0% found this document useful (0 votes)
15 views16 pages

CS Notes FInal Term

The document provides an overview of computer networks, detailing their types such as LAN, PAN, MAN, and WAN, along with their characteristics. It also covers networking fundamentals including wired and wireless networks, security measures, and the role of operating systems in managing resources. Additionally, it discusses advanced topics like augmented reality, artificial intelligence, and data handling techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views16 pages

CS Notes FInal Term

The document provides an overview of computer networks, detailing their types such as LAN, PAN, MAN, and WAN, along with their characteristics. It also covers networking fundamentals including wired and wireless networks, security measures, and the role of operating systems in managing resources. Additionally, it discusses advanced topics like augmented reality, artificial intelligence, and data handling techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Chapter 1

Lecture Topics: Computer Network and Its Types

Computer Network
A Computer Network is a group of two or more interconnected computer systems that use common
connection protocols for sharing various resources and files. You can establish a computer network
connection using either cable or wireless media. Every network involveshardware and software that
connects computers and tools.

Different Types of Computer Networks

A computer network can be categorized by its size. A computer network is mainly of four types:
o LAN (Local Area Network)
o PAN (Personal Area Network)
o MAN (Metropolitan Area Network)
o WAN (Wide Area Network)

PAN (Personal Area Network)


PAN (Personal Area Network) is a computer network formed around a person. It generally consists of a
computer, mobile, or personal digital assistant. PAN can be used for establishingcommunication among
these personal devices for connecting to a digital network and the internet.

Characteristics of PAN
Below are the main characteristics of PAN:

• It is mostly personal devices network equipped within a limited area.


• Allows you to handle the interconnection of IT devices at the surrounding of a single user.
• PAN includes mobile devices, tablet, and laptop.
• It can be wirelessly connected to the internet called WPAN.
• Appliances use for PAN: cordless mice, keyboards, and Bluetooth systems.
Figure: Personal Area Network (PAN)
LAN (Local Area Network)
A Local Area Network (LAN) is a group of computer and peripheral devices which are connected in a
limited area such as school, laboratory, home, and office building. It is a widelyuseful network for sharing
resources like files, printers, games, and other application. The simplest type of LAN network is to connect
computers and a printer in someone’s home or office. In general, LAN will be used as one type of
transmission medium. It is a network whichconsists of less than 5000 interconnected devices across
several buildings.

Figure: Local Area Network (LAN)


Characteristics of LAN
Here are the important characteristics of a LAN network:

• It is a private network, so an outside regulatory body never controls it.


• LAN operates at a relatively higher speed compared to other WAN systems.
• There are various kinds of media access control methods like token ring and ethernet.
WAN (Wide Area Network)

WAN (Wide Area Network) is another important computer network that which is spread across alarge
geographical area. WAN network system could be a connection of a LAN which connects with other LAN’s
using telephone lines and radio waves. It is mostly limited to an enterprise or an organization.

Figure: Wide Area Network (WAN)


Characteristics of WAN
Below are the characteristics of WAN:

• The software files will be shared among all the users; therefore, all can access to the latestfiles.
• Any organization can form its global integrated network using WAN.

The End
Chapter 1
Lecture Topics: Networking and Security Fundamentals

1. Copper and Fiber-Optic Cables


1.1 Copper Cables
• Types: Twisted pair and coaxial.
o Twisted Pair Cables:
▪ CAT5e: Up to 100 Mbps, common in homes.
▪ CAT6: Supports 1 Gbps, better for noisy environments.
▪ CAT6a: Up to 10 Gbps, high-performance.
o Coaxial Cables:
▪ Used for TV and broadband.
• Advantages: Lower cost, easy to install.
• Disadvantages: Limited bandwidth, interference-prone.
1.2 Fiber-Optic Cables
• Structure: Core, cladding, and protective layers.
o Single-Mode Fiber: For long distances, narrow core.
o Multi-Mode Fiber: For shorter distances, wide core.
Image: Cross-sectional view comparing single-mode and multi-mode fiber.
• Advantages: Higher speeds, less signal loss.
• Disadvantages: Higher cost, fragile.
2. Wired vs. Wireless Networks
2.1 Wired Networks
• Types: Ethernet, token ring.
o Ethernet: Common in LANs, uses twisted pair or coaxial cables.
• Advantages: Faster, more secure.
• Disadvantages: Less flexible, higher installation cost.

2.2 Wireless Networks


• Types: Wi-Fi, Bluetooth, cellular.
o Wi-Fi: Widely used in homes and offices.
• Advantages: Mobility, easier setup.
• Disadvantages: Possible interference, typically slower speeds.
3. Firewalls
3.1 Purpose
• Definition: Monitors and controls network traffic based on security rules.
o Types: Packet-filtering, stateful inspection, proxy, next-generation.
• Functionality: Blocks or permits traffic based on set rules.

4. Antivirus and Anti-Spyware


4.1 Antivirus Software
• Purpose: Detects and removes malicious software.
o Detection Methods: Signature-based, heuristic, and behavioral.

4.2 Anti-Spyware Software


• Purpose: Targets and removes spyware and adware.
o Functionality: Provides real-time protection and scanning.
5. Security in Different Networks
5.1 LAN Security
• Measures: Use strong passwords, segment networks, and apply security policies.
5.2 WAN Security
• Measures: Encrypt data, secure communication channels.
5.3 Wireless Network Security
• Measures: Employ WPA3 encryption and strong passwords.
5.4 Cloud Security
• Measures: Use encryption, access controls, and regular security checks.

The End
Chapter 1
Lecture Topics: Data Transmission and Operating System

Echo Checks:

Echo checks are a simple method of error detection used in data transmission. In an echo check, the sender
transmits data to the receiver. The receiver then sends the data back to the sender, who compares the echoed data
with the original data.

• Process:

1. Transmission: The sender transmits data to the receiver.


2. Echo: The receiver sends the received data back to the sender.
3. Comparison: The sender compares the original data with the echoed data.
4. Error Detection: If there is a discrepancy between the original data and the echoed data, an error
is detected.

• Advantages & Disadvantages:


o Advantages: Simple to implement, no additional hardware required.
o Disadvantages: Not effective for detecting all types of errors, particularly complex errors.

Flowchart for Error Checking:

1. Start: Begin the error-checking process.


2. Transmit Data: Send data to the receiver.
3. Receive Echo: Receive the echoed data from the receiver.
4. Compare Data: Compare the transmitted data with the received echo.
5. Condition - Data Match?
▪ Yes: No error detected, proceed to the next step.
▪ No: Error detected, retransmit data.
6. End: Finish the process.

Operating Systems (OS):

An operating system is the software that manages computer hardware and software resources and provides
services for computer programs.

Features of OS:

1. Process Management: Managing the execution of processes, including multitasking and process
synchronization.
2. Memory Management: Handling memory allocation for processes, ensuring efficient use of
memory.
3. File System Management: Managing files on storage devices, including file creation, deletion,
and access control.
4. Device Management: Controlling and monitoring peripheral devices, such as printers, disks, and
network interfaces.
5. User Interface: Providing a user interface, such as command-line or graphical user interface
(GUI), for interaction with the system.
Network Operating Systems (NOS)

A Network Operating System (NOS) is software that controls and manages network resources, allowing multiple
computers to communicate, share resources, and work together.

• Features of NOS:
1. User Management: Managing multiple users and their access rights.
2. Security: Implementing security protocols to protect data and resources.
3. Resource Sharing: Enabling the sharing of files, printers, and other resources across the network.

Comparison of Network OS with Standard OS

• Network OS:
o Designed to manage and coordinate multiple computers across a network.
o Focuses on resource sharing, security, and user management in a networked environment.
• Standard OS:
o Designed to manage resources on a single computer.
o Focuses on process management, memory management, and device management on a standalone
system.

Utilities Software in Network Management

Utility software helps manage, maintain, and control computer resources.

Importance of Utilities Software in Network Management

1. Network Monitoring: Tools like network analyzers and monitoring software to track network
performance and detect issues.
2. Backup and Recovery: Software that automates data backup across the network and provides recovery
solutions.
3. Security Utilities: Antivirus, firewall, and encryption tools to protect network data and prevent
unauthorized access.
4. File Management: Utilities for managing files, such as archiving, compression, and secure deletion
across the network.

Augmented Reality (AR) in Education, Gaming, and Robotics

Augmented Reality (AR) overlays digital information on the real-world environment, enhancing the user’s
perception of reality.

Applications of AR:

1. Education:

▪ Interactive Learning: AR can create immersive learning experiences, such as visualizing


complex concepts in 3D.
▪ Virtual Laboratories: Students can conduct virtual experiments, providing hands-on
experience without physical labs.
1. Gaming:
▪ Enhanced Gameplay: AR adds digital elements to the real world, creating more engaging
and interactive games (e.g., Pokémon Go).
▪ Physical Interaction: Encourages physical movement and interaction within the real
world, blending reality with the game.
2. Robotics:
▪ Robot Control: AR can provide real-time data overlays for controlling and monitoring
robots.
▪ Simulation and Training: AR allows for the simulation of robotic tasks in a real-world
setting, aiding in training and development.

The End
Chapter 3
Lecture Topics: Connections are made: Accessing the internetvhgvc

1. Digital Device Interaction

 Operating Systems (OS): Manage hardware and software resources. Tasks include managing files, memory, and
processes.
 Utility Programs: Special software to perform maintenance tasks like file management and disk cleanup.

2. Data Representation

 ASCII (American Standard Code for Information Interchange): Represents text characters in binary.
 Binary and Denary Conversions:
o Binary uses 0s and 1s to store data.
o Denary is the standard base-10 numbering system.

3. Compression Techniques

 Purpose: Reduces file size for storage efficiency and faster internet transfer.
 Common Techniques: Run-length encoding (replacing repeated values with symbols and counts).

4. Logic and Truth Tables

 Logic Gates:
o AND: Outputs TRUE only if all inputs are TRUE.
o OR: Outputs TRUE if at least one input is TRUE.
o NOT: Inverts the input.
 Truth Tables: Represent the outputs of logic gates based on different inputs.

1. Artificial Intelligence (AI)

 Machines mimicking human decision-making.


 Examples include voice assistants and recommendation systems.

2. Augmented Reality (AR)

 Superimposes digital images onto the real-world environment.


 Applications:
o Education: Interactive 3D learning tools.
o Gaming: Enhanced user experiences, e.g., Pokémon GO.
o Medical Training: 3D visualization of human anatomy.

3. Robotics

 Combination of AI and autonomous programming.


 Applications:
o Assembly Lines: Robots perform tasks using imaging systems.
o Rovers: Data collection in hazardous environments.
o Customer Service: Robots learn tasks through interaction.
Chapter 3
Lecture Topics: Connections are made: Accessing the internet
Lecture 2
1. Advanced Data Handling

1.1 Machine Learning

 Definition: Teaching computers to perform complex tasks by learning from data and past experiences instead of
relying solely on predefined programming.
 Examples of Machine Learning:
o Home assistants recommending alarms based on past settings.
o TV subscriptions suggesting content based on viewing history.
o Google Maps verifying store timings using real-world traffic data.

Key Terms:

 Autonomous Programming: Integration of hardware and AI to solve problems without human intervention.
 Learning Systems: Devices adapt over time, improving user interaction efficiency (e.g., predictive text, voice
assistants).

2. Digital Compression

2.1 Image Compression

 Purpose: Reduces file size to save storage space and accelerate transmission speeds.
 Techniques:
o Run-Length Encoding (RLE): Replaces repeated patterns in data with a single count and pattern
representation.
o Example: A simple black-and-white bitmap is encoded into a string of counts for black and white
sections.

3. Emerging Applications of AI and AR

3.1 AI & AR in Daily Life

 Integration Example: AR glasses combined with AI to guide emergency responders to accident sites.
 Benefits: Enhanced decision-making and efficiency in real-time scenarios.

3.2 Use of AR in Different Domains

 Education: Interactive 3D learning tools simplify complex subjects.


 Gaming: Real-world overlays create immersive experiences (e.g., Pokémon GO).
 Shopping: Virtual previews of products in real settings (e.g., furniture or clothing).

Advantages of AR:

 Makes learning interactive and safer.


 Reduces costs by simulating real-world scenarios digitally.
4. Truth Tables and Logic Circuits

4.1 Truth Tables for Logical Operations

 Operations Overview:
o AND Gate: Output is TRUE if all inputs are TRUE.
o OR Gate: Output is TRUE if at least one input is TRUE.
o NOT Gate: Inverts the input.

4.2 Example Application:

 Combining logic gates to simulate scenarios like authentication:


o Condition: Correct login credentials OR facial recognition AND within school hours.
Guidelines for Writing Pseudocode
Guideline Explanation
Write using plain, structured English. Avoid using
1. Use Simple Language
programming syntax.
2. Start with BEGIN and
Clearly mark the start and end of the pseudocode.
End with END
3. Use Logical Sequence Write steps in the order that they should happen.
4. Use Indentation for Indent blocks of code for loops, conditions, and procedures to
Structure show hierarchy.
Common keywords: IF THEN, ELSE, WHILE, REPEAT, UNTIL,
5. Use Keywords Clearly
FOR, INPUT, OUTPUT, SET.
6. Describe Inputs and Use INPUT for user data entry and OUTPUT for results or
Outputs display.
7. Assign Values Using
Use SET to assign a value to a variable, e.g., SET total TO 0.
SET
Do not write in any specific programming language; focus on
8. Avoid Code Syntax
logic only.
Check your pseudocode with test values to see if it works
9. Test with Example Data
logically.
Use the same naming and structure throughout the
10. Be Consistent
pseudocode.

Guidelines for Drawing a Flowchart

Step Explanation

1. Define the Understand the process or algorithm you want to represent. Break it
Problem down into logical steps.

Use the correct flowchart symbols:

- Terminator (Oval): Start/End


2. Use Standard
Symbols - Process (Rectangle): Action or instruction
- Decision (Diamond): Yes/No or True/False choice
- Input/Output (Parallelogram): Receiving or displaying information

3. Start with “Start” Every flowchart begins with a Start symbol.

4. Follow Logical Arrange the symbols in the order the steps are performed, top to bottom
Sequence or left to right.
Step Explanation

5. Use Arrows for Use arrows to connect the symbols and show the direction of the
Flow process flow.

Label decision branches (e.g. “Yes” and “No”), inputs, and outputs
6. Use Clear Labels
clearly.

Avoid crossing lines and keep the chart easy to read. Break complex
7. Keep It Simple
processes into sub-processes if needed.

Every flowchart must have a Stop symbol to mark the end of the
8. End with “Stop”
process.

Chapter 4: Binary Inside – Lecture Notes

Topic Details

- Binary number system


- Denary system and place value
Key Concepts
- Binary switches and transistors
- Conversion between binary and denary formats

- Binary uses only 0 and 1 (base 2).


Binary Representation - Each binary digit represents a power of 2.
- Computers use 8 bits (1 byte) to store binary numbers.

Converting Denary to - Use place value method and divide-by-2 method to convert.
Binary - E.g. 15₁₀ = 00001111₂.

- Students practice using spreadsheet model to convert binary to


Conversion Activity denary.
- Formula to check ON/OFF state of transistors included.

- Represent 1 as ON and 0 as OFF.


Transistors in Devices
- Millions of transistors make up processors.

- Create a spreadsheet (Binary Conversion.xlsx).


Application Activity - Use IF formulas to determine ON/OFF state and calculate
denary value.

Keywords Binary, Denary, Transistor, Bit, Byte, Place Value, ON/OFF


Chapter 6: Don’t Make Mistakes! – Lecture Notes

Topic Details

- Data validation techniques


Key Concepts
- Types of validation: presence, length, range, format, type check

- Prevents incorrect data entry in databases.


Data Validation
- Ensures data integrity and consistency.

- Presence Check: Ensures a field is not left blank.

- Length Check: Limits character count.

- Range Check: Accepts only certain values.


Types of Validation
- Format Check: Ensures the correct pattern (e.g. email).
- Type Check: Accepts only a certain data type (e.g. number).

- Define format of input (e.g. Tutor Surname must start with capital
Input Masks in MS
letter).
Access
- Use characters like >, <, L, ? in masks.

- Add validation checks and input masks to a database (e.g.


Practice Activity
MusicSchoolGoFurther.accdb).

- Students test database entries with valid and invalid data.


Testing Validation
- Create test plans to ensure all checks work.

Validation, Input Mask, Format Check, Type Check, Range, Presence,


Keywords
MS Access

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy