Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
179 views

SRC Computer Notes 2024 9th Class

Uploaded by

Ahsan Siddiqui
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
179 views

SRC Computer Notes 2024 9th Class

Uploaded by

Ahsan Siddiqui
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

CHAPTER # 01
The computer is derived from a Latin Word, "Compute", Which means To Count or
Calculate.
▸ Define the term Computer. Briefly describe the working of computer processing
system.
COMPUTER
"Computer is an electronic device that takes raw data as input from the user and
processes it under the control of set of instructions (called program), gives the result
(output), and saves it for the future use."
OR
Computer is an electronic machine that is used for storing, organizing, and finding
words, numbers,and pictures, for doing calculations, and for controlling other
machines"
OR
"Computer is an electronic machine which can accept information, store that
information,arithmetically and logically process that information and outputs the results
to the users."
FUNCTIONS OF COMPUTER
Computer has the ability to store, retrieve and process data. It processes data at very
high speed according to the instructions given to it and produces accurate results.
COMPUTER PROGRAM
"The instructions given to a computer to perform a particular task is known as Computer
Program."
TOPIC #1 EVOLUTION OF COMPUTER
At the early age people used pebbles, stones, sticks, scratches, symbols and finger tips
to count, which were later replaced by numbers. The history of computing is divided
into three ages during which man invented and improved different types of calculating
machines. These ages are,
i) MECHANICAL ERA (Dark age)-30008 BC to 1837 A.D.
ii) ELECTRO-MECHANICAL ERA (Middle age) - 1890 A.D.
iii) ELECTRONICERA (Modern age) - since 1940 AD

MECHANICAL ERA (DARK AGE


In the Mechanical Era, human become successful to make simple machines. These all
data processing machine operated manually since the electricity was not invented. This
could help performing simple arithmetic operation, in other words computing. The
following manual machines were used for data processing in the dark ages of computer.
ABACUS (3000 B.C)

Page 1 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

ABACUS was invented by 'TIM CRANMER' about 5,000 years ago. It is also known as
counting frame, ABACUS was the earliest calculating device most probably invented in
CHINA.
STRUCTURE & FUNCTION OF ABACUS
ABACUS consisted of a wooden frame having parallel rods. These rods had a number of
wooden
beads which could slide freely along the length of rods. While performing calculations
beads were moved up and down with fingers. ABACUS was used to perform addition,
subtraction, multiplication and division. It has been used in China and some other Asian
countries till the end of 20th century. Although today calculators and computers are
usually used instead of abacuses, abacuses still remain use in some countries. They are
still used to teach arithmetic to children.
JOHN NAPIER CALCULATING DEVICE (1612 A.D)
Napier's bones is a manually-operated calculating device created by John Napier of
Scotland for the calculation of products and quotients of numbers in 1612. Using the
multiplication tables embedded in the rods, multiplication can be reduced to addition
operations and division to subtractions. The complete device usually includes a base
board with a rim; the user places Napier's rods inside the rim to conduct multiplication
or division.
SLIDE RULE (1622 A.D)
A tool commonly used by engineers and scientists who dealt with math in their work
was the Slide rule. It was invented by William Ought red, an English mathematician, in
1622. A slide rule is actually a simple form of what is called an analog computer, a
device that does computation by measuring and operating on a continuously varying
quantity, Ought red designed the common slide rule, which has a moveable center rule
between fixed upper and lower rules. Many different scales are printed on it, and a
sliding cursor helps the user better view the alignment between scales
PASCALINE OR PASCAL's CALCULATOR (1642 A.D)
Blaise Pascal, a French mathematician invented a calculating machine called Pascaline in
1642 when he was only 19years old. Pascaline used rotating wheels. Each wheel had ten
parts having digits from 0 to 9. Calculations were performed by the rotation of wheels.
When one wheel completes a rotation, the next wheel moves by one digit. It had a
number of small slots for displaying the result. Pasculine could perform addition and
subtraction on whole numbers.
LEIBNIZ CALCULATOR (1694 A.D)
In 1671, the German mathematician-philosopher Gottfried Wilhelm von Leibniz
designed a calculating machine called the Step-Reckoner and completed in 1694 the
Step-Reckoner expanded
on Pascal's ideas and did multiplication by repeated addition and shifting. It was the first
calculator that could perform all four arithmetic operations.

Page 2 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

CHARLE'S BABBAGE DIFFERENCE ENGINE (1822 A.D)


The difference engine is a mechanical calculator first developed by Charles Babbage in
1822. It is capable of computing several sets of numbers and making a hard copies of
the results. Due to lack of funding, he was never able to complete a full-scale functional
version of the machine. It was a large machine, made of metal and was powered by
steam. The Difference Engine had storage (mechanical memory) that could hold the
data temporarily for processing and to store results. It was used to allow a user to enter
calculations and get printed results. The Difference Engine worked on difference
equations.
CHARLE'S BABBAGE ANALYTICAL ENGINE (1825 A.D)
The Analytical Engine was a proposed mechanical general-purpose computer designed
by English mathematician and computer pioneer Charles Babbage and with assistance of
Ada Lovelace. It was first described in 1887 as the successor to Babbage's difference
engine. The proposed design included an ALU with basic programmatic flow control. It
was programmed using punch cards and contained integrated memory. Historians
consider it to be the first design concept of a general-purpose computer because of its
comprehensive design.
ELECTRO-MECHANICAL ERA (MIDDLE AGE)
This electro-mechanical era starts from the mid of 19th century. In this era scientists
became able to develop faster and more accurate computing machines as they were
powered by steam and electricity. One of such machines was Tabulating machine.
HERMAN HOLLERITH'S TABULATING MACHINE (1890 A.D)
The Tabulating machine was an electromechanical machine designed to assist in
summarizing information stored on punched cards. Invented by Herman Hollerith in
1890, was an important movement in the development of the computer.
He used the working method of a punch cutter on the train. His calculator was so
successful that he started his own business to sell his product. Later the company was
called International Business Machines (IBM). However, the original cards could not be
used for complicated calculations
ELECTRONIC ERA (MODERN AGE)
GENERATIONS OF COMPUTER
From 1942 onwards the development of electronic computers can be divided into five
generations. These five generations of computers are:
First generation 1940-1956 Vacuums Tube
Second generation 1956-1963 Transistors
Third generation 1964-1971 Integrated Circuits (ICs)
Fourth generation 1971-1981 Microprocessor/Large Scale
Fifth generation 1981-Present Artificial Intelligence

Page 3 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

FIRST GENERATION (1940-1956)


i) These computers used vacuum tubes instead of relays.
ii) These computers were large in size.
iii) These computers used machine language (i.e. 1's and o's).
iv) Magnetic drums were used as primary internal storage medium.
v) Punched cards used as input.
vi) Computers of this generation were primarily used for scientific and resea
IMPORTANT MACHINES
EDSAC, EDVAC, UNIVAC-I and ENIAC
ENIAC
In1943, ENIAC (Electronic Numerical Integrator and Calculator) was designed and built
at the University of Pennsylvania. It contained about 18,000 vacuum tubes and
consumed 150 kilowatt of power. It occupied more than 15,000 square feet, and
weighed more than 30 tons. It could perform 5,000 additions and hundreds of
multiplication per sec
EDSAC
In 1949, EDSAC (The Electronic Delayed Storage Automatic Computer) was developed at
the Cambridge University, which used the concept of stored programs.
EDVAC
In 1949, EDVAC (Electronic Discrete Variable Automatic Computer) was developed using
the concept of stored program it could store programs and perform arithmetic logic
activities.
UNIVAC
In 1951, Eckert and Mauchly developed UNIVAC-I, Universal Automatic Computer.
UNIVAC-1 could work 24 hours a day
DRAWBACKS OF FIRST GENERATION
i) Very big in size.
ii) Slow in speed
iii) Low level reliability.
iv) Large power consumption.
v) Difficult maintenance.
vi) Low Level Languages.
SECOND GENERATION (1956-1963)
i) Transistor technology came into existence in second generation of computers.
ii) Transistors were smaller, faster reliable and consumed less power.
iii) Computers were able to perform a single operation in microseconds.
iv) Store data in kilobytes (K.B.).
v) These computers were mainly used for commercial productions, scientific and
engineering analysis and design.
vi) Assembly language and a high level language FORTRAN were introduced.

Page 4 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

IMPORTANT MACHINES
IBM 7094 and IBM 1401.
DRAWBACKS OF SECOND GENERATION
i) Air conditioning required
ii) Frequent maintenance
iii) Commercial production required
THIRD GENERATION (1964-1971)
i) Integrated Circuits (ICs) were developed in the field of microelectronics, in the
mid of sixties.
ii) Transistors, diodes, capacitance and resistances were grown upon a single
semiconductor.
iii) Size and price were reduced, computer became smaller in size and storage
capacity became larger.
iv) High level programming languages such as Pascal and COBOL.
IMPORTANT MACHINES
IBM System/360 & IBM 370.
DRAWBACKS OF THIRD GENERATION
i) Air conditioning required in many cases.
ii) Very advance technology was required to made IC
iii) IC chips are still difficult to maintain
FOURTH GENERATION (1971-PRESENT)
i) Microprocessor chip was developed which contains an entire central
Processing Unit (CPU) on a single silicon Chip, which caused the development
of faster, less expensive, smaller and more reliable computers.
ii) These Computers used Large Scale Integration (LSI) and Very Large Scale
Integration (VLSI) and then the size and cost of computers reduced.
iii) 4,8 and 16 bits microprocessor announced by Intel Corporation of U.S.A in
1971 and 1973 respectively that were capable of performing arithmetical,
logical and control functions.
iv) Microcomputers or IBM PC were developed in this generations,
FIFTH GENERATION (PRESENT AND BEYOND)
i) The concept of Al (Artificial Intelligence) developed in this generation, which
means the capabilities of reasoning, learning, drawing inference and making
decision like human beings.
ii) These machines will be equipped with large number of VLSI (Very Large Scale
Integration) and huge primary memory.
iii) LISP and PROLOG have been used as the principal language for a work
iv) Robots are example of fifth generation computers.
IMPORTANT MACHINES
ULAIC Technology, Artificial intelligence etc

Page 5 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

TOPIC #2: CLASSIFICATION OF COMPUTER


The classification of computers are divided into three broad categories that are
discussing below:
1. By purpose
2. By data handling/Technology
3. By size/capacity/storage/speed
According to purpose, computers are either general purpose or special purpose.
GENERAL PURPOSE COMPUTER
General purpose computers are designed to perform a range of tasks. They have the
ability to store numerous programs, but lack in speed and efficiency.
SPECIAL PURPOSE COMPUTER
Special purpose computers are designed to handle a specific problem or to perform a
specific task. A set instruction is built into the machine.
CLASSIFICATION OF COMPUTER ACCORDING TO DATA HANDLING
According to data handling, computers are analog, digital or hybrid.
ANALOG COMPUTER
An analog computer is a form of computer that uses continuous physical phenomena
such as electrical, mechanical or hydraulic quantities to model the problem being
solved. Analog computers work on the principle of measuring, in which measurements
obtained are translated into data. Modern analog computers usually employ electrical
parameters, such as voltages resistances or currents, to represent the quantities being
manipulated. Such computers do not deal directly with the numbers. They measure
continuous physical magnitudes.
DIGITAL COMPUTER
It is a computer Performs calculations and logical operations with quantities
represented as digits, usually in the binary number system. These computers are those
that operate with information, numerical or otherwise, represented in a digital form.
Such computers process data into a digital value (in os and 1s). they give the results with
more accuracy and at a faster rate.
HYBRID COMPUTER
It is a combination of computers those are capable of inputting and outputting in both
digital and analog signals. A hybrid computer system setup offers a cost effective
method of performing complex simulations. Hybrid computers incorporate the
measuring feature of an analog computer and counting feature of a digital computer.
For computational purposes, these computers use analog components and for storage,
digital memories are used.
CLASSIFICATION OF COMPUTER ACCORDING TO SIZE
According to Size, computers are classified in to four categories

Page 6 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

SUPER COMPUTER
The fastest and most powerful type of computer is Super computer. They are very
expensive and are employed for specialized applications that require immense amounts
of mathematical calculations. For example, weather forecasting, animated graphics,
fluid dynamic calculations, nuclear energy research and petroleum exploration.
The chief difference between a super computer and a mainframe is that a super
computer channels all its power into executing a few programs as fast as possible,
where as a mainframe uses its power to execute many programs currently.
MAINFRAME COMPUTER
They are very large and expensive computers capable of supporting hundreds, or even
thousands, of users simultaneously. In the hierarchy that starts with a simple
microprocessor (in watches, for example) at the bottom and moves to supercomputers
at the top, mainframes are just below super computers. In some ways, mainframes are
more powerful than super computers because they support more simultaneous
programs. But super computers can execute a single program faster than a
mainframe.
MINI COMPUTER
They are midsized computers. In size and power, minicomputers lie between
workstations and mainframes: In the past decade, the distinction between large
minicomputers and small mainframes has blurred, however, has the distinction
between small minicomputers and workstations. But in general, a minicomputer is a
multiprocessing system capable of supporting from 4 to about 200 users simultaneously
MICRO COMPUTER
Micro computers are also called Personal Computers (PC). The use of microprocessor
has made computers cheaper yet faster and more reliable. These are the smallest
computers designed to be used by individuals. PC's can be used for variety of tasks like
documentation, calculations, illustration and entertainment. The power of network and
internet has also made it more useful. Now computers are also used for communication
and socialization. Micro computers are further divided in to following categories:-
DESKTOP COMPUTER It is a personal or micro computer sufficient to fit on a desk.
LAPTOP COMPUTER It is a portable computer complete with an integrated screen and
keyboard. It is generally smaller in size than a desktop computer and larger than a
notebook computer.
PALMTOP COMPUTER/NETWORK/PDA's It is a hand-sized computer. They have no
keyboard but the screen serves both as an input and output device.
TOPIC #3: ROLE OF COMPUTERS
ROLE OF COMPUTER IN EDUCATION
technology eases the process of learning. Many programs are available for students to
learn the Role of computer in education has been given a lot of importance in the recent
years. Computer subjects like Physics, Mathematics, Chemistry, Biology etc. Multimedia

Page 7 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

software makes the process of learning interactive and interesting. It combines text,
graphics, sound and video for effective learning. Internet has enormous information on
a wide variety of subjects. Students can refer to Internet to find information on any
topic. All the activities related to examinations are also being controlled using
computers. Therefore, it plays an important role in computer.
ROLE OF COMPUTER IN DEFENSE
There are various applications of computer technology in defense. Computers are used
in tanks, planes weapons and other equipment are controlled by computers. Computers
are used for designing and and ships to target enemy forces. They help in tracking
missiles and destroying them. Modern defense testing of weapons. Computers are also
used in communication system and defense.
ROLE OF COMPUTER IN BUSINESS
Computers are used in all types of businesses, to improve productivity. They help
running business activities efficiently. They are used to prepare business documents,
reports, charts, presentations, invoices etc. they help in staying in contact with
employees and customers.
ROLE OF COMPUTER IN MEDIA
Computers have lot of applications in print and electronic media. Print media refers to
mass communication through printed material. Computer technology helps in
preparation and production of newspapers, magazines, booklets and brochures, flyers,
press releases and books. Electronic media refers to broadcast media that includes radio
broadcast, cable and satellite television broadcast and the new-age media like internet
and mobile devices, Computer is used for television broadcasting.
ROLE OF COMPUTER IN MANUFACTURING INDUSTRY
Now days, computer technology is widely used in manufacturing industry. It has
improved the accuracy, quality and speed of manufacturing. Computers are used for
product design and automation of manufacturing process in factories. This is known as
Computer-Aided Design (CAD) and Computer-Aided Manufacturing (CAM).
TOPIC #4: CARRERR IN IT FIELD
HARDWARE ENGINEER
He designs and manufactures computer hardware. His work also involves repair and
maintenance of computer hardware. He has deep knowledge of internal working of the
computer, processor, circuit boards etc.
SOFTWARE ENGINEER
Software engineering is the process of analyzing user needs and designing, constructing
and testing end-user applications that will satisfy these needs through the use of
software programming languages. It is the application of engineering principles to
software development. A software engineer develops or designs new applications with
the software needs of end-users in mind. Software engineers may also analyze existing
software, and modify it to meet current application needs.

Page 8 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

NETWORK ADMINISTRATOR
Network Administrator is responsible for installing, configuration and maintenance of
computer networks in an organization. He assigns passwords to the network users so
that unauthorized people do not have access to network.
DATABASE ADMINISTRATOR
He is a person who is responsible for the design, implementation and maintenance of a
database in an organization. He is also responsible for maintaining the security and
monitoring the performance of database.
WEB DESIGNER
Web designer is a person whose job is to plan create websites. He design web pages
that include text, images sound and video clips and make the website interactive. HTML
is the most commonly used language for creating websites.
MULTI-MEDIA DESIGNER
They are the people who organize and present the information in easy and attractive
manner. They combine text, graphics, animation, audio and video. They create digital
images and arrange them in sequence for animation. They have the skill to edit and
manipulate audio and video files. They usually work in TV, film and different computer
software companies.
GRAPHIC DESIGNER
Graphic designer create visual concepts, using computer software or by hand, to
communicate ideas that inspire, inform and captive consumers. They develop the
overall layout and production design for applications such as advertisements, brochures,
magazines and reports.
INFORMATION SECURITY ANALYST
These people protect networks. They plan and carry out security measures to ensure
that no loss of data (or information) occurs. We can call them the police force of the
internet. Computer technology has expanded into online banking and businesses.
Computer hackers are always on the lookout for customer account details that they can
use to steal money. Information Security Analyst ensures for no such theft occurs.
COMPUTER SCIENCE OR IT TEACHER
Today's educational landscape is undergoing a dramatic shift as computer literacy
becomes increasingly necessary for jobs in every economic sector. With the current
focus on science, technology. engineering and mathematics (STEM), computer
technology teachers have one of the most important jobs in education today.
Computer technology teachers prepare students for careers in a wide range of
professions from future accountants and healthcare workers, to web developers and
retail managers, to home builders and delivery drivers.
LATEST CAREER IN IT FIELD

Page 9 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

ARTIFICIAL INTELLIGENCE
Artificial Intelligence is based on simulating human intelligence in machines that can
easily mimic and execute tasks from simple to more complex operations. The term A.I.
may also be referred to any machine that displays qualities associated with a human
brain such as learning, reasoning and problem solving. A.I. is also used for Machine
Learning. It learns from our daily routines and suggests us different options. Like Google
maps suggest the best ways for our daily commute. A.I. is vastly used in scientific
experiment, healthcare and space technologies.
VIRTUAL REALITY
Virtual Reality is un artificial environment that is created with software and presented
to the user in a way that the user feels it as a real environment. Virtual reality can be
used for the simulation of a real environment for training and education. It is also used
for development of an imagined environment for a game or interactive story.
WIRELESS COMMUNICATION
Wireless Communication has become an integral part of our lives. Wireless
communication technology transmits information using electromagnetic waves like IR
(Infrared), RF (Radio Frequency), satellite, etc. Global Positioning System (GPS) is now
used to find real time location of people and objects. Smart phones that include 3G, 4G
and 5G networks have transformed the conventional use of telephones. These phones
not only provide better coverage but also fast mobile Internet experience. Wireless
communication is also giving new meaning to the socialization and human interactivity.
TOPIC #5: COMPUTER HARDWARE
HARDWARE
computer casing, the CPU or Central Processing Unit, computer memory, VGA graphics
card, sound Computer hardware is a collection of all physical parts or components of a
computer. It includes the card, motherboard etc.
SYSTEM UNIT
A System Unit is the part of a computer that contains the primary devices. The system
unit performs operations and produces results for complex calculations. It includes the
motherboard, CPU, RAM and other components, as well as the case in which these
devices are enclosed.
MOTHERBOARD
A motherboard (also called main board) is the main printed circuit board in general-
purpose computers communication between many of the crucial electronic components
of a system, such as the central processing unit (CPU) and memory, and provides
connectors for other peripherals. Unlike a back plane, a motherboard usually contains
significant sub-systems, such as the central processors, the chip set's input/output and
memory controllers, interface connectors, and other components integrated for general
use.

Page 10 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

Motherboards are made of layered fiberglass. These layers contain copper lines that
form the circuitry by which electrical signals are provided to all parts of computer.
MICROPROCESSOR
CPU or microprocessor is the brain of computer. The microprocessor is a chip containing
millions of tiny transistors. These transistors manipulate data. Microprocessor performs
all the calculations necessary to make the computer work! These balclitations are
performed at very high speed and accuracy Microprocessor is made up of silicon. The
microprocessor fetches, decodes, executes and stores all the instructions given by the
user or any other device. The speed of computer mainly depends upon the speed of
microprocessor. A microprocessor that has faster clock speed (measured in GHz) and
more cores and cache works faster.
There are typically five components of a microprocessor.
ARITHMETIC LOGIC UNIT (ALU)
ALU performs all the actual calculations like arithmetic operations and logical
comparisons. Arithmetic operations include addition, subtraction, multiplication and
division while logical comparisons include comparing, selecting and matching of data.
CONTROL UNIT (CU)
Control Unit is responsible for controlling the transfer of data and instructions among
other units of a computer. This unit controls the operations of all parts of the computer
but does not carry out any actual data processing operations. CU functions just like a
traffic policeman. It manages and coordinates all the units of the computer
CLOCK
Clock generates pulses and instructions are executed on the basis of pulses. Clock speed
is measure in MHz and GHz.
REGISTERS
It is a temporary storage area that holds the data that is being processed. It is also
known as programming model which may be of 8 bits, 16 bits, 32 bits or 64 bits.
CACHE
Cache is an intermediate storage area, which is available inside microprocessor. The
immediate processed information is stored in cache. The cache inside the
microprocessor is called internal cache and outside is called external cache.
BUSES
The bus is a pathway composed of cables and connectors used to carry data between a
computer microprocessor and the main memory. The bus provides a communication
path for the data and control signals moving between the major components of the
computer system The system bus works by combining the functions of the three main
buses: namely, the data address and control buses. Each of the three buses has its
separate characteristics and responsibilities.

Page 11 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

ADDRESS BUS
A one-way pathway that allows information to pass in one direction only, carries
information about where data is stored in memory.
DATA BUS
A two-way pathway carrying the actual data (information) to and from the main
memory.
CONTROL BUS
Holds the control and timing signals needed to coordinate all of the computer's
activities.
TOPIC #6: INPUT DEVICES
INPUT DEVICES
The devices used to enter data into the computer are called Input devices. These
devices can be categorized into text entering, pointing and image scanning devices.
KEYBOARD
A computer keyboard is an input device used to enter characters and functions in to the
computer contains keys for individual letters, numbers and special characters, as well as
keys for specific system by pressing buttons, or keys. It is the primary device used to
enter text. A keyboard typically functions. A keyboard is connected to a computer
system using a cable or wireless connection. Most keyboards have a very similar layout.
The most widely used layout in the English language is called
QWERTY, named after the sequence of the first six letters from the top left. Keys on
keyboard are divided into following categories:
i) Alphanumeric keys
ii) Numeric keys
iii) Function keys
iv) Screen navigation keys
v) Modifier keys
MICROPHONE
It is a device that allows computer user to input audio in to the computer. It changes
audio signals into electrical signals which are translated in to digital form by sound card
for processing by the computer.
SCANNER
It is a device that captures images from photographs, magazines, books etc. and stores
them in computer in digital form. These images can be edited, displayed on the screen
or inserted in documents.
BARCODE READER
It is a device that reads the barcode printed on products that represents product code
description and price. This information is used by the computer to print bill for the
customer.

Page 12 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

DIGITAL CAMERA
It is a device used to capture pictures and store them in a digital form. These pictures
can be downloaded to computer for editing, viewing or inserting in documents.
TOUCH SCREEN
It is a pressure-sensitive display screen that is used to interact with the computer by
touching pictures or words with finger. It is more commonly used with mobile phone
and tablet.
TOPIC #7: OUTPUT DEVICES
A hardware device that sends data from a computer (CPU) to another device or user is
called an output device. The most common output devices of a computer are monitor
and printer. There are two types of output devices.
SOFTCOPY OUTPUT DEVICES
Softcopy output is screen display or voice output. It is volatile output and lost when
other output is shown or computer is turned off. The output devices that produce
output on screen or in audio form are called Softcopy Output Devices. Some most
common softcopy output devices are monitor, data projector, and speakers.
HARDCOPY OUTPUT DEVICES
Hardcopy output is output on paper. It is non-volatile output that is relatively stable and
permanent form. The output devices that produce output on paper are called Hardcopy
Output Devices. Some most common hardcopy output devices are printer and plotter.
MONITORS
It is an output device that has a screen on which information is displayed.
TYPES OF MONITORS
It has two common types i.e.
CRT (Cathode Ray Tube) MONITOR: It is very similar to old television. It is almost
obsolete due to its big size and low display quality
LCD (Liquid Crystal Display): It is slim, uses less power and has better display quality
than CRT monitor.
SPEAKER
Speaker is a device used to produce audio output. A pair of speakers is attached to the
sound card on the motherboard. Speakers are commonly used with multimedia
software and for playing music and videos on computer.
PRINTER
Printer is an output device that prints text and graphics on paper which is known as
hardcopy. There are two types of printers:
IMPACT PRINTER
Impact Printer uses electro-mechanical mechanism which causes the character shape to
strike against the paper and leave an image of the character on the paper. Dot matrix
printer is the most commonly used impact printer. The printing speed varies from 50 to
500cps (character per second). Their printing is very cheap but print quality is poor. They

Page 13 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

produce lot of noise while printing. These printers are still in use for printing invoices,
bank statements, utility bills, etc.
NON-IMPACT PRINTER
Non-Impact Printer prints without striking the paper. There are two types of Non-
Impact printers:
Inkjet printer stores ink in cartridge and sprays on paper through fine nozzles on the
print head.
Laser printer uses technology similar to photocopying machine.Laser printer is more
expensive, faster and has very high print quality compared to inkjet printer. Inkjet
printers are used in all sectors such as homes and simple businesses, Laser printers are
perfect for large scale businesses.
PLOTTER
Plotter is an output device used for printing engineering drawings, machine parts,
building designs, maps, charts and panaflexes etc on large size papers/sheets. Such large
size printing is not possible on printers. It is more expensive than printer. There are two
types of plotters Ink plotter and Pen plotter. Ink plotter is used for printing images
whereas pen plotter is used for printing engineering drawings, machine parts, building
designs etc. Plotter is a slow output device but its printing quality is good.
TOPIC #8: STORAGE DEVICES
A storage device refers to a hardware used to store information. There are two types of
storage devices; Primary and Secondary.
PRIMARY STORAGE DEVICES
Primary storage devices are used by computer during processing. They are quite smaller
in storage capacity. Most primary storage devices are found inside the computer, and
they have the fastest acces to data. Primary devices include RAM and ROM.
ROM is the Read Only Memory. It is permanent memory. ROM is quite small in capacity.
It stores the major setting of computer permanently.
RAM is Random Access Memory. RAM is volatile, means it loses its content as the power
supply disconnected. This is used to store data and instructions temporarily.
SECONDARY STORAGE DEVICES
Secondary storage devices have a larger storage capacity and can store data
permanently. Users saves their data on secondary storage devices. Hard Disk, CD and
DVD, SD Card and USB flash disk are t examples of secondary storage devices.
HARD DISK
A hard disk is a magnetic storage device used to store computer data. It has storage
capacity of hundreds of Gigabyte (GB). It is fixed inside the computer casing. Portable
hard disks are also available that is attached to USB port.

Page 14 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

CD/COMPACT DISK
CD stands for Compact Disk. It is a portable optical storage device with a storage
capacity of 700Megabytes (MB). A CD is 1.2millimeter thick with a diameter of
120millimeters. CD drive is used to read data from or write data to a CD.
DVD/DIGITAL VERSATILE DISK
DVD stands for Digital Versatile Disk. It has the same thickness and diameter as CD but
has more storage capacity. Its storage capacity is in the range of 4 to 16GB. A DVD writer
is installed in the computer to read data from or write data to a DVD. A CD can also be
used in a DVD writer.
MEMORY CARD
Memory card is a small storage device having storage capacity of few Gigabytes. It is
available in different sizes and storage capacities. Memory cards are generally used in
laptop computers and portable devices such as mobile phone and digital camera for
storing pictures, audio and video.
USB FLASH DRIVE/USB MEMORY
USB flash drive is a small portable drive that is connected to computer through USB
port. It is also known as USB memory. It is fast in operation and its storage capacity is up
to 128GB.
TOPIC #9: BASIC OPERATIONS OF A COMPUTER
A computer is a machine that acts according to the instructions given by the user. A
computer performs four basic operations: input, processing, output and storage.
INPUT
Computer input has many forms. It can be from a command entered using a keyboard
or a mouse. It can be data sent from another computer on a network.
PROCESSING
Processing is done inside the computer by CPU, Processing is the conversion of input
into output. After processing, data is turned into meaningful information. This is carried
out with the help of arithmetic and logical operations.
STORAGE
Storage refers to the holding or saving data. RAM, ROM and Hard Disk are the devices
that are used for storage.
OUTPUT
Output is the result of a computer processing. Output may be viewed on a monitor
screen, heard through speakers or printed on paper. Here, monitor screen, speakers and
printer are called output devices.
TOPIC #10: COMPUTER SOFTWARE
The term 'software' refers to the set of electronic programs, instructions or data a
computer processor reads in order to perform a task or operation.
Software can be categorized according to what it is designed to accomplish. There are
two main types of software: system software and application software.

Page 15 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

SYSTEM SOFTWARE
System software includes the programs that are dedicated to managing the computer
itself, such as the operating system, file management utilities and disk operating system
(or DOS). The operating system manages the computer hardware resources in addition
to applications and data. Following are the categories of system software.
i) Operating System
Operating system is the master control program that manages all the system resources.
It creates an interface between computer system and user. Windows and Linux are
commonly used operating systems.
ii) Device Drivers
Device drivers are computer programs that control a particular device when it is
connected to a computer. A device driver is a translator between the operating system
and the hardware device
iii) Utility Programs
Utility means being useful. Utility programs are useful computer programs that help to
manage, maintain and control computer resources. Operating systems usually have pre-
installed programs that can serve the purpose, but utility software provides further
functionality. Antivirus, Disk Cleaner, Disk defragmenter are some examples of utility
programs.
iv) Language Translators
Language Translators are programs that used to translate human readable instructions
into machine language as Computer can only understand and work with machine
language which is composed of o's and 1's. Language translator are of three types;
assembler, compiler and interpreter.
Assembler: The assembler translates the program written in assembly language into
machine language instructions for execution.
Compiler: It translates the entire high-level language program at once into machine
language before it is executed.
Interpreter: It translates the high-level language program line by line into machine
language.
APPLICATION SOFTWARE
Application Software, or simply applications, are often called productivity programs or
end-user programs because they enable the user to complete tasks such as creating
documents, spreadsheets, databases and publications, doing online research, sending
email, designing graphics, running business and even playing games. This type of
software is specific to the task it is designed for and can be simple as a calculator
application or as complex as a word processing application. There are different types of
application software.

Page 16 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

(i) Productivity Software


This kind of application software is used to produce things such as documents,
spreadsheets, databases and presentations. Many of the productivity
software are intended to be used in businesses and offices. MS Office for
Windows is an example of productivity software.
ii) Business Software
Business Software are used to manage business activities efficiently. It is used to
provide many business functions such as billing, database management and inventory
management.
(iii) Entertainment Software
This type of software provides amusement and fulfills a user's hobby. The most common
entertainment software are video games.
(iv) Educational Software
Educational software is used for teaching and learning. This kind of software is used in
many schools to enhance knowledge of students in learning different subjects.

Page 17 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

CHAPTER # 02
TOPIC #1: INTRODUCTION OF OPERATING SYSTEM
OPERATING SYSTEM
An Operating System is software which performs all the basic tasks like booting the
computer, file management, memory management, process management, and
controlling peripheral devices such as hard disk, printer, etc. It manages computer
resources efficiently. Most common operating systems are: DOS, Windows, Linux,
Android, Mac OS and iOS.
FUNCTIONS OF OPERATING SYSTEM
Operating system manages every activity of a computer. It is the master control
program that provides an interface for a user to communicate with computer. It has
several functions it has performs which are as follows:
BOOTING
Booting is a process of starting the computer operating system. The operating system
makes sure that the computer is ready to perform different tasks.
RESOURCE MANAGEMENT
Resource management function of OS manages all the hardware and software
resources. This includes allocation and de-allocation of processor, memory, access to
shared cache memory and access to network resources.
USER INTERFACE/COMMAND INTERPRETER
The user interface is what we use to interact with the operating system. The command
interpreter translates the user's commands into machine language that the operating
system can understand and executes.

MEMORY MANAGEMENT
This performs the allocation and de-allocation of memory space which means that it
divides and shares memory space among the programs that are in need of it.
INPUT/OUTPUT MANAGEMENT
Input and output devices require drivers to perform their functions. These drivers are
software that are provided and managed by the operating system.
FILE MANAGEMENT
It manages tasks related to files such as organization, storage, retrieval, naming, sharing,
and protection of files.
PROCESS MANAGEMENT
Processes are activities that are performed by the system. Most systems have multiple
processes running in the background. The operating system manages the creation,
suspension, scheduling and deletion etc. processes. It also decides the order in which
the processes have access to the processor and how much time they get on the
processor.

Page 18 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

USER MANAGEMENT
It is the ability of administrators to control user access to resources such as software,
input/output devices, storage etc.
TOPIC #2: TYPES OF INTERFACE
INTERFACE
The interface is a program that allows a user to enter and receive information. Two
common types interface are:
COMMAND LINE INTERFACE
A Command Line Interface (CLI) is a screen or text based representation in which the
user types the commands on place called prompt to operate the computer. CLI is
difficult to use because the user has to remember the commands and their syntaxes but
it is fast in use because text mode takes less resources. MS-DOS and Apple DOS are
some examples,
GRAPHICAL USER INTERFACE
This is more user friendly interface which uses icons, menus and images which the user
can click to interact with the computer. It does not require any memorization but is
slower because it require more resources. Windows and IOS are common examples.
TOPIC #3: TYPES OF OPERATING SYSTEM
Explain different types of operating system.
TYPES OF OPERATING SYSTEM
SINGLE USER AND MULTI USER
Single user OS are those in which only one user can use the system at a time, Windows
and DOS for PC
are examples,Multi user OS are those which allow several people to use the computer at
the same time. LINUX and UNIX are common examples
BATCH PROCESSING
This operating system does not interact with computer directly. The users prepare and
submit their jobs and the system batches similar jobs together and executes them. Its
main benefits are;
i) Can be shared by multiple users
ii) Has less idle time
iii) Performs onbe job right after another
TIME SHARING
Time sharing is a method that allows users to share resources at the same time. This
system executes one task at a time so that all processes run without issues. The system
gives each task a time slot in which it will get executed. The tithe that each task is given
to be executed is called a quantum. After this time interval is over, the system movers to
the next task.

Page 19 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

REAL TIME PROCESSING


This system processes task within a fixed time limit and fails if it is not able to do so. It is
classified into two parts;
i) Hard Real Time System: This system guarantees the completion of critical
tasks within the deadline with zero delay. Air traffic control system missile
systems are the best examples
ii) Soft Real Time System: This system has a less strict time limit and meeting the
deadline is not compulsory every time. Critical tasks get priority over others
and completion of tasks in a defined time is not guaranteed. Online
transaction system and Airline reservation system are good example
TOPIC #4: SOFTWARE INSTALLATION
How to install a software,
SOFTWARE INSTALLATION
This program installs files, drivers and applications on the computer and makes them
ready for execution. They can be downloaded from the internet or from a CD/DVD/USB.
INSTALLING WINDOWS OPERATING SYSTE6
Choosing an operating system depends upon the hardware and software compatibility.
Windows is the most commonly used operating system. The latest version is Windows
10 and to install it we need at minimum the following specifications:
. 1GHz processor speed
. 1GB 32-bit or 2GB 64-bit RAM
. 32GB hard disk space
. Graphics card: Direct X9 or higher with WDDM 1.0 driver
. 800 x 600 displays
The steps for installation are:
i) Insert the Windows Installation DVD/Flash Drive
ii) Restart your Computer
iii) Wait for the first startup screen
iv) Press or hold Del or F2 to enter the BIOS screen
v) Locate the Boot order/ Boot sequence
vi) Select Boot order/ Boot sequence as per your installation source
. USB Flash/USB Hard Disk
. USB CD/DVD ROM
. Internal CD/DVD ROM
vii) Select any option:
• Upgrade
. Customize Installation (Advance)
. Select any drive for installing your operating system
. Follow the on screen instructions

Page 20 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

How to install Office automation software


OFFICE AUTOMATION SOFTWARE INSTALLATION
Office Automation software is a group of computer programs that includes word
processing, spreadsheet, multimedia presentation, data base management system and
email application. It makes it possible for business organization to improve their
productivity and recognize easier ways to do business in profits with less time.
MS Office is the most common type of software package that is used in schools,
offices etc. this
package contains MS Word, MS Excel, MS Power point, MS Access and MS Outlook.
. The following steps are taken for installing MS Office:
. To install MS-Office package we need to take following steps.
. Run the MS-Office setup from USB, DVD or Hard Disk backup.
. Check the box marked 'I accept the terms of this agreement' and click on 'Continue'.
. Enter Product Key
. Click on Install Now or Customize procedure.
. Select the package which you want to install. Click on 'Install Now'.
. Then installation begins.
MS Office installer will notifi automatically after finishing the installation.
Define antivirus and how to install it?
ANTIVIRUS
Antivirus software protects and keeps your computer free from viruses. It is very
important to install an antivirus. Antivirus software have been developed to get rid of
the computer viruses that can destroy the valuable data and causes the computer to
malfunction. Effective antivirus products not only detect and remove viruses, they also
help you to recover data that has been lost because of a virus. AVG, Avast, Avira etc are
some commonly used free antivirus software
INSTALLATION
The installation file is downloaded from the software websites. After running the
installation file, the software will be installed on to the computer automatically.
The virus database is the most important part of the antivirus and must be kept up to
date to ensure maximum protection from virus threats.
BRAIN STORMING
Q8) If you are a manager of a large organization which type of operating system will
you prefer? Justify your answer with any 2 reasons.
I will prefer multi user operating system because of the following reasons:
. Multi user operating system allows more than one user to access the system at a time.
Computer is connected to a network, so it can be remotely used, which saved the time.
. Multiuser operating system is very useful in large organization where we can share
resources like printer, documents, slides etc.
. Allocating memory is easy and cheap.

Page 21 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

09) List the programs available in MS Office and write why each program is used.
MS Office contains:
. Word processor (MS-WORD)
. Spread Sheet (MS-EXCEL)
. Multimedia Presentation (MS Power Point)
. Email Application (MS OUTLOOK)
. Data Base Management System (MS Access)
Microsoft Office is very helpful tool used in home office and school to organize, manage
and present information, data and figures it includes Word; to create and share
document, Excel; to analyze and visualize data, Power Point; to create, collaborate and
effective present ideas Outlooks; to organize email, coordinate schedules and stay up to
date with contact Access; to create custom data base and process.

Page 22 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

CHAPTER # 03
TOPIC #4: MS-WARD
MS WORD 2010:
Microsoft office word is one of the most famous Word-processing software. It allows
the user to type and manipulate text. It has advanced features like tables, images,
formatting etc that allow customization. The latest versions are included in Microsoft
Office Suite.
PAGELAYOUTTAB:
This allows user to control the look the document. Users can apply, control page
orientation and size, add page numbers, line breaks, etc. this tab contains the following
groups:
. Themes Group:
A theme is a predefined set of formatting, colors and settings that changes the design
and look of the document. MS-word has a number of themes to choose from.

* Page setup group:


This group has setup page layout properties like margins, orientation and size which
are applied throughout the document.
Margins button changes the space between the content and edge of the page.
Orientation button changes the placement o Content on the page in either portrait or
landscape mode.
Columns button splits the text in columns.
Breaks button inverts column or page breaks
Line Numbers button ads ling numbers in the left side.
Hyphenation button specifies how hyphenation should be applied.
*Page background group:
This group is used for special documents like certificates, invitations etc.
Watermark button adds a faded background image behind the text. The watermark
can be a logo text or image,
Page Color button allows the user to apply color to the page background.
Page Border button put a border around the page.
*Paragraph Group:
This group helps in the modification of paragraph settings.
Indent Left is used to define the space between the paragraph and the left margin.
Indent Right is used to define the space between the paragraph and the right margin
Space Before is used to indicate how much space is added before the paragraph
Space After is used to indicate how much space is added after the paragraph
*Arrange group:
This group helps arrange the document in relation to the content:
Position is used to place an object where you want to on the page.

Page 23 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

Wrap Text is used to arrange text around an object.


Bring Forward button brings selected object to the front.
Bring Backward button sends selected object to the back
Selection Pane is used to select, show, hide or change the order or objects.
Align is used to place objects in alignment with margins or relative to other objects.
Group is used to combine objects so that they can be treated as a single object.
Rotate is used to rotate or flip the selected object.
TOPIC #2: TABLE OF CONTENT
A table of contents is an organized listing of the sections, groups and headings of
content in a document and identified by page numbers where they are placed. It
provides an overview of the document and allows readers to go directly to specific
section or content in the document. There are two ways to create table of contents:

(a) Automatic table


(b) Manual table
AUTOMATIC TABILE :
Automatc table creates a table of contents automatically based on the content used as
heading presets of Ms Word based on the tupe of heading. Automatic table of contents
will create the appropriate levels and show page umbers where those headings are
placed.
MANUAL TABLE:
Choosing manual table from the table of contents menu will create a template of a
generic table of contents. This table will need to be edited and defined manually by
providing all the headings, sub headings and page numbers.

TOPIC # 3: TVPING INURDUAND SINDILANGỦAGE


TYPING IN URDU AND SINDHI:
MS word helps write documents in a default language (usually English) set by Microsoft
Windows. MS Word 2010 also supports Urdu and Sindhi languages for writing
documents. The keyboards for these languages need tọ be installed separately. To
change the default language go File > Word Options > Language Tab and then select the
language you want to set as default.
TOPIC # 4: MS- EXCEL
MS EXCEL 201o
Microsoft Excel is a software that uses spreadsheet system to organize and format data
and has advanced features and formulae that allow calculation of the data and display it
as graphs or pivot tables.
SORTING:
It is the process of rearranging or reordering data based on different criteria like size,
quality, value and quantity. It the capability of MS Excel sort data according to the need

Page 24 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

Formulae:
MS Excel allows its users to perform numerous calculations on the data from basic
addition, subtraction to logarithms and averages. The formulae start with an equal sign
and are defined in the formula bar. Here is u step by step guide to perform addition in
Excel.
 Write the numbers in two adjacent cells (A1 and B1).
 Select C1 and type
 Click on A1
 Type+.
 Click on B1
 Press Enter
 The sum of the numbers should be written in cell C1.

TOPIC# 5CHARTS AND IS TYPES

Charts:
The charts features allows user to present data in the form of graphs or tables. This is
useful when there is a large set of data which is hard to understand at a glance.
Presenting this kind of data graphically will help the user to better understand it and
reach a conclusion.
TYPES OF CHARTS:
1) COLUMN CHARTS: Data that's arranged in Column or rows on a worksheet can be
plotted in a column chart. A column chart typically displays categories along the
horizontal (category) axis and values along the vertical (value) axis, as shown in this
chart,
(2) PIE CHART:
Data that's arranged in one column or row on a worksheet can be plotted in a pie chart.
Pie charts show the size of items in one data series, proportional to the sum of the
items. The data points in a pie chart are shown as a percentage of the whole pie.
(3) LINE CHART:
Data that's arranged in columns or rows on a worksheet can be plotted in a line chart. In
a line chart, category data is distributed evenly along the horizontal axis, and all value
data is distributed evenly along the vertical axis. Line charts can show continuous data
over time on an evenly scaled axis, so they're ideal for showing trends in data at equal
intervals, like months, quarters, or fiscal years.
(4) BAR CHART:
Data that's arranged in columns or rows on a worksheet can be plotted in a bar chart.
Bar charts illustrate comparisons among individual items. In a bar chart, the categories
are typically organized along the vertical axis, and the values along the horizontal axis.

Page 25 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

CHAPTER # 04
BASICS OF DATA COMMUNICATION
Communication is the process of sharing a message. Data communications refers to the
sharing of a virtual message. Electronic communications, like emails and instant
messages and phone calls are examples of data communications. Data communication is
the exchange of digital messages between two devices. It involves a sender and a
receiver which communicate via some form of transmission medium such as a cable.
TOPIC #1: BASIC TERMINOLOGIES OF DATA COMMUNICATION
BASIC TERMINOLOGIES OF DATA COMMUNICATION
Data is the collection of raw facts and figures. The word data is derived from Latin
language and it is plural of Datum. The text, numbers, symbols, images, voice and video
which are processed by computers and digital devices are called data. Data can be
considered as unprocessed information.
Data Communication is the process of transferring data electrically from one place to
another. It is the process of exchange of data and information between two parties such
as human and electronic or computing device.
Data transmission means emission of data in any direction via wireless or wired
medium. Transmission may occur between source and destination
Analog signals are a continuously varying signals or waves that change with time period
and used to represent data. An analog signal can be used to measure changes in some
physical quantities such as light, sound, pressure or temperature
Digital signal is an electrical signal that is converted into a pattern of bits to represent a
sequence of discrete values, at any given time. It can only be one of the finite numbers
represented as o or 1.
Data rate is the rate at which data is transferred. It is normally measured in bits per
second. Bit is the actual binary digit which is the basic unit of data transmission. Bit can
hold either 0 or 1. Data rate can be ranging from bps (bits per second) for smaller values
to kbps (kilo bits per second) and mbps
(megabits per second). It is also called bit rate. Data rate becomes faster when more bits
are transferred in one second
Baud rate is the number of signals transmitted per second and one signal can represent
one or more bits. It is used to describe the maximum change in an electronic signal. For
example, if a signal changes 1200 times in one second, it would be measured at 1200
baud.
Signal-to-noise ratio (abbreviated SNR or S/N) is a measure used in engineering that
compares the level of a desired signal and the level of background noise. It is defined as
the ratio of signal power to the noise power, often expressed in decibels.

Page 26 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

TOPIC #2: COMPONENTS OF COMMUNICATION SYSTEM


COMPONENTS OF A COMMUNICATION SYSTEM:
Message: It is the information or data to be communicated. Common forms of
information include text, numbers, pictures, audio and video.
Sender: It is the device that generates and sends a message. It can be a computer,
telephone handset, etc.
Receiver: Any particular digital electronic device which has capability to receive data in
form of message. The location of receiving computer is generally different from the
sending computer. Like sender, it can also be a computer, telephone handset, etc.
Medium: It is the channel or path through which the message is carried from sender to
the receiver. Some examples include twisted-pair cable, coaxial cable, radio waves, etc.
Protocol: Protocols are the rules and procedures on which computers exchange data on
network Sender and receiver follow same protocols to communicate with each other. In
other words, a protocol is an agreement between two parties or venders, using
communication devices

SHOPIC #3: PROPERTIES OF GOOD COMMUNICATION SYSTEM


PROPERTIES OF A GOOD COMMUNICATION SYSTEM:
The effectiveness of a data communication system depends on the fundamental
characteristics which include delivery accuracy and timeliness.
Characteristic Description

Making sure that the data is delivered is the first


fundamental characteristic of any communication network
1. Delivery
The system must be able to deliver data in correct order
to the correct destination.

The system must deliver the data accurately. Data that has
2. Accuracy been altered during transmission and left uncorrected is
not useful.

3. Timeliness The data must be delivered in a timely manner. Late


delivered data is useless
TOPIC #4: TRANSMISSION MEDIUM
Definition:
Communication media refers to the main through which data or information
transmitted. It can be guided or unguided media. Here we discuss in detail both of the
media:
GUIDED MEDIA:

Page 27 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

It includes cables or wires. In other words, it is tangible or physical. The guided media is
further classified into three categories:
a. Twisted pair cable
b. Coaxial cable
c. Fiber optic cable
TWISTED PAIR CABLE:
It is the most widely used medium consist of pairs of copper wiring insulated in plastic
twisted around each other. Two wires scary data signals. The use of two wires twisted
together helps reduce crosstalk and electromagnetic induction.
Advantages;
1. It is thin and light weight cable.
2. Crosstalk is minimized
3. It is inexpensive.
Disadvantages:
1. It is slower in data transmission
2. Difficult to connect
3. It breaks easily as it is thin in size.
COAXIAL CABLE:
It consists of copper wrapped with insulating layer wrapped in a wire mesh shield than
in an external insulating cover. These cables are normally used for television cables or
for medium sizes local area network.
Advantage:
1. It carries more data than twisted pair cable.
2. It is faster in transmission.
3. It has less crosstalk than twisted pair cable.
Disadvantage:
1. It is expensive.
2. Difficult to install due to thickness
FIBER OPTIC CABLE:
It is flexible transparent fiber made of glass or plastic that transmit signals in the form of
light. A fiber optic consists of inner cylinder of glass called core which is actual
programming path for the light.
Advantages:
1. It has much greater bandwidth than all.
2. It is much thinner and lighter.
3. It has rare crosstalk.
Disadvantage:
1. It is limited to fix point to point ground installation.
2. It is much expensive cable.
3. It requires highly protection than copper wire or cable.

Page 28 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

UNGUIDED MEDIA:
It refers intangible or wireless communication. The main source travel data on waves. It
is further
Classified in three categories.
1. Radio waves
2. Microwaves
3. Infrared
RADIO WAVES:
1. It also called electromagnetic waves.
2. It is omnidirectional and propagated in all directions.
3. It does not need to be aligned.
4. Cordless phones, television, FM or AM radios are examples.
MICROWAVES:
1. It does not need cable.
2. It has multiple channels available.
3. It has wide bandwidth.
4. It has to be aligned in some cases.
5. It uses electromagnetic energy.
6. It is used in mounting ranges.
INFRARED:
1. It uses infrared light energy.
2. It uses terahertz frequency.
3. It cannot penetrate walls or other objects.
4. It works in point to point or line of sight
5. Blue tooth, remote controls are examples.
TOPIC #5: TRANSMISSION IMPAIREMENT
Definition:
Transmission impairments are those defects that occur when data is transmitted from
one end to another. There are three kinds of impairments:
1. Attenuation
2. Distortion
3. Noise
1. ATTENUATION:
It refers loss of energy or a weakened signal. It strength increases or decreases in
distance.
2. DISTORTION:
It refers change in the shape of the signal due to different speed of medium at different
points.
They have different phases at sender and receiver ends.
3. NOISE:

Page 29 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

It refers influence signal that mixes up with the original signal during the transmission of
data causes crosstalk, thermal noise etc..
TOPIC #6: COMMUNICATION DEVICES
Definition;
Communication devices are those that provide facility to transmitters data device to
device from source to destination. In this regard, there are several communication
devices some of them are:
1. Hub
2. Switch
3. Router
4. Modem
5. NIC
HUB:
It is a small simple and inexpensive device that joins multiple computers together. The
signal send from the hub and receive by all connected devices. It is very useful in small
networks and short distance.

SWITCH:
It is a network device that little smarter than hub. It determines how and where data is
forwarded from the place where data comes from. It can send signal of data directly to
the specified location.
ROUTER:
It is the smartest device that enable computer to communicate. It can pass information
from one local area network or wide area network to another. It record the address
information of everything connected to it like switch.
MODEM:
It is short for modulator and demodulator. It is a network device that capable to convert
analogue and digital signals. The process of converting from digital to analogue signals is
called modulation. The process of converting from analogue to digital signals is called
demodulation. There are three types of Modems:
1. Dial up modem
2. Dsl modem
3. ISDN modem
TOPIC #7: BASICS OF COMPUTER NETWORK
BASICS OF COMPUTER NETWORKS
A computer network connects parts of distributed system including hardware and
software. It shares common functions and features like data and devices which is very
important nowadays.
COMPUTER NETWORK AND NETWORKING

Page 30 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

Computer Network is a group of computers and related equipment connected by a


communication links to share data and other resources. The related equipment may be
printer, scanners, fax machines, server, etc. The resources may include a file server
internet connection, etc.
Networking is the act of joining computers and its accessories so that exchange of
information and sharing of resources take place In today's world, networking plays a
vital role in computers and telecommunication Delis. Modern, organizations create a
networking environment and device connectivity for fast, inexpensive and reliable
communication.
TYPES OF COMPUTER NETWORKS
Computer networks can be categorized by their size as well as their purpose. The size of
a network can be expressed by the geographical area they occupy and the number of
computers that are part of the network. Networks can cover anything from a handful of
devices within a single room to millions of devices spread across the entire globe. There
are three types of computer networks:
*Local Area Network (LAN)
*Metropolitan Area Network (MAN)
*Wide Area Network (WAN)
LAN is a group of computer and peripheral devices which are connected in a limited
area such as school, laboratory, home and office building. Useful resources like internet
access, storage space and printers can be shared through LAN It can be built with
inexpensive hardware such as hubs, switches, network adapters and network cables.
Data and software are also shared through LAN.
In MAN, computer network can spread across an entire city, college campus, or a small
region. It can cover the area of several miles and may include multiple small networks or
LANS. MANS offer very fast communication but they are expensive to establish.
Therefore, only large business organization or universities set up MAN. It also requires
security measures to prevent unauthorized access.
A Wide Area Network is used for long distance transmission of data. WAN helps to
cover a larger geographical area and connect cities, provinces or even countries Using
WAN technology, computers may be linked together in different countries using
satellites, microwaves or telecommunication links. Therefore, large business, research
and educational organizations situated at longer distances use WAN. A WAN may
include multiple MANS and LANS. WANs are set up with expensive devices and need
some dedicated connections
TOPIC #8: FUNDAMENTALS OF TOPOLOGIES
Definition:
The physical layout in which computers are connected is called topology. The topology
of network describes the way computers are connected. Topology is a major design
consideration for computer networking.

Page 31 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

In Bus Topology computers and other devices are connected with a single cable. The
central cable is the backbone of the network and every device communicates with the
other device through this bus. The advantages of Bus Topology are simplicity, low cost
and easy expansion of the network. The disadvantage of the Bus Topology is that a
breakdown in the bus cable brings the entire network down.
Advantage:
1. It is simple and easy to use.
2. It requires small length of cable to connect.
Disadvantage:
1. It is difficult to troubleshoot.
2. It only supports smaller number of computer.
In Ring Topology, computers are connected in a ring or circle shape. The signal travels
around the loop in one direction and passes through each computer. The recipient of
the message receives the message while another computer acts like a repeater to send
it to the next computer. The failure of a link or a computer can make the entire network
non-functional.
Advantage:
1. It is inexpensive in cost.
2. It is a circle without a central host computer.
Disadvantage:
1. Troubles shoot is difficult to diagnose.
2. The entire network breakdown due to break of cable or disorder of any terminal.
In a star topology, all the computers are connected to a central device called hub or
switch. To communicate with any computer, the sender must send information to the
hub. Then the hub transmits that information to the destination. The advantages of star
topology are easy to set up and easy expansion of the network. Another feature of Star
Topology is that if one link to the hub breaks, only the station using that link is affected
not the whole network.
Advantages
1. It is useful for longer distances.
2. There is no data collusion.
Disadvantage:
1. It is expensive topology.
2. The entire network held up due to disorder of host computer.
TOPIC #9: STANDARD ORGANIZATIONS
Definition of Standards:
It refers rules that define the appearance, functionality or protocols of some equipment.
By following standards, all hardware become compatible in the network, allowing
efficient networking to take place.
STANDARD ORGANIZATION:

Page 32 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

There are different standard organizations some of them are listing below:
1. International organization for standardization
2. Institute of electrical and electronic engineering
3. International engineering task force
4. International telecommunication union
5. American national standards institute
TOPIC # 10: NETWORK ARCHITECTURE
OSI MODEL LAYERS:
The open system interconnection model has seven layers which are follows:
Layer # 1: Physical layer
Layer # 2: data link layer
Layer # 3: network layer
Layer # 4: transport layer
Layer # 5: session layer
Layer # 6: presentation layer
Layer #7: application layer

TOPIC # 11: NETWORK ADDRESSING


Definition:
The network addresses are like our house addresses, They must be unique and
distinctive. It has two types:
1. Physical address
2. Logical address
PHYSICALADDRESS:
I. It cannot be changed:
2. It is globally unique and permanent.
3. It refers MÃC address
4. It is 48 bit MAC address
LOGICALADDRESS
1. It can be changed.
2. It is unique but in one network.
3. It refers IP address.
4. It is 32 bit TP address.

Page 33 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

CHAPTER # 05
TOPIC #1: COMPUTER SECURITY
Definition:
Computer security, cyber security or information technology security is the protection of
computer systems and networks from the theft of or damage to their hardware,
software, or electronic data, as well as from the disruption or misdirection of the
services they provide.
Why is computer security important? Write any three reasons.
Here are three reasons why is computer security important in our life.

Computer security is important because it keeps your information protected.


It's also important for your computer's overall health; proper computer security helps
prevent viruses and malware, which allows programs to run quicker and smoother. Data
theft is act of stealing sensitive information such as bank account details, credit card
information, passwords, and documents which stored on computers, servers, or other
devices
TOPIC #2: FORMS OF COMPUTER CRIME
CYBERCRIME
Cybercrime is criminal activity that either targets or uses a computer, a computer
network or a networked device. Most, but not all, cybercrime is committed by
cybercriminals or hackers who want to make money. Cybercrime is carried out by
individuals or organizations.
OR
Cybercrime is the crime that is committed through a computer and network.
Cybercriminal uses devices to gain unauthorized access to important information.
Stealing passwords and important information, hacking social media accounts, accessing
anyone else's account and making transactions, committing online frauds are some of
the examples of cybercrime
HACKERS
Hacker can be a person who has in-depth knowledge of computer systems, networks,
and programs. Hacker may be someone who uses his or her extensive skills to identify
and overcome a network loophole.
TYPES OF HACKERS:
Ethical Hacking
Ethical Hacking sometimes called as Penetration Testing is an act of intruding into
system to find out threats in those systems which a malicious attacker may find and
exploit causing loss of data, financial loss and major damage.

The purpose of ethical hacking is to improve the security of the network or systems by
fixing the threats found during testing. Ethical hackers may use the same methods and

Page 34 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

tools used by the malicious hackers but with the permission of the authorized person for
the purpose of improving the security and defending the systems from attacks by
malicious users.
Ethical hackers are expected to report all the vulnerabilities and weakness found during
the process to the management.
UNETHETICAL HACKERS:
This is totally opposite with ethical hackers, because they indulge crime activities,
unauthorized access accounts, seizing accounts etc... They are also called black hat
hackers.
Write any two measures to avoid email account hacking.
MEASURES TO AVOID EMAIL ACCOUNT HACKING
Don't click suspicious links in email or texts.
Activate Two-Factor Authentication (2FA) which requires a second piece of information
to confirm your identity.
Get a strong antivirus that raises the bar on securing your information, with real-time
protection from phishing attacks and threats.
CRACKERS
Crackers are persons who gain unauthorized access to another system. They
intentionally breach computer security. They do it with negative intentions and make
system non-functional.
CYBER ATTACKS
Cyber-attack occur when a cybercriminal uses computer or any device to launch attacks
to other single or multiple computer networks. A cyber- attack either disables the
targeted computer or deletes information or knocks it offline. It may also steal
information from the computer or network.
NOTE: Cyber-attack is just a part of Cybercrime, when you attack someone's PC or
devices to steal or destroy the data then it's considered as the cyber-attack which is a
cybercrime.
CYBER BULLYING
Cyber bullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyber bullying can occur through SMS, Text, and apps, or online
in social media, forums, or gaming where people can view, participate in, or share
content.
TOPIC #3: COMPUTER CRIME IN REAL LIFE
As technology is growing the data security has become so crucial. We can be a victim of
computer crime at any time. There are many genres of computer crime or now called
cyber-crimes. Some examples of such crimes in real life are discussed here.
HACKING
Hacking is perhaps the most common crime in the computer world. Hackers can steal
our WiFi, email, social media accounts' passwords or website. The hackers can also steal

Page 35 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

sensitive information from government and business organizations, make fraudulent


transactions and erase data on the cloud or network computers.
CREDIT AND DEBIT CARD SCAM
Scammers set small machines inside an ATM or credit card machine. These machines
copy the data which is then misused by the scammers. Debit and credit cards are also
secured with PIN codes. User has to keep this code secret otherwise any person can use
the card for online shopping and other purposes. All he or she needs to know our credit
card number, PIN and security code printed on the back of the cards.
PHISHING
Phishing is a method of trying to gather personal information using false e-mails and
websites. In Phishing, perpetrators contact the target person through email, telephone
or text message and pose as trusted individual and ask the personal details that causes
identity theft and financial loss.
CLICKJACKING
Click jacking is a malicious technique of tricking a user into clicking on something
different from what the user perceives, thus potentially revealing confidential
information or allowing others to take control of their computer while clicking on
seemingly innocuous objects, including web pages.
CYBER BULLYING OR HARASSMENT
Cyber bullying behavior can include posting rumors, threats, passing inappropriate
remarks, leaking personal information, blackmailing and committing hate speech.
Victims may experience lower self- esteem, intent to commit suicide or being scared,
frustrated, angry and depressed.
BRAIN STORMING
What should we do in case of becoming a victim of cyber-attack? OR Your friend has
become a victim of cyber harassment. What two advices will you give him or her?
ANS: There are ways to get rid of such miseries.
First thing is to report such incidents to the trusted people that are highly likely parents
and teachers. The government has also taken measures to curb cybercrimes especially
cyber bullying and harassment. In Pakistan, the National Response Centre for Cyber
Crimes has been set up to help the victims of cybercrimes. An online complaint can be
launched through the form available on the websites.
TOPIC #4: MALWARE
Definition:
Malware is a program that is written generally to cause a mess. They can be so
dangerous that they can also damage devices.
OR
Malware is intrusive software that is designed to damage and destroy computers and
computer systems. Malware is a contraction for "malicious software."

Page 36 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

Examples of common malware include viruses, worms, Trojan viruses, spyware, adware,
and ransom ware.
TOPIC #5: COMPUTER VIRUS
A computer virus is a program or a piece of code that is loaded on its computer without
knowledge and interface with the operation of computer. There are different types of
computer viruses are:
1. File infector
2. Boot sector
3. Macro virus
4. Email virus
5. Worm
6. Trojan horse
7. Adware
8. Spyware
WORM:
They are like viruses that replicates itself and can make hundreds and thousands of
copies. It works slower pace in the system. It consumes useless internal storage, delete
files etc.......
TROJAN HORSE:
is comparatively harmful and dangerous than worm. It can illegal trace important login
details of users online. It works faster in the system.
ADWARE:
It is not much like that a computer virus done normally. It is basically advertising
supported software. It irritate the user by endless ads and pop up windws during online.
They use extra processing resources and memory. They include games, advertisements
etc...
SPYWARE:
It is something dangerous than adware. It monitors a device and steal information and
send without consent a person.. includes cookies trackers, rootkits, key loggers etc..
HOW COMPUTER VIRUS SPREAD:
Contact there are many ways through which viruses may be transferred from one
computer to another. Most common ways are follows:
1. Email attachment: by receiving junk mails or unknown mails
2. Network connection: due to connection of number of devices attach together and
send data from different pc’s
3. Removable storage media. Like usb's, floppy disks, are portable disks cause transmits
virus
4. Pirated software: due to install or download unregistered or unauthorized software.

Page 37 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

TOPIC#6: COMPUTER ANTIVIRUS


Definition:
Antiviruses are utility software designed to protect computers from any potential
threats of data or hardware loss. It is highly recommended that the user must install an
antivirus on an operating system like windows. The most common antiviruses are:
1. Avast
2. Norton
3. McAfee
AVAST:
1. It is a next generation tool claim by company.
2. It has an immense cloud-based machine learning engine.
3. It stops viruses in a faster and smarter mode than other,
NORTON:
1. It is easy to use.
2. It configures easily.
3. It has least impact on system performance.
McAfee:
1. It enables to protect latest computer viruses.
2. It also protect from least effect viruses like spyware, adware etc...
3. It provides powerful combination of antivirus.
TOPIC #7: AUTHENTICATION MECHANISM
Definition:
It is the process of preventing and detecting and authorized use of computer. Some
security techniques used to reduce risks. They are follows:
1. Physical access restriction
2. Password
3. Digital signature
4. Firewall
5. Encryption
6. Audit
7. Making backup
TOPIC #8: PROFESSIONAL ETHICS
1. Access computing and communication resources only when authorized
2. Manage personnel and resources to enhance the quality of work life
3. Create opportunities for other individuals or groups to grow as professionals.
4. Avoid causing any harm.
5. Be honest and trustworthy.
6. Be ethical to everyone.
7. Don't misuse of accessories that are controlled by you

Page 38 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

TOPIC #9: INTELLECTUAL PROPERTY RIGHTS


They are the rights of creator or producer who invent or discover device, idea or
something else. If somebody extract the creator's idea or invention without the
permission or authority the creator can claims on that person or culprit under the law of
intellectual property rights. Following are included in intellectual property rights:
1. Patent
2. Copyright
3. Trademark
4. Software piracy
5. Plagiarism

Page 39 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

CHAPTER # 06
TOPIC# 1: BASIC TERMINOLOGIES OF WEB DEVELOPMENT
World Wide Web:
It Stands for "World Wide Web." It is important to know that this is not a synonym for
the Internet. The World Wide Web, or just "the Web," as ordinary people call it, is a
subset of the Internet. The Web consists of pages that can be accessed using a Web
browser. The Internet is the actual network of networks where all the information
resides.
Web page: A Web page is a document for the World Wide Web that is identified by a
unique uniform resource locator (URL).
Website: a group of World Wide Web pages usually containing hyperlinks to each other
and made available online by an individual, company, educational institution,
government, or organization
Web Browser: A software application used to access information on the World Wide
Web is called a Web Browser. When a user requests some information, the web
browser fetches the data from a web server and then displays the webpage on the
user's screen.
Search Engine: a computer program that searches documents, especially on the World
Wide Web, for a specified word or words and provides a list of documents in which they
are found.
Home page: A home page is a web page that serves as the starting point of the website.
Web server: A web server is the computer that is responsible for serving a website and
all of its content including text and media to a user.
TOPIC #2: TYPES OF WEBSITE
Portal: Web portals come in two flavors - internal an external. Internal portals are
designed to provide services within an organization, while external portals serve as a
starting point for browsing the web.
News: A news website is a site dedicated to giving the latest local or world news. A news
site may also be dedicated to a specific topic. For example, many computer-related
news websites are dedicated to talking about the latest computer and technology
related news.
Personal: A personal website is a site created by an individual that talks about their
personal life, family, life experiences, and maybe contains a résumé. Today, many
people are creating personal websites as a blog or using a social networking website as a
place to store information about themselves.
Blogs: A blog is a website that is often created by an individual to keep a list of entries
that interests them. See our weblog definition for a full description, services used to
create a blog, and related pages. A micro blog website is also another popular form of
blogging website that limits the number of characters someone can post in each blog
entry. Twitter is an example of a social networking website for a micro blog.

Page 40 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

Social: A social news website is a site that generates its content from its members and,
once posted, all other members can vote if they enjoyed or liked the story. Reddit is an
example of a social news website that allows everyone to post almost anything. It is a
great place to find things that would most interest you on the Internet.
TOPIC #3: INTRODUCTION TO HTML
Stands for "Hypertext Markup Language." HTML is the language used to create
webpages. "Hypertext" refers to the hyperlinks that an HTML page may contain.
"Markup language" refers to the way tags are used to define the page layout and
elements within the page.
Below is an example of HTML used to define a basic webpage with a title and a single
paragraph of text.
<!doctype html>
<html>
<head>
<title>TechTerms.com</title>
</head>
<body>
<p>This is an example of a paragraph in HTML.</p>
</body>
</html>
TOPIC #4: HTML TAGS
Definition:
In order to work out in HTML, it provides some specific tags so that require task can be
achieved. All HTML tags are enclosed by angular brackets <> with lowercase letter. You
can't use any tag with uppercase later. This is because of pre-defined format. Each
HTML tag has the particular format or syntax in order to use in web development.
<html>, <head>, <body> etc... are examples of HTML tags.
TOPIC #5: DESIGNING AND FORMATTING
There are some HTML tags enhance the design and format of that content. Some most
commonly used HTML tags which change the looks of the web page are explained
below:
 IDOCTYPE HTML TAG: it specifies the HTML version used so the web browsers
can show the web page according to html standards.
 HTML tag: It is the root of the html document which is used to specify that the
document is html.
Syntax:
<html> Statements... </html>
 Head tag: Head tag is used to contain all the head element in the html file. It
contains the title,style,

Page 41 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

Syntax:
<head> Statements... </head>
 Body tag: It is used to define the body of html document. It contains image,
tables, lists, ... etc.
Syntax:
<body> Statements... </body>

 Title tag: It is used to define the title of html document.


Syntax:
<title> Statements... </title>

 Heading: used to define the heading of html document.


Syntax
<h1> Statements... </h>
<h2> Statements... </h2>
<h3> Statements... </h3>
<h4> Statements... </h4>
<h5> Statements... </h5>
<h6> Statements... </h6>
 Paragraph tag: It is used to define paragraph content in html document.
Syntax:
<p> Statements... </p>
 Bold tag: It is used to specify bold content in html document.
Syntax:
<b> Statements...</b>
 Italic tag: It is used to write the content in italic format.
Syntax:
<i> Statements... </i>
 Small (text) tag: It is used to set the small font size of the content.
Syntax:
<small> Statements...</small>
 Underline tag: It is used to set the content underline.
Syntax:
<u> Statements... </u>
 List tag: It is used to list the content.
Syntax:
<li> Statements... </li>
 Comment tag: It is used to set the comment in html document. It is not visible on
the browser.
Syntax:

Page 42 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

<!--Statements... -->
 Font tag: It is used to specify the font size, font color and font-family in html
document.
Syntax:
<font> Statements... .</font>
TOPIC #6: CREATING LISTS
HTML provides three types of lists elements namely:
1. Ordered list
2. Unordered list
3. Description list
4. Nested list
1. ORDERED LIST:
It is used where the number of elements are required in order in listing. The ordered list
can be presented by <ol> tag. It has two aspect start and reverse. The start shows the
list in sequence while revers shows the list in decreasing order
1. UNORDERED LIST:
It is required where listing not require in proper numbering it just shows by bullets. It
can be presented by <ul> tag.
3. DESCRIPTION LIST:
It is used to display different terms and their descriptions just like in a dictionary or
glossary. It is
defined by <dl> tag. The term is defined by <dt> tag and its description is defined by
<dt> tags.
4. NESTED LIST:
If you require number of order list or unordered into description to description is called
nested list. It is very powerful feature of HTML lists is there ability to nest one into
another.
TOPIC #7: IMAGE AND BACKGROUND
The image and background give a visual appearance in the websites. These tags provide
attractive look for any websites or web page. There are different image tags and
background tags some of them are below:
IMAGE TAGS:
1. <srs> tag: it refers the source or reference of the image file.
2. <width> tag: it displays width of the image.
3. <height> tag: it displays height of the image.
4. <border> tag: it defines the width of the border.
BACKGROUND TAGS:
1. <bgcolor> tag: it is used to change the color of entire web page. Its color value can be
defined as RGB code.

Page 43 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

2. <background> tag: it is used to display an image at the background of the web page.
Its value
will be the reference or URL of the background image.
TOPIC #8: HYPERLINK
A hyperlink is an element in an HTML document that links to either another portion of
the document or to another document altogether. On webpages, hyperlinks are usually
colored purple or blue and are sometimes underlined.
1. <href> tag; it specifies the URL or section id of the page the link
2. <name> tag: it specifies the name of an anchor.
3. <target>tag: it specifies where to open the linked document.

TOPIC #9: TABLES


HTML tables allow web developers to arrange data such as name, class, item, product
number, roll number, batch number etc... into rows and columns. It provides better
format to display data on web page for pleasant reading. In order to generate table in
any website or web page there are different tags used in this regard some of them are
follows:
1. <width> tag: it specifies the width of the table,
2. <border> tag: it enables or disables the border around the table.
3. <cell padding> tag: it specifies the space between the edge of cell and the content
inside.
4. <cell spacing> tag: it specifies the space between cells.
TOPIC #10: FRAMES
HTML frames can be used to display the entire contents of another web page within a
web page. Frames sets define the layout to display different frames and their contents.it
is defined by <frame> tag.

Page 44 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

CHAPTER # 07
TOPIC # 1: WHAT IS DATABASE
Database:
A collection of related data stored in a manner that enables information to be retrieved
as needed
A Database stores data in organized form. It composed of tables which contain rows and
columns. These rows and columns are called record and fields respectively)
USE OF DATABASE:
1. It used in NADRA which keeps the multi millions of records of people Pakistan.
2. It used in organizations now a days to enhance the efficiency and productivity of it
production and skills.
3. It is used in schools, universities to maintain the overall record of students and their
progress.
4. It used in hospitals to keep the record of patients, doctors details, quaries etc...
TOPIC #2: WHAT IS DBMS
The DBMS serves as an interface between databases and end users or application
programs. Ensuring that data is consistently organized and remains easily accessible.
Following are some examples of DBMS software’s:
1. Oracle
2. Mongo DB
3. IBM DB2
4. PostgreSQL
5. MySQL
DISADVANTAGES OF DBMS
 Reducing Data Redundancy
 Sharing of Data
 Data Integrity
 Data Security
 Privacy
 Backup and Recovery
 . Data Consistency
DISADVANTAGES OF DBMS
 Cost of Hardware and Software
 Cost of Staff Training
 Cost of Data Conversion
 Complexity
 Currency Maintenance:.
 Performance:

Page 45 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

 Frequency Upgrade/Replacement Cycles:


TOPIC #3: BASIC COMPONENTS OF DBMS
1. Fields/columns: Hold single pieces of data-
2. Records/rows: Groups of related fields-
3. Tables: Collection of related records - Database Contains a group of related tables
4. Data types: All fields in a table muse have some data type. This is obviously, during
working in database user handles different types of data. Here we discuss some of
them:
(a) Integer: it holds numbers only such as 0-9.
(b) Floating point: it holds numbers with decimal point. Such as 455.22 etc..
(e) Character: it holds only single character such as A, B, C etc..
(d) String: it holds more than one character or character array such as name, place etc...
(e) Boolean: it holds only o's or 1's.
(f) Date and Time: it stores data and time with specific format such 29th may 20223 etc..
5. View: In database the records are stored on a table and these records can be seen or
view by views. The view component help out to represent data on screen or taken by
the printer on the paper.
TOPIC #4: DATA MODELING
The data modeling is a process of developing conceptual representation of data objects
and their relations. There are three most common components of data modeling:
1. Entity
2. Relationship
3. Referential keys
1. Entity: A person, object, or event of importance to the organization Entities that the
Organization wants to store data about typically becomes a database table-Attribute:
Characteristics of an entity. Typically become fields in the entity's database table-
2. Relationship: An association between two or more entities, A relationship define the
connection between two tables. It creates a connection from an attribute of one entity
with an attribute of another entity.
One to One (1:1) Entity Relationships: One entity is related to only one other entity of a
particular type Not a common type of relationship
One to Many (O:M) Entity Relationship: Most common type of relationship One entity
can be related to more than one other entity - A supplier can supply more than one
product to a company
Many to Many (M:M) Entity Relationships: One entity can be related to more than one
other entity, and those entities can be related to multiple entities of the same type as
the original entity
3. Referential Keys:
The relationships are configured by using referential keys. Following are some common
keys used in database.

Page 46 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

 Primary key
 Secondary key
 Foreign key
 Candidate key
 Super key
Here are some reasons for using SQL key in the DBMS system.
 Keys help you to identify any row of data in a table. In a real-world application, a
table could contain thousands of records. Moreover, the records could be
duplicated. Keys in RDBMS ensure that you can uniquely identify a table record
despite these challenges.
 Allows you to establish a relationship between and identify the relation between
tables
 Help you to enforce identity and integrity in the relationship.
PRIMARY KEY: in DBMS is a column or group of columns in a table that uniquely
identify every row in that table. The Primary Key can't be a duplicate meaning the same
value can't appear more than once in the table. A table cannot have more than one
primary key.
Example:
In the following example, <code>StudID</code> is a Primary Key.

Student ID Roll NO. First Name Last Name Email


1 11 Tom Price abc@gmail.com
2 12 Nike Wriaht xyz@gmail.com
3 13 Natan Danan mno@gmail.com

FOREIGN KEY: is a column that creates a relationship between two tables. The purpose
of Foreign keys is to maintain data integrity and allow navigation between two different
instances of an entity. It acts as a cross-reference between two tables as it references
the primary key of another table.
Example:
Dent Code Dent Name
001 Science
002 English
003 Computer

TOPIC # 5: ENTITY RELATIONSHIP DIAGRAM


Definition:
The ER-diagram is a pictorial or graphical presentation to show the flow of data in any
Database system. It helps out to the database administrator in order to check out the
Errors and detail flow or data operation that work out in database. The ER-diagram has
Page 47 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

some important component that are follows:


COMPONENT OF ER DIAGRAM
1. Entity Diagram:

it represents by rectangle shape that shows any student name, roll number etc..
2. Attributes Diagram:

It represents by oval shape that shows an entity contains multiple attributes.

3. Relationship Diagram:
It represents by diamond shape that shows the connectivity between Entity

4. Lines diagram:
It represents by lines that shows connecting lines between entities or attributes,

IMPORTANT DIFFERENCES
Difference between Hackers and Crackers:

Hackers Crackers
1. Hacker is any skilled computer expert A cracker is a person who breaks into
that uses their technical knowledge to someone else's computer or a network
overcome a problem. illegally.

2. They don't damage the data They damage the data or make it non-
intentionally. functional intentionally.

3. Hackers are generally programmers who They bypass passwords of computers and
obtain advance knowledge about social media websites, can steal your bank
operating systems and programming details and transfer money from bank.
languages.

Page 48 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

They are also named as "Black Hats


4. They are also named as "White Hats"

Difference between Data Rate OR Baud Rate

Baud rate is used when we want to know


Bit rate tells the number of bits the number of signal units transmitted per
transmitted per unit of time (Second). unit of time (Second).

Baud rate is the number of times a signal is


Bit rate is the number of bits (o's and 1's)
travelling comprised of bits. One signal can
transmitted per second.
represent more than one bit.

Baud rate bit rate/the number of bits per


Bit rate = baud rate x the number of bits
signal Baud rate bit rate/the number of
per signal unit.
bits per signal

Difference between Analog and Digital Signals:

An analog signal is a continuous wave that A digital signal is a discrete wave that
changes by time period. carries information in binary form.

Analog has no fixed range. Digital signal has finite number i.e. o and 1.
The human voice is an example of an Signals used by computer are the digital
analog signal. signal.
An analog signal is represented by sine A digital signal is represented by square
wave. waves.
Analog signals are long term waves need Digital signals are short term signals
to remain
be booting. within digital devices/electronic.

Difference between Physical Address and Logical Address:

Physical address is attached with ROM of Logical address is assigned to a device.


the NIC card.
Physical Addressing means MAC (Media Logical addressing means IP addressing
Access Control) provided by manufacture that is provided by your Internet server

Page 49 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

and attached address of the NIC. The card Provider (ISP) or set by Network
which is used to connect your machine to Administrator
the internet.
Physical addressing cannot be changed. Logical Address can be changed.
They are also called hardware address.
Physical Address is a 48 bit MAC address. Logical Address is a 32 bit IP Address.
It is globally Unique and Permanent. It is unique in one network and temporary.

Difference between Software and Hardware

SOFTWARE HARDWARE
It instructs to the computer what to It instructs to the computer regarding
do and how to do. data processing stages.
It comprises set of instructions or It comprises tangible or physical
commands. components that forms a system unit.
Ms-word, Ms-windous, Flash etc... Keyboard, microprocessor, printers
are examples of soft wares. etc. are examples of hardware.
It is very helpful in order to get It is very helpful in transmission data
desire task conveniently. throughout system unit.

Difference between General Purpose Computer and Special Purpose Computer

General purpose computer Special purpose computer


It is designed to perform variety of
It is designed to perform specific task.
task.
It is commonly used in offices, It is specifically used in industries,
school, home etc.. missile testing etc...
It is less expensive in cost. It is expensive in cost
Micro computer, laptop etc.. are Super computers, analogue computers
common examples. are some examples.

Difference between Micro Computer and Mini Computer

Micro computer Mini computer


It has limited data storage. It has large data storage.
It’s a single user computer. It is a multi user computer.
It’s portable. It is not portable.
Hardware maintenance is easy and Hardware maintenance is hard and
less expensive. expensive.

Page 50 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

Difference between High Level Language and Low Level Language

High level language Low level language


It’s easy to understand and learn. It is hard to understand and learn.
It comprises English alphabets or
It comprises digits O or 1.
letters
GW basic, Fortran etc. are Machine language, assembly language
Examples of high level. are examples of low level.

Difference between Serial Port and Parallel Port

Serial port Parallel port


It is a port that transmit data bit by It is a port that transmit data more
bit at a time. than 1 bit at a time.
It is a slower port. It is a faster port.
It has normally 9 or 25 pins. It has normally 25 holes.
Keyboard and monitor use serial Hard disk, printer use parallel port for
port for transmission data. transmission data.
Mostly software are designed in All softwvares are converted into low
high level languages. level languages.
Difference between Interpreter and Compiler

Interpreter Compiler
It interprets statement or program It interprets whole statement or
line by line at a time. program at a time.
It is slower in working. It is faster in working.
It is used in Gwbasic, Qbasic etc It is used in C-language, Pascal etc..
It does not make an object file It makes an object file separately.

Difference between Monitor and Printer

Monitor printer
It is an output device that shows It is an output device that shows
data on the screen. data on the paper.
It produces softcopy. It produces hardcopy
It is slower device. It is faster device.
It has three basic types. It has two types.

Difference between Keyboard and Mouse


Keyboard Mouse
Page 51 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

It is a primary input device. It is a primary pointing input device


It is used to enter or feed textual It doesn't have the ability to enter
data into the system unit. textual data into the system unit.
It is help full to prepare It is help full to operate GUI software such
summary reports, drafting etc as windows, Photoshop etc..
It is a necessity for any It is necessary for any computer.
computer.
Difference between Impact printer and Non-Impact printer
Impact printer Non-Impact printer
It is a type of printer that It is a type of printer that produces
produces low quality printing. high quality printing.

It is noisy printer It is quite printer.

It prints any character by striking pins It prints any character by using


against the ribbon laser beam technology.

Dot matrix, daisy wheel etc.. are examples Laser, ink-jet etc.. are examples of non
of impact impact printers.

Difference between Soft copy and Hard copy

Softcopy Hardcopy
Screen output is known as softcopy. Paper output is known is hardcopy.
It is intangible and temporary. It is tangible and permanent.
It is very helpful to examine data It is very useful to finalizing
before finalizing it on a paper. documents.
It is a first and basic medium for It is a second but indispensable
showing output. medium for showing output.

Difference between RAM and ROM

RAM ROM
It stands for random access memory It stands for read only memory
It is also called volatile memory. It is also called non-volatile memory.
It refers read and write memory. It refers read only memory.
It is fastest and expensive type of storage. It is slower and expensive type storage.
It has two basic types. DRAM, SRAM It has three basic types.
PROM, EPROM, EEPROM.

Page 52 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

Difference between Floppy disk and Hard disk

Floppy disk Hard disk


It is an flexible type storage medium. It is an inflexible type storage medium.
It is also called portable storage device. It is also called fixed storage device.
It stores less amount of data or instruction. It stores massive amount of data or
instruction.
It has slow data access operation. It has fast data access operation.

Difference between Computer virus and Computer antivirus

Computer virus Computer antivirus


It is a program that infect other programs. It is a program that remove virus program
Trojan horse, worm etc.. are some Mcafee, PC Clean etc.. are some common
common virus program. antivirus program.
It replicates in files rapidly, It stops replicating
It decrease the efficiency of computer It increases the capability and
efficiency of computer

Difference between Mouse and Track ball

Mouse Track ball


It is a pointing device that controls It is a pointing device that controls
the pointer dragging it over a the pointer without rolling it over a
flat surface. flat surface.
It has a revolving ball fixed downside. It has a revolving ball fixed upside.
It is used with any type of It is particularly used with laptop or
computers. palm top computers.
It requires space to work out. It doesn't require space to work out.

Difference between Volatile memory and Non-volatile memory

Volatile memory Non-volatile memory


The contents of this memory is temporary The contents of this memory is permanent.
It helps in making exact address location of It helps in operating, loading any
bytes system unit.
Ram, catche memory are common ROM, hard disk are common
Page 53 of 54
Class 9 Computer Studies 2024-2025 Sir Rafiq’s Collegiate

example of volatile memory. example of non-volatile memory.


It helps in storing any data into It helps in performing fundamental
secondary storage devices. task to computer.
Computer Abbreviation Full Form
AAC Advanced Audio Coding
ADSL Asymmetric Digital Subscriber Line
AGP Advanced Graphics Port
ΛΙ Artificial Intelligence
ALGOL Algorithmic Language
ALU Arithmetic Logic Unit
AMD Advanced Micro Devices
API Application Program Interface
ARPANET Advanced Research Projects Agency Network
ASCII American Standard Code for Information Interchange
ASP Active Server Pages
ASPI Advanced SCSI Programming Interface
AUI Attachment Unit Interface
BASIC Beginner's All-purpose Symbolic Instruct
BCC Blind Carbon Copy
BCD Binary Coded Decimal
BCR Bar Code Reader

Page 54 of 54

You might also like