He Mantra
He Mantra
.co
ra
nt
Ma
He
HeMantra EduTech
Computer Awareness
Click here 1
m
.co
ra
nt
Ma
He
Introduction of Computer
Click here 2
Functioning of a Computer
A computer operates on the Input-Process-Output model:
m
Features of a Computer
.co
● Speed: Processes millions of instructions per second.
● Automation: Performs tasks without manual intervention.
● Accuracy: Minimal errors unless input is incorrect.
● Versatility: Can perform multiple tasks simultaneously.
ra
● Storage: Large memory for storing vast amounts of data.
● Connectivity: Can connect to networks and the internet.
History of Computers
nt
● Ancient Calculators: Abacus, Pascal’s calculator.
Ma
Generations of Computers
He
1. First Generation (1940-1956): Used vacuum tubes, slow and bulky (e.g., ENIAC).
2. Second Generation (1956-1963): Used transistors, smaller and faster.
3. Third Generation (1964-1971): Used ICs (Integrated Circuits), improved efficiency.
4. Fourth Generation (1971-Present): Microprocessors, personal computers emerged.
5. Fifth Generation (Future): AI, quantum computing advancements.
Click here 3
Classification of Computers
● Based on Size: Supercomputer, Mainframe, Minicomputer, Microcomputer.
● Based on Purpose: General-purpose (PCs, laptops) & Special-purpose (ATMs, medical devices).
● Based on Processing: Analog, Digital, Hybrid computers.
Special-Purpose Computers
Designed for specific tasks such as:
m
● ATM Machines: Banking transactions.
● Embedded Systems: In cars, microwaves, medical devices.
.co
● Supercomputers: Weather forecasting, scientific simulations.
Applications of Computers
● Government & Administration: E-governance, record-keeping.
ra
● Education: Online learning, research.
● Banking: Digital transactions, ATMs.
nt
● Healthcare: Patient records, diagnostics.
● Communication: Emails, social media.
● Business: Data management, automation.
Ma
Click here 4
Computer Architecture
Input Unit
Output Unit
m
● Examples: Monitor, Printer, Speakers, Projector.
.co
● The brain of the computer that executes instructions.
● Consists of:
○ Arithmetic Logic Unit (ALU)
○ Control Unit (CU)
ra
○ Memory Unit
Click here 5
Memory Unit
m
(a) RAM, ROM, CD-ROM
(b) Cache, ROM, CD-ROM
(c) Hard Disk, Pendrive, CD-ROM
.co
(d) Hard Disk, Cache, RAM
Motherboard
ra
● Main circuit board connecting all components.
● Houses CPU, RAM, storage, expansion slots, ports.
nt
Interconnection of Units
Click here 6
Computer Hardware
m
.co
ra
nt
Ma
He
Click here 7
Input Devices
● Input devices allow users to enter data and commands into a computer for processing.
Keyboard-Based Input
m
● Keyboard: Standard input device with alphanumeric keys, function keys, and control keys.
.co
Pointing Devices
● Mouse: Controls cursor movement, has left & right buttons for selection.
ra
● Touchpad: Used in laptops as a mouse alternative.
● Joystick: Used in gaming and simulations.
● Trackball: A stationary device with a rolling ball, often used in specialized applications.
nt
Scanning & Imaging Devices
Ma
Click here 8
E. Touch & Biometric Devices
Output Devices
m
Types of Output Devices:
.co
Visual Output Devices
Click here 9
Tactile & Other Output Devices
m
(d) Joystick
.co
ra
nt
Ma
He
Click here 10
Computer Memory
Memory Hierarchy
m
memory placed in between RAM and CPU. It increases the speed of processing. Cache memory is very expensive,
so it is smaller in size. Generally, computers have cache memory of sizes 256 KB to 2 MB.
.co
3. Primary Memory (RAM, ROM) – Main working memory for processing.
4. Secondary Storage (HDD, SSD, CD) – Stores data permanently.
5. Tertiary Storage (CD, DVD, Tape) – Used for backup and archival.
Parameters of Memory
Click here 11
Types of Memory
● RAM (Random Access Memory): Temporary memory, loses data on power loss.
○ SRAM (Static RAM): Faster but expensive, used in cache.
○ DRAM (Dynamic RAM): Slower but cheaper, used as main memory.
● ROM (Read-Only Memory): Permanent memory storing system firmware.
○ PROM, EPROM, EEPROM – Programmable ROM types.
m
Secondary Memory (Non-Volatile Storage)
.co
● Hard Disk Drive (HDD): Mechanical storage, large capacity.
● Solid State Drive (SSD): Faster, no moving parts, used in modern computers.
● USB Flash Drive: Portable storage.
● Memory Card (SD Card): Used in phones, cameras.
ra
Tertiary & External Storage
nt
● CD/DVD/Blu-ray: Optical storage for media and backup.
● Magnetic Tape: Used for large-scale backups.
Ma
Click here 12
Data Representation
Number System
● A number system represents numerical values using a set of symbols (digits). It is the foundation of computer
operations.
m
1. Decimal (Base 10) – Uses digits 0-9 (e.g., 123, 456).
2. Binary (Base 2) – Uses digits 0 & 1, fundamental for computers (e.g., 1010₂).
3. Octal (Base 8) – Uses digits 0-7, often used in computing (e.g., 25₈).
.co
4. Hexadecimal (Base 16) – Uses digits 0-9 and letters A-F (e.g., 3F₁₆).
Conversions:
1. ASCII (American Standard Code for Information Interchange) – 7-bit code, represents characters (e.g., 'A' =
65).
2. Unicode – Supports multiple languages, 16-bit or more.
3. BCD (Binary-Coded Decimal) – Stores decimal numbers in binary.
4. EBCDIC (Extended Binary Coded Decimal Interchange Code) – Used in IBM systems.
Click here 13
Logic Gates
Logic gates are electronic circuits that perform Boolean operations (AND, OR, NOT).
m
○ Truth Table:
A B Output (A AND B)
.co
0 0 0
0 1 0
1 0 0
ra
1 1 1
nt
2.
OR Gate – Outputs 1 if at least one input is 1.
○ Truth Table:
Ma
A B Output (A OR B)
0 0 0
0 1 1
He
1 0 1
1 1 1
3.
NOT Gate – Inverts the input (0 → 1, 1 → 0).
○ Truth Table:
A Output (NOT A)
Click here 14
0 1
1 0
Universal Gates:
m
.co
ra
nt
Ma
He
Click here 15
Computer Software
Computer Software
m
Types of Software
System Software
.co
● Controls and manages computer hardware.
● Examples: Operating System, Utility Software, Firmware.
Application Software
ra
● Designed for specific user tasks.
● Examples: MS Office, Web Browsers, Media Players.
nt
Specific Purpose Software
● Examples:
○ Banking Software (Core Banking Solutions).
○ Payroll Software (Salary Processing).
○ Inventory Management Software (Stock Control).
He
Application Software
● General-Purpose Software: Used by multiple users for different tasks (MS Word, Excel).
● Customized Software: Designed for a specific user or organization (ERP, HRMS).
● Mobile Applications: Apps for smartphones (WhatsApp, Google Maps).
Click here 16
System Utilities (Utility Software)
m
.co
ra
nt
Ma
He
Click here 17
Operating System
m
1. Process Management – Controls execution of programs.
2. Memory Management – Allocates and deallocates memory.
.co
3. File System Management – Organizes and manages files.
4. Device Management – Controls hardware devices (printers, keyboards).
5. Security & Access Control – Protects data using authentication.
6. User Interface – Provides interaction methods (GUI/CLI).
ra
Types of Operating System
User Interface
He
● Graphical User Interface (GUI) – Uses icons and windows (Windows, macOS).
● Command-Line Interface (CLI) – Uses text commands (MS-DOS, Linux Terminal).
Click here 18
Microsoft Disk Operating System (MS-DOS)
m
.co
ra
nt
Ma
He
Click here 19
Programming concepts
Programming Concepts
Programming Languages
m
Languages used to write computer programs are categorized as:
Low-Level Language
.co
● Machine Language (1st Gen) – Binary code (0s and 1s), difficult to write.
● Assembly Language (2nd Gen) – Uses mnemonics (MOV, ADD), requires an assembler.
ra
Medium-Level Language
● Also called "Middle-Level Language", combines features of low and high-level languages.
nt
● Example: C language (used in system programming).
Click here 20
Language Translator
Generation of Languages
m
1. 1st Generation (Machine Language) – Binary code (0s & 1s).
2. 2nd Generation (Assembly Language) – Uses mnemonics.
3. 3rd Generation (High-Level Language) – Human-readable (C, Java).
.co
4. 4th Generation (4GLs) – Used in databases (SQL).
5. 5th Generation (5GLs) – AI-based languages (Prolog, LISP).
Algorithm
Ma
Click here 21
Microsoft Windows
m
.co
ra
nt
Ma
Microsoft Windows
● Microsoft Windows is a Graphical User Interface (GUI)-based Operating System developed by Microsoft
Corporation.
● It provides multi-tasking, security, and user-friendly interface for personal and business use.
He
Early Versions:
Click here 22
Modern Versions:
m
Desktop in Windows
● The desktop is the main screen that appears after logging in.
.co
● It contains icons, taskbar, start menu, and other graphical elements.
Icons of Desktop
ra
● Icons are small graphical representations of programs, files, or functions.
● Common Desktop Icons:
○ My Computer (This PC) – Access to storage drives and system files.
nt
○ Recycle Bin – Stores deleted files temporarily.
○ Network – Displays connected networks.
○ Shortcut Icons – Quick access to software (e.g., MS Word).
Ma
Taskbar
Start Menu
Click here 23
○ All Programs – List of installed applications.
○ Search Bar – Quick search for apps and files.
○ Power Options – Sleep, restart, shutdown.
Title Bar
m
Scroll Bar
.co
● Found in browsers, documents, and file explorers.
Menu Bar
ra
● Located below the title bar in some applications.
● Contains drop-down menus like File, Edit, View, Tools, Help.
● Common in programs like Notepad, MS Word.
nt
Dialog Box
● A pop-up window that appears when the system requires input or displays information.
Ma
● Examples:
○ Save As / Open File Dialog
○ Print Dialog Box
○ Error/Warning Messages
He
Click here 24
Extension Names of Files
m
Video .mp4, .avi VLC Media Player
.co
Spreadsheet .xls, .xlsx MS Excel
Click here 25
General Windows Shortcuts
m
Ctrl + Y Redo last action
.co
Ctrl + P Print the current document
Click here 26
File Explorer Shortcuts
m
F2 Rename selected file/folder
.co
Delete Move file to Recycle Bin
Click here 27
Run Command & System Shortcuts
m
Windows + U Open Ease of Access Center
.co
Windows + P Open Project (Display options for external screen)
Windows + X
ra Open Quick Access Menu (Power User Menu)
Click here 28
Browser Shortcuts (Chrome, Edge, Firefox, etc.)
m
Ctrl + D Bookmark current page
.co
Ctrl + H
ra Open browser history
Click here 29
Microsoft Office
Microsoft Word
● A word processing application used for creating, editing, formatting, and printing documents.
m
● Text Formatting – Font, size, color, bold, italics, underline.
● Page Layout – Margins, orientation, columns, borders.
.co
● Table Creation – Insert, modify, and format tables.
● Spell Check & Grammar – Auto-correction feature.
● Mail Merge – For mass mailings.
● Header & Footer – Add document titles and page numbers.
ra
Shortcut Keys in Microsoft Word
nt
Shortcut Key Function
Click here 30
Ctrl + U Underline text
Microsoft Excel
m
● A spreadsheet program used for data analysis, calculations, and chart creation.
.co
Components of Microsoft Excel
Basics of Spreadsheet
Click here 31
Types of Charts in Excel
m
Ctrl + N Create a new workbook
.co
Ctrl + O Open an existing workbook
Click here 32
Microsoft PowerPoint
● A presentation software used to create slideshows with text, images, animations, and videos.
m
Ctrl + S Save presentation
.co
Ctrl + M Insert a new slide
Click here 33
Microsoft Access
● A database management system (DBMS) used to store, manage, and retrieve structured data.
m
Ctrl + S Save database object
.co
Ctrl + C Copy record
Microsoft Outlook
● A personal information manager used for emails, calendars, contacts, and tasks.
He
Click here 34
Database Concept
Database Concept
m
Fundamentals of Database
.co
● Information: Processed data that makes sense.
● Database System: Combination of data and software to manage it.
● Database Management System (DBMS): Software used to create and manage databases.
ra
Types of Database
Components of Database
Click here 35
Architecture of DBMS
Advantages of DBMS
m
✔ Data Consistency – Reduces redundancy.
✔ Data Security – Controlled access.
✔ Backup & Recovery – Prevents data loss.
.co
✔ Multi-user Access – Multiple users can access data.
✔ Data Integrity – Ensures accuracy of data.
Disadvantages of DBMS
ra
● Complex Setup – Requires technical expertise.
● High Cost – Expensive software and maintenance.
nt
● Performance Issues – Large databases require powerful hardware.
● Security Risks – If hacked, data can be lost or misused.
Ma
Applications of DBMS
Click here 36
Relational Database (RDBMS)
m
● Column (Attribute) – Single field in a table.
● Schema – Structure of a database.
● Index – Speeds up search operations.
.co
Keys in Database
Database Languages
Ma
Click here 37
Data communication and networking
Data Communication
● Definition: The process of transmitting data between devices using a communication medium.
● Components:
○ Sender – The device that sends data.
m
○ Topology
Topology in computer networks refers to the arrangement of devices, nodes, and connections in
.co
a network that defines how data flows between them.
Click here 38
Communication Channel
● Definition: The pathway through which data is transferred between sender and receiver.
● Types:
○ Simplex – One-way communication (e.g., TV broadcast).
○ Half-Duplex – Two-way but one at a time (e.g., Walkie-Talkie).
○ Full-Duplex – Two-way simultaneously (e.g., Telephone).
Communication Media
m
● Definition: The physical or wireless means used to transfer data.
● Categories:
○ Guided Media (Wired) – Uses cables.
.co
○ Unguided Media (Wireless) – Uses radio waves.
Computer Network
Click here 39
Benefits of Computer Networks
m
Type Coverage Area Example
.co
Local Area Network (LAN) Within a building Office, School
Network Topology
Click here 40
○ Hybrid Topology – Combination of two or more topologies.
Layer Function
m
1. Physical Transmits raw bits over a medium.
.co
3. Network IP addressing, routing.
Click here 41
Internet and its service
Internet
Definition:
The Internet is a global network that connects millions of computers worldwide, enabling communication,
information sharing, and data exchange.
Key Characteristics:
m
✔ Decentralized Network – No single authority controls the entire internet.
✔ Uses TCP/IP Protocol – Ensures seamless data transmission.
.co
✔ Supports Multiple Services – Web browsing, email, cloud computing, etc.
1969 ARPANET (Advanced Research Projects Agency Network) was created by the US Department of
nt
Defense.
1991 The World Wide Web (WWW) was invented by Tim Berners-Lee.
1995 The Internet became commercialized, and companies started using it widely.
He
Click here 42
Advantages of the Internet
m
Disadvantages of the Internet
.co
✖ Misinformation & Fake News – False information spreads quickly.
✖ Privacy Issues – Personal data leaks and surveillance risks.
✖ Health Issues – Internet addiction, screen time strain.
✖ Dark Web & Illegal Activities – Cybercrime, identity theft.
ra
Internet Connections
nt
Type Description Speed
DSL (Digital Subscriber Line) High-speed internet using phone lines. 1 Mbps – 100 Mbps
Fiber-Optic Connection Uses optical fibers for ultra-fast speed. 100 Mbps – 10 Gbps
He
Mobile Networks (3G, 4G, 5G) Internet via SIM cards, used in smartphones. 10 Mbps – 10 Gbps
Wi-Fi (Wireless Fidelity) Wireless internet access in homes/offices. 100 Mbps – 1 Gbps
Click here 43
Interconnecting Protocols
Protocol Function
m
SMTP (Simple Mail Transfer Protocol) Send emails.
.co
PYQ 2022 JCA
HTTP is the acronym for __________.
(a) HyperText Transfer Promise (b) Hyper Transfer Text Promise
ra
(c) HyperText Transfer Protocol (d) Hyper Transfer Text Protocol
Web Browser Software to access the internet (e.g., Chrome, Firefox, Edge).
He
Domain
Abbreviations
Click here 44
● .com – Commercial
● .org – Organization
● .edu – Educational
● .gov – Government
| Blogs | Personal or professional online journals. |
| Newsgroups | Online discussion forums. |
| Search Engine | A tool to find information online. |
m
✔ Google (Most widely used)
✔ Bing (Microsoft’s search engine)
✔ Yahoo (Oldest search engine)
.co
✔ DuckDuckGo (Privacy-focused search engine)
Internet Services
ra
Service Description Example
Video Conferencing Online meetings via video. Zoom, Skype, Google Meet
Ma
Click here 45
Feature E-Commerce M-Commerce
m
✔ Hacking – Unauthorized access to data.
✔ Malware – Viruses, spyware, trojans.
.co
✔ Data Privacy – Tracking of user activity.
✔ Cyberbullying – Online harassment.
ra
nt
Ma
He
Computer Security
Click here 46
Definition:
Computer security refers to protecting computer systems, networks, and data from unauthorized access,
cyberattacks, and data breaches.
m
✔ Availability – Ensure resources are accessible when needed.
.co
✔ Authentication – Verifying user identity (e.g., passwords, biometrics).
✔ Encryption – Securing data through coding.
✔ Firewalls – Blocking unauthorized access.
ra
✔ Antivirus Software – Detecting and removing malware.
✔ Backup & Recovery – Storing duplicate copies of data.
✔ Access Control – Restricting data access based on user roles.
nt
Components of Computer Security
Ma
Component Description
Click here 47
✔ Hackers – Unauthorized individuals breaking into systems.
✔ Insiders – Employees misusing access privileges.
✔ Phishing – Fraudulent emails tricking users into sharing credentials.
✔ Denial of Service (DoS) Attacks – Overloading a system to make it unavailable.
✔ Malware – Software designed to harm computers.
Malware (Malicious Software) is any software designed to harm, exploit, or steal data.
m
Malware Type Description
.co
Worms Self-replicating programs that slow down systems.
Types of Viruses
Ma
Effects of Viruses
Click here 48
Symptoms of Malware Attack
m
✔ Install Antivirus Software – Regularly scan for threats.
✔ Keep Software Updated – Apply security patches.
✔ Use Strong Passwords – Avoid common passwords.
.co
✔ Enable Firewalls – Block unauthorized access.
✔ Avoid Clicking Suspicious Links – Prevent phishing attacks.
✔ Regular Backups – Prevent data loss.
ra
Security Measures & Tools
nt
Anti-Malware Software
Ma
Digital Certificate
✔ Issued by a Certificate Authority (CA) to verify the authenticity of websites & software.
He
Digital Signature
Firewall
Click here 49
Password Protection
m
Term Definition
.co
Decryption Converting encrypted data back to normal form.
Computer security is essential to protect systems from malware, hacking, and cyber threats. Using strong passwords,
Ma
-Thanks-
He
Click here 50