Computer
Computer
A computer is a fast electronic device that processes the input data according to the
Instructions given by the programmer/user and provides the desired information as an
Output. In a laymans language, a computer is a fast calculating device that can perform arithmetic
Operations. Although the computer was originally invented mainly for doing high speed
And accurate calculations, it is not just a calculating device. The computer can perform any
Kind of work involving arithmetic and logical operations on data. It gets the data through an
Input device, processes it as per the instructions given and gives the information as an
Output.
Computers play a vital role for processing of data in an organization. Computer: help in
Processing the volumes of data efficiently and accurately within a short time. A computer
has the following characteristics which make it so important for an organization:
1. Fast: A computer is so fast that it can perform the given task (arithmetical or logical)
in few seconds as compared to man who can spend many months for doing the same
task. A computer can process millions of instructions per second.
2. Accurate: While doing calculations, a computer is more accurate than man can make
mistakes in calculations but a computer does not make mistakes, if it is provided
accurate instructions.
3. Diligence: A computer does not suffer from the human traits of tiredness and boredom.
Man will be tired and bored while doing millions of calculations but a computer, being
a machine, does this job very efficiently and without any tiredness and boredom.
4. High Memory: A computer has much more memory or storage capacity than human
being. It can store millions of data and instructions, which can be retrieved and recalled
even after a number of years. This is not possible in case of human brain.
5. No Intelligence: A computer is a machine and obviously has no intelligence of its
own. Each and every instruction must be given to the computer for doing a task. Man
has an intelligence and it is the man who invented computer and gives it all the
instructions and logic to work. A computer cannot take decisions on its own and it is
the main drawback of computer.
The characteristics of the computer system are as follows −
Speed
A computer works with much higher speed and accuracy compared to humans while
performing mathematical calculations. Computers can process millions (1,000,000) of
instructions per second. The time taken by computers for their operations is microseconds
and nanoseconds.
Accuracy
Computers perform calculations with 100% accuracy. Errors may occur due to data
inconsistency or inaccuracy.
Diligence
A computer can perform millions of tasks or calculations with the same consistency and
accuracy. It doesn’t feel any fatigue or lack of concentration. Its memory also makes it
superior to that of human beings.
Versatility
Versatility refers to the capability of a computer to perform different kinds of works with same
accuracy and efficiency.
Reliability
A computer is reliable as it gives consistent result for similar set of data i.e., if we give same
set of input any number of times, we will get the same result.
Automation
Computer performs all the tasks automatically i.e. it performs tasks without manual
intervention.
Memory
COMPUTER GENERATIONS
Computers are classified into following six types based on their historical advancement and
electronic components used.
Zeroth Generation Computers
The zeroth generation of computers (1642-1946) was marked by the invention of mainly
mechanical computers. In 1822, Charles Babbage, an English mathematician, designed
a machine called Difference Engine to compute tables of numbers for naval navigation. Later
on, in the year 1834, Babbage attempted to build a digital computer, called Analytical Engine.
The analytical engine had all the parts of a modern computer, i.e.; it had four components
the store (memory unit), the mill (computation unit), the punched card reader (input unit)
and the punched/printed output (output unit). The Zeroth generation of computers or the
era of mechanical computers ended in 1946 when vacuum tubes were invented.
First Generation Computers
The first generation of computers (1946-1954) was marked by the use of vacuum tubes or
valves for their basic electronic component. Although these computers were faster than
earlier mechanical devices, they had many disadvantages. First of all, they were very large
in size. They consumed too much power and generated too much heat, when used for even
short duration of time. They were very unreliable and broke down frequently. They required
regular maintenance and their components had also to be assembled manually.
Examples:
ENIAC (Electronic Numerical Integrator and Calculator) It was the first electronic
computer using vacuum tubes. - 1946
EDSAC (Electronic Delay Storage Automatic Calculator) It was the first stored-program computer.
- 1949
EDVAC (Electronic Discrete Variable Automatic Computer) It was successor of EDSAC.
- 1951
IAS machine (Princeton's Institute of Advanced Studies) It was a new version of the
EDVAC, built by von Neumann. - 1952
31
CLASSIFICATION OF COMPUTERS
PC (Personal Computer)
A PC can be defined as a small, relatively inexpensive computer designed for an individual user. PCs
are based on the microprocessor technology that enables manufacturers to put an entire CPU on one
chip. Businesses use personal computers for word processing, accounting, desktop publishing, and
for running spreadsheet and database management applications. At home, the most popular use for
personal computers is playing games and surfing the Internet.
Although personal computers are designed as single-user systems, these systems are normally linked
together to form a network. In terms of power, nowadays high-end models of the Macintosh and PC
offer the same computing power and graphics capability as low-end workstations by Sun
Microsystems, Hewlett-Packard, and Dell.
Workstation
The workstation is a computer used for engineering applications (CAD/CAM), desktop publishing,
software development, and other such types of applications which require a moderate amount of
computing power and relatively high-quality graphics capabilities.
Workstations generally come with a large, high-resolution graphics screen, a large amount of RAM,
inbuilt network support, and a graphical user interface. Most workstations also have mass storage
device such as a disk drive, but a special type of workstation, called diskless workstations, comes
without a disk drive.
Common operating systems for workstations are UNIX and Windows NT. Like PC, workstations are
also single-user computers like PC but are typically linked together to form a local area network,
although they can also be used as stand-alone systems.
Minicomputer
It is a midsize multi-processing system capable of supporting up to 250 users simultaneously.
Mainframe
The mainframe is very large in size and is an expensive computer capable of supporting hundreds or
even thousands of users simultaneously. Mainframe executes many programs concurrently and
supports much simultaneous execution of programs.
Supercomputer
Supercomputers are one of the fastest computers currently available. Supercomputers are very
expensive and are employed for specialized applications that require an immense amount of
mathematical calculations (number-crunching). For example, weather forecasting, scientific
simulations, (animated)graphics, fluid dynamic calculations, nuclear energy research, electronic
design, and analysis of geological data (e.g. in petrochemical prospecting).
COMPUTER ORGANISATION
Computer Organization refers to the level of abstraction above the digital logic level, but
below the operating system level.
In computer engineering, micro-architecture, also called computer organization, is the way a
given instruction set architecture is implemented on a processor. A given ISA may be
implemented with different micro-architectures.
2. Memory Unit
A memory is just like a human brain. It is used to store data and instruction. Computer
memory is use to Stores information being processed by the CPU
3. Control Unit
Control unit help to perform operations of input unit, output unit, Memory unit and ALU in a
sequence.
Memory
Computer memory is any physical device capable of storing information temporarily or
permanently. For example, Random Access Memory RAM is a type of volatile memory that
is stores information on an integrated circuit, and that is used by the operating system,
software, hardware, or the user.
Input Devices
A device that can be used to insert data into a computer system is called as input device. It
allows people to supply information to computers. An input device is any hardware device
that sends data to the computer, without any input devices, a computer would only be a
display device and not allow users to interact with it, much like a TV.The most fundamental
pieces of information are keystrokes on a keyboard and clicks with a mouse. These two input
devices are essential for you to interact with your computer. Input devices represent one
type of computer peripheral.
Examples of input devices include keyboards, mouse, scanners, digital cameras and
joysticks.
Output Devices
A device which is used to display result from a computer is called as output device. It Allows
people to receive information from computers. An output device is any peripheral that
receives or displays output from a computer. The picture shows an inkjet printer, an output
device that can make a hard copy of anything being displayed on a monitor. Output device is
electronic equipment connected to a computer and used to transfer data out of the computer
in the form of text, images, sounds or print.
Examples of output devices include Printer, Scanner, Monitor, etc.
STORAGE DEVICES
A storage unit is a part of the computer system which is employed to store the information
and instructions to be processed. A storage device is an integral part of the computer
hardware which stores information/data to process the result of any computational work.
Without a storage device, a computer would not be able to run or even boot up. Or in other
words, we can say that a storage device is hardware that is used for storing, porting, or
extracting data files. It can also store information/data both temporarily and permanently.
Computer storage is of two types:
Primary Storage Devices: It is also known as internal memory and main memory. This is a
section of the CPU that holds program instructions, input data, and intermediate results. It is
generally smaller in size. RAM (Random Access Memory) and ROM (Read Only Memory)
are examples of primary storage.
Secondary Storage Devices: Secondary storage is a memory that is stored external to the
computer. It is mainly used for the permanent and long-term storage of programs and data.
Hard Disk, CD, DVD, Pen/Flash drive, SSD, etc, are examples of secondary storage.
Storage Devices
Now we will discuss different types of storage devices available in the market. These storage
devices have their own specification and use. Some of the commonly used storage devices
are:
(i) RAM: It stands for Random Access Memory. It is used to store information that is used
immediately or we can say that it is a temporary memory. Computers bring the software
installed on a hard disk to RAM to process it and to be used by the user. Once, the computer
is turned off, the data is deleted. With the help of RAM, computers can perform multiple
tasks like loading applications, browsing the web, editing a spreadsheet, experiencing the
newest game, etc. It allows you to modify quickly among these tasks, remembering where
you’re in one task once you switch to a different task. It is also used to load and run
applications, like your spreadsheet program, answer commands, like all edits you made
within the spreadsheet, or toggle between multiple programs, like once you left the
spreadsheet to see the email. Memory is nearly always being actively employed by your
computer. It ranges from 1GB – 32GB/64GB depending upon the specifications. There are
different types of RAM, although they all serve the same purpose, the most common ones
are:
SRAM: It stands for Static Random Access Memory. It consists of circuits that retain stored
information as long as the power is supply is on. It is also known as volatile memory. It is
used to build Cache memory. The access time of SRAM is lower and it is much faster as
compared to DRAM but in terms of cost, it is costly as compared to DRAM.
DRAM: It stands for Dynamic Random Access Memory. It is used to stores binary bits in the
form of electrical charges that are applied to capacitors. The access time of DRAM is slower
as compare to SRAM but it is cheaper than SRAM and has a high packaging density.
SDRAM: It stands for Synchronous Dynamic Random Access Memory. It is faster than
DRAM. It is widely used in computers and others. After SDRAM was introduced, the
upgraded version of double data rate RAM, i.e., DDR1, DDR2, DDR3, and DDR4 was
entered into the market and widely used in home/office desktops and laptops.
(ii) ROM: It stands for Read-Only Memory. The data written or stored in these devices are
non-volatile, i.e, once the data is stored in the memory cannot be modified or deleted. The
memory from which will only read but cannot write it. This type of memory is non-volatile.
The information is stored permanently during manufacture only once. ROM stores
instructions that are used to start a computer. This operation is referred to as bootstrap. It is
also used in other electronic items like washers and microwaves. ROM chips can only store
few megabytes (MB) of data, which ranges between 4 and 8 MB per ROM chip. There are
two types of ROM:
PROM: PROM is Programmable Read-Only Memory. These are ROMs that can be
programmed. A special PROM programmer is employed to enter the program on the PROM.
Once the chip has been programmed, information on the PROM can’t be altered. PROM is
non-volatile, that is data is not lost when power is switched off.
EPROM: Another sort of memory is that the Erasable Programmable Read-Only Memory. It
is possible to erase the info which has been previously stored on an EPROM and write new
data onto the chip.
(i) Floppy Disk: It is also known as a floppy diskette. It is generally used on a personal
computer to store data externally. A Floppy disk is made up of a plastic cartridge and
secures with a protective case. Nowadays floppy disk is replaced by new and effective
storage devices like USB, etc.
(ii) Hard Disk: It is a storage device (HDD) that stores and retrieves data using magnetic
storage. It is a non-volatile storage device that can be modified or deleted n number of times
without any problem. Most of the computers and laptops have HDDs as their secondary
storage device. It is actually a set of stacked disks, just like phonograph records. In every
hard disk, the data is recorded electromagnetically in the concentric circles or we can say
track present on the hard disk, and with the help of a head just like a phonograph arm(but
fixed in a position) to read the information present on the track. The read-write speed of
HDDs is not so fast but decent. It ranges from a few GBs to a few and more TB.
(iii) Magnetic Card: It is a card in which data is stored by modifying or rearranging the
magnetism of tiny iron-based magnetic particles present on the band of the card. It is also
known as a swipe card. It is used like a passcode(to enter into house or hotel room), credit
card, identity card, etc.
(iv) Tape Cassette: It is also known as a music cassette. It is a rectangular flat container in
which the data is stored in an analog magnetic tape. It is generally used to store audio
recordings.
(v) SuperDisk: It is also called LS-240 and LS-120. It is introduced by Imation corporation
and it is popular with OEM computers. It can store data up to 240 MB.
It is a cheaper and portable storage device. It is the most commonly used device to store
data because is more reliable and efficient as compare to other storage devices. Some of
the commonly used flash memory devices are:
(i) Pen Drive: It is also known as a USB flash drive that includes flash memory with an
integrated USB interface. We can directly connect these devices to our computers and
laptops and read/write data into them in a much faster and efficient way. These devices are
very portable. It ranges from 1GB to 256GB generally.
(ii) SSD: It stands for Solid State Drive, a mass storage device like HDDs. It is more durable
because it does not contain optical disks inside like hard disks. It needs less power as
compared to hard disks, is lightweight, and has 10x faster read and write speed as
compared to hard disks. But, these are costly as well. While SSDs serve an equivalent
function as hard drives, their internal components are much different. Unlike hard drives,
SSDs don’t have any moving parts and thus they’re called solid-state drives. Instead of
storing data on magnetic platters, SSDs store data using non-volatile storage. Since SSDs
haven’t any moving parts, they do not need to “spin up”. It ranges from 150GB to a few and
more TB.
(iii) SD Card: It is known as a Secure Digital Card. It is generally used with electronic devices
like phones, digital cameras, etc. to store larger data. It is portable and the size of the SD
card is also small so that it can easily fit into electronic devices. It is available in different
sizes like 2GB, 4GB, 8GB, etc.
(iv) Memory Card: It is generally used in digital cameras. printers, game consoles, etc. It is
also used to store large amounts of data and is available in different sizes. To run a memory
card on a computer you require a separate memory card reader.
(v) Multimedia Card: It is also known as MMC. It is an integrated circuit that is generally used
in-car radios, digital cameras, etc. It is an external device to store data/information.
(i) CD: It is known as Compact Disc. It contains tracks and sectors on its surface to store
data. It is made up of polycarbonate plastic and is circular in shape. CD can store data up to
700MB. It is of two types:
CD-R: It stands for Compact Disc read-only. In this type of CD, once the data is written can
not be erased. It is read-only.
CD-RW: It stands for Compact Disc read Write. In this type of CD, you can easily write or
erase data multiple times.
(ii) DVD: It is known as Digital Versatile Disc. DVDs are circular flat optical discs used to
store data. It comes in two different sizes one is 4.7GB single-layer discs and another one is
8.5GB double-layer discs. DVDs look like CDs but the storage capacity of DVDs is more
than as compared to CDs. It is of two types:
DVD-R: It stands for Digital Versatile Disc read-only. In this type of DVD, once the data is
written can not be erased. It is read-only. It is generally used to write movies, etc.
DVD-RW: It stands for Digital Versatile Disc read Write. In this type of DVD, you can easily
write or erase data multiple times.
(iii) Blu-ray Disc: It is just like CD and DVD but the storage capacity of blu ray is up to 25GB.
To run a Blu-ray disc you need a separate Blu-ray reader. This Blu-ray technology is used to
read a disc from a blue-violet laser due to which the information is stored in greater density
with a longer wavelength.
Nowadays, secondary memory has been upgraded to virtual or cloud storage devices. We
can store our files and other stuff in the cloud and the data is stored for as long as we pay for
the cloud storage. There are many companies that provide cloud services largely Google,
Amazon, Microsoft, etc. We can pay the rent for the amount of space we need and we get
multiple benefits out of it. Though it is actually being stored in a physical device located in
the data centres of the service provider, the user doesn’t interact with the physical device
and its maintenance. For example, Amazon Web Services offers AWS S3 as a type of
storage where users can store data virtually instead of being stored in physical hard drive
devices. These sorts of innovations represent the frontier of where storage media goes.
PC AS A VIRTUAL OFFICE
UNIT: 2
Information technology (IT) is the use of computers to create, process, store, retrieve, and
exchange all kinds of electronic data[1] and information. IT is typically used within the context
of business operations as opposed to personal or entertainment technologies.[2] IT forms part
of information and communications technology (ICT). An information technology
system (IT system) is generally an information system, a communications system, or, more
specifically speaking, a computer system — including all hardware, software,
and peripheral equipment — operated by a limited group of IT users.
1. Computer Hardware:
Physical equipment used for input, output and processing. The hardware structure depends
upon the type and size of the organization. It consists of an input and an output device,
operating system, processor, and media devices. This also includes computer peripheral
devices.
2. Computer Software:
The programs/ application program used to control and coordinate the hardware
components. It is used for analysing and processing of the data. These programs include a
set of instruction used for processing information.
a) System Software
b) Application Software
c) Procedures
3. Databases:
Data are the raw facts and figures that are unorganized that are and later processed to
generate information. Softwares are used for organizing and serving data to the user,
managing physical storage of media and virtual resources. As the hardware can’t work
without software the same as software needs data for processing. Data are managed using
Database management system.
Database software is used for efficient access for required data, and to manage knowledge
bases.
4. Network:
Networks resources refer to the telecommunication networks like the intranet, extranet and
the internet. These resources facilitate the flow of information in the organization. Network
consists of both the physicals devices such as networks cards, routers, hubs and cables and
software such as operating systems, web servers, data servers and application servers.
Telecommunications networks consist of computers, communications processors, and other
devices interconnected by communications media and controlled by software. Networks
include communication media, and Network Support.
5. Human Resources:
It is associated with the manpower required to run and manage the system. People are the
end user of the information system, end-user use information produced for their own
purpose, the main purpose of the information system is to benefit the end user. The end user
can be accountants, engineers, salespersons, customers, clerks, or managers etc. People
are also responsible to develop and operate information systems. They include systems
analysts, computer operators, programmers, and other clerical IS personnel, and managerial
techniques.
A computer network is a group of computers linked to each other that enables the computer to
communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four types:
o Local Area Network is a group of computers connected to each other in a small area such as
building, office.
o LAN is used for connecting two or more personal computers through a communication
medium such as twisted pair, coaxial cable, etc.
o It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and
ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.
o Local Area Network provides higher security.
PAN (Personal Area Network)
o Personal Area Network is a network arranged within an individual person, typically within a
range of 10 meters.
o Personal Area Network is used for connecting the computer devices of personal use is known
as Personal Area Network.
o Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area
Network.
o Personal Area Network covers an area of 30 feet.
o Personal computer devices that are used to develop the personal area network are the laptop,
mobile phones, media player and play stations.
Wireless Personal Area Network: Wireless Personal Area Network is developed by simply using
wireless technologies such as WiFi, Bluetooth. It is a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
Examples Of Personal Area Network:
o Body Area Network: Body Area Network is a network that moves with a person. For
example, a mobile network moves with a person. Suppose a person establishes a network
connection and then creates a connection with another device to share the information.
o Offline Network: An offline network can be created inside the home, so it is also known as
a home network. A home network is designed to integrate the devices such as printers,
computer, television but they are not connected to the internet.
o Small Home Office: It is used to connect a variety of devices to the internet and to a
corporate network using a VPN
o A Wide Area Network is a network that extends over a large geographical area such as states
or countries.
o A Wide Area Network is quite bigger network than the LAN.
o A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business, government, and education.
The Internet is “the global system of interconnected computer networks that use the
Internet protocol suite (TCP/IP) to link devices worldwide.” It has changed the way we do
our daily chores. The usual tasks that we perform like sending an email, looking up train
schedules, social networking, paying a utility bill is possible due to the Internet. The
structure of internet has become quite complex and it cannot be represented as it is
changing instantaneously. Every now and then some resources are being added while some
are being removed. Internet comprises of various networks that include public, private,
government, business, and academic sectors linked together using different electronic
technologies. It interconnects global networks with local and vice-versa. The resources of
Internet range in both information (including digital documents like image, video, text etc.)
and services (including information sharing, email, video conferencing) domains.
Though the terms Internet and World Wide Web are used interchangeably in lay man terms
they are not the same. It is common practice to say "going on the Internet" whenever we
open any web page on a browser. However, the World Wide Web or the Web is one of the
most popular Internet services available. The Web is a collection of interconnected
documents (web pages) and other web resources, linked by hyperlinks and URLs. It uses
HTTP as an underlying protocol for information transfer, which is one of the several other
protocols available in networking theory.
Definition: - The Internet is a global collection of computer networks that are linked together
by devices called routers and use a common set of protocols for data transmission known as
TCP/IP (transmission control protocol / Internet protocol). The primary purpose of the
Internet is to facilitate the sharing of information. There are many different tools used on
the Internet to make this possible. Some of the more common tools include email, list
servers, newsgroups, telnet, gopher, FTP, and the World Wide Web. Probably the most
popular of all Internet tools is the World Wide Web.
Advantages of Internet :
The internet is perhaps one of the best inventions thus far. As anyone can access the
computer this made people by stripping away geographical barriers and sharing information
instantaneously.
1. Communication Forum –
The speed of communication becomes faster which is obtained through the web.
Families and friends can confine touch easily. The platform for products like SKYPE
allows for holding a video conference with anyone within the world who also has access.
2. Abundant Information –
Anyone can find information on almost any imaginable subject. Plenty of resources are
often found through the program in minutes.
3. Inexhaustible Education –
For instance, students can gain readily available help for his or her homework online.
4. Entertainment for everybody –
Most folks love using our laptops, smartphones, and, tablets. The web is that the big
reason behind us spending such a lot of time on these gadgets.
5. Online Services and E-commerce –
Many services of emails, online banking, online shopping, etc are there. Free mail to
anyone is definitely accessible all around the world. E-commerce enables one in
America to shop for things in Asia, Africa, or other areas within the world through some
simple clicks of the mouse.
6. Social network –
Social networking is the sharing of data with people across the planet. Aside from being
an entertainment website, it’s many uses.
7. Learning –
The web has now become a neighborhood of education. Education like homeschooling
is definitely administered using the web. Teachers can upload their teaching videos on
the web
Disadvantages of Internet :
The Internet’s drawbacks can’t be overlooked any longer as numerous teenagers are
affected by Internet Addiction Disorder, then many ladies became online shopaholics.
1. Internet Addiction Disorder –
Internet addiction is detrimental to not only fitness but also psychological state.
2. Cyber Crime –
Hacker programs a virus which gets into the pc and ruins valuable data. Users’ personal
information like name, address, master card, bank details, and other information are
often accessed by culprits when used on the web, leading to significant economic loss.
3. Social Alienation –
Time spent online flies fast without consciousness. After getting attracted the user
trapped into the trap, users are trapped by a “net”, spending less time with people in the
real world. Less interaction and face-to-face communication, actually, may end in a
decrease in social abilities.
4. Spam –
The unnecessary emails, advertisements, etc. are sometimes said to be spam because
they need the power to hamper the system and make the users face many problems.
E-mail is defined as the transmission of messages on the Internet. It is one of the most commonly
used features over communications networks that may contain text, files, images, or other
attachments. Generally, it is information that is stored on a computer sent through a network to a
specified individual or group of individuals.
Email messages are conveyed through email servers; it uses multiple protocols within
the TCP/IP suite. For example, SMTP is a protocol, stands for simple mail transfer protocol and used
to send messages whereas other protocols IMAP or POP are used to retrieve messages from a mail
server.
Although most of the webmail servers automatically configure your mail account, therefore, you only
required to enter your email address and password. Email messages include three components, which
are as follows:
o Message envelope: It depicts the email's electronic format.
o Message header: It contains email subject line and sender/recipient information.
o Message body: It comprises images, text, and other file attachments.
Uses of E-mail : Email can be used in different ways: it can be used to communicate either within an
organization or personally, including between two people or a large group of people. Most people get
benefit from communicating by email with colleagues or friends or individuals or small groups. It
allows you to communicate with others around the world, send, and receive images, documents, links,
and other attachments. Additionally, it offers benefit users to communicate with the flexibility on their
own schedule.
Advantages of E-mail
Disadvantages of E-mail
o Impersonal: As compared to other forms of communication, emails are less personal. For
example, when you talk to anyone over the phone or meeting face to face is more appropriate
for communicating than email.
o Misunderstandings: As email includes only text, and there is no tone of voice or body
language to provide context. Therefore, misunderstandings can occur easily with email. If
o Malicious Use: As email can be sent by anyone if they have an only email address.
Sometimes, an unauthorized person can se
o Accidents Will Happen: With email, you can make fatal mistakes by clicking the wrong
button in a hurry. For instance, instead of sending it to a single person, you can accidentally
send sensitive information to a large group of people.
o Spam: Although in recent days, the features of email have been improved, there are still big
issues with unsolicited advertising arriving and spam through email. It can easily become
overwhelming and takes time and energy to control.
o Viruses: Although there are many ways to travel viruses in the devices, email is one of the
common ways to enter viruses and infect devices. Sometimes when you get a mail, it might
be the virus come with an attached document.
A network protocol is an established set of rules that determine how data is transmitted between
different devices in the same network. Essentially, it allows connected devices to communicate with
each other, regardless of any differences in their internal processes, structure or design. Network
protocols are the reason you can easily communicate with people all over the world, and thus play a
critical role in modern digital communications.
Similar to the way that speaking the same language simplifies communication between two people,
network protocols make it possible for devices to interact with each other because of
predetermined rules built into devices’ software and hardware. Neither local area networks
(LAN) nor wide area networks (WAN) could function the way they do today without the use of
network protocols. There are thousands of different network protocols, but they all perform one of
three primary actions:
● Communication
● Network management
● Security
The World Wide Web is abbreviated as WWW and is commonly known as the web. The
WWW was initiated by CERN (European library for Nuclear Research) in 1989.
History:
It is a project created, by Timothy Berner Lee in 1989, for researchers to work together
effectively at CERN. is an organization, named the World Wide Web Consortium (W3C),
which was developed for further development of the web. This organization is directed by
Tim Berner’s Lee, aka the father of the web.
System Architecture:
From the user’s point of view, the web consists of a vast, worldwide connection of
documents or web pages. Each page may contain links to other pages anywhere in the
world. The pages can be retrieved and viewed by using browsers of which internet explorer,
Netscape Navigator, Google Chrome, etc are the popular ones. The browser fetches the
page requested interprets the text and formatting commands on it, and displays the page,
properly formatted, on the screen.
The basic model of how the web works are shown in the figure below. Here the browser is
displaying a web page on the client machine. When the user clicks on a line of text that is
linked to a page on the abd.com server, the browser follows the hyperlink by sending a
message to the abd.com server asking it for the page.
Here the browser displays a web page on the client machine when the user clicks on a line
of text that is linked to a page on abd.com, the browser follows the hyperlink by sending a
message to the abd.com server asking for the page.
Working of WWW:
The World Wide Web is based on several different technologies: Web browsers, Hypertext
Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
A Web browser is used to access web pages. Web browsers can be defined as programs
which display text, data, pictures, animation and video on the Internet. Hyperlinked
resources on the World Wide Web can be accessed using software interfaces provided by
Web browsers. Initially, Web browsers were used only for surfing the Web but now they
have become more universal. Web browsers can be used for several tasks including
conducting searches, mailing, transferring files, and much more. Some of the commonly
used browsers are Internet Explorer, Opera Mini, and Google Chrome.
Features of WWW:
● HyperText Information System
● Cross-Platform
● Distributed
● Open Standards and Open Source
● Uses Web Browsers to provide a single interface for many services
● Dynamic, Interactive and Evolving.
● “Web 2.0”
Components of the Web: There are 3 components of the web:
1. Uniform Resource Locator (URL): serves as a system for resources on the web.
2. HyperText Transfer Protocol (HTTP): specifies communication of browser and server.
3. Hyper Text Markup Language (HTML): defines the structure, organisation and content
of a webpage.
INTERNET SECURITY
Internet security is a term that describes security for activities and transactions made over
the internet. It is a particular component of the larger ideas of cybersecurity and computer
security, involving topics including browser security, online behaviour and network security.
We spend a large proportion of our lives online, and some of the internet security threats we
can encounter include:
● Hacking, where unauthorized users gain access to computer systems, email accounts, or
websites.
● Viruses or malicious software (known as malware) which can damage data or make systems
vulnerable to other threats.
● Identity theft, where criminals can steal personal and financial information.
Individuals and organizations can protect themselves from these kinds of threats by
practicing internet security.
Phishing
Phishing is a cyber-attack involving disguised emails. Hackers try to trick email recipients
into believing that a message is genuine and relevant – a request from their bank or a note
from a co-worker, for example – so that they click on a link or open an attachment. The goal
is to deceive people into handing over their personal information or downloading malware.
Hackers are always looking to exploit a private network or system's vulnerabilities so they
can steal confidential information and data. Remote access technology gives them another
target to exploit. Remote access software allows users to access and control a computer
remotely – and since the pandemic, with more people working remotely, its usage has
increased.
The protocol, which allows users to control a computer connected to the internet remotely, is
called Remote Desktop Protocol, or RDP. Because businesses of all sizes so widely use
RDP, the chances of an improperly secured network are relatively high. Hackers use
different techniques to exploit RDP vulnerabilities until they have full access to a network
and its devices. They may carry out data theft themselves or else sell the credentials on the
dark web.
Malware is a portmanteau of "malicious" and "software". It's a broad term related to viruses,
worms, trojans, and other harmful programs that hackers use to cause havoc and steal
sensitive information. Any software intended to damage a computer, server, or network can
be described as malware.
Ransomware
Ransomware is a type of malware that prevents you from using your computer or accessing
specific files on your computer unless a ransom is paid. It is often distributed as a trojan –
that is, malware disguised as legitimate software. Once installed, it locks your system’s
screen or certain files until you pay.
Because of their perceived anonymity, ransomware operators typically specify payment in
cryptocurrencies such as Bitcoin. Ransom prices vary depending on the ransomware variant
and the price or exchange rate of digital currencies. It isn’t always the case that if you pay,
the criminals will release the encrypted files.
Ransomware attacks are on the rise, and new ransomware variants continue to emerge.
Some of the most talked-about ransomware variants include Maze, Conti, GoldenEye, Bad
Rabbit, Jigsaw, Locky, and WannaCry.
Botnets
Once a botnet’s owner controls your computer, they can use it to carry out malicious
activities. These include:
● Generating fake internet traffic on third party websites for financial gain.
● Using your machine’s power to assist in Distributed Denial of Service (DDoS) attacks to shut
down websites.
● Emailing spam to millions of internet users.
● Committing fraud and identity theft.
● Attacking computers and servers.
Computers become part of a botnet in the same ways that they are infected by any other
type of malware – for example, opening email attachments that download malware or visiting
websites infected with malware. They can also spread from one computer to another via a
network. The number of bots in a botnet varies and depends on the ability of the botnet
owner to infect unprotected devices.
Multifactor authentication (MFA) is an authentication method that asks users to provide two
or more verification methods to access an online account. For example, instead of simply
asking for a username or password, multifactor authentication goes further by requesting
additional information, such as:
● An extra one-time password that the website's authentication servers send to the
user's phone or email address.
● Answers to personal security questions.
● A fingerprint or other biometric information, such as voice or face recognition.
Use a firewall
A firewall acts as a barrier between your computer and another network, such as the
internet. Firewalls block unwanted traffic and can also help to block malicious software from
infecting your computer. Often, your operating system and security system come with a pre-
installed firewall. It is a good idea to make sure those features are turned on, with your
settings configured to run updates automatically, to maximize internet security.
Our browsers are our primary gateway to the web and therefore play a key role in internet
security. A good web browser should be secure and help to protect you from data breaches.
Create strong passwords, and use a secure password manager
A strong password will help you maintain internet security. A strong password is:
Internet security antivirus is critical for ensuring privacy and security online. The best internet
security software protects you from different types of internet attacks and protects your data
online. It’s important to keep antivirus software up to date – most modern programs update
themselves automatically to stay on top of the latest internet security threats.
APPLICATION OF INTERNET IN BUSINESS
There are a number of strategic uses of the Internet within business. These
include:
1. Corporate activities
2. Market intelligence
3. Customer relations
4. Selling
5. Marketing
● Finding new customers
● Educating customers
● Building credibility with potential customers
● Building goodwill
● Improving brand loyalty
● Encouraging brand trial
● Building customer loyalty: membership programs
● Building customer loyalty: ongoing communications
● Building a mailing list.