0% found this document useful (0 votes)
31 views21 pages

Computer Ebook New

Uploaded by

soumriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views21 pages

Computer Ebook New

Uploaded by

soumriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

JKSSB Study Fast (Iqbal Sir)

ir)
lS
ba
(Iq
st
Fa
y
ud
St
B
SS
JK
JKSSB Study Fast (Iqbal Sir)

Computer
Important Points
 Computer - Latin word - Computare -means to Calculate.

 Father of Computer - Babbage. (Difference Engine 1822). -

 Father of Modern Computer - Alan Turing.

 First Computer of India - Sidhartha.

 First Super computer of india - PARAM-8000.

ir)
 First Super computer of World - Cray-1.

lS
ba
Features of Computer :- The key features of computer are as follows
(Iq

1. Speed :- The computer can process data very fast at the rate of millions of instructions per
st
Fa

second.
y

2. Accuracy :- Computers provide a high degree of accuracy. They respond to the user as per
ud

the input instructions.


St
B

3. Storage Capacity :- Computers are store huge amounts of data which depends on the
SS

capacity of the hard disk.


JK

4. Versatility :- Computers can do types of work simultaneously. They can perform multiple
tasks at the same time.

5. Automation :- Once the instruction to do any work is given to the computer, the computer
does its work automatically by itself.

6. Diligence :- Unlike human beings, a Computer is free from monotony, tiredness, lack of
concentration, etc. and can work for hours without creating any errors.

7. Secrecy :- Leakage of information is reduced by creating a login system with password


protection.

8. Reliability :- Computers are more reliable than human beings. Computers always produce
exact results. The possibility of errors occur only if the input is wrong, i.e. the computers never
make mistakes of their own accord. (GIGO = Garbage In Garbage Out)

9. Plug and Play :- Computers have the ability to automatically configure a new hardware and
software component.
JKSSB Study Fast (Iqbal Sir)

ir)
lS
ba
(Iq
st
Fa
y
ud
St
B
SS

---------
JK

-----
JKSSB Study Fast (Iqbal Sir)

--------------------------------

ir)
lS
ba
(Iq

Computer Architecture/ Components Computer :-


st
Fa

It was introduced in 1970 by Von Nauman. • Input - Processing - Output - Storage { IPOS}
y
ud

CPU (Central Processing Unit) :- Also known as Brain of computer. CPU have three parts as
St

below:
B
SS

1. ALU (Arthematic Logic Unit). 2. Control Unit. 3. Register.


JK

1. ALU (Arithmetic logic unit):- Consists of two subsections namely:

• Arithmetic section :- Performs arithmetic operations like addition, substraction, multiplication,


and division.

• Logic Section: Performs logic operations such as comparing, selecting, matching, and
merging of data.

2. Control Unit (CU) :- CU coordinates with the input and output devices of a computer. It directs
the computer to carry out stored program instructions by communicating with the ALU and
Register . It organises the processing of data and instructions.The basic function control unit is
to fetch the instruction stored in the main memory, identify the operations and the devices
involved in it and accordingly generate control signals.
3. Registers :- These are used to quickly accept, store and transfer the data and instructions
that are being used immediately by the CPU.These rigisters are top of the memory
hierarchy.(Fastest Memory).
JKSSB Study Fast (Iqbal Sir)

Computer Memory
Memory is primarily of three types −
1. Primary Memory/Main Memory
2. Secondary Memory
3. Cache Memory
1. Primary Memory (Main Memory) :-
Primary memory holds only those data and instructions on which the computer is currently
working. It has a limited capacity and data is lost when power is switched off. It is generally
made up of semiconductor device. These memories are not as fast as registers. The data and
instruction required to be processed resides in the main memory. It is divided into two
subcategories RAM and ROM.

A. RAM (Random Access Memory) :- It is also known as read/write memory that allows CPU to
read as well as write data and instructions into it. RAM (Random Access Memory) is used for

ir)
the temporary storage of input data, output data and intermediate results.

lS
There are two categories of RAM :
ba
(Iq
(a) Dynamic RAM (DRAM):- It is made up of memory cells where each cell is composed of one
st

capacitor and one transistor. DRAM must be refreshed continually to store information. DRAM
Fa

is slower, less expensive and occupies less space on the computer's motherboard.
y
ud

(b) Static RAM (SRAM):- It retains the data as long as power is provided to the memory chip. It
St

need not be refreshed periodically. SRAM uses multiple transistors for each memory cell. It
does not use capacitor. SRAM is often used as cache memory due to its high speed. SRAM is
B
SS

more expensive than DRAM.


JK

B. ROM (Read Only Memory) :- It is non-volatile memory or permanent storage. It does not lose
its content when the power is switched OFF. ROM has only read capability, no write capability.

There are three categories of ROM as follow

(a) Programmable ROM (PROM):- It is also non- volatile in nature. Once a PROM has been
programmed, its contents can never be changed.

(b) Erasable Programmable ROM (EPROM) :- It can be erased by exposure to strong ultraviolet
light, then rewritten.

(c) Electrically Erasable Programmable ROM (EEPROM) :- It can be erased electrically. Itis now
commonly used for holding BIOS.

2. Secondary Memory :-
This type of memory is also known as external memory or non-volatile. It is slower than the
main memory. These are used for storing data/information permanently. CPU directly does not
JKSSB Study Fast (Iqbal Sir)

access these memories, instead they are accessed via input-output routines. The contents of
secondary memories are first transferred to the main memory, and then the CPU can access it.
For example, disk, CD-ROM, DVD, etc.

Types of Secondary Memory

1. Magnetics Memory:- Magnetic tapes, Magnetic Disks, Hard Disk, Floppy Disks.

2. Optical Memory:- Optical Disks like CD, DVD, CD-ROM, DVD-ROM, CD-RW(CD- Rewritable), CD-
R (CD-Recordable) WORM (Write Once Read Many), Blue-ray Disks.

3. Solid State Storage : Pendrive (Flash drive), memory cards.

3. Cache Memory :- It is a very high speed semiconductor memory which can speed up the CPU.
It acts as a buffer between the CPU and the main memory. It is used to hold those parts of data
and program which are most frequently used by the CPU. The parts of data and programs are
transferred from the disk to cache memory by the operating system, from where the CPU can

ir)
access them.

lS
Input Devices ba
(Iq
st

 Keyboard  Microphone
Fa

 Mouse  Magnetic Ink Card Reader(MICR)


y
ud

 Joy Stick  Optical Character Reader(OCR)


St

 Light pen  Bar Code Reader


B
SS

 Track Ball  Optical Mark Reader(OMR)


JK

 Scanner  Quick response (QR)


 Graphic Tablet
Keyboard :- Discovered by Christopher Lantham Sholes.

• QWERTY key Layout [Total-104 keys] :- Consists of the following Keys: Alphabetical keys (A-Z,
a-z), Number keys (0-9), Function keys (F1 to F12), modifier keys (Ctrl, Alt, Shift), Toggle keys
(Caps lock, Num-lock, Scroll lock) etc.

• Concept Keyboard - Food Restaurant & Numeric keyboard - ATM

• Caps Lock & Norn Lock = Toggle key [ because when they pressed they change).

• Caps Lock key: To enable or disable Uppercase [capital letter] & Num Lock key: To enable or
disable Numeric keypad.

• Escape key: (Esc]: It allows users to cancel or about operation.

• Backspace key: Used to Erase anything typed.(Or Delete one letter left side)
JKSSB Study Fast (Iqbal Sir)

• Delete key: Used to Erase information from computer Memory & from Screen. (Or Delete one
letter on the right side)

Mouse :- Discovered by Douglas Engelbert. Two types of mouses are Optical mouse and
mechanical mouse.

• Left Click:- Left mouse button is used for object Selecting & double clicking

• Right click: Used to open the pop-up menu.

• R. Double click: Used to open objects (such as file, icon).Stylus:- It is a pen-shaped input
device used to draw on the screen of a graphic tablet or device. Initially it was just used for
graphic tablets & PDAs, but Now it has become popular on mobile.

Graphic tablet : A flat rectangular pad which can be drawn on with a special pen called Stylus.
Whatever is drawn on it seen on •Computer Screen. It mainly used for CAD (computer aided
design)

ir)
Joystick: It is a pointing device like Mouse & trackball. It is a popular device for gaming. • Uses

lS
in Video games, Aeroplane Stimulators, Industrial Machinery [Cranes] Track ball: It is similar to
mouse but a ball is on top of this. ba
(Iq
st

Scanners :- Used to convert images or text on paper into a digital Format that can be used by
Fa

the computer: Types of Scanners :- • Flatbed , Handheld, Sheet-fed Scanners.


y

Barcode Reader :- [Point of Sale] (POS). :- is able to scan and decode barcodes.
ud
St

OMR (Optical Mark Reader):- It is used to detect marks on paper.


B
SS

MICR (Magnetic Ink Character Recognition) : It examines character Shape in the matrix form.
Characters are printed using special Ink, which Contains Iron particles that can be magnetised.
JK

Used in "Bank Cheques".

OCR (Optical Character Recognition) :- It is a technique for scanning of printed pages,


translating it than using OCR software to recognise the image as ASCII [American Standard
Code for Information Interchange) text that is editable. Used for acquiring textual data from
image.
QR (Quick response) :- contains a matrix of code
• Other input Devices: Webcam, Biometric Sensor, Touch Screen, Microphone.

Output Devices
 Monitor.  Both Input-Output Devices:
 Printer.  Modems
 Headphones.  Network cards
 Speakers.  Touch screen
JKSSB Study Fast (Iqbal Sir)
 Projector.  Headsets
 GPS  Facsimile (FAX)
 Audio cards/sound cards.
Monitor :- (Visual Display Unit)(VDU) :- A monitor is of two kinds monochrome display (only one
color) and another & colour display monitor (can display 254 colours). The image is created by
a configuration of dots also k/as "Pixels".

Types of Monitor :

1. Cathode Ray Tube : It is a Rectangular shaped monitor . CRT has Vacuum tubes.

2. Liquid Crystal Display (LCD) :- These are laptops and notepad sized PC's (Non-Emission
displays)

3. Light Emitted Diode (LED): It emits light when electric current is passed (Emission Display)

4. Thin Film Transister (TFT): It is an active-matrix LCD.

ir)
lS
Printers :- Speed measures in Characters per second, Lines per second, Pages per second. •
Resolution of Printer-measures in -Dots Per Inch (DPI). ba
(Iq
Types of Printers:
st
Fa

1. Impact Printers: It strikes paper & ribbon together to form a character. It is like a typewriter. It
uses pins or hammers that press an Inked ribbon against the paper. There are 4-types.
y
ud

a) Dot Matrix Printer (Pin Printer): It forms characters using rows of pins. It can print one
St

character at a time.
B
SS

b) Daisy wheel Printer : Here characters are fully formed on Petals (like Typewritten)
JK

c) Line Printer: Capable of Printing an entire line of text at once.

d) Drum Printer: An old line printer technology.

2. Non-Import Printer :- They don't hit a ribbon to print. They use electrostatic & Chemical inkjet
technology. It is of 4 types:

a) Laser Printer, b) Inkjet Printer , c) Thermal Printer, d) Electromagnetic.

Plotters :- These are used to print out huge graphs, designs, and other types of paper-based
documents, such as engineering drawings, business charts, construction maps, and
architectural blueprints.

Computer Ports :-

1. Parallel Port :- It is an interface for connecting eight or more data wires. The data flows
through the eight wires simultaneously. They can transmit eight bits of data in parallel. As
result, parallel ports provide high speed data transmission. Parallel port is used to connect
printer to the computer.
JKSSB Study Fast (Iqbal Sir)

2. Serial Port :- It transmits one bit of data through a single wire. Since, data is transmitted
serially as single bit. It provides slow speed data transmission. It is used to connect external
modems, plotters, barcode reader, etc.

3. Universal Serial Bus (USB):- It is a common and popular external port available with
computers. Normally, two to four USB ports are provided on a PC. USB also has the plug and
play feature, which allows devices ready to be run.
4. Firewire:- Fastest Speed. (Peer to peer protocol)
5. PS/2 (Personal system/2):- Connects Mouse/Keyboard.

ComputerSoftware
SytemSoftware ApplicationSoftware
A.SystemManagementProgram:- A.GeneralPurpose
 OperatingSystem  WordProcessor
 DeviceDrivers  Spreadsheet
 SystemUtility.  Powerpointetc.

ir)
B.SystemDevelopmentProgram:- B.SpecialPurpose

lS
 Programinglanguages  ReservationSystem
 LanguageTranslators  ba
AttendenceSystem
(Iq
 Linker&Loader.  BillingSystemetc
st
Fa

Operating System :- It consists of programs which control, cordinate and supervise


y
ud

the activities of various components of Computer.


St

• It provides the interface b/w Hardware & User. Eg. MS.DOS, Windows XP/2000/98, Unix, Linux.
B

etc.
SS
JK

• Linux is an operating system. Linux was created in 1991 by Linus Torvalds and the Free
Software Foundation (FSF). It is an open-source Unix-like operating system. An operating
system helps users interact with the computer.

• BIOS (Basic Input/output system) - Important for booting. It lies in EEPROM (ROM)

• Cold Booting :- If the computer is in "off state" and we boot by switching on.

• Warm Booting: If computer is on & we restart it.

Device Drivers:- Making device functional, it act like interface between Device & User.
Important for working of peripheral devices (monitor, keyboard etc.)

Language Translator :-
1. Assembler :- Convert Assembly language into Machine Language.
JKSSB Study Fast (Iqbal Sir)

2. Compilor :- Convert High level language into Machine language ( at Once ).

3. Interpreter :- Convert High level language into Machine language (Line by Line)

Programming Languages :-
FORTRAN [Formula Translation] - IBM
ALGOL [Algorithmic language] - European Scientists
LISP [List Processing] - John McCarthy
COBOL [Common Business Oriented Lang.]. - Grace Hopper
PROLOG [Programming Logic] - by Alain Colmerauer - Used for Artificial Intelligence.
BASIC [Beginners's All Purpose Symbolic Instruction Code] - Kemney
PASCAL [Programming Language] - Niklaus Wirth

ir)
C - Dennis Ritchie

lS
C++ - Bjarne Strouptrup
ba
(Iq
Linker :- A linker is an important utility program that takes the object files, produced by the
st

Assembler & Compiler and other code to join them into a single executable file.
Fa
y

Loader:- A loader is a vital component of an operating system that is accountable for


ud
St

loading programs and libraries.


B

• The Linker is used during the compilation process to link object files into a single executable
SS

file, while the Loader is used at runtime to load the executable file into memory and prepare it
JK

for execution.

Open Source Technology


🔍 Father = Richard Stalman . 🔍 Pioneer = Linus Torvalds.
1. Open Source Software:- Software whose Source Code is Freely available to modify &
distribute among others.

2. Closed Source Software :- (Properiaty Software) :- Software that holds the source code
safe & encrypted. Users can't modify or delete part of the code.
• Free Software Foundation (Non-profit organization): Founded by - Richard Stallman (1985).
• Open Source Initiative (1998): Started by- Raymond & Bruce.
• Infoworld Bossie Award:- Best Open source software award. In 2021 it was given to 25 OSS.
JKSSB Study Fast (Iqbal Sir)

Popular Open Source Softwares :-


Linux - Operating System. Android - Mobile OS.
Word Press - for creating websites. Freemind
Mozilla Firefox - Browser. Blender
Zozilla Thunderbird - E-mail Handbrake
Filezila Magento
Python - OS Language Ubunto
Apache- Web server. Open office
Pidgin - Message Tool. LibreOffice

Debugging :- is the process of finding and correcting errors or defects (Bug) in software
or systems to prevent improper operation.

ir)
Computer Error

lS
ba
1. Synthetic Error:- It occurs when we Violate any grammatical rule of programming
(Iq
Language.
st
Fa

2. Logical Error:- It occurs in the Output of Programs. Its presence leads to undesired/
incorrect Output. qbal Si
y
ud

3. Runtime Error:- It occurs due to some illigal Operation performed in the program
St
B

Deadlock :- is a situation where a computer process waits for a resource which is being
SS

held by another process or a situation in which two programs sharing the same resource are
JK

preventing each other from accessing the resource.

• The minimum number of threads or processes for a deadlock situation is 2. The OS detects
the deadlocks with the help of the Resource Allocation graph.

• Deadlock detection is supported only in Windows XP and later versions of windows.

M.S. Word {Word processing software }


How to Start M.S.Word:- 1. Start Menu - All Program - MS Office - MS Word

MS. Word MS Excel MS PowerPoint MS Access

File Extensions .docx .xlxs .pptx .accdb

Document Document 1 Book1 Presentation 1 Table 1


Name
JKSSB Study Fast (Iqbal Sir)

Typing Mistakes
1. Green wavy underline:- Grammatical Error.
2. Red wavy underline :- Misspell.
3. Blue wavy underline :- Wrong word used but spelled right.
Important Shortcut Keys
 Ctrl+A = All Select  Ctrl+V = Paste
 Ctrl+B = Bold  Ctrl+W = Close
 Ctrl+C = Copy  Ctrl+X = Cut
 Ctrl+I = Italic  Ctrl+Y = Redo
 Ctrl+K = Hyperlink  Ctrl+Z = Undo
 Ctrl+N = New Document Text Alignment
 Ctrl+O = Open  Ctrl+L = Align Text Left
 Ctrl+P = Print  Ctrl+R = Align Text To Right
 Ctrl+S = Save  Ctrl+E = Align Text To Center

ir)
 Ctrl+U = Underline  Ctrl+J = Justify

lS
ba
(Iq
 Copyright © - Ctrl + Alt + C Function Keys
st

 Rupee symbol - Ctrl + Alt + 4 (or Ctrl+Alt+R) F1 - Help


Fa

 Superscript - Ctrl + Shift + + F2 - Rename


y
ud

 Subscript - Ctrl + = F3 - Find file and folder


St

 Current Time = Ctrl + Shift + semi-colon (;) F4 - Shut down/Close


B
SS

 Current Date = Ctrl + semi-colon (;) F5 - Refresh


JK

 For Screenshot = Windows key + Print Screen F6 - Highlight web address


key.
F7 - Spell/Grammar Check
 Increase the font size by 1 point = Ctrl + ]
F8 - Boot Manu
 Decrease the font size by 1 point -- Ctrl + [
F9 - Remove Selected Items
 Delete permanently text, file etc - Shift + Delete
F10 - Action Menu
 Reboot/Restart Ctrl + Alt + Del
F11 - Full screen mode
 Save - F12 , Ctrl+S or Shift + F12
F12 - Save as
 Print Preview - Ctrl + F2
 Ctrl+Tab: Switch between different open
presentations
MS Word Terminologies :-

Thesaurus- A feature that provides synonyms or alternative words for chosen words.

Page Break:- The spot in a document where one page ends and the other starts.
JKSSB Study Fast (Iqbal Sir)

Indentation :- It denotes the distance text boundaries and page margins. It offers three types of
negative indentation. positive, hanging and negative indent.

Page Orientation :- Two types of page orientation 1. Portrait - vertically oriented and 2.
Landscape - horizontally oriented.

Gutter Margin:- (Binding Area) A gutter margin adds extra space to the side, top margin, or
inside margins of a document you plan to bind.

Drop Cap :- A drop cap (dropped capital) is a large capital letter used as a decorative element at
the beginning of a paragraph or section. The size of a drop Caps by default 3 lines and
Maximum 10 lines.

Footer- A feature that allows the text/graphics that are marked on every page or segment,
regularly at the bottom yet can be anywhere on a page.

Header- A feature that allows text/graphics that are imprinted on every page/section, usually at
the top yet can be anywhere on a page.

ir)
lS
Endnotes- Notes or references that resemble at the end of the document.

ba
Footnotes- Comments or references that appear at the bottom of each page.
(Iq

Indent- A feature that allows setting a temporary left or right margin for paragraph line.
st
Fa

Font Size: Range Max. -Min. 8-72 (by default - 11)


y
ud

MS Excel :- Spreadsheet
St
B
SS

 Workbook: Collection of worksheets By Default: 3 worksheet.


JK

 Cell:- Intersection of Row & Column.


 Action Cell : (Current/Working Cell) (cell currently selected)
 Columns = Letters (ABC....) &Rows = Number (123.....)
 Total No. Rows = 1048576 &Total No. Of Columns = 16,384.
 Formula (= is equal to sign is used)
 Function:- Predefined formula in MS Excel is called Functions. There are 5 types of
functions in MS Excel eg.
=SUM (A1:A4)
=AVERAGE (B2:B17)
=COUNT (A2:A18)
=MAX (B8:B14)
=MIN (A1:A17)
• Charts and Graphs: Users can create visually appealing charts and graphs from their data to
illustrate trends, comparisons, and patterns. Excel offers various chart types, including bar
JKSSB Study Fast (Iqbal Sir)

charts, line charts, pie charts, and more.

Shortcut Keys

• F2 - Edit the selected cell Shift+F5. - Bring up search box


• F5 - Go to a specific cell Ctrl+5 - Strike through highlighted
selection
• F7 - Spell check selected
Ctrl + F9 - Minimize current workbook
• F11 - Create chart
Ctrl + F10 - Maximize currently selected
• Alt+Shift+F1 - Insert the new workbook
worksheet
Ctrl + Space - Select the entire column
• Shift+F3 - Open the excel formula
Shift + SpaceSelect the entire row

MS PowerPoint :- Presentation Software.

ir)
Terms in PowerPoint

lS
ba
1. AutoContent Wizard:- Quickest way to Creat PowerPoint Presentation.
(Iq
2. Template:- (Presentation design) A file which contains readymade styles.
st
Fa

3. Slide Transition: A special effect used to introduce slide in a slide show. It is how one slide
removed from the screen and the next slide is displayed during a presentation.
y
ud

4. Animation :- Special effects used in Slide.


St
B

5. Rehersal :- Custom Timing for slide in a presentation.


SS

6. Default Page Orientation in MS PowerPoint - Landscape


JK

7. Motion Path:- Method of moving objects/items on Slide.

8. OLE = Object Linking and Embedding.

PowerPoint Views

1. Normal View :- Default or Actual Screen displayed.

2. Slide Sorter View: All Slides at one

3. Slide Show View :- Full Screen view to deliver resentation to audience.

4. Outline view :- Displays your presentation as an outline made up of the titles and main text
from each slide.

Image File Extensions


1. GIF (gif)- Graphic Interchange Format
2. JPEG (.jpeg/.jpg): Joint Photographic Expert Group.
JKSSB Study Fast (Iqbal Sir)
3. BMP (.bmp):- Bitmap image file.
4. PNG (.png) Portable Network
Audio/Music File Extensions
1. WAV (.wav) :- Wave form audio file 2. MIDI (•midi or •mid ) Musical Instrument Digital.
Shortcut Keys
 F5. - View the Slide Show.
 Ctrl+M - New Blank Slide
 Ctrl + N - New Blank Presentation
 S - Stop the slide show press S again to restart the slide show.
 Esc - End the slide show.
 Placeholder: The term “placeholder” is used to identify the containers on a slide which are
shown with a dotted external border. Placeholders are specifically used to position different

ir)
types of content on the slide and are preformatted for you to provide consistent formatting
between each slide.

lS
ba
Outline pane: The Outline pane appears at the left, showing only the text in your presentation.
(Iq
Slide pane: Slide pane contains the current slide in your presentation. You can use the vertical
st

scroll bar to view other slides in the presentation. Notes pane is located below the slide pane
Fa

and is used to type reference notes.


y
ud

Microsoft Access
St
B

A database is a collection of logically related and similar data. Database stores similar kind of
SS

data for a specific purpose that is organised in such a manner that any information can be
JK

retrieved from it, when needed. Microsoft Access is an application which allows the creating of
databases. Microsoft Access is a Relational Database Management System (RDBMS).

• Column = Field / Attributes & Rows = records/Tuples

Internet (International Network/Network of Networks)


Father of Internet- Vint Curf.
First Network - ARPANET (Advanced Reasearch Project Agency Network) (1969).
Every Computer on internet is identified by a unique IP address.
• IP Address:- It is a unique set of four numbers (0-256)

like -{110.22.33.112}.

IP address is of two types 1. IPV4 = 32 bits. 2. IPV6 = 128 bits

• Uniform Resource Locator (URL) :- URL is the address of a document you'll find on the WWW.
JKSSB Study Fast (Iqbal Sir)

• The elements in a URL:


Protocol://server's address/filename
Example: https://www.google.com.index.html
Domain Names
.in - stands for India (country name)
.gov - indicates government agencies
.net - network organisations
.org - non-profit organisations
.edu - educational organisations
.com - commercial organisations
.mil - military or defence
• WWW (World wide Web) by- Tim Berner's Lee (1989).The World Wide Web is a system of
interlinked hypertext documents accessed via the Internet. With a web browser one can view
web pages that may contain text, images, videos, and other multimedia and navigate between

ir)
lS
them via hyperlinks.

ba
• Web Browsers :- Firefox, Google Chrome, Microsoft edge, Apple saffari, Opera, Brave ,Vivaldi
(Iq
etc.
st
Fa

• Search Engines :- Google, AltaVista, Yahoo, Hotbot, Lycos, Excite, WebCrawler etc.
y

Types of Communication
ud
St

1. Simplex Channel :- In this channel, the flow of data is always in one direction, with no
B

capability to support response in other direction. This communication is unidirectional. Only


SS

one of the communicating devices and the other can only e.g. Radio, Television, information etc.
JK

2. Half Duplex channel:- In this channel, the data can flow in directions, but not at a same time.
Wh one device transmits other can only receive at informatioir) that point of time. e.g. Walkie
Talkie.

3. Full Duplex Channel :- In this channel, the flow of data is in both directions at a time, i.e. both
stations can transmit and receive information simultaneously. e.g. Wireless handset (mobile
phone).

Networking Devices
Modem: Modem stands for Modulator- Demodulator. It is used to connect computers for
communication via telephone lines.

Hub: It just acts like a connector of several computers i.e. simply connects all the devices on its
ports together. It broadcasts all the data packets arriving at it.
JKSSB Study Fast (Iqbal Sir)

Switch: It is used for dividing a network into segments called subnets. It provides filtering of
data packets and prevents network traffic also. Repeater: It is used to amplify (multiply) a
signal that has lost its original strength so as to enable them to travel long distances.

Router: It is used to connect different networks that have different architectures and protocols.
It sends the data packets to desired destination by choosing the best path available thus
reducing network traffic. It routes the data packets using the routing table that contains all the
Information regarding all known network addresses, possible paths and cost of transmission
over them.

Gateway: It can be used to connect two different networks having different architectures,
environment and even models. It converts the data packets in form that is suitable to the
destination application. The two different networks may differ in types of communication
protocols they use, language, data formats etc.

Bridge: They are used two connect two LANS with the same standard but using different types

ir)
lS
of cables. It provides an intelligent connection by allowing only desired messages to cross the
bridge thus improving performance.
ba
(Iq
Network Topology
st
Fa

Topology is the geometric arrangement of a computer system. Each computer system in a


y

topology is known as a node.


ud
St

• Network topology is determined only by the configuration of connections between nodes.


B
SS

1. Bus Topology: A bus topology is such that there is a single line to which all nodes are
connected and the nodes connect only to this bus.
JK

2. Mesh Topology: This type of network topology contains at least two nodes with two or more
paths between them.

3. Ring Topology: In this network topology, every node has exactly two branches connected to it.
The ring is broken and cannot work if one of the nodes on the ring fails.

4. Star Topology: In this network topology, the peripheral nodes are connected to a central node,
which rebroadcasts all transmissions received from any peripheral node to all peripheral nodes
on the network, including the originating node.

5. Tree Topology: This is a network topology in which nodes' are arranged as a tree. The
function of the central node in this topology may be distributed.

Types of Network
 PAN - Personal Area Network eg. Bluetooth
 LAN - Local Area Network eg. Ethernet, Wifi.
JKSSB Study Fast (Iqbal Sir)
 MAN - Metropolitan Area Network eg. Cable tv network
 WAN - Wide Area Network. Eg. Internet

PDF (Portable Document Format}• Developed by: Adobe (in 1990s)


• Adobe Acrobat Reader is a OSS for reading PDFs. It is free and available for Windows, macOS,
iOS & Android.
• In 1991 - Adobe co founder Dr. John Warnock the paper to digital Revolution" Project.
with the idea is called Camelot Project • Latest Version is " Acrobat (version 15.0).
• By 1992 - Camelot had developed into PDF. • Before 2008 PDF was a Proprietary Format
controlled by Adobe but after 1,july 2008 it became Open Standard.

E-mail :- :-Ray Tomlinson 1971 (1st message sent by him was QWERTYUIOP.
• Name@website.com eg. jkssbstudyfast@gmail.com
E-mail supports-

ir)
 POP3 (Post office protocol 3) for recieving mails.

lS
 SMTP (Simple Mail Transfer Protocol) For sending mails/messages.
 ba
IMAP (Internet Messaging Access Protocol). - for. Storing messages.
(Iq
 Outlook Express - E-mail Internet Explorer.
st
Fa

VIRUS:- A computer virus is a type of program that, when executed, replicates itself
y
ud

by modifying other computer programs and inserting its own code.


St

VIRUS = Vital Information Resources Under Siege.


B
SS

First ever Virus Creeper (1971). First PC Book Sector Virus Brain (1986)
JK

Types of computer viruses:

Boot Sector Virus :- It affects the boot sector. This virus enters ,the system when computers
are booted from floppy disks. Nowadays, these viruses can even penetrate in forms of physical
media such as external hard drives or USBs. Brain is the first PC Boot sect Post

Direct Action Virus :- When a virus connects itself directly to a .exe or .com file and penetrates
the device while its execution is named a Direct Action Virus. It is also known as a Non-
Resident Virus as it does not install itself.

Resident Virus :- Unlike Direct Action Virus this type of virus installs itself in the primary
memory of the computer and then infects other files and programs. A resident virus can affect
anytime when an operating system loads; heading towards file and program corruption. These
viruses are hidden in the memory and are hard to find and removed from the system.

Multipartite Virus :- It can infect and spread in various ways. It can infect multiple parts of the
system including program files, memory files, and boot sector.
JKSSB Study Fast (Iqbal Sir)

Overwrite Virus. :- One of the most damaging viruses, the overwrite virus can fully remove the
existing program and substitute it with the malicious code by overwriting it. These types of
viruses generally spread through emails and are difficult to trace, to remove the virus one needs
to delete the infected file.

Polymorphic Virus :- A polymorphic virus is difficult to track or remove as these viruses alter
their code each time an infected file is executed. Spread through spam and infected websites.

Spacefiller virus :- As the name implies, this type of virus fills in the empty spaces of a file with
viruses without affecting the size of the file such that the user cannot detect it easily. It is also
recognized as a "cavity virus".

Macro Virus :- It infects files that are created using certain applications or programs that
contain macros, e.g. Melissa.A

Malware :- Malicious Software

Trojan Horse: It is non-self replicating" type of Malware which faciliate unathorised access to

ir)
user's computer. [By Falsifying). eg. Beart, Sub 7 Zeus. Spyware: It is a program which is

lS
installed on a Computer to spy on the system owner's activities & collects all the information eg
ba
keylogger. Worms. It is a "standalone Malware" that replicate spread. 28. Morris. to
(Iq
Ransomware: It holds computer system captive while nonding Ransom.
st

Adware: Advertising-supported Software es pop-up adds.


Fa

Phishing :- Acquired Sensitive information such a Passward, Creadit card et by falsifying


y
ud

Spooking :- Access the unathorised data


St

Salami Technique :- Small amount money from large No. of accounts. es. Rs.1. from.
B
SS

Hacking :- Introducing into someone's else's computer / Network.


JK

Spam: Unsolicited bulk Messages in the form of E-mail [Junk e-mail ].


Anti-virus :- It is a program /utility software which protect your PC/Laptops from Malvares.

Popular Anti Viruses :-


Avast AVG Quick Heal K7 Kaspersky.
Mac Afee. Norton. Bit defender Trend Macko
Computer Abbreviations

ARPANET - Advanced Research Projects JPEG. -Joint Photographic Expert Group


Agency Network LCD - Liquid Crystal Display
ASCII - American Standard Code for LED -Light Emitting Diode
Information Interchange MIPS - Million Instructions Per Second
BCD - Binary Coded Decimal MIME - Multipurpose Internet Mail
BMP - Bitmap Extensions
BCC - Blind Carbon Copy MPEG - Motion Picture Experts Group
JKSSB Study Fast (Iqbal Sir)

CAD - Computer Aided Design NIC - Network Interface Card


CD - Compact Disk OSI - Open Systems Interconnection
CD RW - Compact Disk Rewritable PDF - Portable Document Format
DOS. - Disk Operating System PNG - Portable Network Graphics
DVD - Digital Versatile Disk PDA - Personal Digital Assistant
DHTML - Dynamics Hyper Text Markup RDBMS - Relational Data Base
Language Management System -
DNS - Domain Name System SMPS - Switch Mode Power Supply
DPI - Dots Per Inch SMTP - Simple Mail Transfer Protocol
ENIAC. - Electronics Numerical Integrator SIM - Subscriber Identity Module
And Calculator URL - Uniform Resource Locator
FDD. - Floppy Disk Drive USB - Universal Serial Bus
FTP - File Transfer Protocol UNIVAC - Universal Automatic Computer.
FLOPS - Floating Point Operations Per UPS - Uninterruptible Power Supply

ir)
Second VIRUS - Vital Information Resource Under

lS
GIF - Graphic Interchangeable Format. Seized
GUI - Graphical User Interface ba
VGA - Video Graphics Array
(Iq
GIGO - Garbage In Garbage Out VOIP - Voice Over Internet Protocol
st

HTTP -Hyper Text Transfer Protocol WAN - Wide Area Network


Fa

HTTPS - Hyper Text Transfer Protocol WORM - Write Once Read Many
y

Secure WWW - World Wide Web


ud

HTML - Hyper Text Markup Language XML - Extensible Markup Language


St

IMAP - Internet Message Access Protocol XHTML - Extensible Hyper Text Markup
B
SS

ISP - Internet Service Provider Language


IP - Internet Protocol
JK

Role of Information Technology (IT) in Governance:-


E- governance :- Also known as Electronic governance, application of information and
communication technology (ICT) for delivering government services exchange of information,
communication transactions and integration of various systems and services.
ICT stands for Information and Communication Technology. The term gives a broader meaning
to Information Technology (IT).
IT refers to all communication technologies that are the tools to access, retrieve, store,
transmit and modify information digitally(study or use of electronic equipment).
Objective To provide a SMART Government
S:The use of ICT brings Simplicity in governance.
M : It brings morality to governance.
A : It makes the Government accountable
R : Due to increased communication speeds, the Government becomes responsive and
increases access to information to make a responsible Government.
T:Government becomes transparent.
JKSSB Study Fast (Iqbal Sir)

Advantages of e-governance :-
1) ICT provides efficient storing and instantaneous transmission of information faster than the
earlier manual systems.
2) E-Governance brings public services to citizens with Convenience.
3) More efficient government management.
4) Cost Reduction
5) Productivity increase
6) Better transparency as it allows the public to be informed on government decisions and
policies
7) Accountability
8) Re-structuring of administrative processes 9) Growth in GDP
10) The efficiency of the current system as it would have saved money and time.
Challenges of e-governance
1. Knowledge of Technology Literacy of the users and the i to use the computer.
2. Resistance to change People face the hesitation towards a
3. Digital Divide Separation between those that have access to Internet technology resources &

ir)
those who don't due to poverty & lack of awareness.

lS
4. Trust. 5. Privacy and Security
ba
(Iq
st
Fa
y
ud
St
B
SS
JK

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy