IT Note
IT Note
Data Processing:
Types of Processing:
1. Batch Processing:
2. Real-Time Processing:
3. Online Processing:
Validation Checks:
Verification Methods:
Hardware:
Input Devices:
1. Keyboard:
2. Pointing Devices:
3. Scanners:
Output Devices:
1. Monitors:
2. Printers:
Storage Devices:
1. Primary Storage:
2. Secondary Storage:
3. Cloud Storage:
Software:
1. System Software:
2. Application Software:
Monitoring:
Patient Monitoring:
Weather Monitoring:
Control:
Algorithms:
Characteristics:
Example Algorithm:
3. Display area.
Flowcharts:
Symbols:
o Oval: Start/End.
o Rectangle: Process.
o Diamond: Decision.
1. Start.
5. No → Output "Odd."
6. End.
5. e-Security
Advanced Threats:
1. Zero-Day Exploits:
2. Keyloggers:
3. Man-in-the-Middle Attacks:
Encryption Types:
1. Symmetric Encryption:
2. Asymmetric Encryption:
Firewalls:
Types:
Causes:
1. Infrastructure Inequality:
2. Device Affordability:
3. Language Barriers:
Bridging Solutions:
Detailed Examples:
2. Agricultural Use:
8. Modelling
Applications:
1. Economic Models:
2. Weather Models:
3. Engineering Models:
9. IT in Society
2. Digital Piracy:
Blockchain:
1. Cryptocurrency:
2. Smart Contracts:
1. Applications:
Detailed Tools:
1. Gantt Charts:
2. Agile Tools:
Phases in Detail:
1. Analysis:
2. Design:
3. Testing:
4. Maintenance: