Introduction to It System
Introduction to It System
LECTURE NOTES
ON
INTRODUCTION TO IT SYSTEM
Compiled by
Laxmipriya Samantaray
(Lecturer, Computer Science & Engineering, KIIT Polytechnic,
BBSR) Email : laxmipriyasamantarayfcs@kp.kiit.ac.in
CONTENTS
Function:
A web browser is a software application designed to access and display web pages and other resources on the
internet. It interprets HTML documents, CSS stylesheets, and executes JavaScript code to render web pages
in a visually understandable format for users.
Components:
1. User Interface: The graphical interface that allows users to interact with the browser. It includes menus,
toolbars, address bar, and navigation buttons (back, forward, refresh).
2. Rendering Engine: The core component that interprets HTML, CSS, and JavaScript to display web
pages. Different browsers use different rendering engines (e.g., Blink for Chrome, Gecko for Firefox).
3. Browser Engine: Coordinates interactions between the rendering engine and the user interface.
4. Networking: Handles communication with servers over the internet using protocols like HTTP and
HTTPS. It manages requests for web pages and resources and handles responses.
5. JavaScript Engine: Executes JavaScript code embedded in web pages to make them interactive and
dynamic.
6. Browser Extensions/Add-ons: Optional tools that enhance browser functionality, such as ad blockers,
password managers, or developer tools.
7. Storage: Manages storage of cookies, cached files, and other browsing data.
8. Security Features: Includes mechanisms like HTTPS support, phishing protection, and sandboxing to
protect users from security threats.
4. For each such category, some additional filters are associated, which are visible after clicking on the
Tools button. As depicted by the arrow in step 4.
5. Similarly, News, Books, Videos & More categories provide their associated filters to refine search
parameters to get more accurate & precise results. You may check them one by one by selecting the
category and then Tools option
COLLEGE PORTAL
A college portal is an online platform provided by educational institutions that allows students, faculty, and
staff to access a variety of academic and administrative services. The portal serves as a centralized hub where
users can manage their academic activities, access resources, and stay updated with campus news and events.
Features of a College Portal
1. Student Dashboard
o Profile Management: Students can update personal information, view academic history, and
manage their accounts.
o Course Registration: Register for courses each semester, view available classes, and check
schedules.
o Attendance Tracking: View attendance records for all registered courses.
o Grades and Transcripts: Access grades for each semester and download official transcripts.
o Assignments and Exams: Submit assignments, view deadlines, and check exam schedules.
2. Faculty Dashboard
o Course Management: Faculty can manage their courses, upload syllabi, and communicate with
students.
o Grade Submission: Enter and submit student grades, track attendance, and monitor student
progress.
o Student Interaction: Communicate with students via messaging systems or discussion forums.
3. Administrative Services
o Fee Payment: Pay tuition and other fees online, view payment history, and print receipts.
o Library Access: Search the library catalog, check out books, and access digital resources like
e-books and journals.
o Event Calendar: Stay informed about upcoming campus events, workshops, and seminars.
4. Communication Tools
o Email and Messaging: Use integrated email services for official communication between
students, faculty, and staff.
INTRODUCTION TO IT SYSTEMS 17 Laxmipriya
Samantaray
o Announcements: View important announcements from the college administration, such as
changes in academic schedules or policy updates.
5. Learning Management System (LMS) Integration
o Course Materials: Access lecture notes, presentations, and other learning materials uploaded
by faculty.
o Discussion Forums: Participate in course-related discussions and collaborate with classmates
on projects.
6. Support and Helpdesk
o Technical Support: Contact the IT helpdesk for assistance with portal issues or technical
problems.
o Academic Advising: Schedule appointments with academic advisors or counselors.
o FAQs: Access frequently asked questions for quick solutions to common issues.
How to Access and Navigate a College Portal
1. Accessing the Portal
o URL: The college portal can usually be accessed through a specific web address provided by
the institution (e.g., https://portal.collegename.edu).
o Login: Use the credentials provided by the college (such as a student ID and password) to log
in.
2. Navigating the Portal
o Homepage: Upon logging in, the homepage typically displays a dashboard overview with quick
links to various sections such as courses, grades, and messages.
o Menu or Navigation Bar: Use the menu or navigation bar to access different parts of the portal,
like academics, finance, library, etc.
o Search Function: If you're looking for specific information, use the search bar to find courses,
services, or resources.
3. Using Services
o Course Registration: Navigate to the Academics or Courses section to register for classes.
Follow the prompts to select your courses and submit your schedule.
o Viewing Grades: Go to the Grades or Academic Records section to view your grades for each
semester.
o Making Payments: Access the Finance or Fees section to make online payments for tuition or
other fees.
4. Communication
o Check Emails and Messages: Regularly check your portal inbox for important communications
from faculty and administration.
o Announcements: Stay updated by reviewing the announcements section for news about
deadlines, events, and policy changes.
5. Support
o Technical Issues: If you encounter any issues, look for a Support or Helpdesk link, where you
can report problems or get assistance.
o Academic Support: Schedule appointments with advisors or access resources like tutoring
through the Support Services section.
loaded in memory and generates results in binary form. A conventional microprocessor chip with
pins is shown in the below figure.
Memory Unit
The instructions and data given to the computer are stored in the memory or storage unit. This
data along with the program instructions are used by the CU and ALU. It is also used to store
intermittent results and information (final results). Types of memory are discussed in detail,
in the next topic.
The smallest unit of memory is called a ‘Bit’. A bit can have the value 1 or 0 which is known
as binary values. Groups of eight bits form a Byte and similarly higher order units are formed. The
below table shows measurement units for digital data with their denoting symbol and corresponding
capacity.
Computer memory is one of the most important components of the computer system. Computer
memory is a vital resource that is managed by the operating system. When the data is sent to the memory
it is kept at some particular location called to address. The data can be retrieved by the computer from
this address as and when required.
Types of computer memory
Memory unit:
Generally, during the processing of data memory unit stores the data, instructions, intermediate results
and output temporarily. This unit is classified into two types of memory.
Primary memory
Secondary memory
Primary memory, also known as main memory or internal memory, is the memory in a computer that is
directly accessible by the cpu. It is used to store data and instructions that are currently in use or being
processed by the computer. Primary memory is essential for the computer's operation, as it provides the
CPU with the data it needs quickly.
Types of primary memory
1. Random Access Memory (RAM)
o Volatile Memory: RAM is volatile, meaning it loses its content when the power is turned
off. It temporarily stores data that the CPU needs while performing tasks.
o Types of RAM:
Dynamic RAM (DRAM): This type of RAM needs to be refreshed thousands of
times per second because it stores each bit of data in a separate capacitor.
Static RAM (SRAM): Faster and more expensive than DRAM, SRAM stores data
in flip-flop circuits and does not need to be refreshed as often. It's typically used for
cache memory.
o Function: RAM stores the operating system, application programs, and the data being
processed. When you open a program, it is loaded from the hard drive into RAM, where the
CPU can access it much faster.
2. Read-Only Memory (ROM)
o Non-Volatile Memory: ROM retains its contents even when the power is turned off. It is
used to store firmware, which is the software that is permanently programmed into the
hardware.
o Types of ROM:
PROM (Programmable ROM): Can be programmed once by the user after
manufacturing.
EPROM (Erasable Programmable ROM): Can be erased by exposing it to ultraviolet
light and reprogrammed.
EEPROM (Electrically Erasable Programmable ROM): Can be erased and
reprogrammed using electrical charge, even while the computer is running.
o Function: ROM typically stores the BIOS (Basic Input/Output System) or firmware, which
INTRODUCTION TO IT SYSTEMS 21 Laxmipriya
Samantaray
is the essential software that boots up the computer and performs basic hardware
initialization.
3. Cache Memory
o Speed: Cache memory is a small amount of high-speed memory located close to the CPU.
It stores frequently accessed data and instructions to speed up processing.
o Levels:
L1 Cache: Located within the CPU itself, it is the fastest and smallest cache.
L2 Cache: Slightly larger and slower, but still very fast, it is typically located on the
CPU or on a separate chip close to the CPU.
L3 Cache: Even larger and slower than L2, L3 cache is shared among multiple CPU
cores.
o Function: Cache memory reduces the time the CPU takes to access data from the main
memory (RAM), significantly speeding up processing.
SECONDARY MEMORY
Secondary memory, also known as secondary storage or external memory, refers to the storage
devices used to store data on a long-term basis. Unlike primary memory (RAM), which is volatile
and used for temporary data storage, secondary memory is non-volatile, meaning it retains data even
when the computer is turned off. This type of memory is used to store the operating system, software
applications, and user data such as documents, photos, and videos.
INTRODUCTION TO IT SYSTEMS 22 Laxmipriya
Samantaray
KIIT POLYTECHNIC
Types of Secondary Memory
1. Hard Disk Drives (HDD)
2. Solid-State Drives (SSD)
3. Optical Discs
o CDs, DVDs, and Blu-ray Discs
4. USB Flash Drives
o Portable Storage: USB flash drives are small, portable devices that use flash memory to store
data. They connect to computers via USB ports.
5. Memory Cards
o Flash Storage: Memory cards, such as SD cards and microSD cards, use flash memory to
store data and are commonly used in devices like cameras, smartphones, and tablets.
6. External Hard Drives
o Portable HDDs/SSDs: External hard drives are portable versions of HDDs or SSDs that
connect to computers via USB or other interfaces.
7. Cloud Storage
o Internet-Based Storage: Cloud storage allows users to store data on remote servers accessed
via the internet. Services like Google Drive, Dropbox, and OneDrive are popular examples.
Characteristics of Secondary Memory
Non-Volatile: Secondary memory retains data even when the computer is turned off, making it
suitable for long-term storage.
Higher Capacity: Secondary memory typically offers much larger storage capacities than primary
memory, allowing for the storage of vast amounts of data.
Slower Access: Data access speeds in secondary memory are generally slower compared to primary
memory, especially in the case of traditional HDDs.
Portability: Devices like USB drives and external hard drives are portable, allowing for easy data
transfer between different computers and locations.
Durability: Secondary storage devices like SSDs and flash drives have no moving parts, making
them more durable and less prone to mechanical failure than HDDs.
Role of Secondary Memory in a Computer System
Data Storage: Secondary memory is essential for storing the operating system, software
applications, and user data permanently.
Backup and Recovery: Secondary memory devices are used to create backups of important data,
ensuring that it can be recovered in case of primary memory failure or data loss.
Archival: Secondary memory is used for archiving data that is not frequently accessed but needs to
be retained for long-term purposes.
Data Transfer: Portable secondary storage devices like USB drives and external hard drives are used
to transfer data between different computers or to different locations.
DISPLAY
A display, also known as a monitor or screen, is an output device that visually presents information
generated by a computer, such as text, images, and videos. Displays are crucial components of a
computer system, enabling users to interact with the computer and view its output.
KEY BOARD
A keyboard is one of the primary input devices used with a computer. It allows users to input data,
commands, and interact with the operating system and software applications by pressing keys.
A keyboard has various types of keys, each serving different functions. Here’s an overview of the different
types of keys found on a typical keyboard:
1. Alphanumeric Keys
Letters: A-Z keys, used for typing text.
Numbers: 0-9 keys, found in the main section of the keyboard.
Special Characters: Includes keys like @, #, &, *, (, ), -, +, =, !, etc., usually accessed with the Shift
key.
2. Modifier Keys
Shift: Used to capitalize letters or access the secondary function of other keys (e.g., Shift + 2 produces
@ on a QWERTY keyboard).
Ctrl (Control): Often used in combination with other keys to perform shortcuts (e.g., Ctrl + C for
UNIT 2
OPERATING SYSTEMS
An operating system (OS) is the fundamental software that manages computer hardware and software
resources, providing services for computer programs.Some popular operating systems are:
1. Windows
Developer: Microsoft
First Released: 1985
Latest Version: Windows 11
Key Features:
o User-friendly interface with the Start menu.
o Wide compatibility with a variety of software and hardware.
o Extensive support for gaming.
o Frequent updates and security patches.
Common Use Cases: General computing, gaming, business, and enterprise environments.
2. macOS
Developer: Apple
First Released: 2001 (originally as Mac OS X)
Latest Version: macOS Sonoma
Key Features:
o Sleek and consistent user interface.
o Strong integration with other Apple devices and services (like iPhone, iPad, iCloud).
o Unix-based, providing a robust and secure environment.
o Built-in software like Safari, Mail, and Photos.
Common Use Cases: Creative work (design, video editing, music production), general computing,
and software development.
3. Linux
Developer: Open-source community (originally created by Linus Torvalds in 1991)
Latest Versions: Various distributions (e.g., Ubuntu, Fedora, Debian)
Key Features:
o Highly customizable and configurable.
o Open-source, free to use.
o Strong security and stability.
o Command-line interface for advanced users.
Common Use Cases: Servers, software development, cybersecurity, IoT devices, and as an alternative
to Windows/macOS for general computing.
4. Other Operating Systems
Chrome OS: Developed by Google, focused on web-based applications and integrated with Google
services. Commonly used in Chromebooks.
Android: Primarily designed for mobile devices, developed by Google. It's the most widely used
mobile OS globally.
iOS: Apple's mobile operating system, used in iPhones and iPads, known for its smooth performance
and security.
Window OS installation
Installing a Windows operating system is a easy process, and you can installing through Windows 11 as an
example. The steps are similar for Windows 10.
Steps to Install Windows 11
1. Prepare the Installation Media
Download the Windows 11 ISO File:
o Visit the official Microsoft website and download the Windows 11 ISO file or use the Media
Creation Tool to create installation media directly.
Create a Bootable USB Drive:
o Use the Windows Media Creation Tool to create a bootable USB drive.
o Alternatively, you can use third-party tools like Rufus to create the bootable USB from the ISO
file.
2. Prepare Your PC for Installation
Backup Your Data: Ensure all your important files are backed up. Installing a new OS can erase your
data.
Check System Requirements: Ensure your PC meets the Windows 11 minimum requirements, such
as TPM 2.0 and Secure Boot. You can check this using the PC Health Check tool.
3. Boot from the USB Drive
Insert the USB Drive: Plug the bootable USB drive into your computer.
Access BIOS/UEFI: Restart your computer and enter the BIOS/UEFI settings (usually by pressing a
key like F2, F12, ESC, or DEL during startup).
Set USB as Boot Device: Change the boot order to prioritize the USB drive.
Save and Exit: Save the changes and exit the BIOS/UEFI settings. Your computer should now boot
from the USB drive.
4. Start the Installation Process
Windows Setup: After booting, the Windows Setup screen will appear.
Language and Preferences: Select your language, time, and keyboard preferences, and click "Next."
Install Now: Click the "Install Now" button to begin the installation.
5. Enter the Product Key
If prompted, enter your Windows 11 product key. You can also choose "I don’t have a product key" if
you want to enter it later.
Select the edition of Windows 11 you want to install if necessary.
6. Accept the License Terms
Read and accept the Microsoft software license terms, then click "Next."
UNIT 3
HTML AND CSS
HTML
Hypertext- Hypertext refers to text that contains links (hyperlinks) to other pieces of text or resources. It
enables navigation between different documents or sections within a document.
Markup- Markup refers to a system for annotating a document to define its structure and format. It provides
instructions to the browser or application on how to display or organize content.
HTML (HyperText Markup Language) is the standard markup language used to create web pages. It provides
the structure of a webpage, allowing you to define elements such as headings, paragraphs, links, images, and
more.
In HTML
HTML (HyperText Markup Language) combines both:
HyperText: Facilitates linking through tags like <a>.
Markup: Structures the document with tags like <h1>, <p>, and <div>.
Inline CSS is a method of applying styles directly to an HTML element using the style attribute. Unlike
external or internal CSS, inline styles are written directly in the HTML document, within the opening tag
of an element.
o Applied directly to HTML elements using the style attribute.
<p style="color: blue; font-size: 16px;">This is styled text.</p>
2. Internal CSS
Internal CSS is a way to apply styles within the same HTML document, using a <style> block inside the
<head> section. This method allows you to define styles for the entire page without linking an external
stylesheet.
Defined within a <style> block in the <head> section.
<style>
body { background-color: lightgray; }
p { color: green; }
</style>
1. Element Selector
An element selector in CSS, also known as a type selector, is used to select all HTML elements of a
specific type (tag name) in a document. It applies styles to every instance of the specified HTML
element.
p { color: red; }
2. Class Selector
A class selector in CSS is used to select and style HTML elements with a specific class attribute.
It allows you to apply the same style to multiple elements by assigning them the same class.
css
.highlight { background-color: yellow; }
html
<p class="highlight">This text is highlighted.</p>
3. ID Selector
An ID selector in CSS is used to select and style a single HTML element with a unique id attribute. IDs
are intended to be unique within a page, so they should only be used for elements that need distinct styling.
css
#unique { font-weight: bold; }
html
<p id="unique">This is a bold paragraph.</p>
3.2.3 CSS Properties
1. Text Styling
Text styling in CSS refers to formatting and customizing the appearance of text in HTML elements. This
includes properties to set the font, size, color, alignment, decoration, spacing, and more.
Css
h1 { color: blue; text-align: center; }
2. Box Model
The CSS Box Model is a fundamental concept in web design that describes how every HTML element is
represented as a rectangular box. It defines the element's dimensions and spacing, consisting of the following
components:
margin, padding, border, width, height.
Css
div {
width: 300px;
height: 200px;
border: 2px solid black;
padding: 10px;
margin: 20px;
}
=EFFECT(5%,12) Calculates the effective interest for 5% annual nominal interest with 12
payments a year.
=B8-SUM(B10:B14) Calculates B8 minus the sum of the cells B10 to B14.
=SUM(B8,SUM(B10:B14)) Calculates the sum of cells B10 to B14 and adds the value to B8.
=SUM(B1:B1048576) Sums all numbers in column B.
=AVERAGE(BloodSugar) Displays the average of a named range defined under the
name BloodSugar. It is possible to establish ranges for inclusion by
naming them using Sheet > Named Ranges and Expressions > Define,
for example BloodSugar representing a range such as B3:B10.
=IF(C31>140, “HIGH”, Logical functions can also be performed as represented by the IF
“OK”) statement which results in a conditional response based upon the data in
the identified cell. In this example, if the contents of C31 is greater than
140, then HIGH is displayed, otherwise OK is displayed.
Page Layouts methods, including frames, columns and tables.
Embedding or linking graphics, spreadsheets and other objects.
Built in drawing tools.
Master documents to group a collection of documents into single documents.
Changes tracking during revision
Database integration, including a bibliography database.
Export to PDF, including bookmarks.
4.2.11 AUTOCORRECT
The writer auto-correct function has a long list of common misspelling and typing error which is
correct automatically.
Select tools-> auto correct options to open the auto correct dialog box.
4.3 OPEN OFFICE CALC
Calc is the spreadsheet component of Apache Open office(AOO).It contains most of the features
found in the spreadsheets. Spreadsheets allows us to organize, analyses and store data in the tabular
form.
Other features provided by calc include:
Calc consists of several individual sheets, each sheet of cells arranged in rows and columns.
Function which can be used to create formulas to perform complex calculations in data.
Database function, to arrange, store and filter data.
Dynamic charts a wide range of 2D and 3D charts.
Macros for recording and executing repetitive tasks.
4.3.1 INTRODUCTION TO SPREADSHEETS SHEETS AND CELLS
In calc we create file that are called spreadsheets consists of several separate sheets.
Each sheets containing cell arranged in rows and columns.
Each spreadsheets can have many sheets and each sheets has a large number of individual cells.
FORMULA BAR
It consists of various controls which are annotated with dark background color.
Individual Cells
The main section of the screen displays in the cell in the form of a grid, with each cell being at the
interaction of a column and a row.
Sheet tabs
At the bottom of the grid of cells are the sheet tabs. These tabs enable access to each individual
sheet, and with the visible(action) sheet having a white tab.
Clicking on another sheets tab displays the sheet and its tab turns white.
Menu
Located at the top of the window, it contains menus like File, Edit, View, Insert, Slide, and
Bar
more. These menus provide access to various commands and features.
Toolbar Positioned below the Menu Bar, it offers quick access to frequently used tools like font
settings, alignment, slide layout, and more.
Typically, on the right, it provides additional options for slide properties, transitions,
Sidebar
animations, and master slides. You can toggle it on or off.
Slide Located on the left, it displays a thumbnail view of all slides in the presentation, allowing
Pane for quick navigation and rearrangement.
Workspace(Slide The central area where you design and edit individual slides. This is where you
Editor) can add text, images, shapes, and other elements.
Status Positioned at the bottom of the window, it shows information about the current slide, such
Bar as its number, total slides, zoom level, and layout.
Accessed via the View menu or shortcut, this helps you manage slides, objects, and
Navigator
elements in your presentation.
Slide-Sorter Found under the View menu, it allows you to see all slides at once and reorder them
View easily.
Notes Lets you add speaker notes to slides. This view is useful for preparing presentations with
View additional commentary.
Master-Slide Enables editing of slide layouts and themes, which affect the design and formatting of
View multiple slides in the presentation.
Drawing Located at the bottom, it provides tools for adding shapes, lines, arrows, and other
Toolbar graphic elements.
Properties Part of the Sidebar, it shows detailed formatting options for the selected object, such as
Pane text, images, or shapes.
Slide Transition Found in the Sidebar, it lets you apply and customize transitions between
Pane slides.
UNIT 5
INFORMATION SECURITY BEST PRACTICES
5.1 Introduction to Information Security
What is Information?
o Data that is processed to be meaningful, valuable, and actionable.
o Examples: personal details, bank account information, business secrets, etc.
What is Information Security?
o The practice of protecting information from unauthorized access, use, modification, or
destruction.
Goals of Information Security (CIA Triad):
o Confidentiality: Ensures information is accessible only to authorized persons.
o Integrity: Protects information from unauthorized alterations.
o Availability: Ensures authorized users have access to information when needed.
5.2 Threats to Information Security
1. Malware:
o Malicious software like viruses, worms, ransomware, and spyware that harm devices or steal
data.
o Example: A virus corrupts files or locks systems.
2. Social Engineering Attacks:
o Manipulative tactics to trick users into divulging confidential information.
o Examples: Phishing emails, fake tech support calls.
3. Network Threats:
o Risks to network security, such as unauthorized access, eavesdropping, or denial-of-service
(DoS) attacks.
5.3 Combating Information Security Threats
1. Firewall:
o Monitors and controls incoming/outgoing network traffic based on security rules.
2. Data Backup:
o Regularly saving copies of data to protect against loss or corruption.
3. Virtual Private Network (VPN):
o Encrypts internet connections to provide privacy and security over public networks.
4. Encryption:
o Converts data into unreadable formats for unauthorized users.
5. Anti-Virus Software:
o Detects and removes malicious programs.