Computer
Computer
Computer
A computer does not necessarily mean a monitor, keyboard, mouse, and a CPU. It is any
machine or device that can compute and execute instructions given to it in the form of programs.
So technically, even a cell phone is a computer. And so are desktops, laptops, tablet PCs, and
PDAs. Anything that can perform a series of operations on its own is a computer. This gives us
an idea as to how wide and deep their roles are in our lives. We need a computer for virtually
everything.
Application in Science
One of the most important advantages of computers is in the field of science for research and
development. The computers have played a major role in most of what we know about ourselves
and the universe. The satellites, the telescopes and almost all the research tools make use of
computers in some or the other way. The huge calculations required for space science, safe
communication between scientists, storage of all the gathered information are some of the
computer uses in science and technology.
Page 1
Computer Science notes for Xth class
remotely. There are fully computer based software systems which help to store and manage the
data about patients and medicine repository etc. very easily.
Application in Education
Computer uses in the field of education are infinite. The Internet is a huge source of information.
There are online universities that deliver online degrees and distance learning is spreading far
and wide. Many schools and colleges have started making use of audio-visual ways of imparting
knowledge. A collection of tools that need a computer, help students in many ways. For instance,
a MS word, Excel, PowerPoint etc.
Application in Banking
The banking sector has improved on fronts such as security, ease of use, etc. with the help of
computers. Most of the banking operations can be done online, known as Internet banking, and
you don't have to walk up to the bank for virtually anything.
You can withdraw money from ATMs and deposit money in any branch, thanks to the
networking affected by the use of computers. The complete banking experience has also become
safer.
Entertainment
The field of entertainment has been revolutionized by computers. Animation, graphic image
manipulation etc has made the entertainment experience hundred times better. Computer gaming
is achieving new landmarks in terms of technology. Movie making, editing, music composition
etc everything needs computers.
Positive impacts
Page 2
Computer Science notes for Xth class
wide variety of games and software for learning math, reading science and history. Many
online videos teach skills, such as learning a language.
Negative impacts
A high percentage of people sit at their computer far too long and some people lose
reality as far as social activities and learning social skills.
Not to mention packing on the weight and the lack of exercise that will haunt them
further on down the road.
Sitting behind a computer all day is hard on the eyes.
More crime is committed through the Internet.
More misinformation by SOME people on the Internet can cause problems for the
younger generation.
Spammers are annoying & Hackers can ruin your computer system.
Page 3
Computer Science notes for Xth class
10.2 Internet
10.2.2 describe the hardware and software which make it possible to access
the internet;
For connecting computer to the Internet four basic things are required. These are:
Modem
Telephone Line
Web Browsing Software
Internet Service Provider (ISP).
Computer is a digital machine; any information which a computer handles must be expressed in
digits or numbers. Telephone lines are designed to carry analog signals but if computer wants to
send data to another computer through the telephone wire then it will not be possible because
computer will send data in the form of digital signals. For solving this problem modem is used.
Modem converts the analog signals into digital signals and digital signal into analog signal.
Telephone cables are an essential component. We connect one computer's modem to the other
computer's modem through a telephone cable.
Web browsing software is a program which let us view and explores information on internet.
Examples of web browsing softwares are Internet Explorer, Firefox, and Google Chrome etc.
To access internet from our compute, we need a account with an internet service provider (ISP).
They are replicated by themselves. Viruses are so dangerous and malicious that they can be
automatically copied and pasted from memory to memory over and over; the transmitting power
is too much quick from network to network that can simply hang smoothly running computer,
sometimes damage the important programs of the computer. Viruses are very dangerous program
can go on their activities automatically and can do a great loss of the users.
Page 4
Computer Science notes for Xth class
Boot Sector Virus: Boot sector virus infects the boot sector on floppy disks, hard disks and other
bootable media like DVD or CD.
A Boot Sector Virus infects the first sector of the hard drive, where the Master Boot Record
(MBR) is stored. The Master Boot Record (MBR) stores the disk's primary partition table and to
store bootstrapping instructions which are executed after the computer's BIOS passes execution
to machine code. If a computer is infected with Boot Sector Virus, when the computer is turned
on, the virus launches immediately and is loaded into memory, enabling it to control the
computer.
Macro Virus: Macro viruses are written by using the Macro programming languages like VBA,
which is a feature of MS office package. A macro is a way to automate and simplify a task that
you perform repeatedly in MS office suit (MS Excel, MS word etc). These macros are usually
stored as part of the document or spreadsheet and can travel to other systems when these files are
transferred to another computers.
File Deleting Viruses: A File Deleting Virus is designed to delete critical files which are the part
of Operating System or data files.
File Infector Virus: This sort of virus infects programs or executable records (records with .EXE
or .COM extension). At the same time as one of these programs run, straight or circuitously, the
virus is turned on; creating the harmful belongings it is automatic to bear out.
Trojan horses: A Trojan Horse virus gets its name from Homers story of the Trojan war, when
the Greek armies besieged the city of Troy by building a giant horse and hiding soldiers inside it.
The unsuspecting armies of Troy, thinking the Greeks had retreated leaving a giant horse as an
offering to the gods, wheeled the gift inside the city walls. Once the city of Troy was asleep the
Greek soldiers climbed out from inside the horse and opened the gates of the city allowing the
Greek army to invade and attack.
A Trojan Virus behaves in the same way. It moves silently in on a piece of software or file and
once inside takes over the computer.
Worms: A worm virus works by finding parts of your computers operating system that are weak
and then gains access to them to infect your computer. Worms are generally designed to replicate
and infect other computers on a network.
Page 5
Computer Science notes for Xth class
They come in the form of an email or piece of downloaded software and through these means
will slowly creep through the network of computers. Worms, though relatively harmless should
not be dismissed.
Some worm viruses have been created with the intent of turning all the computers they have
infected into zombies, allowing the author of the virus to take over and perform whatever task
they wish. They could delete or encrypt files, making them useless, or send personal information
and commit internet crimes remotely though your computer.
Other types of virus include Fat Viruses, Polymorphic viruses; Multipartite Viruses, Direct
Action Viruses, Resident Virus, Network viruses, Logic bomb etc.
10.3.2 describe how to combat the viruses with the help of firewalls, and other
anti-virus programs;
Firewall
A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and
worms that try to reach your computer over the Internet.
Antivirus
Antivirus programs are designed to provide the ultimate protection to any computer system
against potential hazards in the form of viruses, Trojans and worms both online and offline.
They identify threats to the computer and even secure the computer against identity theft.
Every antivirus program works in different ways. Some may check every file for malicious codes
and replication loops while others may check the files for their license and publisher’s name.
Page 6
Computer Science notes for Xth class
An observation network is established by all antivirus applications that allow each and every file
to be scanned. They are separated into low-risk and high-risk files. Every antivirus software
application has a database of virus definitions that the developer has to constantly update with
new virus releases every day.
Below is information about helping to secure your computer and prevent any unauthorized
access from other people or software programs; helping keep your information safe.
Software updates are made available, often for free, to consumers to help keep a software
program and operating systems running properly and secure. If the program you're using does
not have any method of checking for updates on its own it is up to you to verify the program is
up-to-date. Often this can be done by visiting the web site of the developer who created the
program.
Passwords
Make sure a password has been set on computer. Default passwords such as password, root,
admin or no password will allow easy access to your computer or your Internet account.
Page 7
Computer Science notes for Xth class
4. Do not use sticky notes around your computer to write down passwords. Instead use a
password manager.
We highly recommend all computer users have a firewall solution. There are two ways a firewall
can protect your computer and network.
Today, e-mail is one of the most popular features on the Internet. Being able to identify threats
sent through e-mail can help keep your computer and your personal information safe. Below are
some of the most common threats you may encounter while using e-mail.
Attachments - Never open or run e-mail attachments. Viruses, spyware, and other
malware are commonly distributed through e-mails that have attachments. For example,
an e-mail may want you to open an attachment of claiming to be a funny video, when it's
really a virus.
Phishing - Phishing or an e-mail phish is an e-mail that appears to be from an official
company (such as your bank) indicating you need to log onto the site to check your
account settings. However, the e-mails are really sites setup to steal confidential
information such as your passwords, credit card information, social security information,
etc.
Page 8
Computer Science notes for Xth class
10.5 Plagiarism
Copyright
A copyright is the exclusive legal right that prohibits copying of intellectual property without
the permission of the copyright holder. Copyright law protects books, articles, pamphlets, music,
art, drawings, movies, and, yes, computer software. Copyright protects the expression of an ideas
but not the idea itself.
Software Piracy
Software piracy is the unauthorized copying of copyrighted software. One way is to copy a
program from one floppy disk to another. Another is to download a program from network and
make a copy of it.
Copyright can to apply for any work, it must be an original idea or literature that is put to
use. The idea alone cannot be protected by copyright. It is the physical use of that idea, such
as a design or a written novel, which is covered under copyright law.
Page 9
Computer Science notes for Xth class
Copyright is given to the author according to the law, as soon as he completes his work.
In order to protect your own work and idea you need to register the work in the
copyright office.
The act of unauthorized uploading of a copyright works for others to download may attract
civil or even criminal sanctions. Unauthorized downloading of copyright works leads to civil
liability.
Software licensing protects the copyright by placing restrictions on the end user in relation to the
product duplication for purposes other than backup, installation on more than one computer,
editing the code, or changing the program in any way is usually forbidden. Software licenses
might also restrict reverse engineering and bypassing controls intended to cut down on pirating.
Aside from restrictive uses of the software, software licensing functions as a kind of disclaimer.
Most EULAs (End User License Agreement) include statements to the effect that the publisher
will not be held liable for any unexpected circumstances that might arise as a result of using the
software. This could refer to anything from a computer crash to loss of data, time or income.
Software licensing differs among types of software. Freeware licensing is less restrictive than
retail or shareware, in that it allows unlimited copying and distribution while still forbidding any
changes to the program. Public domain software is the one type of software licensing that has no
restrictions, as the software belongs to the public.
10.6 Robotics
10.6.1 describe the use of automata e.g. robots used in the automobile
industry;
Robots have been keeping things moving in the automotive industry for 30 years: the cost-
intensive models of the past have meanwhile made way for versatile and reliable high-tech
robots. With the development of each new model, robots have gradually become more profitable.
Today, they pay for themselves faster than ever before.
Typically prime targets for robot automation in automobile manufacturing are welding, assembly
of body, motor and gear-box, and painting and coating.
Page 10
Computer Science notes for Xth class
Cost Effectiveness
A robot can work twenty-four hours a day without a break, and continuously perform the same
routine tasks over and over again virtually non-stop.
Job Efficiency
Without any computer errors, robots will almost always get the job done quicker and more
efficiently than a human possibly could.
Safety
Robots are able to withstand exposure to extreme heat, chemicals in the air, and general physical
contact with parts and structures.
Accuracy
Robots are able to be programmed to perform precise intricate ties at much faster speeds than
any human could be expected to.
Physical Capacity
Robots are not limited like humans when it comes to performing many assembly jobs like
painting, finishing, welding, riveting, and installation. Robots also don't have restrictions with
moving heavy objects or issues of fatigue.
Some current uses of artificial intelligence by the military include systems in non-combat roles.
Training simulators are being developed that incorporate A.I. The U.S. Air Force is working with
private industry to develop systems for faster collection and examination of information. The
goal is to improve reaction and decision-making time to implement more effective military
actions. Like many of the military's uses of A.I., it involves information management and
decision making.
There are some ethical concerns about the use of A.I. based systems in war. Some have raised
concerns about the role of A.I. in war. Using these systems for support and managerial roles is
Page 11
Computer Science notes for Xth class
one thing but having non-human combatants (fighters) is another. Professor Noel Sharkey, of the
University of Sheffield, discusses the potential problems of mechanical warriors. He said robots
could not fulfill two basic tenants of war. One is the ability to distinguish between friend and foe,
which is sometimes difficult for humans to do them during modern war. The other tenant is that
of proportionality. This is the decision about the amount of force considered reasonable in a
given situation. Another concern is that humans could be moved from the position of decision
making to that of monitoring decisions made by computers.
Meteorologists analyze large volumes of data in order to predict the weather, and even the most
experienced weatherman isn't always accurate. Soon, scientists may be able to predict the
weather better by using artificial intelligence software, which can sift through complex data and
spot patterns missed by the human eye. When this software sees a big storm coming, it will
automatically issue alerts to warn residents and the media, and this may help save lives.
By increasing the accuracy of weather predictions, artificial intelligence software may also offer
important benefits in crop development, forestry and agriculture. NASA is even working on
programs that will guide aircraft around potential storms and danger spots, even in remote areas,
which could increase the safety of air travel in the near future.
Page 12