc.
✓ The input devices used to interact with the GUI commonly include the mouse and the
keyboard. Examples of operating systems with GUI interfaces include Microsoft Windows,
Ubuntu, Fedora and Macintosh, among others.
Touch-based Interface
✓ Today smartphones, tablets and PCs allow users to interact with the system simply using
the touch input. Using the touchscreen, a user provides inputs to the operating system,
which are interpreted by the OS as commands like opening an app, closing an app, dialing a
number, scrolling across apps, etc.
✓ Examples of popular operating systems with touchbased interfaces are Android and iOS.
Windows 8.1 and 10 also support touch-based interfaces on touchscreen devices.
Voice-based Interface
✓ Modern computers have been designed to address the needs of all types of users including
people with special needs and people who want to interact with computers or
smartphones while doing some other task.
✓ For users who cannot use the input devices like the mouse, keyboard, and touchscreens,
modern operating systems provide other means of human-computer interaction. Users
today can use voice-based commands to make a computer work in the desired way.
✓ Some operating systems which provide voice-based control to users include iOS (Siri),
Android (Google Now or “OK Google”), Microsoft Windows 10 (Cortana) and so on.
Gesture-based Interface
✓ Some smartphones based on Android and iOS as well as laptops let users interact with the
devices using gestures like waving, tilting, eye motion and shaking. This technology is
evolving faster and it has promising potential for application in gaming, medicine and other
areas.
UNIX
✓ The first version of Unix was developed in 1969 by Ken-Thompson and Dennis Ritchie at AT
& T Bell Laboratories. It is primarily used to a server rather than a workstation and should
not be used by anyone who does not understand the system.
[email protected] 11 | P a g e http://www.edutap.co.in
Apple Macintosh (Mac OS)
✓ It was introduced in January 1984 by Steve Jobs and was initially named as system
software, which was later renamed as Mac OS. The most recent version of OS is based on
Unix because it has a good graphical interface. Version of Mac OSX are Yosemite,
Mavericks, Mountain Lion, Tiger, Tiger Oanther, Jaguar etc.
LINUX
✓ The first Linux Kernel was released in October 1991 by Linus Torvalds. It is an open source
software, means anyone can download it and use it without any fees. Linux is similar to
Unix in operations. It is difficult to understand by anyone who does not understand the
system and can be difficult to learn.
✓ Kernal is the core of the Operating System that supports the process by providing path to
the peripheral devices.
Linux in Space
Linux has been used in various space missions and aerospace applications due to its stability, flexibility,
and open-source nature. For instance, NASA's Mars rover Curiosity runs on Linux, as do many satellites and
space station systems.
SOLARIS
✓ It is a free UNIX based OS developed by Sun Microsystems. The first version of Sun
Microsystems was published in 1992 and coined as SunOS.
[email protected] 12 | P a g e http://www.edutap.co.in
6.6.3 iOS
✓ It is the popular mobile operating system developed by Apple Incorporation. This
operating system is commonly used in Apple iPhone, iPod Touch, iPad, etc. The latest
version of iOS is 17.3.1.
6.6.4 BlackBerry
✓ It is the most secure operating system used in leading Smartphones developed by
BlackBerry company. It also supports WAP 1.2. The BlackBerry operating system was
discontinued.
[email protected] 13 | P a g e http://www.edutap.co.in
6.7.3 Types of DOS Commands
✓ There are two types of DOS command
• Internal Commands – These commands are automatically loaded into main memory
when the booting process gets completed e.g. DATE, TIME, VER, VOL, DIR, COPY, etc
• External Commands – These commands require external file to be loaded in the
computer to run e.g. Checking disk, comparing disk, formatting, etc.
✓ Following are some fundamental commands of MS-DOS
[email protected] 15 | P a g e http://www.edutap.co.in
Microsoft Windows
✓ It is an operating system, based on GUI, developed by Microsoft. Microsoft first introduced
an operating environment named Windows in November 1985 in response to the growing
interest in GUIs. Microsoft Windows stands for ‘Microsoft – Wide Interactive Network
Development for Office Work Solution’. Microsoft Windows is a series of graphical
interface operating system developed, marked and sold by Microsoft. It enables you to
work with a wide variety of programs on your computer, often simultaneously.
[email protected] 16 | P a g e http://www.edutap.co.in
6.8.1.2 Windows 95
✓ It is a graphical user interface-based operating system. It was released on 24th August,
1995 by Microsoft.
Features
• It is a mixed of 16-bit/32-bit Windows operating system.
• It is consumer-oriented.
• It supports graphical user interface operating system.
• It supports FAT32 file system, multi-display, Web TV and the Internet Explorer.
6.8.1.3 Windows 98
✓ It was developed in 1998. This was produced in two main versions. The first Windows 98
version was plagued with programming errors but the Windows 98 second edition came
out later was much better with many errors resolved.
Features
• It supports Internet Explorer 4.0.1.
• It has Intel 80486DX2/66 MHz or a compatible CPU with a Math coprocessor (Pentium
processor recommended).
• Windows 98 was the first operating system to use the Windows Driver Model (WDM).
• It includes a FAT32 converter utility for converting FAT16 drives to FAT32 without
formatting the partition.
• It also supports many peripherals devices (MX, USB, DVD).
6.8.1.4 Windows ME
✓ An upgraded version from Windows 98 (Millennium Edition) launched in June 2000, but
it has been historically plagued with programming errors which may be frustrating for
home users.
Features
• It is designed for single CPU or SMP 32-bit Intel X86 computer.
• It supports 8 or more CPU (the maximum 32 CPU).
• The minimum internal storage is 64MB and maximum 4GB.
• It introduced Multilingual User Interface (MUI).
6.8.1.5 Windows XP
✓ It is an OS produced by Microsoft for use on personal computers. Microsoft released
Windows XP on 25th October, 2001.
✓ Some versions of Windows XP are as follows:
• Windows XP Home edition is a version made for home users.
• Windows XP Professional is made for business users.
Features
• It has various users with independent proles.
• It has 3.75 GB free space on the disk and that the total size of the disk is 19.5 GB.
• At least 64 MB of RAM internal storage.
• It provides 1.5 GB of available space on the hard disk.
• It includes a video adapter and monitor with Super VGA (800 X 600) or higher
resolution.
• It supports sound card, CD-ROM, DVD-ROM drive, speakers or headphones.
[email protected] 17 | P a g e http://www.edutap.co.in
6.8.1.6 Windows Vista
✓ It is an operating system by Microsoft for use on personal computers, including home
and business desktops, laptops, tablet PCs and media center PCs. It was released
worldwide on 30th January, 2007.
Features
• It can be installed Pentium 4, higher, 512MB RAM, 32 MB video card and 40 GB hard
disk.
• It enhances the features of visual style.
The Blue Screen of Death (BSoD) is an error screen displayed by Microsoft Windows operating systems
when the system encounters a critical error that it cannot recover from, forcing a system crash. It is often
accompanied by a cryptic error message and a blue background.
6.8.1.7 Windows 7
✓ It is an OS released by Microsoft on 22nd July, 2009. It is an upgrade of Windows XP and
Vista. It does not include some standard applications like Windows Movie Maker,
Windows Mail, etc.
Features
• It supports 64-bit processor.
• It provides touch, speech, handwriting recognition.
• It supports a playback of media in MP4, MOV.
• It includes Windows Bio-metric framework.
• It provides multiple firewall.
6.8.1.8 Windows 8
✓ It is a part of Windows NT family as personal OS developed by Microsoft and released
on 1st August, 2012.
Features
• It is a 64-bit logical CPU.
• It supports 64 TB Dynamic Virtual Disk.
• It provides 3D Graphic supports and Internet Explorer-10.
• It enhances feature of NTML-5 is assumed.
• It is based on Microsoft’s ‘Metro design language’.
• It supports new emerging technology like USB 3.0, cloud computing.
6.8.1.9 Windows 10
✓ It is a personal computer operating system developed and released by Microsoft as part
of the Windows NT family operating system. The first version of the operating system
entered a public beta testing process in October 2014, leading up to its consumer
released on 29 July, 2015.
Features
• It is easy to use social media sites like Facebook, Twitter.
• Windows 10 will also include a “game DVR” mode to allow recordings of the last 30
seconds of play, all better for social gaming.
• Windows 10 interface adapts based on the hardware it is running on.
[email protected] 18 | P a g e http://www.edutap.co.in
6.8.1.10 Windows 11
✓ Windows 11 is the latest iteration of Microsoft's operating system, released on October
5, 2021, as a successor to Windows 10. It introduces several new features and
improvements aimed at enhancing productivity, gaming, and user experience.
Features
• It features a centered Start Menu and Taskbar, providing a more streamlined and
modern look.
• Windows 11 introduces DirectX 12 Ultimate, Auto HDR, and Direct Storage
technologies, enhancing gaming performance and visuals.
• Windows 11 allows users to download and install Android apps from the Microsoft
Store, expanding the ecosystem of available applications.
• It introduces updated system requirements, including support for newer processors,
TPM 2.0 (Trusted Platform Module), and Secure Boot for enhanced security.
Window Desktop
✓ When we turn ON the computer then the first screen, which will be displayed on the
computer is known as desktop.
✓ The background image of desktop is called wallpaper.
✓ A small arrow or blinking symbol, moving on the desktop, is called cursor.
• Desktop contains Start menu, Task bar, icons, gadgets, etc.
[email protected] 19 | P a g e http://www.edutap.co.in
6.9.1 Icons
✓ A small image of a program, shown on the desktop with program name is known as
icon. Icons are small pictures that represent files, folders, programs and other items.
Users can open these programs by double click on the icons. If you move an icon on
your desktop, this is called ‘dragging’ and after releasing it, it will be called ‘dropping.’
✓ Some of the icons displayed on the desktop are as follows:
6.9.1.1 Computer/PC
✓ It is the most important icon on the desktop, which contains icons of document
folders, hard disk’s partition, each removable disk drive, e.g. floppy disk, CD,
DVD, etc. It also allows the users to access drives, printers, removable disk or
other system applications. It is the main part of our Windows where all the
programs and software backup are stored.
6.9.1.2 Recycle Bin
✓ It is also a form of icon on the desktop, which contains deleted files, folders or
shortcuts. If we delete a file or folder then it goes to recycle bin. From recycle bin,
we can restore the deleted files or folders on proper place. It is like a dustbin of
the computer. Once the recycle bin is empty then we won’t be able to restore
those files and folders again.
6.9.1.3 Network
✓ It consists of all network connections, which make possible to connect the
computer from Intranet.
6.9.1.4 Documents
✓ This folder contains all your files which you have created and saved in it. This
folder contains all types of file format Word processor, Spreadsheet, PowerPoint,
image, etc.
✓ Middle Section of the taskbar contains the button of programs or documents which are
currently being used by the user. Notification and the right end of the task bar, consists
of clock-date and time, icons of certain programs, computer setting, sound and icons of
removable disk, i.e. pen drive.
[email protected] 20 | P a g e http://www.edutap.co.in
6.9.3 Start Menu
✓ This menu is the main gateway of our computer’s program such as files, folders and
settings. Start menu also contains most recently opened program.
• Close Button – At the right edge of the title bar, there is a square containing a [X]
called the Close button. It helps to terminate the running program.
• Minimize Button – It reduces to window to a button on the task bar. It helps to
shrink the window.
• Maximize Button – It enlarges the window to occupy the whole desktop. It expands
the size of window t to the desktop.
[email protected] 21 | P a g e http://www.edutap.co.in
6.9.5 Scroll Bar
✓ It appears at the right (or left) side or at the bottom of the window. A window can
display a document, i.e. larger than the window area, so
with the help of scroll bar arrow, the user can scroll a
document in the window area to bring the view of hidden
portion of document.
✓ There are two types of scroll bars
• Horizontal scroll bar
• Vertical scroll bar.
6.9.6 Menu Bar
✓ Each window contains its own menu which performs specific actions when they have
been selected.
✓ The menu bar consists of several options as
follows:
• File Menu – Contains options like New,
Open, Close, Save, Save As and Print, etc.
• Edit Menu/Home Menu – Contains
options like Undo, Cut, Copy, Paste,
Clear, etc.
• View Menu – Like Normal, Toolbar, Print
layout, etc.
• Insert Menu - Contains options like
Header, Footer, etc.
• Help Menu – for tutorials or helpful
information.
[email protected] 22 | P a g e http://www.edutap.co.in
Main Programs Inside the Window
6.10.1 Notepad
✓ It is a text editor program. Notepad is most commonly used to the edit or view text files.
The extension of Notepad files is .txt (text document).
✓ To open Click on
Start menu —> All Programs —> Accessories —> Notepad
6.10.2 WordPad
✓ It is another text editor program including some few features such as complex
formatting, pictures, etc. The extension of WordPad le is .rtf (rich text format).
✓ To open Click on
Start menu —> All Programs —> Accessories —> WordPad
6.10.3 Paint
✓ It is a drawing program, used to create drawing or edit digital pictures (images). The
extension of paint file is .png or. jpg or. bmp.
✓ To open Click on
Start menu —> All Programs —> Accessories —> Paint
6.10.4 Calculator
✓ It performs addition, subtraction, multiplication, division, etc.
✓ To open Click on
Start menu —>All Programs —>Accessories —> Calculator
6.10.5 Media Player
✓ Windows media player is an easy-to-use interface to play digital media files, organize
digital media collection, burn CDs, etc.
✓ To open Click on
Start menu —> All Programs —> Windows Media Player
6.10.6 Games
✓ Windows have some games like Chess titans., Hearts, Freecell, Mahjong titans, Purble
place, Solitaire, Spider solitaire, etc.
✓ To open Click on
Start menu —> All Programs —> Games
6.10.7 Files
✓ These are the collection of data stored on auxiliary storage media. In Windows, files are
the basic unit to store data. The name given to a file or document by the user is called
file name. Filename is used to identify the type of file format. Each file has a specific
filename and has a file extension that identifies the file type.
✓ Some common filename extensions are as
Common File Meaning Output Type
Extension
.txt Text file Plain Text
.doc/.docx Microsoft Word document Rich Text Format (RTF)
.pdf Portable Document Format Document
.jpg/.jpeg Joint Photographic Experts Group Image
.png Portable Network Graphics Image
[email protected] 23 | P a g e http://www.edutap.co.in
.gif Graphics Interchange Format Image
.html/.htm Hypertext Markup Language Web Page
.css Cascading Style Sheets Style Sheet
.js JavaScript Script
.xls/.xlsx Microsoft Excel spreadsheet Spreadsheet
.ppt/.pptx Microsoft PowerPoint presentation Presentation
.zip ZIP archive Compressed Archive
.mp3 MPEG Audio Layer III Audio
.mp4 MPEG-4 Part 14 Video
.rtf WordPad document Rich Text Format (RTF)
✓ These are containers that you can use to store files. Folders can also store other folders,
i.e. sub-folders. You can create any number of sub-folders and each can hold any
number of files and additional subfolders.
✓ Different types of library are as follows
• Documents Library
It is used to organize and arrange Word processing documents, Spreadsheets,
Presentation and other text related files. It is used to store in My Document folder.
• Pictures Library
It is used to organize and arrange your digital pictures. By default, it is saved in the
Pictures folder.
• Music Library
It is used to organize and arrange your digital music, such as songs, etc. By default, it is
saved to the Music Library folder.
• Videos Library
It is used to organize and arrange your videos, such as clips, recording, etc. By default,
it is stored in My Videos folder.
Keys Description
Ctrl + C Copy
Ctrl + X Cut
Ctrl + V Paste
Ctrl + Z Undo
Ctrl + Y Redo
Ctrl + A Select All
Ctrl + S Save
[email protected] 24 | P a g e http://www.edutap.co.in
Ctrl + P Print
Ctrl + F Find
Ctrl + N New (File or Window)
Ctrl + W Close window or tab
Alt + F4 Close active program/window
Win + D Show Desktop (minimize or restore all windows)
Esc Cancel the current task
Win () key To display or hide the start menu
Alt + Tab Switch between open applications or windows
Win + Tab Opens Task View (thumbnail view of open
applications)
Alt + F4 Close active program/window
Win + Arrow Keys Snap window to sides or corners of the screen
Win + E Open File Explorer
Win + M To minimize all open window
Alt + Up Arrow Go up one level in File Explorer
F2 Rename selected file/folder
Ctrl + Shift + N Create new folder
Ctrl + Mouse Wheel Up/Down Zoom in/out in File Explorer
Alt + Enter Open Properties for selected file/folder
Win + 1, 2, 3, ... Open the corresponding program pinned to the
taskbar
Windows key + Ctrl + Left Switch between windows (while using a virtual
Arrow/Right Arrow desktop)
Shift + Click on Taskbar icon Open a new instance of the program
Ctrl + Shift + Click on Taskbar Open a program as Administrator
icon
Win + Plus (+)/Minus (-) Zoom in/out (Magnifier)
Win + Ctrl + Enter Activate Narrator (Screen reader)
Win + U Open Ease of Access Center
Ctrl + Shift + Esc Open Task Manager directly
Win + L Lock your PC or switch accounts
Win + R Open the Run dialog box
Ctrl + Shift + Esc Open Task Manager
Win + Pause/Break Open System Properties
Ctrl + Alt + Delete Open Security options menu
F3 Search for a file or folder in Windows Explorer
Alt + Spacebar Opens the shortcut menu for the active window
Ctrl + Esc Display the Start Menu
F5 Refresh the active window
Esc Cancel the current task
[email protected] 25 | P a g e http://www.edutap.co.in
File Explorer
IIn Windows, File Explorer (previously known as Windows Explorer in older versions) allows users to perform
various tasks such as creating, deleting, copying, moving, and renaming files and folders. It also includes
features like searching for files, sorting and filtering files, previewing files without opening them, and
managing file properties.
Home Tab offers Copy, Paste, Cut, Move to, Copy to, Rename, New Folder, Properties
Share Tab offers Share, Email, Zip, Burn to disc, Print, Fax, Remove Access and Advanced Security
View Tab offers Navigation pane, Icon style, Sort by, Hidden Selected item and options
Action Gestures
Show more commands (like Tap the touchpad with two fingers or press down in the lower-
right-clicking) right corner/ Press and hold the item
Show all open windows Swipe with three fingers up on the screen
Show the desktop Swipe with three fingers down on the screen
[email protected] 26 | P a g e http://www.edutap.co.in
Switch between open apps or Swipe with three fingers left or right on the screen
windows
Switch desktops Swipe with four fingers to the left or right on the screen
Switch to the last open app Swipe with three fingers to the left or right on the screen
Open notification center Swipe with one finger in from the right edge of the screen
See widgets Swipe with one finger in from the left edge of the screen
✓ Open: Opening a file establishes a connection between the file and the program,
allowing the program to read from or write to the file. This operation typically requires
specifying the file path and mode (e.g., read, write, or both).
✓ Read: Reading from a file involves retrieving data from the file and transferring it into
memory for processing by the program. This operation typically requires specifying the
number of bytes to read and the location in memory to store the data.
✓ Write: Writing to a file involves transferring data from memory to the file for storage.
This operation typically requires specifying the data to write and the number of bytes to
write.
✓ Rename: Renaming a file involves changing its name while keeping its contents intact.
This operation is commonly used to give files more meaningful or descriptive names.
✓ Close: Closing a file refers to terminating the connection between the file and the
program accessing it. This operation releases the resources associated with the file and
ensures that any pending data is written to the file system.
✓ Truncate: Truncating a file involves reducing its size to a specified length. This operation
typically removes the contents of the file beyond the specified length while preserving
the initial data up to that point.
✓ Delete: Deleting a file removes it from the file system, freeing up storage space. This
operation permanently erases the file and its contents, making it irrecoverable unless a
backup exists.
✓ Copy: Copying a file involves creating a duplicate of the original file with the same
contents. This operation is useful for creating backups or duplicating files for sharing or
distribution.
✓ Move (or Rename and Move): Moving a file involves changing its location within the file
system while preserving its contents. This operation is commonly used to organize files
into different directories or folders.
✓ Lock (or Exclusive Access): Locking a file prevents other programs or users from
accessing or modifying it simultaneously. This operation is used to ensure data integrity
and prevent conflicts when multiple programs or users interact with the same file.
✓ Seek: Seeking in a file involves moving the file pointer to a specified position within the
file. This operation allows programs to navigate within the file to read or write data at
specific locations.
[email protected] 27 | P a g e http://www.edutap.co.in
✓ Append: Appending to a file involves adding data to the end of an existing file without
modifying its existing contents. This operation is commonly used to add new data to
files, such as log files or data storage files, without overwriting existing information.
• Task Manager (Windows): Task Manager is a built-in utility in Windows that allows
users to view and manage running processes, monitor system performance, and
manage startup programs. The primary purpose of a Task Manager is to manage tasks in
a project or workflow and monitor the performance of a computer system.
• Activity Monitor (macOS): Activity Monitor is a built-in utility in macOS that provides
information about processes, CPU usage, memory usage, disk activity, and network
activity. It allows users to monitor and manage system resources.
• htop: htop is an interactive process viewer for Unix-like systems (Linux, macOS,
FreeBSD) that provides a customizable, colorized view of system processes. It allows
users to monitor and manage processes, CPU usage, memory usage, and more.
• top: top is a command-line utility available in Unix-like systems that provides a dynamic,
real-time view of system processes. It displays information such as CPU usage, memory
usage, and process IDs, and allows users to manage processes interactively.
• Sysinternals Suite (Windows): Sysinternals Suite is a collection of advanced system
utilities for Windows developed by Microsoft. It includes tools such as Process Explorer,
which provides detailed information about processes, and Process Monitor, which
monitors file system, registry, and process activity.
• System Monitor (Linux): System Monitor, also known as System Monitor Tool or
GNOME System Monitor, is a graphical utility available in Linux-based distributions (e.g.,
Ubuntu) that provides information about system processes, resource usage, and file
systems.
• Windows Resource Monitor (Windows): Windows Resource Monitor is a built-in utility
in Windows that provides detailed information about CPU, memory, disk, and network
usage. It allows users to monitor and analyze resource usage by processes and services.
• GNU Parallel: GNU Parallel is a command-line utility for Unix-like systems that allows
users to execute multiple commands or processes in parallel. It can be used for
parallelizing tasks, managing resources efficiently, and speeding up data processing.
[email protected] 28 | P a g e http://www.edutap.co.in
CONCEPT NOTES
Thus, data communication refers to the exchange of data between two or more networked or
connected devices. These devices must be capable of sending and receiving data over a
communication medium.
✓ In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction. A device can only send the data but cannot receive it or it can receive the data
but cannot send the data.
✓ The radio station is a simplex channel as it transmits the signal to the listeners but never
allows them to transmit back.
✓ Keyboard and Monitor are the examples of the simplex mode as a keyboard can only
accept the data from the user and monitor can only be used to display the data on the
screen.
1.2.2 Half-Duplex mode
✓ In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and
receive the data as well. Messages flow in both the directions, but not at the same time.
The entire bandwidth of the communication channel is utilized in one direction at a
time.
✓ A Walkie-talkie is an example of the Half-duplex mode.
1.2.3 Full-duplex mode
2 Switching Techniques
In a network having multiple devices, we are interested to know how to connect the sender and
receiver so that one-to-one communication is possible. One solution is to make a dedicated
connection between each pair of devices (mesh topology) or between a central device and
every other device (a star topology). However, such methods are costly in case of large
networks.
An alternative to this is switching whereby data is routed through various nodes in a network.
This switching process forms a temporary route for the data to be transmitted. Two commonly
used switching techniques are — Circuit Switching and Packet Switching.
3 Transmission Media
A transmission medium can be anything that can carry signals or data between the source
(transmitter) and destination (receiver).
In data communication, transmission media are the links that carry messages between two or
more communicating devices.
[email protected] 8|P age http://www.edutap.co.in
Transmission can be classified as guided (wired) or unguided(Wireless Media).
In guided transmission, there is a physical link made of wire/cable through which data in terms
of signals are propagated between the nodes. These are usually metallic cable, fiber -optic
cable, etc. They are also known as wired media.
[email protected] 10 | P a g e http://www.edutap.co.in
3.3 Wireless Technologies
3.3.1 Bluetooth
✓ Bluetooth is a short-range wireless technology(PAN) that can be used to connect
mobile-phones, mouse, headphones, keyboards, computers, etc. wirelessly over a short
distance. One can print documents with bluetooth-enabled printers without a physical
connection.
✓ All these bluetooth-enabled devices have a low cost transceiver chip. This chip uses the
unlicensed frequency band of 2.4 GHz to transmit and receive data. These devices can
send data within a range of 10 meters with a speed of 1 - 2 Mbps.
✓ In Bluetooth technology, the communicating devices within a range of 10 meters build a
personal area network called piconet. The devices in a piconet work in a master -slave
configuration. A master device can communicate with up to 7 active slave devices at the
same time.
✓ Bluetooth technology allows up to 255 devices to build a network. Out of them, 8
devices can communicate at the same time and the remaining devices can be inactive,
waiting for a response command from the master device.
WiMax
It stands for Worldwide Interoperability for Microwave Access. Like Wi-Fi, it is also used for
communication in wireless networks but there is a difference. Whereas Wi-Fi is used to form small
wireless networks (WLANs), WiMax uses a larger spectrum to deliver connections to various
devices on the network. It has a higher data transfer rate and can span over a larger area. That is
why it is used in MAN applications.
The architecture of the mobile network has rapidly evolved over the last few decades. The
different landmark achievements in mobile communication technologies are classified as
different generations. They are identified as 1G, 2G, 3G, 4G, and 5G. Let us briefly discuss the
mobile telecommunication generations.
[email protected] 11 | P a g e http://www.edutap.co.in
4.1 First Gneration
✓ The first generation (1G) mobile network system came around 1982. It was used to
transmit only voice calls. The analog signals were used to carry voices between the caller
and receiver.
✓ GSM (2G): Global System for Mobile Communications was the foundation of the 2G network. It
provided the basic voice and text messaging services that were the hallmark of early mobile
phones.
✓ GPRS (2.5G): General Packet Radio Service was introduced as an enhancement to GSM,
transitioning mobile networks towards 2.5G. It introduced packet-switched data transmission,
enabling basic internet access and services beyond voice and text messaging.
✓ EDGE (2.75G): Enhanced Data rates for GSM Evolution further improved upon GPRS, offering
faster data speeds and enhanced data transmission capabilities. It bridged the gap between 2G
and 3G, providing a smoother transition to more advanced mobile data services.
While these technologies were primarily associated with 2G networks, they were also utilized in the
early stages of 3G networks before more advanced technologies like UMTS (Universal Mobile
Telecommunications System) and HSPA (High-Speed Packet Access) became prevalent.
✓ 4G networks typically use technologies such as LTE (Long-Term Evolution) and WiMAX (Worldwide
Interoperability for Microwave Access) for data transmission.
✓ 5G networks use a variety of new technologies and standards to achieve their high speeds and
low latency. While some aspects of 5G build upon existing technologies like LTE, 5G introduces
new technologies such as mmWave (millimeter wave) and advanced antenna technologies like
massive MIMO (Multiple Input Multiple Output).
5 Protocol
In communication, Protocol is a set of standard rules that the communicating parties — the
sender, the receiver, and all other intermediate devices need to follow.
[email protected] 13 | P a g e http://www.edutap.co.in
5.2.2 File Transfer Protocol (FTP)
✓ File Transfer Protocol (FTP) is the protocol used for transferring files from one machine
to another over a TCP-based network.
✓ File transfer between two systems seems simple and straightforward because FTP takes
care of issues between two communicating devices, such as:
• use of different conventions while naming files.
• representation of text and data in different formats.
• having different directory structure
5.2.10 Telnet
✓ Telnet is a set of rules designed for connecting one system with another. The connecting
process here is termed as remote login. The system which requests for connection is the
local computer, and the system which accepts the connection is the remote computer.
5.2.11 Gopher
✓ Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites. Gopher also works on the client/server
principle.
6 Computer Network
We are living in a connected world. Information is being produced, exchanged, and traced
across the globe in real time. It's possible as almost everyone and everything in the digital world
is interconnected in one way or the other.
[email protected] 16 | P a g e http://www.edutap.co.in
A computer network is a group of two or more computers connected together to share
information and resources. A computer network permits the sharing of resources among
devices communicated in the network.
ARPANET is the first network developed by Robert Kahn and Vinton Cart in 1969.
7 Network Devices
7.1 Network Interface card (NIC)
✓ NIC is a device that helps the computer to communicate with another device. The network
interface card contains the hardware addresses, the data-link layer protocol uses this
address to identify the system on the network so that it transfers the data to the correct
destination.
• Wireless NIC – All the modern laptops use the wireless NIC. In Wireless NIC, a connection
is made using the antenna that employs the radio wave technology.
• Wired NIC – Cables use the wired NIC to transfer the data over the medium.
7.2 Hub
✓ Hub is a central device that splits the network connection into
multiple devices. When computer requests for information from a
computer, it sends the request to the Hub. Hub distributes this
request to all the interconnected computers.
✓ The limitation of Hub is that if data from two devices come at the same time, they will
collide.
7.3 Switch
✓ Switch is a networking device that groups all the devices
over the network to transfer the data to another device.
✓ A switch is better than Hub as it does not broadcast the
message over the network, i.e., it sends the message to
the device for which it belongs to.
✓ Therefore, we can say that switch sends the message directly from source to the
destination.
[email protected] 17 | P a g e http://www.edutap.co.in
7.4 Cables and connectors
✓ Cable is a transmission media that transmits the communication signals. E.g. Twisted pair
cable, Coaxial cable or Fiber optic
7.5 Router
✓ Router is a device that connects the LAN to the internet. The router is mainly
used to connect the distinct networks or connect the internet to multiple
computers.
7.6 Modem
✓ Modem connects the computer to the internet over the existing telephone line. A modem
is not integrated with the computer motherboard. A modem is a separate part on the PC
slot found on the motherboard.
7.7 Gateway
✓ A gateway is a network node that connects two dissimilar networks using different
protocols together.
7.8 Repeaters
It is an electronic device that magnifies the signal it receives. It is implemented in
computer networks to expand the coverage area of the network. It is also known
as signal boosters.
[email protected] 18 | P a g e http://www.edutap.co.in
8 Computer Network Architecture
Computer Network Architecture is defined as the physical and logical design of the software,
hardware, protocols, and media of the transmission of data. Simply we can say that how
computers are organized and how tasks are allocated to the computer.
[email protected] 19 | P a g e http://www.edutap.co.in
9 Types of Computer Network
A computer network is mainly of four types:
COMPUTER NETWORK
Personal Area Network
(PAN)
Metropolitan Area
Network (MAN)
[email protected] 21 | P a g e http://www.edutap.co.in
10 Internetwork
An internetwork is defined as two or more computer network LANs or WAN or computer
network segments are connected using devices, and they are configured by a local addressing
scheme. This process is known as internetworking.
10.1.2 Intranet
✓ An intranet is a private network based on the internet protocol such as Transmission
Control protocol and internet protocol. An intranet belongs to an organization which is
only accessible by the organization's employee or members. The main aim of the
intranet is to share the information and resources among the organization employees.
An intranet provides the facility to work in groups and for teleconfer ences.
11 Network Topology
Topology defines the structure of the network of how all the components are interconnected to
each other. There are two types of topology: physical and logical topology.
[email protected] 22 | P a g e http://www.edutap.co.in
backbone cable is considered as a "single lane" through which the message is broadcast to
all the stations. The most common access method of the bus topologies is CSMA (Carrier
Sense Multiple Access).
[email protected] 23 | P a g e http://www.edutap.co.in
11.5 Mesh topology
✓ Mesh technology is an arrangement of the network in which computers are interconnected
with each other through various redundant connections.
✓ There are multiple paths from one computer to another computer. It
does not contain the switch, hub or any central computer which acts
as a central point of communication. The internet is an example of the
mesh topology.
✓ To calculate the total number of connections in a mesh network, you
12.1 MAC
✓ It stands for Media Access Control. The MAC address, also known as the physical or
hardware address, is a unique value associated with a network adapter called a NIC. The
MAC address is engraved on NIC at the time of manufacturing and thus it is a permanent
[email protected] 24 | P a g e http://www.edutap.co.in
address and cannot be changed under any circumstances. The machine on which the NIC is
attached, can be physically identified on the network using its MAC address.
✓ Each MAC address is a 12-digit hexadecimal numbers (48 bits in length), of which the first
six digits (24 bits) contain the manufacturer’s ID called Organisational Unique Identifier
(OUI) and the later six digits (24 bits) represents the serial number assigned to the card by
the manufacturer. A sample MAC address looks like:
12.2 IP Address
✓ IP address, also known as Internet Protocol address, is also a unique address that can be
used to uniquely identify each node in a network. The IP addresses are assigned to each
node in a network that uses the Internet Protocol for communication.
✓ Thus, if we know a computer’s IP address, we can communicate with that computer from
anywhere in the world. However, unlike MAC address, IP address can change if a node is
removed from one network and connected to another network.
✓ The initial IP Address called version 4 (IPV4 in short), is a 32 bit numeric address, written as
four numbers separated by periods, where each number is the decimal (base-10)
representation for an 8-bit binary (base-2) number and each can take any value from 0 -
255. A sample IPV4 address looks like:
182:128:0:178
✓ With more and more devices getting connected to the Internet, it was realised that the 32-
bit IP address will not be sufficient as it offers just under 4.3 billion unique addresses. Thus,
a 128-bit IP address, called IP version 6 (IPV6 in short) was proposed.
✓ An IPv6 address is represented by eight groups of hexadecimal (base-16) numbers
separated by colons. A sample IPV6 address looks like:
2001:CDBA:0000:0000:0000:0000:3257:9652
[email protected] 25 | P a g e http://www.edutap.co.in
13.1 Layered Architecture
✓ The main aim of the layered architecture is to divide the design into small pieces. Each
lower layer adds its services to the higher layer to provide a full set of services to manage
communications and run the applications.
✓ The number of layers, functions, contents of each layer will vary from network to network.
However, the purpose of each layer is to provide the service from lower to a higher layer
and hiding the details from the layers of how the services are implemented.
✓ The basic elements of layered architecture are services, protocols, and interfaces.
• Service – It is a set of actions that a layer provides to the higher layer.
• Protocol – It defines a set of rules that a layer uses to exchange the information with peer
entity. These rules mainly concern about both the contents and order of the messages
used.
• Interface – It is a way through which the message is transferred from one layer to another
layer.
✓ The OSI model is divided into two layers: upper layers and lower layers.
✓ The upper layer of the OSI model mainly deals with the application related issues, and they
are implemented only in the software. The application layer is closest to the end user. Both
the end user and the application layer interact with the software applications.
[email protected] 26 | P a g e http://www.edutap.co.in
✓ The lower layer of the OSI model deals with the data transport issues. The data link layer
and the physical layer are implemented in hardware and software. The physical layer is the
lowest layer of the OSI model and is closest to the physical medium. The physical layer is
mainly responsible for placing the information on the physical medium.
Functions of the OSI Layers
✓ There are the seven OSI layers. Each layer has different functions
✓ It is the first layer that physically connects the two systems that need to communicate. It
transmits data in bits and manages simplex or duplex transmission by modem. It also
[email protected] 27 | P a g e http://www.edutap.co.in
manages Network Interface Card’s hardware interface to the network, like cabling, cable
terminators, topography, voltage levels, etc.
✓ Protocols used are ATM, RS232, and Ethernet.
✓ It is the firmware layer of Network Interface Card. It assembles datagrams into frames and
adds start and stop flags to each frame. It also resolves problems caused by damaged, lost
or duplicate frames.
✓ Protocols used are HDLC, LSL, and ATM
✓ It has two sub-layers.
• Media Access Control (MAC) – It is responsible to the physical address of the sender
and/or receiver in the header of each frame. CSMA/CD, Ethernet are used as protocol.
• Logical Link Control (LLC) – It is responsible for frame management, error checking, and
flow control of data.
✓ It is concerned with routing, switching and controlling flow of information between the
workstations. It also breaks down transport layer datagrams into smaller datagrams.
✓ Protocols used are IPX, TCP/IP
[email protected] 28 | P a g e http://www.edutap.co.in
13.2.4 Transport Layer
✓ Till the session layer, file is in its own form. Transport layer breaks it down into data
frames, provides error checking at network segment level and prevents a fast host from
overrunning a slower one.
✓ Transport layer isolates the upper layers from network hardware.
✓ This layer is responsible for establishing a session between two workstations that want to
exchange data.
✓ Protocols used are RPC, PPTP, SCP, SDP
[email protected] 29 | P a g e http://www.edutap.co.in
13.2.6 Presentation Layer
✓ This layer is concerned with correct representation of data, i.e. syntax and semantics of
information. It controls file level security and is also responsible for converting data to
network standards.
✓ It is the topmost layer of the network that is responsible for sending application requests
by the user to the lower levels. Typical applications include file transfer, E-mail, remote
logon, data entry, etc.
✓ Protocols used are – HTTP, FTP, Telnet, SMTP and DNS.
[email protected] 30 | P a g e http://www.edutap.co.in
13.3.1 Network Access Layer
✓ A network layer is the lowest layer of the TCP/IP model. A network layer is the combination
of the Physical layer and Data Link layer defined in the OSI reference model.
✓ It defines how the data should be sent physically through the network. This layer is mainly
responsible for the transmission of the data between two devices on the same network.
[email protected] 31 | P a g e http://www.edutap.co.in
14 Internet
The Internet is generally defined as a global network connecting millions of computers More
than 190 countries are linked into exchanges of data, news, and opinions. A protocol is a
standard procedure used to connect two data communication devices.
Moreover, smart electronic appliances like TV, AC, refrigerator, fan, light, etc. can also
communicate through a network. The list of such smart devices is always increasing e.g.,
drones, vehicles, door lock, security camera.
The Internet is evolving every day and it is difficult to visualise or describe each and every
aspect of the architecture of the Internet. Computers are either connected to a modem
through a cable or wirelessly (Wi- Fi). That modem, be it wired or wireless, is connected to a
local Internet Service Provider (ISP) who then connects to a national network. Many such ISPs
connect together forming a regional network and regional networks connect together forming
a national network, and such country-wise networks form the Internet backbone.
The Internet today is a widespread network, and its influence is no longer limited to the
technical fields of computer communications. It is being used by everyone in the society as is
evident from the increasing use of online tools for education, creativity, entertainment,
socialisation, and e-commerce.
A Unique Resource Locator (URL) is a link that is used to access a website on the Internet. Each
site has a unique URL.
[email protected] 32 | P a g e http://www.edutap.co.in
14.2 Basic Internet Knowledge
14.2.1 World Wide Web (WWW)
✓ A web server is a computer that provides web services to the client. A page hosted on the
internet is known as web page. It can be viewed by a browser.
✓ A browser can help locate a website on the internet. The World Wide Web (WWW) permits
user to view multi-media-based documents like graphics, animations, audios and/or videos
and any subject. In 1990, the World Wide Web was introduced by Tim Berners-Lee of
CERN.
[email protected] 33 | P a g e http://www.edutap.co.in
Thumbnail
The first text-based web browser is generally considered to be "Line Mode Browser" (also known as
LMB). It was developed by Nicola Pellow in 1991 while she was a student at CERN (European
Organization for Nuclear Research). Line Mode Browser allowed users to access the World Wide Web
using only text, without any graphical elements.
While Line Mode Browser (LMB) was one of the earliest text-based web browsers, LYNX is often
credited as the first widely used text web browser.
LYNX was released in 1992. LYNX Unix-based systems was notable for its ability to render text-based
web pages in a simple and straightforward manner, making it accessible to users who preferred or
needed to browse the web without graphical elements. LYNX gained popularity among early internet
users, particularly those using, due to its ease of use and efficiency.
14.2.7 Hyperlink
✓ A hyperlink, often referred to simply as a link, is a selectable element within a digital
document (such as a webpage or email) that, when clicked or activated, redirects the user
[email protected] 34 | P a g e http://www.edutap.co.in
to another location within the same document or to a different document altogether.
Hyperlinks are typically highlighted text, images, or other media that serve as anchors to
connect various resources on the internet.
14.2.11 ISP
✓ Internet service provider which connect us to internet and charges amount for its
services. ISP has computers called servers which remains permanently connected to other
computers on net. ISP provides us user name and password to connect to internet.
http - Protocol
[email protected] 37 | P a g e http://www.edutap.co.in
14.2.15 Domain Name
✓ A domain name serves as an address which is used to access the website.The web
resource is given a name against its IP address. It can be universally understood by Web
servers and online organizations.
14.2.17 Uploading
✓ It refers to the transmission of data or files from the computer to the internet server.
Uploaded file can be retrieved by anyone.
14.2.18 Downloading
✓ It is the process of copying files from the internet to the user’s computer.
14.2.19 E-Mail
✓ Email is an electronic mail. It is used to send and receive the messages. It consists of two
components like message header and message body. The message header contains added
addresses and the body contains any information and sends any attached contents. The
Internet makes your work easy by communication technologies.
Folders of Email-page
• Inbox – contains the received messages
• Sent/Outbox – contains the messages you have sent to others
• Compose – this link opens the page where you write the message for sending to others
• Spam/Bulk – unwanted commercial messages
• Drafts – messaged you have created but not sent
• Trash – the received messages that you have deleted
E-mail address format
[email protected]
hello - username
edutap - hostname
[email protected] 38 | P a g e http://www.edutap.co.in
14.2.19.1 Carbon copy (CC)
✓ It is used to share e-mail with one or more recipients. Both the main recipients and
other (CC) recipients can see all the mail addresses.
• DSL (Digital Subscriber Line): DSL uses existing telephone lines to provide high-speed
internet access. It offers fast download speeds and is widely available in urban and
suburban areas.
• Cable Internet: Cable internet uses coaxial cables, typically the same infrastructure used
for cable television, to deliver high-speed internet access. It offers fast speeds and is
widely available in urban and suburban areas.
• Fiber Optic Internet: Fiber optic internet transmits data using light signals through fiber
optic cables. It provides the fastest and most reliable internet speeds, making it suitable
for bandwidth-intensive tasks.
• Satellite Internet: Satellite internet delivers internet access via satellites orbiting the
Earth. It is available in remote or rural areas where traditional wired internet options
may not be feasible.
• Fixed Wireless Internet: Fixed wireless internet uses radio signals to provide internet
access to specific locations. It's often used in areas where laying cables is impractical or
costly.
• Mobile Broadband: Mobile broadband utilizes cellular networks to provide internet
access to mobile devices like smartphones, tablets, and mobile hotspots. It offers
internet connectivity on the go but may be subject to data caps and network
congestion.
• Wi-Fi: Wi-Fi technology enables wireless local area networking (WLAN).
• WiMAX (Worldwide Interoperability for Microwave Access): WiMAX provides wireless
broadband access over longer distances compared to Wi-Fi. It's used to provide internet
access to areas where wired connections are not available.
✓ Download
[email protected] 39 | P a g e http://www.edutap.co.in
It is hard to find an Internet user, who has not used it to download music and movies. Apart
from it, there are lots of other things that can be downloaded using the internet as well.
✓ Book Tickets
Online booking has made things really easy. it may be movie ticket or flight ticket, you can
book just about anything using the Internet. The process is very easy, convenient and
super-fast.
✓ Shop Online
The use of internet is not limited merely to booking tickets. With help of net, you can do a
full-fledged online shopping. On popular e-stores like Ebay, Amazon etc., one can find
almost anything that he needs to buy.
✓ Socialize
Social networks have got really big since last decade. Facebook and Twitter are the new
online sites who like to share all the latest happening of their life on these social networks
and keep their profile duly updated.
✓ E Banking
Banking was never so easy and convenient before! Right from opening an account to
operating it, E-Banking has really useful for everyone. We can also do online transactions
from the other accounts sitting at the home.
✓ Data Sharing
Data sharing was never so easy and quick before! It doesn’t matter if you have to send a
file or song, a picture or an eBook, with help of internet, you can send just about anything
at anywhere and that too, in no time.
[email protected] 40 | P a g e http://www.edutap.co.in
CONCEPT NOTES
So, when we enter data, the data is converted into electronic pulse. Each pulse is identified as
code and the code is converted into numeric format by ASCII. It gives each number, character
and symbol a numeric value (number) that a computer understands. So, to understand the
language of computers, one must be familiar with the number systems.
Microsoft Office
Over the years, Office applications have grown substantially closer with shared features such as
a common spell checker, OLE data integration and Visual Basic for Applications scripting
language. Microsoft also positions Office as a development platform for line-of-business
software under the Office Business Applications brand.
Office is produced in several versions targeted towards different end-users and computing
environments. The original, and most widely used version, is the desktop version, available for
PCs running the Windows and macOS operating systems. Microsoft also maintains mobile apps
for Android and iOS. Office on the Web is a version of the software that runs within a web
browser.
The current on-premises, desktop version of Office is Microsoft Office 2021.It was released on
October 5, 2021. Plus, this is compatible with Mac and Windows operating systems.
Office 2021 retains the same major version number of 16 that previous versions of Office had. It
introduces new dynamic arrays, XLOOKUP features for Excel, full dark-mode support and
performance improvements.
MS Word 2010 introduced several new features and enhancements over its predecessor. Some of
the notable ones include:
• Improved Ribbon Interface: The Ribbon interface introduced in Word 2007 was further
refined in Word 2010, providing easier access to commands and features.
• Backstage View: The Backstage View was introduced, providing a centralized location for
managing documents, including functions like saving, printing, and sharing.
• Improved Collaboration Tools: Word 2010 enhanced collaboration features, such as the
ability to co-author documents in real-time with multiple users, track changes more
effectively, and manage comments.
MS Word 2021 introduced several new features and enhancements over its predecessor. Some of
the notable ones include:
Menu Bar
Ribbon Bar
Sub-menu Bar
Dialog Box Launcher
Max, Min and Close Button
Cursor
View Toolbar
Status Bar
Scroll Bar
1.1.4 Ribbon
✓ The Ribbon is a cluster of toolbars in Microsoft Office that are used for writing, designing,
formatting and reviewing different styles, adaptations, add-ins, themes etc. Every tab at the
top of a given word file window displays the Ribbon toolbar.
✓ When you click the File tab, you see many of the same basic commands that you saw
when you clicked the Microsoft Office Button or on the File menu in earlier releases
of Microsoft Office, such as Open, Save, and Print.
• Clipboard Group – Copy (only one item at a time), Paste, Cut, Format Painter.
• Font Group – Font Style, Colour and Size, Bold, Underline, Strikethrough etc.
• Paragraph Group – Bullets and Numbering, Alignment, Shading, Borders, Line spacing.
• Style Group – Listed Styles
• Editing Group – Find, Replace etc.
• Document Formatting Group – Themes (to change colors, fonts and effects for the
document all at once), Style Set gallery (to change the styles), Colors, Fonts,
Paragraph spacing, Effects
• Page Background Group – Watermark, Page Color, Page Borders
• Page Setup Group – Margins, Orientation, Breaks, Line numbers, Hyphenation, Size
of the page, Columns
• Paragraph Group – Paragraph Indentation, Spacing
• Arrange Group – Position, Wrap Text, Bring Forward, Align Rotate etc.
• Views Group – Read mode, Print Layout, Web Layout Outline, Draft
• Immersive Group – Immersive Reader
• Page Movement Group – Vertical, Side to Side
• Show Group – Ruler, Gridline, Navigation Pane
• Zoom Group – Zoom (10% to 500%), Page width, Multiple pages
• Window Group – New Window, Arrange and Split windows, Switch windows etc.
• Macros group – Macros
• SharePoint Group - Properties
Copy refers to duplicating a section of a document and placing it in the clipboard. Paste
allows to copy an object or text from one location and place it to another location.
✓ Editing Features – Any type of correction (insertion, deletion, modification etc.) can be
movement associated.
✓ Find and Replace – You can find a particular word in the whole document and replace it
Header contains page numbers, the document name, or sub-titles within the document.
The footer constantly appears on every page of a document, at the bottom of each page.
It includes the page number, or a company’s name and contact details in formal
documents.
✓ Indentation – It refers to the distance between text boundaries and page margins. There
are three types of indents – Positive Indent, Negative Indent, and Hanging Indent.
✓ Mail Merge – It is a facility that enables to printing of a large number of letters/documents
with more or less similar text. Under it, the same invitation letter has to be sent to
invitees, only the names and addresses are to be changed.
✓ Moving Cursor – You can move the cursor from word to word or from paragraph to
paragraph if needed.
✓ Naming a Document – You can name a document and recall it anytime from a hard disk
used to share information between programs through objects. Objects are saved entities
like charts, equations, video clips, audio clips, pictures etc.
[email protected] 10 | P a g e http://www.edutap.co.in
✓ Page Breaks – You can set a page break at any place within the text so that while printing
it will jump to the next page.
✓ Page Orientation – It refers to whether the text is to be printed length-wise or width-
wise. Length-wise printed page is called PORTRAIT and width-wise printed page is called
LANDSCAPE.
✓ Paste Special – Paste Special is used to paste an item from the clipboard with custom
formatting.
✓ Thesaurus – It is a software tool which is in MS Word that provides synonyms for selected
words on command.
✓ Spell Check – It is a software tool for correcting spelling. It is not only capable of checking
spelling mistakes but also can suggest possible alternatives for incorrectly spelled words.
It is available in word processing programs, e-mail programs, cell phones and a variety of
other applications.
✓ Thesaurus – By using thesaurus you can change a word with any of its synonyms. In this
way you can prevent a repetition of a single word in a document and bring beauty to the
language.
✓ Undo and Redo – Undo refers to deleting the last action in the document. Redo can
In Microsoft Excel, you typically start any formula or function with an equal sign (=). This signals to
Excel that what follows is a calculation or function to be performed, rather than simply plain text.
[email protected] 12 | P a g e http://www.edutap.co.in
1.2.3 Excel Window
1.2.4 Ribbon
✓ In MS Excel are divided into logical groups called Tabs and each tab has its own set of
unique function to perform. There are various tabs – Home, Insert, Page Layout,
Formulas, Date, Review, View and Help.
[email protected] 13 | P a g e http://www.edutap.co.in
1.2.4.1 Home Tab
✓ The Excel Home Tab is used to perform common commands such as bold, underline,
alignment, Number, Copy and Paste. It is also used to apply formats to cells in a
worksheet. The Home Tab groups and their buttons are:
####### : when the results of a formula or text entry are too long to fit within the width of a cell,
Excel displays a series of pound signs in the cell. This indicates that the content is overflowing the
cell's boundaries.
1
Charts – There are eight types of charts. Column or Bar Chart, Hierarchy Chart, Line Chart or Area
Chart, Combo Chart, Statistic Chart, Bubble Chart, Pie Chart, Waterfall, Funnel, Stock, Surface or Radar
Chart.
[email protected] 14 | P a g e http://www.edutap.co.in
1.2.4.3 Page Layout Tab
✓ The features under this tab used to change the look of a workbook. The groups under
this tab are:
[email protected] 15 | P a g e http://www.edutap.co.in
• Formulas Library – Insert Function, AutoSum, Financial & Logical Function, Date &
Time, Maths & Trig, Lookup & Reference, Text, More Function (Statistical, Engineering,
Cube etc.)
• Defined Names Group – Name Manager, Define Name, Use in Formula, Create from
selection
• Formula Auditing - Trace Precedents & Dependents, Error Checking, Evaluate Formula,
Watch window
• Calculation Group – Calculate sheet, options
1.2.4.5 Data Tab
✓ Data Tab is used for importing a large amount of data. Importing Data can be done by
connecting with the server, automatically from the web, MS Access etc., It makes easy
to read vast data.
• Get & Transform Data Group – Get Data, From Text/CSV, Web, Table/Range, Existing
Connections
• Queries & Connection Group – Refresh All, Properties, Edit Links, Queries,
Connections
• Sort & Filter Group – Sort, Filter, Reapply, Clear, Advanced
• Data Tools Group – Text to columns, Flash Fill, Remove Duplicates, Data Validation,
Consolidate, Manage Data Mode, Relationships
• Forecast Group – What-If Analysis, Forecast Sheet
• Outline Group – Group, Ungroup, Subtotal
1.2.4.6 Review Tab
✓ It contains the editing feature, comments, track changes and workbook protection
options. It makes to share the data easily with the proper information and ensuring the
security of data.
[email protected] 16 | P a g e http://www.edutap.co.in
1.2.4.7 View Tab
✓ View Tab helps to change the view of an Excel sheet and make it easy to view this data.
This tab is useful for preparing the workbook for printing. The groups and keys under
this tab are:
• Workbook Views Group – Normal, Page Break Preview, Page Layout & Custom View
• Show Group – Ruler, Formula Bar, Gridlines, Headings
• Zoom Group – Zoom (10% - 400%), 100%, Zoom to Selection
• Window Group – New Window, Arrange All, Freeze Panes, View side by side,
Synchronous Scrolling, Reset Windows, Show/Hide, Switch Windows
• Macros Group – Macros
1.2.4.8 Help Tab
✓ The user can get help using this tab, by tapping F1 key.
[email protected] 17 | P a g e http://www.edutap.co.in
✓ Macro – It is a sequence of instructions that replace a repetitive series of keyboard and
mouse actions to execute. It is used In MS Word and MS Excel.
✓ Ontime: the method that can make macros run automatically, once you have done
some set-up for scheduling a macro.
✓ Status Bar – It is the bar below the worksheet names that has a few buttons and
indicators.
✓ Wrap Text – When text exceeds a column width/Height, wrap text automatically adjust
the height/width of a cell to make all text visible.
✓ Sparklines – They are graphs that can fit into one cell and gives the information about
the data.
✓ Relative and Absolute References: When copying formulas, Excel adjusts cell references
by default (relative reference). You can use dollar signs ($) to create absolute
references, which do not change when you copy the formula.
✓ Functions: Excel provides a wide range of built-in functions for performing various
calculations and tasks. Common functions include SUM, AVERAGE, IF, VLOOKUP, and
CONCATENATE.
✓ Autofill: Excel's Autofill feature allows you to quickly fill cells with data or formulas
based on a pattern. Simply drag the fill handle (a small square at the bottom-right
corner of the selected cell) to copy the data or formula.
✓ Conditional Formatting: Excel enables you to apply conditional formatting to cells based
on specific criteria. This feature allows you to visually highlight data based on its value,
making it easier to identify trends and outliers.
✓ Data Analysis Tools: Excel provides built-in tools for data analysis, such as sorting,
filtering, pivot tables, and data validation. These tools help you organize, analyze, and
interpret your data efficiently.
✓ Data Import and Export: Excel supports importing data from external sources such as
databases, text files, and web queries. You can also export data to various formats for
sharing and collaboration.
✓ Macros and VBA: Excel allows you to automate tasks and create custom functionality
using macros and Visual Basic for Applications (VBA). With VBA, you can write scripts to
perform complex operations and extend Excel's capabilities.
✓ Collaboration: Excel supports collaboration features such as co-authoring, comments,
and sharing workbooks through cloud storage services like OneDrive or SharePoint.
[email protected] 20 | P a g e http://www.edutap.co.in
1.3.3 PowerPoint Window
1.3.4 Ribbon
✓ The Ribbon in MS PowerPoint is divided into following tabs.
[email protected] 21 | P a g e http://www.edutap.co.in
1.3.4.1 Home Tab
✓ The Home Tab includes the commands for formatting presentations. The Keys and
Groups under the Home Tab are:
• Start Slide Show Group – From Beginning, From Current Slide, Present Online, Custom
Slideshow
• Set up Group – Set up slideshow, Hide slide, Rehearse timings, Record Slide Show
• Monitors Group – Automatic, Use Presenter View
1.3.4.7 Review Tab
✓ Review tab is used to check spelling, to collaborate by adding comments, and to access
editor tools. The groups are:
[email protected] 23 | P a g e http://www.edutap.co.in
• Proofing Group – Spelling, Thesaurus
• Language Group – Translate, Language
• Comments Group – New comment, Delete Previous/next Comment
• Compare Group – Compare, Accept, Reject, End Review, reviewing Pane
• Ink Group – Start inking, Hide ink
• OneNote Group – Linked Notes
1.3.4.8 View Tab
✓ View tab is used to access the various presentation views, to show and hide the rulerand
grid lines, and more.
• Presentation Views Group – Normal, Outline view, Slide Sorter, Notes Page, Reading
view
• Masters View Group – Slide Master, Handout Master, Notes Master
• Show Group – Ruler, Gridlines, Guides, Notes
• Zoom Group – Zoom (10% to 400%), Fit to the window
• Colour/Grayscale Group – Colour, Grayscale, Black & White
• Window Group – New window, Arrange All, Cascade, Move Split
• Macros Group – Macros
1.3.5 Features of Presentation Program (MS PowerPoint)
✓ Presentation – A Presentation is a collection of individual slides that contain information
on a topic with audio, visual features. It makes an interaction between a speaker and an
audience.
✓ Design Template – A PowerPoint template is a pattern of a slide whose format and colour
scheme is used as the basis for other presentations. It can contain layouts, theme colours,
theme fonts, theme effects, background styles, and even content.
✓ Master Slide – A slide that controls the properties such as theme, layout, background,
colour, fonts, and positioning of all other slides in a presentation.
✓ Normal View – Normal view is used for creating, editing and viewing presentation slides. It
contains all three view panes such as Slides, Outline and Notes.
✓ Greyscale – Grayscale is a variety of shades of grey (Black and white combination) without
apparent colour.
✓ Notes Pane – It is used to add notes and graphics that apply to the current slide in the
presentation. It is also used to print the notes.
✓ Slides Pane – Slide Pane displays the slides thumbnails. It allows the user to view and edit
the slides.
✓ Outline Pane – Outline Pane displays the text from the slides.
[email protected] 24 | P a g e http://www.edutap.co.in
✓ Slide Show View – It is used to display the presentation. It is the way to preview the
presentation.
✓ Slide Sorter View – It shows all the slides in a presentation as thumbnails. It is used to
reorganize, insert, delete and copy the presentation slides.
✓ Slide Timing – It is the time period that a slide seems on the screen.
✓ Task Pane – It allows to access commands like getting started, PowerPoint help, slide, new
presentation etc. related to a specific task.
✓ AutoContent Wizard - A wizard helps to create a presentation. It helps with a general
structure and suggested topics based on the user’s view regarding the presentation output.
✓ Exporting and Sharing- PowerPoint enables you to export presentations to various formats,
including PDF, video, and images. You can also share presentations online through email,
cloud storage, or collaboration platforms.
1.3.6 Shortcut Keys
Keys Description Keys Description
Ctrl + D Duplicate Slide Ctrl + Shift + F Change Font Style
Shift + F3 Toggle cases Ctrl + Shift + Z Normal/Plain Text
Move anticlockwise
Shift + F6 F5 Start Slideshow
among pane
Restore window to
Shift + F10 Display context menu Ctrl + F5
previous size
Esc End the slideshow Alt + Q Search
[email protected] 25 | P a g e http://www.edutap.co.in
1.4.1.4 Query
✓ Queries answer a question by selecting and sorting and filtering data based on search
criteria.
✓ Queries show a selection of data based on criteria (limitations) you provide.
✓ Queries can pull from one or more related Tables and other Queries.
✓ Types of Query can be SELECT, INSERT, UPDATE, DELETE.
1.4.1.5 Form
✓ A form is a database object that you can use to create a user interface for a database
application.
✓ Forms help you to display live data from the table. It mainly used to ease the process of
data entry or editing.
1.4.1.6 Report
✓ A report is an object in desktop databases primarily used for formatting, calculating,
printing, and summarizing selected data.
✓ You can even customize the report's look and feel.
1.4.1.7 Macros
✓ Macros are mini computer programming constructs. They allow you to set up commands
and processes in your forms, like, searching, moving to another record, or running a
formula.
1.4.1.8 Modules
✓ Modules are procedures(functions) which you can write using Visual Basic for
Applications (VBA).
Short Text Text, including numbers which does not Up to 255 characters.
need calculation. (e.g., Mobile numbers).
Long Text This data type is used for lengthy text or Maximum 63, 999 characters.
alphanumeric data.
[email protected] 26 | P a g e http://www.edutap.co.in
Auto Number Assign a unique number or assigned by Four bytes (16 bytes if it is set as
Microsoft Access when any new record is a Replication ID).
created. Usually used as the primary key
Attachment It stores files, such as digital photos. Multiple Up to 2 GB Data can be stored.
files can be attached per record.
OLE objects OLE objects can store audio, video, other Up to 2 GB data can be stored.
Binary Large Objects.
Hyperlink Text or combinations of text and numbers Each part of a Hyperlink data
stored. That text is used as hyperlink type allows you to store a
address. maximum 2048 characters.
Calculated Helps you to create an expression that uses You can create an expression
data from one or more fields. which uses data from one or
more fields.
[email protected] 27 | P a g e http://www.edutap.co.in
1.5.1.2 Coordination and Constitution
✓ In aspects where the organization of work tasks is an issue, Outlook takes first position in
way it provides a calendar feature. Via using calendars in Outlook users can view all of
tasks and meetings as daily, weekly, and monthly with coloring important meetings.
'Contacts' is another way to stay organized in Outlook. It allows you to save vCard which
are digital cards in an electronic communication system.
1.5.1.3 Message Confirmation
✓ To keep a record of messages that are sent to other users, Outlook offers better tracking
services than any other application. When users send a message to anyone, if it's reached
or not, they can set Outlook options as 'Request a Delivery Report' from settings to ensure
that the message has been delivered. 'Request a read report' option for users to know
whether opposite party has opens message or not.
1.5.1.4 Co-operation
✓ MS Outlook also provides the option to perform teamwork tasks easily just like meetings.
The 'Meeting Invite' feature in Outlook allow users to invite all users for immediate
meetings along with tracking who accepts or who declines this invitation. Moreover,
Outlook's 'Share My Calendar' function also lets users about confirmation of both parties
for meetings, etc. Another useful function is 'Task Request' which helps to assign work to
other colleagues.
1.5.1.5 Integration with Microsoft Exchange
✓ Outlook and Exchange server when used integrated with each other works as parallel
tracks for employees. No extra efforts are required to let Outlook and Exchange work
together. In order to set Outlook with Exchange Server user has to perform few steps
using Outlook settings and that's it smooth commune is available for IT users.
1.5.1.6 Outlook's Co-ordination with Active Directory
✓ Active Directory is all credentials of Exchange Users that are registered on the Server,
when users log into their Outlook account, they don't have to fill in all login credentials
again and again to log into the Exchange Server account. In fact, MS Outlook does not
require any information it figures out the right e-mail address via AD and log into the
respective email client.
[email protected] 29 | P a g e http://www.edutap.co.in
CONCEPT NOTES
Database Management
[email protected] 1|P age http://www.edutap.co.in
Contents
1 Database ....................................................................................................................................4
1.1 Important Database management System.............................................................................4
1.1.1 Oracle Database ...........................................................................................................4
1.1.2 MySQL .........................................................................................................................4
1.1.3 Microsoft SQL Server ....................................................................................................4
1.2 Fundamentals of Database ...................................................................................................4
1.3 Types of Database................................................................................................................5
1.3.1 Network Database ........................................................................................................5
1.3.2 Hierarchical Database ...................................................................................................5
1.3.3 Relational Database ......................................................................................................5
1.4 Components of a Database...................................................................................................5
1.4.1 Tables ..........................................................................................................................5
1.4.2 Queries ........................................................................................................................5
1.4.3 Forms ..........................................................................................................................5
1.4.4 Reports ........................................................................................................................5
1.5 Database Management System (DBMS) ................................................................................6
1.6 Architecture of DBMS...........................................................................................................6
1.6.1 Internal Level ...............................................................................................................6
1.6.2 Conceptual Level ..........................................................................................................6
1.6.3 External Level...............................................................................................................7
2 Advantages & Disadvantages of DBMS..........................................................................................7
3 Applications of DBMS ..................................................................................................................8
4 Data Model.................................................................................................................................8
4.1 Relation...............................................................................................................................8
4.2 Domain ...............................................................................................................................8
4.3 Entities................................................................................................................................9
4.4 Attributes............................................................................................................................9
4.5 Tuples .................................................................................................................................9
4.6 Constraints..........................................................................................................................9
4.7 Normalization......................................................................................................................9
4.8 Data Integrity ......................................................................................................................9
4.9 Data Modeling Notations .....................................................................................................9
1.4.2 Queries
✓ These are basically questions based on the data available in a database. A query consists
of specifications indicating which fields, records, and summaries a user wants to fetch
from a database. Queries allow you to extract data based on the criteria that you define.
1.4.3 Forms
✓ Although you can enter and modify data in datasheet view of tables but you neither
control the user’s action very well nor you can do much to facilitate the data -entry
process. To overcome this problem, forms are introduced. Like tables, forms can be
used to view and edit your data. However, forms are typically used to view the data in
an underlying table one record at a time. e.g. a user can create a data entry form that
looks exactly like a paper form. People generally prefer to enter data into a well-
designed form, rather than a table.
1.4.4 Reports
✓ When you want to print those records, which are fetched from your database, design a
report. Access even has a wizard to help produce mailing labels.
[email protected] 5|P age http://www.edutap.co.in
1.5 Database Management System (DBMS)
✓ A DBMS is a collection of interrelated data and a set of programs to retrieve data from a
database. It is an organised collection of data viewed as a whole, instead of a group of
separate unrelated files.
✓ The primary goal of DBMS is to provide an environment that is both convenient and
efficient for user to store and retrieve database information, e.g. MySQL, Oracle, FoxPro,
dBASE, SyBase MS-Access. The purpose of database management system is to bridge the
gap between information and data.
✓ The basic processes that are supported by DBMS are as follows:
• Specification of data types, structures and constraints to be considered in an application.
• Storing the data.
• Manipulation of the database.
• Querying the database to retrieve desired information.
• Updating the content of the database.
✓ Reduction in Data Redundancy – The duplication of data refers to data redundancy. DBMS
cannot make separate copies of the same data. All the data is kept at a place and different
applications refer to data from centrally controlled system.
✓ Better Interaction with Users – In DBMS, the availability of up to date information improves
the data to be access or respond as per user requests.
✓ Improvement in Data Security – DBMS can allow the means of access to the database
through the authorised channels. To ensure security, DBMS provides security tools, i.e.
username and password.
✓ Maintenance of Data Integrity – Data integrity ensures that the data of database is accurate.
In DBMS, data is centralised and used by many users at a time, it is essential to enforce
integrity controls.
✓ Ease of Application Development – The application programmer needs to develop the
application programs according to the user’s need. The other issues like concurrent access,
security, data integrity, etc. are handled by database itself. This makes the application
development an easier task.
✓ Backup and Recovery – The DBMS provides backup and recovery subsystem that is
responsible to recover data from hardware and software failures.
As there are many advantages, DBMS also have some minor disadvantages. These
disadvantages are listed here:
✓ Cost of Hardware and Software – A processor with high speed of data processing and
memory of large size is required to run the DBMS software. It means that you have to
upgrade the hardware used for file-based system. Similarly, database software is also very
costly.
✓ Complexity – The provision of the functionality that is expected from a good DBMS makes
the DBMS an extremely complex piece of software. Failure to understand the system can
lead to bad design decisions, which can have serious consequences for an organisation.
✓ Cost of Staff Training – Mostly DBMS are often complex systems so the training for user to
use the database is required. The organisation has to pay a lot of amount for the training of
staff to run the DBMS.
3 Applications of DBMS
Some applications of DBMS are as follows
✓ Banking – For customer information, accounts, loans and other banking transactions.
✓ Reservation – For reservation and schedule information.
✓ Universities – For student information, course registration, grades, etc.
✓ Credit Card Transaction – For purchase of credit cards and generation of monthly
statements.
✓ Telecommunication – For keeping records of calls made, generating monthly bill, etc.
✓ Finance – For storing information about holdings, sales and purchase of financial statements.
✓ Sales – For customer, product and purchase information.
4 Data Model
A data model is a conceptual representation of the structure of data, describing how data is
organized, stored, and manipulated within a system or application. It serves as a blueprint for
designing databases, software applications, and information systems. Data models help ensure
that data is accurately and efficiently managed, retrieved, and analyzed.
4.1 Relation
✓ It is a table with columns and rows which represent is the data items and relationships
among them. Relation have three important properties a name, cardinality and a degree.
These properties help us to further define and describe relations.
• Name – The first property of a relation is its name, which is represented by the tide or
the entity identifier.
• Cardinality – The second property of a relation is its cardinality, which refers to the
number of tuples (rows) in a relation.
• Degree – The third property of a relation is its degree, which refers to the number of
attributes (columns) in each tuple.
4.2 Domain
✓ It is a collection of all possible values from which the values for a given column or an
attribute is drawn. A domain is said to be atomic if elements are considered to be
indivisible units.
[email protected] 8|P age http://www.edutap.co.in
4.3 Entities
✓ Entities represent real-world objects, concepts, or events that are relevant to the system
being modeled. Each entity typically corresponds to a table in a relational database and is
defined by its attributes.
4.4 Attributes
✓ Attributes are the properties or characteristics of entities. Each attribute of a table has a
distinct name.
4.5 Tuples
✓ The rows in a relation are also known as tuples. Each row or tuple has a set of permitted
values for each attribute.
4.6 Constraints
✓ Constraints define rules or conditions that must be satisfied by the data in a database to
maintain integrity and consistency. Common constraints include primary key constraints,
foreign key constraints, uniqueness constraints, and check constraints.
4.7 Normalization
✓ Normalization is the process of organizing data in a database to minimize redundancy and
dependency, thereby improving data integrity and reducing anomalies. It involves breaking
down large tables into smaller, related tables and eliminating repeating groups of
attributes.
4.10 Keys
✓ Key is one of the important concepts of database. A key is defined as the column or Set of
columns in a table that is used to identify either row of data in a table or establish
relationship with another table.
✓ It is also referred as super key, arranging the records either in ascending or descending
order.
✓ If a table has id, name and address as the column names then each one is known as the key
for that table. The keys are also used to uniquely identify each record in the database table.
4.10.1 Types of Keys
✓ There are mainly four types of keys which are described below:
4.10.1.1 Primary Key
✓ It is a set of one or more attributes that can uniquely identify tuples within the
relation. It identifies unique records within a table. The primary key should be chosen
in such a way, i.e. its value must not be changed. There should not be duplicacy in the
[email protected] 9|P age http://www.edutap.co.in
record of primary key. Primary key can be atomic or composite. The field chosen as
primary key, cannot accept null value.
4.10.1.2 Candidate Key
✓ The set of all attributes which can uniquely identify each tuple of a relation, are known
as candidate keys. Each table may have one or more candidate keys and one of them
will become the primary key. The candidate key of a relation is always a minimal key.
4.10.1.3 Alternate Key
✓ From the set of candidate keys after selecting one of the keys as primary key, all other
remaining keys are known as alternate keys.
4.10.1.4 Foreign Key
✓ It is a non-key attribute whose value is derived from the primary key of the same or
some another table. The relationship between two tables is established with the help
of foreign key. A table may have multiple foreign keys and each foreign key can have a
different referenced table. Foreign keys play an essential role in database design, when
tables are broken apart then foreign keys make it possible for them to be
reconstructed.
Let’s Discuss Relational Database Management System (RDBMS) and Entity - Relationship Model
(E-R Model)in detail.
5 Relational Database
In a relational database, data is stored in different tables with relationships to each other.
These tables communicate and share information, which facilitates data search ability,
organisation and reporting. In the case of relational database, a Relational Database
Management System (RDBMS) performs these tasks.
An important feature of this database system is that a single database can be spread across
several tables, e.g. Base, Oracle, DB2, SAP SyBase, Informix, etc.
[email protected] 10 | P a g e http://www.edutap.co.in
6 Entity - Relationship Model (E-R Model)
It represents the entities contained in the database. It is a diagrammatically representation of
entities and relationship between them. It is also known as E-R diagram.
6.1 Entity
✓ It is an object that has its existence in the real world. It includes all those things about
which the data are collected. “Entities are represented in rectangles.” e.g. customer buys
goods, it means customer and goods are entities. ‘
6.2 Attributes
✓ It describes the characteristics or properties of entity. In tables, attributes are represented
by columns. Attributes are drawn in elliptical shapes (ovals), e.g. ITEM entity may contain
code and price.
6.4 Relationship
✓ It is an association among several entities. A relationship describes how two or more
entities are related to each other. It is represented by diamond shape.
✓ Relationship can be divided into three parts
• One to one
• Many to one
• One to many
[email protected] 11 | P a g e http://www.edutap.co.in
6.5 Symbol Used in ER Diagram
[email protected] 12 | P a g e http://www.edutap.co.in
CONCEPT NOTES
Cryptography: It is a
Integrity: This term
process of protecting the
certifies that the
information by storing on
information cannot be
disk. It is an art of writing
changed by unauthorized
data in hidden or secrete
users.
format.
3.1 Malware
✓ Malware is a short term used for MALicious softWARE. It is any software developed with an
intention to damage hardware devices, steal data, or cause any other trouble to the user.
Viruses, Worms, Ransomware, Trojans, and Spyware are some of the kinds of malware.
3.1.1 Modes of Malware distribution
✓ A malware once designed, can take many routes to reach your computer. Some of the
common distribution channels for malware are:
• Downloaded from the Internet: Most of the time, malware is unintentionally
downloaded into the hard drive of a computer by the user. Of course, the malware
designers are smart enough to disguise their malware, but we should be very careful
while downloading files from the Internet (especially those highlighted as free stuff).
• Spam Email: We often receive an unsolicited email with embedded hyperlinks or
attachment files. These links or attached files can be malware.
• Removable Storage Devices: Often, the replicating malware targets the removable
storage media like pen drives, SSD cards, music players, mobile phones, etc. and
infect them with malware that gets transferred to other systems that they are
plugged into.
• Network Propagation: Some malware like Worms have the ability to propagate from
one computer to another through a network connection.
3.2 Virus
✓ A virus is a piece of software code created to perform malicious activities and hamper resources of
a computer system like CPU time, memory, personal files, or sensitive information.
✓ Some well-known viruses include CryptoLocker, ILOVEYOU, MyDoom, Sasser and Netsky, Slammer,
Stuxnet, etc.
✓ It is a software program that affects the system to corrupt the files in the form of executable files.
The first computer virus is creepers and is developed in 1986.
✓ The virus is used for destruction purpose. It can copy itself and gets attached by itself to other files.
The virus can attack over a network such as the Internet or removable disk like floppy disk, DVD,
CD, and Pen drive. Virus can infect the computer and spread the infection.
3.2.1 Types of Virus
✓ Append Virus: As the name suggests, this virus appends its malicious code to the end of
the host program's file. After that, it alters the file's header in a way that the file's
header is redirected to the start of the malicious code of the append virus. Thus, this
3.2.2 Antivirus
✓ Antivirus is a software, also known as anti-malware. Initially, antivirus software was
developed to detect and remove viruses only and hence the name anti-virus. However,
with time it has evolved and now comes bundled with the prevention, detection, and
removal of a wide range of malware.
• Sandbox detection
✓ Sandbox detection involves executing new applications or files within a virtual
environment (sandbox) to observe their behavioral patterns for potential
malware indicators.
[email protected] 7|P age http://www.edutap.co.in
• Data mining techniques
✓ Data mining techniques utilize various data mining and machine learning
methods to classify file behavior as either benign or malicious.
• Heuristics
✓ Heuristics involve comparing suspected program source code to known viruses
in a heuristic database. If a significant match is found, the code is flagged as a
potential threat based on patterns typically seen in malware infections.
• Real-time protection
✓ Real-time protection monitors the behavior of applications or files in active
memory, ensuring timely detection of dormant or activated malware. This
involves continuous observation for any suspicious activity while the file is
being executed.
3.3 Worms
✓ The Worm is also a malware that incurs unexpected or damaging behaviour on an infected
computer system. The major difference between a worm and a virus is that unlike a virus,
a worm does not need a host program or software to insert its code into.
✓ Worms are standalone programs that are capable of working on its own. Also, a virus needs
human triggering for replication (i.e. when a user opens/executes the infected file), while a
worm replicates on its own and can spread to other computers through the network.
✓ Some prominent examples of worms include Storm Worm, Sobig, MSBlast, Code Red,
Nimda, Morris Worm, etc.
3.4 Ransomware
✓ It is a type of malware that targets user data. It either blocks the user from accessing their
own data or threatens to publish the personal data online and demands ransom payment
against the same.
3.5 Trojan
✓ It is malware, that looks like a legitimate software and once it tricks a user into installing it,
it acts pretty much like a virus or worm. However, a Trojan does not self-replicate or infect
other files, it spreads through user interaction such as opening an email attachment or
downloading and executing a file from the Internet. Some Trojans create backdoors to give
malicious users access to the system.
3.6 Spyware
✓ It is a type of malware that spies on a person or an organisation by gathering information
about them, without the knowledge of the user. It records and sends the collected
information to an external entity without consent or knowledge of the user.
✓ Spyware usually tracks internet usage data and sells them to advertisers. They can also be
used to track and capture credit card or bank account information, login and password
information or user’s identity.
3.8 Keyloggers
✓ A keylogger can either be malware or hardware. The main purpose of this malware is to
record the keys pressed by a user on the keyboard. A keylogger makes logs of daily
keyboard usage and may send it to an external entity as well. In this way, very sensitive and
personal information like passwords, emails, private conversations, etc. can be revealed to
an external entity without the knowledge of the user.
4 Spam
Spam encompasses a range of activities across digital platforms such as messaging, forums,
chats, emails, and advertisements. However, email spam is perhaps the most commonly
recognized form.
5 HTTP vs HTTPS
HTTP (Hyper Text Transfer Protocol) and its secure variant HTTPS (Hyper Text Transfer Protocol
Secure) are both sets of protocols governing data transmission over the World Wide Web
(WWW).
HTTP transmits data over the network without encryption, making it susceptible to attacks by
hackers. Therefore, it's suitable for websites sharing public information like news portals and
blogs.
In contrast, HTTPS encrypts data before transmission and requires an SSL Digital Certificate for
decryption at the receiver's end. This ensures enhanced security for websites handling sensitive
information.
6 Firewall
A computer firewall serves as a network security mechanism crafted to safeguard a trusted
private network from unauthorized access or traffic stemming from an untrusted external
network, such as the Internet or distinct sections within the same network.
Firewalls can be deployed through software, hardware, or a combination of both. They function
as the primary line of defense against malware infiltration.
[email protected] 9|P age http://www.edutap.co.in
A firewall acts as a network filter and based on the predefined security rules, it continuously
monitors and controls the incoming and outgoing traffic.
7 Cookies
A computer cookie, a small file or data packet, is stored by a website on the client's computer
and can only be modified by the originating website. The client's computer serves as a host for
storing the cookie, which is utilized by websites to retain browsing information.
There are various types of cookies depending on their functions. Session cookies, for instance,
monitor the ongoing session and automatically end it upon timeout, as seen in banking
websites where leaving an e-banking page open results in automatic closure after a period of
inactivity.
Similarly, authentication cookies are employed by websites to verify whether the user is already
logged in (authenticated) or not. This eliminates the need for repeated logins when navigating
different pages or links within the same website.
Identity theft
Identity theft occurs when someone wrongfully obtains and uses another person's personal data, such as
their name, Social Security number, credit card number, or other identifying information, usually for
financial gain.
rd
Phishing, Hacking, 3 Party Cookies, Spyware, Dumpster Diving, Malware can also lead to identity theft
[email protected] 10 | P a g e http://www.edutap.co.in
knowledge to find loopholes and vulnerabilities in computer systems or computer networks
and gain access to unauthorised information (Hacking).
In simple terms, a hacker is a person that is skilled enough to hack or take control of a
computer system. Depending on the intent, there are different types of hackers.
[email protected] 11 | P a g e http://www.edutap.co.in
9.2 Mail Bomb
✓ An excessively large email (typically many thousands of messages) or one large message
sent to a user’s email account. This is done to crash the system and prevent genuine
messages from being received.
9.3 Scareware
✓ A common trick cybercriminal uses to make users think that their computer has become
infected with malware to get them to purchase a fake application.
9.4 Sniffers
✓ A software program used to monitor the traffic in a network. The hackers may use the
sniffed data to access important confidential data.
9.5 Rootkit
✓ A program designed to hide objects such as processes, files or Windows registry entries
(often including its own).
9.6 Phishing
✓ This is acquiring the personal and sensitive information of a person through official
looking emails. Users of online banking and e-commerce websites are more prone to
this attack.
10 Internet Safety
✓ Strong Passwords: Use strong, unique passwords for each online account. Avoid using easily
guessable information like birthdates or pet names. Consider using a password manager to
generate and store complex passwords securely.
✓ Two-Factor Authentication (2FA): Enable two-factor authentication wherever possible. This
adds an extra layer of security by requiring a second form of verification, such as a code sent
to your phone, in addition to your password.
✓ Update Software Regularly: Keep your operating system, antivirus software, web browsers,
and other applications up to date with the latest security patches and updates to protect
against vulnerabilities.
✓ Secure Wi-Fi Connections: Use encrypted Wi-Fi connections at home and in public places.
Avoid connecting to public Wi-Fi networks without using a VPN (Virtual Private Network) for
added security.
✓ Be Cautious of Phishing: Be wary of unsolicited emails, messages, or calls asking for personal
information or urging urgent action. Avoid clicking on suspicious links or downloading
attachments from unknown sources.
✓ Privacy Settings: Review and adjust privacy settings on social media platforms and other
online services to control who can see your information and posts. Limit the amount of
personal information you share publicly.
✓ Safe Browsing Habits: Exercise caution when visiting websites, downloading files, or clicking
on links. Stick to reputable websites and avoid downloading software from unknown sources
to minimize the risk of malware infections.
✓ Use Secure Websites (HTTPS): Look for the padlock icon and "https://" in the URL when
accessing websites, especially when entering sensitive information like passwords or credit
card details. This indicates a secure connection.
[email protected] 13 | P a g e http://www.edutap.co.in
✓ Data Backup: Regularly back up important files and data to an external hard drive, cloud
storage service, or another secure location to protect against data loss due to malware,
hardware failure, or other incidents.
✓ Educate Yourself: Stay informed about common online threats and scams. Educate yourself
and your family members about internet safety practices and encourage open
communication about online experiences and concerns.
✓ Parental Controls: Use parental control features available on devices, routers, and
internet browsers to restrict access to inappropriate content. These controls can limit the
websites children can visit, set time limits for internet usage, and block or filter explicit
content.
✓ Safe Search Settings: Enable safe search settings on search engines to filter out explicit
content from search results. This helps prevent children from accidentally accessing
inappropriate material while browsing the web.
✓ Education and Communication: Educate children about online safety, including the risks
of sharing personal information, interacting with strangers, and engaging in cyberbullying.
Encourage open communication and teach them to report any suspicious or
uncomfortable online encounters.
✓ Supervised Internet Use: Monitor children's online activities and supervise their internet
usage, especially for younger children. Co-browsing with them can help you guide their
online experience and address any concerns or questions they may have.
✓ Set Ground Rules: Establish clear rules and guidelines for internet use, such as which
websites are allowed, time limits for screen time, and appropriate online behavior. Make
sure children understand the consequences of breaking these rules.
✓ Privacy Settings: Review and adjust privacy settings on social media accounts and other
online platforms to restrict who can view and interact with your child's profile or posts.
Teach children to be cautious about sharing personal information online.
✓ Cyberbullying Awareness: Educate children about cyberbullying and encourage them to
speak up if they experience or witness bullying online. Teach them how to block or report
abusive behavior and seek help from a trusted adult.
✓ Safe Messaging Apps: Choose messaging apps and online platforms with built-in safety
features designed for children, such as age-appropriate content filters, moderation tools,
and options for parental supervision.
✓ Regular Check-Ins: Have regular conversations with children about their online
experiences and any challenges they may be facing. Create a supportive environment
where they feel comfortable sharing their concerns or seeking help if needed.
✓ Lead by Example: Be a positive role model for responsible internet use. Practice good
online habits yourself and demonstrate respectful and safe behavior in your interactions
online.
[email protected] 14 | P a g e http://www.edutap.co.in
11 Incognito mode
It also known as private browsing or privacy mode, is a feature available in most web browsers
that allows users to browse the internet without storing local data such as browsing history,
cookies, or cached files. When you use incognito mode, the browser typically doesn't save your
browsing history, cookies, site data, or information entered in forms. However, it's important to
note that incognito mode does not make you completely anonymous online.
11.2 Uses
✓ Privacy: It prevents others who may have access to your device from seeing your browsing
history.
✓ Testing: Web developers often use incognito mode to test websites without interference
from their browsing history or cached data.
✓ Logging into Multiple Accounts: It allows users to log into multiple accounts on the same
website simultaneously.
✓ Avoiding Cookies: Incognito mode can help users avoid being tracked by cookies, which are
often used for advertising purposes.
11.3 Limitations
✓ While Incognito Mode provides a level of privacy by not storing data locally, it does not
make users completely anonymous online. Internet service providers, websites visited, and
network administrators may still be able to track users' online activities.
✓ Additionally, activities such as downloading files or bookmarking pages while in Incognito
Mode may still leave traces on the device or network.
[email protected] 15 | P a g e http://www.edutap.co.in
CONCEPT NOTES
Emerging Trend
[email protected] 1|P age http://www.edutap.co.in
Contents
1 Artificial Intelligence ....................................................................................................................3
1.1 Machine Learning ................................................................................................................3
1.2 Natural Language Processing (NLP) .......................................................................................3
1.3 Immersive experiences.........................................................................................................3
1.3.1 Virtual Reality (VR)........................................................................................................4
1.3.2 Augmented Reality (AR) ................................................................................................4
1.4 Robotics ..............................................................................................................................4
2 Big Data ......................................................................................................................................4
2.1 Characteristics of Big Data ....................................................................................................5
2.2 Data analytics ......................................................................................................................5
2.3 Internet of Things (IoT).........................................................................................................6
2.4 Web of Things (WoT) ...........................................................................................................6
2.5 Smart Cities .........................................................................................................................6
3 Grid Computing...........................................................................................................................7
4 Blockchain technology .................................................................................................................8
4.1 Largest cryptocurrencies by market cap ................................................................................8
Large Language Models (LLMs) are advanced computer programs trained to understand and generate
human-like text. They use machine learning techniques to analyze vast amounts of written content and
learn the patterns of human language. LLMs can perform various language tasks such as text generation,
summarization, translation, and question answering. Notable examples include GPT-3, BERT (Bidirectional
Encoder Representations from Transformers).
LLMs are valuable for applications in health care, software development and language translation, content
generation, customer service chatbots, language translation, text summarization, personal assistants,
educational tools, creative writing, research, legal assistance, and accessibility support.into machine
language know as Object code.
1.4 Robotics
✓ A robot is a machine capable of performing tasks automatically with accuracy and
precision, programmable by a computer to follow instructions through computer
programs. Initially designed for repetitive and labor-intensive industrial tasks, robots have
various types such as wheeled robots, legged robots, manipulators, and humanoids.
Humanoids are robots resembling humans. They find applications in industries, medical
science, bionics, scientific research, and the military.
✓ Examples of robots include
• NASA's Mars Exploration Rover (MER) for studying Mars
• Sophia the humanoid utilizing artificial intelligence and facial recognition
• Drones - unmanned aircraft controlled remotely or autonomously through software-
controlled flight plans. Drones are used in journalism, filming, aerial photography,
shipping, disaster management, search and rescue operations, healthcare, geographic
mapping, structural safety inspections, agriculture, and wildlife monitoring.
2 Big Data
With technology permeating nearly every aspect of our lives, data production has skyrocketed.
With over a billion Internet users and the majority of web traffic stemming from smartphones,
an astonishing amount of data is generated daily - approximately 2.5 quintillion bytes. This pace
is accelerating with the continuous evolution of the Internet of Things (IoT)
This results in the generation of data sets of enormous volume and complexity called Big Data.
Traditional data processing tools struggle to handle Big Data due to its voluminous and
unstructured nature, including posts, instant messages, photographs, tweets, blog articles,
news items, opinion polls, and more.
To establish a grid, middleware such as the open-source Globus toolkit is used to implement
distributed processor architecture. This toolkit provides software for security, resource
management, data management, communication, and fault detection, facilitating the creation
and management of grid networks.
(i) Data Grid: This type of grid is utilized for managing large and distributed datasets, providing
multi-user access. Data grids facilitate efficient storage, retrieval, and sharing of data across
geographically dispersed locations.
(ii) CPU or Processor Grid: In a CPU grid, processing tasks are distributed among multiple
computing nodes. This approach allows for workload balancing and parallel processing, where a
large task is divided into smaller subtasks and assigned to different nodes for simultaneous
execution. This maximizes computational efficiency and speeds up the overall processing time.
A blockchain consists of blocks, which are secured chunks of data or transactions, linked
together to form a chain. Each block contains visible header data accessible to every node,
while private data remains encrypted. Transactions are authenticated by all nodes in the
network before being added to the append-only ledger, ensuring data integrity.
While blockchain is widely known for its application in digital currency, its decentralized nature
and security features make it ideal for enhancing transparency, accountability, and efficiency
across various sectors. In healthcare, blockchain facilitates better data sharing among
providers, leading to accurate diagnoses and cost-effective care delivery. It also finds use in
land registration to prevent disputes and in voting systems to ensure transparency and
authenticity.
Overall, blockchain technology holds promise for transforming industries like banking, media,
telecom, travel, and hospitality by fostering trust and streamlining processes through
decentralized and secure transactions.
[email protected] 10 | P a g e http://www.edutap.co.in
• Artificial Intelligence – Fifth generation computing devices, based on artificial
intelligence, are still in development, though there are some applications, such as voice
recognition, that are being used today.
• ASCII – ASCII (American Standard Code for Information Interchange) is a character set and
a character encoding based on the Roman alphabet as used in Modern English and other
Western European languages.
• Assembler – A program that translates mnemonic statement into executable instruction.
• Attribute – The characteristics of an entity are called its attributes.
B
• Backspace – This key is used on the keyboard to delete the text. It will delete the text to
the left of cursor.
• Backup – Storage of duplicate files on disks, diskettes, or some other form of magnetic
medium (such as taped) as a safety measure in case the original medium is damaged or
lost.
• Bandwidth – The maximum amount of data that can travel in a communication path in a
given time, measured in bits per second (bps).
• Bar Code – It is a machine-readable representation of information in a visual format on a
surface. The first bar code system was developed by Norman Joseph Woodland and
Bernard Silver in 1952.
• Basic Input Output System (BIOS) – Also known as ROM BIOS. It provides an abstraction
layer for the hardware, i.e., a consistent way for application programs and operating
system to interact with input/output devices
• Binary Code – The language used by computers in which data and instructions are
represented by a series of 1s and 0s.
• Binary Coded Decimal (BCD) – A coding system in which a 4-digit binary number
represents each decimal digit from 0 to 9
• Binary numbering system – A numbering system in which all numbers are represented
by various combinations of the digits of 0 and 1
• Bit – A bit sometimes abbreviated as (binary digit) is the most basic information unit used
in computing and information theory. A single bit is a one or a zero, a true or a false, a
'flag' which is 'on' or 'off' or in general, the quantity of information required to distinguish
two mutually exclusive states from each other.
• Bitmap – A method of storing a graphic image as a set of bits in a computer memory. To
display the image on the screen, the computer converts the bits into pixels.
• Blog – It is a discussion or informational site published on the world wide web.
• Bomb – A type of virus designed to activate at a specific date and time on your computer.
• Bluetooth – A protocol that permits a wireless exchange of information between
computers. cell phone and other electronic devices within a radius about 30 feet,
• Booting – It is a bootstrapping process which starts the operating system when a
computer is switched on
[email protected] 11 | P a g e http://www.edutap.co.in
• Botnet – It is a collection of internets connected programs communicating with other
similar programs in order to perform tasks.
• Boot Sequence – A boot sequence is the set of operations the computer performs when
it is switched on which loads an operating system.
• Browser – A special software that enables users to read/view web pages and jump from
one web page to another.
• Buffering – The process of storing data in a memory device, allowing the devices to
change the data rates, perform error checking and error retransmission.
• Bug – A software bug is an error, flaw, failure, or fault in a computer program or system
produces an incorrect or unexpected result.
• Bulletin Board System (BBS) – An online information system, usually, set-up by an
individual on a non-profit basis for the enjoyment of other individual with similar interest
• Bus – A pathway along which electronic signals travel between the components of a
computer system.
• Byte – A byte is commonly used as a unit of storage measurement in computers,
regardless of the type of data being stored.
C
• Cache Memory – The speed of CPU is extremely high compared to the access time of main
memory Therefore, the performance of CPU decreases due to the slow speed of main memory.
To decrease the mismatch in operating speed, a small memory chip is attached between CPU and
main memory whose access time is very close to the processing speed of CPU It is called the Cache
Memory.
• Central Processing Unit (CPU) – The Central Processing Unit (CPU) performs the actual processing
of data. It is the part of a computer system that interprets and carries out the instructions
contained in the software. The CPU is generally called by its generic name 'Processor'. It is also
known as the brain of computer.
• Chart Wizard – The chart wizard brings you through the process of creating a chart by displaying
a series of dialog boxes.
• Channel – A medium for transferring information which is also called a line or circuit. A
communication channel can be a physical link, such as a cable that connects two stations in a
network or it can consist of some electromagnetic transmission.
• Chat – A method of communication in which people type text messages to each other, thereby
holding a conversation over a network such as the Internet.
• Chip – A tiny wafer of silicon containing miniature electric circuits that can store millions of bits
of information.
• Client-Server – It is a network architecture which separates the client from the server. Each
instance of the client software can send requests to a server or application server.
• Clipboard – A holding area in memory where information that has been copied or cut (text,
graphics, sound or video) can be stored until the information is inserted elsewhere.
• Clock Rate – The clock rate is the fundamental rate in cycles per second, measured in hertz, at
which a computer performs its most basic operations such as adding two numbers or transferring
a value from one processor register to another.
[email protected] 12 | P a g e http://www.edutap.co.in
• CMOS – A type of computer chip which is able to operate with a very small amount of electricity
from a battery. CMOS refers as complementary metal oxide semiconductor.
• Cold Boot – When a computer restarts after the power cut is called cold boot
• Command – An instruction that causes a program or computer to perform a function.
• Command Line Interface - A Command Line Interface (CLI) is a method of interacting with a
computer by giving it lines of textual commands (that is, a sequence of characters) from the
keyboard.
• Command.com – It is the name for the default operating system shell (or command line
interpreter) for DOS and some versions of Windows.
• Communication – The transmission of data from one computer to another or from one device to
another is called communication
• Compact Disk (CDR) – CD-ROM disks are made of plastic and are coated with reflective metals.
Their storage density is very high, storage cost is very low and access time is relatively fast. Each
disk is approximately 4.5 inches in diameter and can hold about 700 MB of data
• Compiler – A compiler is a computer program that translates a series of instructions written in
one computer language (called the source language) into another computer language (also called
the object or target language).
• Computer Graphics – Computer Graphics are visual presentations on a computer screen.
Examples are photographs, drawings, line arts, graphs, diagrams, typography numbers, symbols,
geometric designs, maps, engineering drawings or other images.
• Computer Networks – A computer network is a system or communication among two or more
computers. The computer networks can be broadly classified as Homogenous' and
'Heterogeneous'.
• Computer Output Microfilm (COM) – An extremely high speed, low cost process that records
computer generated information directly from the computer tape or cartridge to a mini microfilm
media.
• Computer Worm – A computer worm is a self - replicating computer program, similar to a
computer virus.
• Control Panel – Control Panel is the part of Windows menu, accessible from the start menu, which
allows users to view and manipulate basic system settings and controls, such as adding hardware,
adding/removing software, controlling user accounts, changing accessibility options, etc.
• Control Unit – A control unit is the part of a CPU that directs its operation. The output of this unit
controls the activity of the rest of the device.
• Cookie – A packet of information that travels between a browser and the web server.
• Cracker – The preferred term used to refer to a computer criminal who penetrates a computer to
steal information or damage the program in some way.
• Crash – A malfunction in hardware or software that keeps a computer from functioning.
• CRT Monitor – A CRT (Cathode Ray Tube) monitor contains millions of tiny red, green and blue
phosphorous dots that glow when struck by an electron beam that travels across the screen to
create a visible image.
• Crawler – A web crawler is an internet bot that systematically browses the world wide web,
typically for the purpose of web indexing. It is also called a web spider.
[email protected] 13 | P a g e http://www.edutap.co.in
D
• Data – Information consisting of letters, numbers, symbols, sound or images – in a form that can
be processed by a computer.
• Database – A database is a collection of information that is organized so that it can easily be
accessed, managed and updated.
• Data abstraction – It is the reduction of a particular body of data to a simplified representation of
the whole.
• Data Dictionary – The document that contains clear definitions of the data that will be used in
setting up database management systems.
• Data processing – It refers to the process of collection and manipulating raw data to yield useful
information.
• Data Flow Diagrams – A data flow diagram (DFD) is a graphical representation of the flow of data
through an information system. A data flow diagram can also be used for the visualization of data
processing (structured design).
• Data Type – A data type is a defined kind of data, i.e, a set of possible values and basic operations
on those values.
• Debugging – Locating and eliminating defects in a program.
• Degree – The number of fields associated with the database table or relation.
• Delete – A command to erase information in storage.
• Desktop Publishing – Desktop Publishing (also known as DTP) combines a personal computer,
Page Layout software and a printer to create publications on small economic scale.
• Device Driver – A device driver, often called a driver for short, is a computer program that enables
another program, typically, an operating system to interact with a hardware device.
• Difference Engine – A difference engine is a historical (now obsolete) mechanical special-purpose
computer designed to tabulate polynomial functions. Difference engine was created in 1822 by
Charles Babbage. The machine used for the decimal numbers system and was powered by
cranking a handle.
• Direct Access – Direct access is the capability of the computer equipment to obtain data from a
storage device. or to enter data into a storage device, in a sequence independent of their relative
positions by means of address that indicate the physical location of the data.
• Directory – A list of the files stored on a disk.
• Disk Operating System (DOS) – A disk operating system (abbreviated DOS) is a computer
operating system that can used a disk storage device, such as floppy disk, hard disk drive, or
optical disc.
• Domain Name – A unique name that identifies a particular website and represents the name of
the server where the web pages reside.
• Dot Matrix Printer – A Dot Matrix Printer refers to a type of computer printer with a print head
that runs back and forth on the page and prints by impact, striking an ink-soaked cloth ribbon
against the paper, much like a typewriter.
• Dots Per Inch (DPI) – It is defined as the measure of the resolution of a printer, scanner or monitor.
• Download – A copy (data) from one computer system to another, typically over the Internet.
• Drag-and-Drop – In computer graphical user interfaces, drag and drop is the action of clicking on
a virtual object and dragging it to a different location or onto another virtual object.
[email protected] 14 | P a g e http://www.edutap.co.in
• Dual Core – The Pentium dual core brand was used for mainstream X-86 architecture
microprocessor from Intel.
• Dumb Terminal – A computer terminal with no processing or programming capabilities, generally
used for simple data entry or retrieval tasks.
• DVD – It is an optical disk storage media format that can be used for data storage including movies
with high quality video and sound.
• Dynamic RAM (DRAM) – Dynamic Random-Access Memory is a type of random-access memory
which stores each bit of data in a separate capacitor.
E
• EBCDIC – EBCDIC (Extended Binary Coded Decimal Interchange Code) is an 8-bit character
encoding used on IBM mainframe operating systems, like Z/OS, S/390, AS/400 and i5/OS.
• E-Commerce – Electronic commerce is a type of industry where buying and selling of product or
services is conducted over electronic systems such as the Intranet and other computer network.
• Editing – The process of changing information by inserting, deleting, replacing, rearranging and
reformation.
• EDO (Extended Data Output) RAM – This form of dynamic RAM speeds access to memory
locations by working on a simple assumption—the next time memory is accessed. it will be at a
contiguous address in a contiguous chunk of hardware.
• Electrically Erasable Programmable Read Only Memory (EEPROM) – A special type of
Programmable Read Only Memory (PROM) that can be erased by exposing it to an electrical
charge. It retains its contents even when the power is turned off.
• Electronic Data Processing (EDP) – A data processing through equipment that is predominantly
electronic such as digital computer.
• E-mail – Electronic mail, abbreviated e-mail is a method of composing, sending, storing and
receiving messages over electronic communication systems.
• Encapsulation – It is a mechanism that associates the code and the data it manipulates into a
single unit and keeps them safe from external interference.
• Encryption – In cryptography, encryption is the process of encoding messages (or information) in
such a way that hackers cannot read it, but the authorised users can access it.
• End User – Any individual who uses the information generated by a computer based system.
• Entity – An entity is something that has certain attributes or properties which may be assigned
values.
• EPROM – An EPROM (Erasable Programmable Read Only memory) is a type of computer memory
chip that retains its data when its power supply is switched off.
• Escape Key – A key that permits the user to leave one segment of a program and move to another.
• Ethernet Card – A network adapter that enables a computer to connect to an ethernet.
• Excel – Excel allows you to create spreadsheets much like paper ledgers that can perform
automatic calculations.
• Exe (.exe) – It is a common filename extension denoting an executable file (a program) in the DOS,
MS - Windows.
• Execution Time – The total time required to execute a program on a particular system.
• Extended Data Output (EDO) RAM – It is a type of RAM chip that improves the time to read from
memory on faster microprocessors such as the Intel Pentium.
[email protected] 15 | P a g e http://www.edutap.co.in
• Extranet – A technology that permits the users of one organisation's intranet to enter portions of
another organisation's intranet in order to conduct business transactions or collaborate on joint
projects.
• Export – To save information from one computer or program to another.
F
• Fax – It stands for ‘Facsimile machine’. It is used to transmit a copy of a document electronically.
• Fax Modem – A device built into or attached to a computer that serves as a facsimile machine
and a modem.
• Field – The attributes of an entity are written as fields in the table representation.
• File – A collection of information stored electronically and treated
• File Allocation Table (FAT) – It is the name of a computer file system architecture. The FAT file
system is a legacy file system which is simple and robust.
• File Manager – The file manager is an operating system utility that provides a user interface to
work with file systems
• File Server – In the client/server model, a file server is a computer responsible for the central
storage and management of data files so that other computers on the same network can access
the files.
• Firewall – A security system usually consisting of hardware and software that prevents
unauthorised persons from accessing certain parts of a programme database or network.
• Firmware – Firmware is a technology which has the combination of both hardware and software.
It provides necessary instructions for how the device communicates with others computer
hardware.
• Flash Memory – It is a type of non-volatile computer storage chip that can be electrically erased
and reprogrammed. It was developed using EEPROM.
• Floppy disk – A floppy disk is a data storage device that is composed of a circular piece of thin,
flexible (i.e., floppy) magnetic storage medium encased in a square or rectangular plastic walled.
• Flowcharts – Flowcharts are the means of visually representing the flow of data through an
information processing system, the operations an performed within the system and the sequence
in which they are performed.
• Foreign Key – A field in a database table, which links it to another related table.
• FORTRAN - It stands for FORmula TRANslation. The language was designed at IBM for scientific
computing. The components were very simple and provided the programmer with low -level
access to the computer's innards.
• Format – To set margins, tabs, font or line spacing in layout of a document.
• Frame – The basic packages of information on a network channel.
• Frequency – The number of oscillations of a signal per unit of time. It is usually expressed in cycles
per second (cps or hertz Hz).
• Freeware – A form of software distribution where the author retains copyright of the software
but makes the program available to others at no cost.
• Function Key – A special key on a computer keyboard or a terminal devices keyboard that is used
to perform specific functions. These keys are programmable so that a software product can put
the function keys to specific uses. Many keyboards have function keys labelled from F1 to F12.
[email protected] 16 | P a g e http://www.edutap.co.in
G
• Garbage In Garbage Out (GIGO) – It pertains to the fact that most computer errors are not errors,
they are data errors caused by incorrect input data.
• Gateway – A device that is used to joint together two networks having different base protocols.
• Gigabyte – A gigabyte is a unit of information or computer storage equal to approximately one
billion bytes
• Gigahertz (GHz) – A measurement used to identify the speed of the central processing unit. One
gigahertz is equal to 1 billion cycles per second.
• Glitch – A hardware problem that causes a computer to malfunction or crash.
• Gopher – A protocol used for locating and transferring information on the internet. It is an internet
search tool that allows users to access textual information.
• Graphic Interchange Format (GIF) – A simple file format for pictures and photographs, that are
compressed so they can be sent quickly.
• Graphical User Interface – A Graphical User Interface (or GUI) is a method of interacting with a
computer through a metaphor of direct manipulating of graphical images and widgets in addition
to text.
• Groupware – It is a software that allows networked individual to form groups and collaborate on
documents, programs or database.
H
• Hacker – A computer criminal who penetrates and tempers with computer programs or systems.
• Hard Copy – Text or graphics printed on paper: also called a printout.
• Hard Disk – A hard disk is a non-volatile data storage device that stores data on a magnetic surface
layered onto disk platters.
• Hardware – The mechanical, magnetic, electronic and electrical components that comprises a
computer system such as CPU, monitor, keyboard and mouse, etc.
• Header – Repetitive Information that appears at the top (the head) of every page of a document.
• High-Level Programming Languages – A high-level programming language is a programming
language that is more user-friendly to some extent, platform-independent and abstract from low-
level computer processor operations such as memory accesses.
• Hit - A single request for information made by a client computer from a web server.
• Home Page – A starting point or a doorway to the website. It refers to the web page that identifies
a website and contains the hyperlink to another web page in the website.
• Host Computer – A computer that provides information or a service to other computers on the
internet. Every host computer has its own unique host name.
• Hub – A network device that connects multiple computers on a LAN, so that they can
communicate with one another.
• Hyperlink – An image or portion of text on a web page that is linked to another web page.
• Hybrid Computer – Hybrid computers are made by taking the best features of the analog
computer and digital computer. A simple example of this type is the computer used in hospitals.
• Hyper Text Transfer Protocol (HTTP) – It is an important protocol used on the world wide web for
moving hypertext files across the internet. It requires an HTTP client program on one end and
HTTP server program on another end.
[email protected] 17 | P a g e http://www.edutap.co.in
I
• Icon – A symbol (such as picture or a folder) that represents a certain function on your computer.
When the user clicks on the icon, the appropriate function is executed.
• Impact Printers – Impact printers transfer the image onto paper through a printing mechanism
that strikes the paper called ribbon. Examples of impact printers are dot matrix printers and daisy
wheel printers.
• Information – Information is the summarization of data according to a certain pre -defined
purpose.
• Ink-Jet Printer – In an ink-jet printer. characters are formed as a result of electrically charged or
heated ink being sprayed in fine jets onto the paper. Individual nozzles in the printing head
produce high resolution characters.
• Input – In order to give instructions to a computer, the information has to be supplied to it. This
information is given to the computers through an input device such as keyboard, mouse, scanner
etc.
• Instant Messaging (IM) – A chat program that lets people communicate over the internet in real
time.
• Instruction – A command or order given to a computer to perform a task.
• Instruction Cycle – Fetching and decoding operations of the machine cycle.
• Integrated Circuits – Multiple electronic components combined on a silicon chip.
• Intelligent Terminal – Intelligent terminals are those which necessarily have processing power
and non-volatile data storage space.
• Interface – A device or program that helps a user to communicate with a computer.
• Internet – The Internet (also known simply as the net is the worldwide, publicly accessible system
of interconnected computer networks that transmit data by packet switching using the standard
Internet protocol.
• Internet Protocol (IP) Address – IP addresses are assigned to each and every computer on a
TCP/IP network. It ensures that data on a network goes where it is supported to go e.g.,
192.168.2.250.
• Internet Protocol Suite – The Internet protocol suite is the set of communications protocols that
implement the protocol stack on which the Internet and most commercial networks run.
• Internet Service Provider – An Internet Service Provider (ISP) is a business organization that offers
users access to the Internet and related services.
• Interpreter – A program that converts and executes the source code into machine code line by
line.
• Intranet – A private network established by an organization for the exclusive use of its employees.
J
• Java – A programming language designed for programs or applets used over the Internet.
• JavaScript – It is an object-oriented programming language used to create interactive effects in a
web browser.
• JPEG – It is a commonly used method of lossy compression for digital photography. The term
'JPEG' is an acronym for the Joint Photographic Experts Groups.
• Joystick – A joystick is a computer peripheral or general control device consisting of a handheld
stick that pivots about one end and transmits its angle in two or three dimensions to a computer.
[email protected] 18 | P a g e http://www.edutap.co.in
• Justification – Aligning lines of text at the left margin, the right margin, both margins, or the
centre.
K
• Kernel – It is the fundamental part of a program, such as an operating system, that resides in
memory at all times.
• Keyboard – This is the standard input device attached to all computers. The layout of keyboard is
just like the traditional typewriter of the type QWERTY. It also contains some extra command keys
and function keys.
• Key Field – A unique field in a record used to distinguish one record from another.
• Kilobyte – A kilobyte is a unit of information or computer storage equal to 1024 bytes. It is
commonly abbreviated KB, kB, k byte or K byte.
L
• Label – One or more characters used to Identify a statement and instruction or a data field in a
computer program.
• LAN – LAN stands for Local Area Network. In a LAN, the connected computers are geographically
close together. They are either in the same building or within a smaller area.
• Landscape – A printer feature, generally controlled by software, which rotates the output image
by 90- to print across the length rather than the width of the paper.
• Laptop – Laptop is a small, lightweight and portable battery-powered computers that can fit onto
your lap. They each have a thin, flat and liquid crystal display screen.
• LASER Printer A computer-driven photocopier that creates an original image of the text or
graphics from the output of the computer onto a paper.
• LIGHT Pen – A light sensitive style for forming graphics by touching coordinates on a display
screen. thereby seeming to draw directly on the screen.
• Link – A communication path between two nodes or channel.
• LINUX – Linux is an open source operating system, meaning that the source code of the operating
system is freely available to the public.
• List Processing (LISP) – A high level programming language suitable for handling logical operations
and non-numeric applications.
