Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
4 views

Computer Classroom Notes

The document provides an overview of the Central Processing Unit (CPU), its components, and memory types in a computer system. It explains the functions of the Arithmetic Logic Unit (ALU), Control Unit (CU), and various memory types including RAM, ROM, and cache, along with their characteristics and access methods. Additionally, it covers input devices like keyboards and mice, and includes comparisons of memory access times and storage capacities.

Uploaded by

Arshdeep Singh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computer Classroom Notes

The document provides an overview of the Central Processing Unit (CPU), its components, and memory types in a computer system. It explains the functions of the Arithmetic Logic Unit (ALU), Control Unit (CU), and various memory types including RAM, ROM, and cache, along with their characteristics and access methods. Additionally, it covers input devices like keyboards and mice, and includes comparisons of memory access times and storage capacities.

Uploaded by

Arshdeep Singh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 112

CPU (Central Processing Unit)

 It is also known as processor, Microprocessor, Brain of


computer or heart of computer.

 Material of CPU: - 1)
2)
 Nature: -

 Processing Speed measurement unit of CPU: -

 Location: -
 Cabinet (When Empty)
Monitor

 Known as system unit when


Keyboard
motherboard inside

Motherboard (or PCB: - Printed Circuit board)

CPU
Parts Of CPU

a) ALU is responsible for all arithmetic ALU


and mathematical calculations inside
CU
computer.
b) Control Unit control the movement of Set of Registers
signals between the CPU and the
peripheral devices.
It is also Known as “Heart of CPU”
c) Register: - It is the fastest smallest storage area inside CPU.

Q:- We have to compare two numeric values in a computer


then which component will perform this task ?
a) CU b) CPU c) Memory Unit d) N.O.T.A

Characteristics of computer:-

1) Deligence:- The capacity of computer of performing repetitive task without getting


tired.

2) Versatile:- The capacity of computer to perform different types of tasks with the
same accuracy and performance.
Memory Units
1) Smallest unit of memory: - bit (Binary digit)
2) 1 Nibble = 4 bits (i.e. a nibble is a combination of 4 bits)
3) 1 byte = 8 bits
(Representation: - Byte  B, Bit  b)
4) 1 Kilo Byte (KB) = 1024 B
5) 1 Mega Byte (MB) = 1024 KB
6) 1 Giga Byte (GB) = 1024 MB
7) 1 Tera Byte (TB) = 1024 GB
8) 1 Peta Byte (PB) = 1024 TB PG
9) 1 Exa Byte (EB) = 1024 PB
10) 1 Zetta Byte (ZB) = 1024 EB
11) 1 Yota Byte (YB) = 1024 ZB PEZY
12) 1Bronto Byte (BB) = 1024 YB
13) 1 Geop Byte (GPB) = 1024 BB

1) 1PB = MB
(a) 1024 * 1024* 1024* 1024
(b) 1024 * 1024* 1024
(c) 1024 * 1024
(d) 1024
2) 1GB = Byte
(a) 1024 * 1024* 1024* 1024
(b) 1024 * 1024* 1024
(c) 1024 * 1024
(d) 1024

3) 1TB = MB
a) 210 b) 220 c) 230 d) 240

4) 1EB = TB
a) 1 Thousand b) 1 Million c) 1 Billion d) 1 Trillion

5. 4096 PB =
a) 2 PB b) 4 PB c) 4EB d) 4TB
6. 5 MB =
(a) 2 00 00 00 bits (c) 4 00 00 00 bits
(b) 5 00 00 000 bits (d) 4 00 00 000 bits

7. 2B = N
a) 2 b) 4 c) 6 d)8

CPU
Types Of Memory
Memory

Primary Memory Secondary Memory


(or Auxilory Memory)

RAM ROM Cache Register

Magnetic Magnetic Optical Disc Flash


Tape Disk Memory

Cassette Floppy Disk CD Pendrive


Zip Disk DVD SD Card
Hard-Disk BRD SSD
HVD
Ways To Access a Memory

1. Sequential Access (Ex – Magnetic tape)


2. Random Access (Ex – RAM)
3. Direct Access (It is a combination of sequential and
random access). Ex - HDD
4. Associate Access (It is a special type of random access
method. Here WORD is accessed rather than its address.)
Ex – Cache

Operations Done On Memory


Memory

Read Operation Write Operation

This operation brings no This operation brings changes


change in the memory in the memory

Ex:- delete operation


Ex:- watching movie or song, edit/update operation
reading pdf etc insert operation
Diagram of how computer starts
Data Flow Diagram

• Different components on motherboard are connected through:-


• Memory nearest to CPU in data flow diagram will:-
i)
ii)
iii)
• Speed comparison between memories wrt data flow diagram
register > cache > ram > hdd

• Price comparison between memories wrt data flow diagram


register > cache > ram > hdd

• Size (or capacity) comparison between memories wrt data flow diagram
hdd > ram > cache > register
Comparison of Memories
Access Time Of Memory: - It is the time taken by memory to
avail data for CPU.
(Ek memory nu CPU tak data pahuchan layi jina time lagya, uss
time nu memory da access time keha janda hai)
Register

 Location: - CPU
 Nature: - It stores the data temporary and is volatile in
nature.
 Which memory is close to the CPU: - Cache (1st Priority)
RAM (2nd Priority)

 Which memory interacts with CPU first:- Register(1st Priority)


Cache(2nd Priority)
 Cache Memory Lies between: - CPU and RAM
 Fastest memory in Computer: - Register
 Costliest memory in computer: - Register
ROM (or MROM)

 Location: - Motherboard.
 ROM is used to start the computer.
 ROM stores a one special program known as BIOS (Basic
Input Output System).
BIOS is the first program that runs inside the computer and
its key role is to load the OS.
 ROM stores the data permanently and thus it is non-volatile
in nature.
 Operation on ROM: - Read only

Types Of ROM
1) PROM: - Programmable Read only Memory.
 It holds the property of WORM (Write once Read
many)
 Dis-adv: - We can’t erase the data from PROM and
thus can’t be updated.

2) EPROM: - Erasable programmable Read only Memory.


 Here data is erased through UV radiations.
 Dis-adv: - The whole data will be erased, not as per our
requirement.

3) EEPROM: - Electrically erasable programmable read only


memory.
 Here data is erased with help of electricity.
 It is also known as flash memory.
Q:-Which current is used in digital devices.
Ans:-
Q:- What is the source of DC current.
Ans:-
Q:- Name the device used in PC to convert AC into DC.
Ans:-
Q:- Fullform of UPS.
Ans:-
RAM (or Main Memory)

 Location: - Motherboard
 Nature: - Temporary and volatile
 Operation: - both read and write

 RAM is also known as “Current time” memory because every


application which we are using at present is being run inside
RAM.

SRAM DRAM

1) Static RAM 1) Dynamic RAM


2) Made up of transistors 2) Made up of capacitors
3) Used in supercomputers 3) Used in PC, Laptop,
Smartphone.
4) Need not to be refreshed 4) It is automatically
5) It is faster and costlier refreshed periodically
than DRAM by the system.
5) It is slower and cheaper
than SRAM.
FRAM: - Ferroelectric RAM
 It is used in server and super computer.
 It is non-volatile in nature.
SDRAM: - Synchronous dynamic random access memory
ADRAM: - Asynchronous dynamic random access memory
SDR: - Single Data Rate
DDR: - Double data Rate

Q:- Main Memory is ………. And Secondary memory is …….


a)Temporary,Temporary b)Permanent,Temporary
c)Temporary,Permanent d)Permanent,Permanent
Cache Memory(or SRAM)
 It is used to speed up the RAM.
 It is one of the type of SRAM.

 The work that is done by RAM in 180 nsec, is done by cache


in 45 nsec.

 Types of cache Memory: -

1. L1 Cache : Level-1 cache


2. L2 Cache
3. L3 Cache
L1 is the fastest cache and L3 is the slowest cache.
 Storage Capacity: -
1. L1: - 2KB to 64 KB
2. L2: - 256KB to 412KB
3. L3: - 1MB to 8 MB
Architecture Of Cache(Diagram-1)
Diagram-2

Virtual Memory
 Memory Hardware (Yes/No)
RAM
ROM
VM

 It is just a concept used by the programmer to make program


believe that it has extra amount of RAM in a system to use.
 It is also known as “Extended RAM”.

 Location: - Hard disk


{Unused space inside hard disk is reserved for virtual
memory and recovery of files}
 (VM size) by default = RAM size
Its size can be increased upto 3 times the size of the RAM.
Diagram
Secondary Memory
Secondary memory is also known as auxiliary memory (or
backup memory).

Magnetic Disk
1. Floppy Disk: -
 It is also known as flexible disk.
 Size: - 3.50” ( 768 KB)
5.25” (1.2 MB)
8” (1.44 MB)

2. Zip Disk: - Magnetic coating used in zip disk was of higher


quality and can store more data than floppy disk. (Zip disk of
3.5” capacity = 750MB)

3. HDD (Hard Disk Drive)

 HDD is reserved for C-Drive for storing OS source code.


 HDD is connected to motherboard via PATA or SATA
cables.
 PATA: - Parallel advanced technology attachment.
SATA: - Serial advanced technology attachment.
 HDD is divided into tracks and sectors.
 The process of dividing the HDD into tracks and sectors is
known as “Formatting”.

 Storage capacity of HDD=


Total no. of Surfaces* No. of tracks per surface* no. of
sectors per track * no. of bytes per sector.

 Seek time = Time to position the R-W head over the


proper track is called seek time.

 Rotational Latency = Time to spin the required data under


R-W head is rotational Latency.

 Access time = It is the time required to access the data


= Seek time + Rotational Latency + Transfer Rate
Optical Disc

Optical storage uses a laser beam of light to store and retrieve


data.

1. CD ( Compact Disc): -

 CD-ROM:- (a) It holds the property of WORM.


(b) used in mass production of audio/video CD’s
of Games/Movies etc.
 CD-R: - (a) Compact disc recordable
(b) It also holds the property of WORM.
(c) It is initially blank and is used for personal
storage of data.
 CD-RW: - (a) Compact disc rewriteable.
(b) Here we can delete the data thus it is
reuseable.

Burning:- The process of writing data on cd or dvd is known


as burning.

CD Capacity by default= 700 MB


2. DVD: - Digital versatile disc
Smallest basic unit that holds the data in CD and DVD is called Pits.

Types: - DVD-R, DVD-RW

Capacity: -
 Single sided Single Layer= 4.7GB (standard DVD)
 Single Sided Double Layer = 8.5 GB
 Double sided Single Layer= 9.4 GB
 Double Sided Double Layer = 17 GB (maximum capacity)

3. BRD: - Blu ray disc


(a) For storing HD movies/games.
(b) BRD Capacity: - Single Layer BRD : - 25 GB
Double Layer BRD: - 50 GB

4. HVD: - Holographic versatile disc


It can store data between 2 to 5 TB.
Computer Keyboard
1. keyboard is basically divided into 4 parts: -

a. Function Keys C. Special keys d. Numeric


Page Up
Keys
b. alphanumeric keys
Page down
(Numbers + Symbols + alphabets + 


Ctrl/spacebar/alt etc)

2. Modern Keyboards contain 104 keys as per US convention.


3. Father of Keyboard = Christopher Lathom Sholes.

Types of Keyboard

1. QWERTY Keyboard (or standard keyboard)

2. DVORAK Keyboard (used in 1930’s)

3. PDA Keyboard (Personal digital assistant)


It is used to attach with Tablet/I-PAD.

4. Flexible Keyboard

5. Ergonomic Keyboard
It is designed to reduce the strain of constant typing on wrist.
6. Virtual Keyboard:- Type OSK (on screen keyboard) in window
search button to open virtual keyboard.
7. Braille Keyboard:- For blind persons.
8. Multimedia Keyboard:- For web developers.

PDA
KeyBoard

Ergonomic
KeyBoard

Dvorak
KeyBoard
 Why Keyboard is QWERTY not ABCD.
Keys were randomly positioned to actually slow down
Typing speed and to prevent KeyJam.

 Typing speed is Measured in : -

 Toggle Keys (One key, Two work) : -

 Modifier keys: -
These Keys doesn’t work alone.

 Function Keys: -
Number Of function keys:-
a) =13 (F1 to F12 and Fn). Fn key is present in laptops.
b) =12 (F1 to F12), These keys are also known as action keys.

Note:- If asked number of function keys then 1st preference is


given to 13.
Function Keys Working
1) F1: - help

2) F2: - Rename

3) F3: - Search

4) F4: - Redo, repeat the last action

5) F5: - Refresh

6) F6: - highlights the full URL

7) F7:- To check spelling and grammatical error in MS-WORD.

8) F8: - Open the boot menu (BIOS settings), while turning ON


the computer.

9) F9: - To unselect

10) Shift + F10: - used as right click of mouse

11) F11 : - enter and exit full screen mode.

12) F12: - Save as.


Input Devices
1) Keyboard

2) Mouse: -
Father Of Mouse: - Douglas Engelbert
Mouse is also known as ‘Pointing & Selecting’ device.
Types of Mouse:- a) mechanical mouse( having brass ball at
. bottom)
b) optical mouse
c) wireless mouse

3) Trackball: - It is also known as up side down mouse.

4) Joystick: - It is mainly used in playing games on the computer


Shape: - vertical
5) Light Pen: - (or electronic Pen)
It is used to digitally input the data into the computer.
ex: In Suvidha Kendra we use digit pen to digitally input a
signature in a computer.

6) Scanner: - It is used to convert hardcopy to softcopy.


Types: -1) Handheld scanner
2) Flatbed scanner: - for domestic/ official use
3) Drum scanner

7) BCR: - Bar code reader

8) MICR: -
It is used to scan the code written on bank cheques.

9) OCR: -
It converts the document to an editable text file.

10) OMR: -
It scans the OMR sheet used in competitive exams.

11) QR Code:- Quick response code

12) Digital camera

13) Webcam
14) Digitizer (or Graphical Tablet)
It is typically designed for CAD/CAM professionals.
It allow users to draw and manipulate graphics the screen.

15) Microphone (MIC)

16) Biometric device


Output Devices
1) Monitor
2) Printer
3) Speaker
4) Projector
5) Plotter
Printer

Types
1) Impact Printer 2) Non- Impact Printer
• Dot Matrix Printer • Inkject Printer
• Daisy Wheal printer • Laser printer
• Line Printer • Thermal Printer
• UV Printer

A) Impact printer: - a) Noisy


b) Black and white printing
c) Here print head touch with the paper.
1. Dot Matrix Printer: -
• It is also known as character printer, as it prints one
character at a time.
• It is bi-directional in nature.
• Printing is of moderate quality.
• Printing speed is measured in CPS (Character per Second)
2. Daisy wheel printer: -
• It also prints one character at a time.
• Printing is of higher quality than dot Matrix Printer.

3. Line Printer: -
• It print one line of text at a time.
• It is also known as bar printer.
• Printing speed is measured in LPM(lines per minute)
B) Non-Impact printer
1. Inkjet Printer: -
• Here ink is sprayed on a sheet of paper.
• Liquid (or wet) type of ink is used.
• Colored Printing.
• Combination of 4 colors are used: - CMYK
{cyan (sea Green) , Magenta, Yellow, Key (Black shade)}

2. Laser Printer: -
• ‘Dry ‘type of ink is used.
• Usage of Cartridge and toner.
• Printing is of higher quality
• Best for usage in home and office.
• Printing speed of both inkjet and laser printer is measured
in PPM (Page per Minute)

3. Thermal Printer: -
• Used in ATM (Automatic Teller Machine), bus ticket,
shopping mall etc.
• Carbon is used as a ink.

4. UV Printer: -
• Used by Govt. agencies for confidential data printing.
• Costly Printers.

Plotter
 Best Quality Graphic Printer for business purpose for printing
car design, architectural designs etc.
 Types: - Drum Plotter and Flatbed Plotter.
Resolution
 The word resolution tells about the image Quality.

 Image resolution is measured in : - PPI (Pixels per inch) or DPI


(Dots per inch)
for moniter for printer
 Smallest unit of Image : - Pixel

 Resolution= no. of horizontal Pixels * no. of vertical Pixels

 Resolution= 640 × 480 Pixel, means  Pixel


640: horizontal lines
480: Vertical lines
Malware
• Malware means malicious software that harms our
computer and computer files.
• Malware Types : - 1) Virus
2) Worm
3) Trojan Horse
4) Spyware
5) Ransomware

1. Virus: - Vital information resource under siege.


 It is an malware that enters the computer system by
attaching with another file.
 The virus becomes active once the file is executed , i.e.
human intervention is required to activate the virus.
 It replicates itself.
 First virus that spread over the network (ARPANET)
Creeper Virus (1971)
 First virus in India: - Brain virus (or Lahore virus)
(Developed by Amjad Alvi in 1986)

Types of Virus

a) Resident virus:- It stays and deploy in the RAM and infect


computer files without even being executed.
b) Boot sector virus: - It affects the boot sector of the computer
and destroys the data stored in the HDD.
ex: - Brain Virus.
c) Macro Virus: - It affects the application softwares ( ex:- MS-
Office files) installed in the computer

d) Polymorphic Virus: -
• It is considered as the most harmful virus because it keeps
on changing its Signature Pattern (or Structure).
• It is also called stealth virus because of its hidden
capabilities.

e) Multipartite Virus: - It performs the unauthorized actions in


the OS.

f) Time Bomb: - It is a virus performs an activity on a particular


Year/month/date.

g) Retrovirus: - A virus that can deactivate anti-virus software is


called retrovirus.

Name of Anti-virus Software


1) Avira 4) McAfee 7) Panda
2) Avast 5) Quickheal 8) Norton
3) AVG 6) Kaspersky 9) K-7 Security
2. WORM: -
 The program that replicates itself rapidly and clogging the
system so that its operations are slowed down or stopped
is called worm.

3. Trojan Horse: -
 The virus that pretends to be useful but in actual it is
harmful is called Trojan Horse.
 It is also known as fake software because it misleads the
user of its true identity.

4. Spyware: -
 It is a tracking software that is used to get the information
of a person or an organization.
 ex: - Keylogger (It copies the key impressions).
To prevent from this, user should opt for virtual keyboard.

5. Ransom ware: -
 It locks the user out of their files (or device) and then
demands anonymous online payment to restore access.
 Famous Ransom ware attack in India: - Wannacry
 Famous Ransom ware attack in Ukraine: - Petya

6. Phishing: - Technique of doing financial fraud over the


internet is called phishing.
ex: -a) Fraudlent attempt to obtain sensitive information
of a person such as username, password, OTP, credit card
details etc.
7. Spoofing: - It is the identity theft of a person used to create
fake accounts like email address, fb account etc.

8. Eavesdropping:- Unauthorized monitoring of other people’s


communications is called Eavesdropping. Here attacker gains
access to the communication medium and thus gets information
about the content of the message.

9. Pharming:- It is an attack in which a hacker attempts to redirect a


website’s traffic to a bogus website. Even if the URL is entered
correctly, it can still be redirected to a fake website.

Extra terms
1. Bogus website:- means fake website

2. DoS:- Denial of Service.


An attempt to or network slow down or stop a computer system by
flooding the system with requests for information is called
DoS attack. It is like sending a artificial traffic to a particular website
during sale time to slow down the further proceedings.
Software
Types of Software
1. Application Software These are user-specific softwares i.e.
these are installed by user as per requirement.
Ex:- MS-Office, Tally, Games etc.

2. System SoftwareWithout them computer system will not


work.
Types of system software:-
i. Operating system
ii. BIOS
iii. Language convertor( or Language Translator):-
a) Assembler
b) Compiler
c) Interpreter
iv. Linker
v. Loader
vi. Utility Software
Q:- What is Software.
Ans. It is program or collection of programs.
MS-WORD

FILE HOME INSERT  ---------- PROGRAMS

Instruction-1
.
.
.
Instruction
Q2) What is Program?
Ans. It is a set of instructions to do a specific Task.

Operating System
 Operating System is an system software that acts as an
interface between i) user and hardware,or
ii)Application programs and hardware

Application software
OR OS Hardware
USER

Kernel: - It is also Known as “heart of the OS”.

RAM
KERNEL Every application on computer is installed on HDD and run
inside RAM.RAM is known as waiting room memory bcoz 1 CPU
(active code of OS) can process one application at a time and each application is
waiting inside RAM for their turn to be processed by CPU.CPU
whatsapp uses time sharing technique to switch between applications and
give illusion to user that all applications are running at the same
time.
youtube
facebook
Song
Functions of Operating System
1. Process Management: - processing each program (or
application) by the CPU one by one.
2. Memory Management: - To manage the memory shared by
different processes is also done by OS.

3. File Management: - All the files that are stored in secondary


and primary memory are managed by the file system
component of OS.

4. I/O Management: - To store all the data given by input


devices and to send output to output devices is also done by
OS.

Types of operating system Interface


a) CUI: - Character User interface.
 Here we have to write commands in order to get the
workdone.
 ex: - MS-DOS, UNIX, Window’s command prompt.

b) GUI: - Graphical user interface (means we have icons here)


 User Friendly Based on usage of Keyboard + Mouse
ex: - Windows, Mac OS, Linux (It is both CUI and GUI)
Desktop Based OS
1) MS-DOS: - CUI based (1981)
2) Windows: - GUI based (1985), Closed Source OS

3) MAC OS: - Machintosh OS, Closed Source OS

4) Unix OS: -
 Developed by Dennis Ritche and ken Thompson in 1969
 Based on C- Language
 Multi-user OS (used as a server)
 Closed source OS.

5) Linux: -
 Developed by Linux torvald in 1991
 It is both CUI and GUI based.
 It is used as a server.
 Open source OS (here we can change the source code.)
 Most secured OS.
 Also known as GNU (GNU Not Unix)
 Different versions of Linux: - a) Ubuntu
b) Fedora
c) Red-hat
d) Debian
e) Kali linux
Mobile Based OS
1. Google: - Android (Launch in 2008), developed by Andy
Rubin (Open Source OS)

2. Apple: - IOS, I-Phone Operating System (Launch in 2007)

3. Samsung: - Bada & Tizen


4. Microsoft: - Windows (for both desktop & Mobile)
5. Nokia: - Symbian
6. Research in Motion (Company): - blackberry

 First operating System: -


1. GMOS: - General Motors operating system developed by
General Motors in 1956.
2. Created for IBM 704.
3. In 1964, IBM developed its own OS known as OS/360.

Types of OS
1. Batch OS: -

 Program-1
Storage
Program-2 Batchfile (.bat)   CPU
Medium
Program-3
Viz, magnetic tape

Similar jobs are combined together to form a batch and is given


to CPU.
 The user of batch OS do not interact with computer directly.
2. Single user, Single Task: -
ex: -Window XP, Windows 95, Window NT (New Technology)
MS-DOS

3. Single User, Multi-Tasking OS: -


 It is related to microcomputer.
 ex: - MS- Windows, MACOS, Android.
 {ex: - Smartphone, Laptop , PC}

4. Multi-user, Multi –Task OS: -


 It is related to servers.
 ex: - Unix, Windows 2000 advanced server, mainframe
computer

5. Real time operating system: -


 These are also known as embedded system (here we have to
do work within time limits).
ex: - Robots based OS, Digital watches, Automatic washing
machines etc.
 RTOS Types:- a) Hard real time OS (ex: - satellite launch)
b) Soft real time OS (ex: - Metro Train Gate close)

{ An embedded system is a computer system- - a combination of


a computer processor,computer memory and input/output devices-
-- that has a dedicated function within larger mechanical or
electronic system}
BIOS (BASIC INPUT OUTPUT SYSTEM)

1. BIOS is the first program that runs inside the computer at


the time of booting(start of computer).
2. The Key role of the BIOS is to load the OS from the HDD to
RAM.
3. The process of transferring of OS files from HDD to RAM
during startup operation of computer is called booting.

Booting Types: - a) cold booting: - start of computer


b) hot/warm booting: - restart (or reboot)
of computer.

4. POST (Power On Self Test): -


It is a program and is a part of BIOS. It sends the signals to
all hardware attached to the motherboard. It checks
whether all the components are working properly or not.

5. Shadowing: -Shadowing refers to the technique of copying


BIOS code from slow ROM chips into faster RAM chips
during booting so that any access to BIOS routines will be
faster.
Programming Languages

Low Level Language (LLL):- These languages are close to


computer machine(or hardware).

1st Generation of language 2nd Generation of language

 Binary language or Assembly language.


machine language. It is in the form of
 It is in the form of 0&1 mnemonics (Keywords &
abbreviations)
ex: - Sub, add, div

High Level Language (HLL):- These languages are written in


simple English statements and are close to programmer/user.

3rd generation 4th generation 5th generation

Known as software Known as Query Known as smart


development based or website languages
languages development lang’s

COBOL HTML, CSS LISP

C JAVASCRIPT PROLOG

C++ SQL MERCURY

JAVA ORACLE

FORTRAN PYTHON
Translator
 It is a program that converts the source code to the machine
language that computer can understand.

 Types: - Assembler, Compiler, Interpreter

1. Assembler: - It converts the assembly language into machine


language.

2. Compiler: - It translates the HLL source to the machine


language in one go.

3. Interpreter: - It also converts HLL to machine language but


line by line.

Time wise efficient=

Performance wise efficient=

Syntax error= mistake in a code that violates the programming


language rules and they are detected during compile time.

Exceptions= These are runtime errors in a program.


Linker
The program which links the different modules(or parts) of a
application and runs it as a single executable file is known as
linker.

Loader
 The program which load the applications from the HDD to
RAM is called loader.
 Location: - inside a sector named as MBR (master boot
record) in a HDD.
Note:- The First instruction of bootstrap loader is
present inside BIOS and is responsible for loading the
initial code necessary to start the operating system.

Debugger
The program that is used by the programmer to find the errors
(or bug) in the syntax of source code is called debugger.

Utilities (or utility software)


The program that is used to optimize and improve the
performance of the computer is called utility software.
ex: - Anti-virus(ex:-Window defender which is pre-installed in
windows), disk cleaner(it cleans temporary files or junk data on
HDD), device drivers(used to detect hardware connected to
PC),disk defragmentator(it brings unused space in HDD at a single
space) etc.
File Extension
1. Everything inside the computer is saved in form of files.
Ex:- Image, Audio, Video, pdf, doc
(All these are considered as different files for a computer).

2. Computer OS (windows) File System or File manager.


(File System manages all these files inside the computer).