• Loop – A sequence of instructions that is executed repeatedly until a terminal condition occurs.
M
• Machine Language – The language of computer is called binary language. Instructions in this
language are written as a sequence of 0's and 1's.
• Macro – A script that operates a series of commands to perform a function. It is set up to
automate repetitive tasks.
• Mainframe - Sometimes it's called a server or CPU mostly. A mainframe is only a mainframe when
compared to a desktop computer. It is bigger and much more powerful.
• Malware – It a software that disrupts normal computer functions or sends a user’s personal data
without the user’s authorisation.
• Mass Storage – It is referred to storage where large volume of backup/data is stored.
• Megabyte (MB) – 1 Megabyte is equal to 1048576 bytes usually rounded off to one million bytes.
• Megahertz (MHz) – A measurement used to identify the speed of the central processing unit.
[email protected] 19 | P a g e http://www.edutap.co.in
• Memory - Temporary storage for information, including applications and documents. Computer
memory is measured in terms of the amount of information it can store, commonly in megabytes
or gigabytes.
• Menu – A list of choices shown on the display screen.
• Menu Bar – The horizontal strip across the top of an application's window. Each word on the strip
has a context sensitive drop-down menu containing features and actions that are available for the
application in use.
• Merge – Combining two or more files into a single file.
• Metadata – Data about data, i.e., name, length, valid values or description of a data element. It is
stored in a data dictionary and repository.
• Microcomputer – A microprocessor-based computer, consisting of an MPU, internal
semiconductor memory, input and output sections and a system bus, all on one, or several
monolithic IC chips inserted into one or several PC boards.
• Microprocessor – A complete Central Processing Unit (CPU) contained on a single silicon chip.
• MIDI – It stands for Music Instrument Digital Interface. It allows a computer to store and replay a
musical instrument's output.
• Minicomputer – It is considered to be more capable than a microcomputer but less powerful than
a mainframe.
• Minimize – A term used in a GUI operating system that uses windows. It refers to reducing a
window to an icon, or a label at the bottom of the screen, allowing another window to be viewed.
• MIPS – An acronym derived from Million of Instruction Per Second (MIPS). It is used to measure
the speed of a processor.
• Mnemonic – A symbolic label or code remainder that assists the user in remembering a specific
operation or command in assembly language.
• Modem – An acronym for Modulator/Demodulator that refers to specific equipment that
provides a means of communication between two computer systems over conventional
telephone lines.
• Monitor – The visual readout device of a computer system. A monitor can be in several forms a
cathode ray tube (CRT), a liquid crystal display (LCD), or a flat-panel, full-colour display.
• Mouse – A manually operated input device for moving or entering positional information and
other data or commands by accessing (pointing to) images on a monitor.
• Morphing – The transformation of one image into another image.
• Motherboard – Main circuit board of a microcomputer that contains the CPU, BIOS, memory,
mass storage interfaces, serial and parallel ports, expansion slots and all the controllers required
to control standard peripheral devices such as display screen, keyboard and disk drive.
• MS-DOS – An early operating system developed by Microsoft Corporation (Microsoft Disc
Operating System).
• Multitasking – Multitasking can simultaneously work with several programs or interrelated tasks
that share memories, codes, buffers and files.
• Multithreading – It is a facility available in an operating system that allows multiple functions
from the same application packages.
• Multiuser – The term describing the capability of a computer system to be operated at more than
one terminal at the same time.
[email protected] 20 | P a g e http://www.edutap.co.in
• Multiplexer – It is a device that combines multiple input signals into an aggregate signal for
transmission.
• Multimedia Software programs – A program that combine text and graphics with sound, video
and animation. A multimedia PC contains the hardware to support these capabilities.
N
• Network Interface Card (NIC) – This is a part of the computer that allows it to talk to other
computers via a network protocol like TCP/IP.
• Newsgroup – An electronic discussion group maintained over the internet or tied into a bulletin
board system. Each newsgroup is typically organised around a specific interest.
• Nibble – A sequence of four adjacent bits, or a half byte. A hexadecimal or BCD coded digit can
be represented by a nibble.
• Non-Volatile Memory – A memory where stored data remains undisturbed by the removal of
electrical powers.
• Notebook Computer – A portable computer, also known as a laptop computer.
O
• Object – Something that contains both the data and the application that operates on that data,
• Object Code – A machine language code produced by a translator program, such as an assembler,
interpreter, or compiler.
• Object Linking and Embedding (OLE) – A process that permits the user to take material from one
source and insert it in another document.
• Object Oriented – A computer program and its data are modelled as a group of autonomous
objects that respond to message sent by another object.
• Offline – It refers to the state in which a computer is temporarily or permanently unable to
communicate with another computer.
• Online – It refers to the state of being connected to the networked computer system or the
Internet.
• Open Source Software (OSS) – Software that makes the underlying source code available to all
users at no charge. Linux is the example of open source software.
• Operand – The part of a machine level instruction which tells the central processor, the location
of the data to be manipulated by some operation.
• Operation Code (Op-Code) – Part of a computer instruction word that designates the function
performed by a specific instruction,
• Operating System (OS) – A set of instructions that tell a computer on how to operate when it is
turned on. It sets up a filing system to store files and tells the computer how to display information
on a video display.
• Optical Character Reader or Optical Character Recognition (OCR) – A device that can scan text
from hard copy and enter it automatically into a computer for storage or editing. Also called an
optical scanner.
P
• Password – A user’s secret identification code, required to access stored material.
• Patch – A patch is a piece of software designed to update a computer program or its supporting
data to fix or improve it.
[email protected] 21 | P a g e http://www.edutap.co.in
• Peripheral – A term designating the various kinds of machines and devices that work in
conjunction with a computer but are not necessarily part of the computer structure. Typically,
peripherals refer to the hardware devices external to a computer.
• Personal Computer (PC) – A single-user computer containing a Central Processing Unit (CPU) and
one or more memory circuits.
• Piracy - The illegal copying of software or other creative works.
• Pitch – The number of monospace characters (with same width) that will fit in a 1-inch line of text.
• Pixel – The smallest element (a dot) on a display screen. The pixel is the basic unit of
programmable color on a computer display or in a computer range.
• Plug and play – The ability to plug in a peripheral and have it work without difficulty.
• Plug-In – This is a program that your browser uses to manipulate a downloaded file. It differs from
a Helper Application in which the plug-in works inside the browser window.
• Port – A port serves as an interface between the computer and other computers or peripheral
devices. It generally refers to the part of a computing device available for connection to
peripherals such as input and output devices.
• Portrait – A term that designates the position of conventional printing across the width of a page.
• Post Office Protocol (POP) – A protocol that specifies how a personal computer can connect to a
mail server on the internet and download e-mail.
• Primary Key – It is a key that uniquely identifies each tuple or row in a table.
• Process – A collection of code, data and other system, resources including at least one thread of
execution that performs a data processing task.
• Program – A set instructions to perform a specific task. The term program means the same as
software.
• Programming Language – A vocabulary and set of grammatical rules for instructing a computer
to perform specific tasks. Some common programming languages are BASIC, C, C+ +, dBase and
Pearl.
• Programmable Read-Only Memory (PROM) – A blank read-only memory (ROM) that is
programmed with external programming equipment after Once programmed, it is not re -
programmable considered to be a ROM.
• Prompt – A prompt is text or symbols used to represent the system's readiness to perform the
next command. A prompt may also be a text representation of where the user is currently.
• Printer – A mechanical device for printing a computer's output on paper.
• Protocols – A set of rules that defines exactly how information is to be exchanged between two
systems over internet.
• Pseudocode – It is a short hand way of describing a computer program.
• Push technology – A process that allows a user to obtain automatic delivery of specified
information from the Internet to the user’s computer e.g. stock market quotes, weather forecasts
and sports scores.
Q
• Query - A request for information from a database.
• Queue – A queue is an example of a linear data structure, or more abstractly a s
• QWERTY – It is one of the standard computer keyboards with the character Q, W. E, R. T and Y on
the top row of letters
[email protected] 22 | P a g e http://www.edutap.co.in
R
• Random Access Memory (RAM) – A volatile, semiconductor storage structure that accesses
temporary data with a random or direct accessing method. It is accurately referred to as 'erasable
read/write' memory. Data in this memory can be read by the CPU directly.
• Read Only Memory (ROM) – A semiconductor memory whose data cannot be erased, or
overwritten. It can only be accessed (read) for use by the CPU
• Record – A collection of all the information pertaining to a particular entity instance.
• Register – A temporary storage unit for quick, direct accessibility of a small amount of data for
processing. Most computers include a set of internal registers that can be accessed more quickly
than the system's main memory
• Remote Server – A network computer that allows a user on the network from a distant location
to access information.
• Response Time – The total time elapsed between submission of command and data to a computer
and getting the result of computation.
• Retrieve – To call up information from memory or storage so that it can be processed in some
way.
• Rich Text Format (RTF) – A type of document formatting which enables special characteristic like
fonts and margins to be included within as ASCII file.
• Router – A network device that enables the network to reroute messages, it receives, that are
intended for other networks. The network with the router receives the message and sends it on
its way exactly as received. In normal operations. they do not store any of the messages that they
pass through.
• Routing – The process of choosing the best path throughout the LAN.
S
• Scanner – An electronic device that uses light-sensing equipment to scan paper images such as
text, photos and illustrations and translate the images into signals that the computer can then
store, modify, or distribute.
• Scroll – To move information horizontally or vertically on a display screen so that one can see
parts of a document that is too wide or too deep to fit entirely on one screen.
• Search Engine – Software that makes it possible to look for and retrieve information on the
Internet, particularly the Web. Some popular search engines are Alta Vista, Google, BIng, Yahoo!,
Web Crawler and Lycos.
• Sector – A section of a recording track on a magnetic disk.
• Serial Operation – A method of data transmission where the data is handled in sequence, one bit
at a time.
• Server – A computer that shares its resources and information with other computers on a
network. This is a mainframe computer that serves the other computers attached to it.
• Shareware – A software that is not free but is available for a free trial period.
• Shell – A shell is an outer layer of a program that provides that user interface or the way of instruct
the computer.
• Simplex – Transmission of data in one direction.
• Socket – A bi-directional pipe for incoming and outgoing data that enables an application program
to access the TCP/IP protocols
[email protected] 23 | P a g e http://www.edutap.co.in
• Software – The set of computer programs, procedure and associated documentation related to
the effective operation. Software includes: operating systems (system software). language
translators (assemblers, interpreters and compilers) and application programs.
• Source Code (Source Program) – A set of computer instructions in hard-copy or stored form.
When written in a language other than machine language, the source code requires translation
by an assembler (or macro assembler), interpreter, or compiler into object code.
• Spam – Irrelevant or unsolicited messages sent over Internet, typically to large numbers of users,
for the purpose of advertising. phishing spreading malwares, etc.
• Spreadsheet – Software that allows one to calculate numbers in a format that is similar to pages
in a conventional ledger.
• Swapping – Storing programs on disk and then transferring these programs into main storage as
and when they are needed.
• Synchronisation – This method ensures that the receiving end can recognise characters in order,
in which the transmitting end sends them in a serial data transmission.
• System Software – A general term for software that supervises, sequences and coordinates
programs. System software may include programs such as: operating systems, assemblers,
interpreters, compilers, software debugging programs, text editors, utilities and peripheral
drivers.
• Super Computer – The largest mainframe computer featuring exceptionally high-speed operation
while manipulating huge amounts of information.
T
• TCP/IP – It stands for Transmission Control Protocol/Internet Protocol. This is a large grouping of
programs and standards that govern how information moves round the Internet.
• Telecommunication – The process of sending and receiving information by means of telephones.
satellites and other devices.
• Telnet – A protocol that allows a computer to connect with a host computer on the Internet.
• Template – A pre-established format for a document, stored in a computer.
• Terabyte (TB) - It's about a trillion bytes. Actually it's 240 or 10095111627776 bytes.
• Teraflop – A measure of a computer's speed. It can be expressed as a trillion floating-point
operations per second.
• Terminal – This is what you look at when you're on the Internet. It's your computer screen.
• Terminal Emulation – This is an application that allows your terminal to act as a dumb terminal.
• Time Sharing – It refers to the allocation of computer resources in a time dependent fashion to
run several programs simultaneously.
• Topology – The structure of the network including physical connection such as wiring schemes
and logical interactions between network devices.
• Touchpad – The device on a laptop computer that takes the place of a mouse.
• Track – A ring on the surface of a magnetic disk.
• Trackball – Input device that controls the position of the cursor on the screen; the unit is mounted
near the keyboard and movement is controlled by moving a ball.
• Transfer Rate – The rate at which data is transmitted tween two computers or other electronic
equipment.
[email protected] 24 | P a g e http://www.edutap.co.in
U
• Uniform Resource Locator (URL) – The specific internet address for a resource such as an
individual or an organisation.
• Universal Serial Bus (UPS) – A common standard for connecting multiple peripherals to a
computer as needed.
• Unix – This is an operating system developed by AT & T. It's a big push that it allows one server to
serve many different end users at one time.
• Upload – The process of transferring information from a computer to a web site (or other remote
location on a network).
• UPS (Universal Power Supply or Uninterruptible Power Supply) – An electrical power supply that
includes a battery to provide enough power to a computer during an outage to back -up data and
properly shut down.
• User - Someone attached to a server or host.
• User-Friendly Program – A software program that has been designed to easily direct the user
through the operation or application of a program. A menu-driven program is considered to be
'user-friendly'.
• Utility – A software program designed to perform a computer system's routine housekeeping
functions, like copying, deleting files and/or providing techniques to simplify the execution of a
program.
V
• Validation - The process of making sure that the forms and documents from a particular
transaction are correct.
• Video Teleconferencing – A remote 'face-to-face chat', when two or more people using a webcam
and an Internet telephone connection chat online. The webcam enables both live voice and video.
• Virus – A piece of computer code designed as a prank or malicious act to spread from one
computer to another by attaching itself to other programs.
• Volatile Memory – A memory whose contents are irretrievably lost when power is removed. If
data in RAM must be saved after power shutdown, back-up in non-volatile memory (magnetic
disk. tape. or CD-R) is essential.
W
• Webcam – A video camera/computer setup that takes live images and sends them to a Web
browser.
• Window – A portion of a computer display used in a graphical interface that enables users to
select commands by pointing to illustrations or symbols with. A 'Windows' is also the name
Microsoft adopted for its popular operating system.
• Word – The set of binary bits handled by a computer as a primary unit of data. Typically, each
location in memory contains one word.
• Word Processor – A computer system or program for setting, editing, revising, correcting, storing
and printing text.
• Word Wide Web (WWW) – A network of servers on the Internet that use hypertext-linked
databases and files. It was developed in 1989 by Tim Berners-Lee, a British computer scientist and
is now the primary platform of the Internet.
[email protected] 25 | P a g e http://www.edutap.co.in
• Workgroup – Persons sharing files and data between themselves.
• Workstation – The work area and/or equipment used for computer operations, including
Computer-Aided Design (CAD). The equipment generally consists of a monitor, keyboard, printer
and/or plotter and other output devices
• WORM (Write-Once, Read-Many) – A high-density optical disk memory available in a variety of
formats from 5.25" to 1.4". The Worm can be programmed once, permanently saving a user's
data. It then becomes an optical disk read-only memory having essentially the same features as a
CD-ROM. Also called CD-R (CD-RECORDABLE).
XYZ
• X-Y Plotter – A computer-driven printing mechanism that draws coordinate points in graph form.
• Zoom – The enlarging or reducing an image displayed on a computer process of proportionately
monitor.
• ZIP – It stands for Zone Information Protocol. It is an achieve file format that supports lossless
data compression. A ZIP file may contain one or more files or directories that may have been
compressed.
• Zombie – A computer that has been hijacked by a cracker without the owner's knowledge and
used to perform malicious tasks on the Internet.
[email protected] 26 | P a g e http://www.edutap.co.in