3. Microsoft’s file system name:-


FAT:- File Allocation Table (In DOS)
NTFS: - New Technology file system (in windows).Windows have
both FAT and NTFS for file management.

4. File Extension: - Files extensions are used in order to identify


“Type of file”.

Q:- File name and file extension name is separated by.


Ans:-

File Extension for Images

1) .jpeg/ .jpg: - Joint photographic expert group. (Picture taken


by digital camera by default).

2) .png: - Portable network graphics.


(Image drawn in ‘Paint application’ is saved with this file
extension).
3) .gif: - Graphics interchange format.
(Animated file).

4) .tiff/ .tif: - tagged image file format


(Scanned Image by scanner).

5) .bmp: - bit map image.


(Desktop wallpaper).

File Extension For Audio/Video


1) .mpeg3/ .mp3: - Moving picture expert group version- 3
( for audio file)

2) .wav: - wave (audio file)

3) .mp4 : - Moving picture expert group version- 4


(video file)

4) .avi : - audio video interleave file.


(video file)

5) .mkv :- matroska multimedia video file.


(video file)

6) .wmv : - windows media video file.


7) .flv : - flash video file.

8) .midi/ .mid: - Musical instrument digital interface


Whatever we play on a instrument will automatically record on
computer through midi device.

Electric wire
Musical
Midi Instrument
PC Device Ex = Guitar

midi port

System Files
.dll: - Data link library
.sys: - system files
.bat: - batch files
.exe:- executable file
Computer Classification

Analog Digital Hybrid


Computer Computer Computer

Super Mainframe Mini Micro


Computer Computer Computer Computer

Personal Laptop SmartPhone Digital


Computer (or notebook) Dairies
(or desktop
computer)
Super Computer
They are used by scientists and mathematicians to do critical
calculations, like, in satellite launch, drug design, missile attack
etc.

 First super computer: - CDC 6600 from Control Data


Corporation is generally recognized as the 1st supercomputer
built in 1964 by Seymour Cray.

Seymour Cray left CDC in 1972 to start his own company and
built Cray-1 super computer in 1972.

 India’s 1st Supercomputer: - PARAM-8000 (1991)


 India’s Fastest Supercomputer: - PARAM SIDDHI
 Father of Supercomputer: - 1) Seymour Cray
2) Vijay Pandurang

 Speed Measurement Unit of Supercomputer: - FLOPS


{Floating point operation per Second}

 World’s Fastest Supercomputer: - 1) Frontier (USA)


2) Fugaku (Japan)
Mainframe Computer
 They are used as server computer.
 1st Mainframe computer: - Harvard Mark-1

Minicomputer(1970’s)
 They are smaller, less expensive and less powerful than a
mainframe (or supercomputer) but more expensive and
more powerful than a personal computer.
 Minicomputers were used for scientific and engineering
computations, file handling and database management.
 1st Minicomputer: - PDP-1 (Programmed Data Processor)

Microcomputer
 Used for personal/office use.
 1st personal computer: - ALTAIR
 India’s 1st computer: - SIDDHARTH
History of Computers
1. ABACUS (China)
 It was the world first calculating device and is similar to
children’s toy.

OOO Wooden box


OOO with strings
OOO

2. Pascaline (1642)
 Also known as calculator of modern world.
 By Blaise Pascal in 1642.
 1st Mechanical calculator

3. Difference Engine, 1820 and analytical engine, 1837


 By Charles Babbage (Father of Computer)
 First Mechanical Computer.
Diagram:- Difference Engine

Diagram:- Analytical Engine

4. ABC (Atansoff-Berry Computer)


1st digital electronic computer to do Specific Task.
5. ENIAC (1946): -
 Electronic Numerical Integrator and computer.
 1st digital electronic computer for General Purpose.
 By John Eckart and John Mauchl.
 based on decimal no. system, not binary.

6. UNIVAC (1951) : -
 Universal automatic computer.
 First digital electronic computer for commercial purpose.
 By john Eckert and John Mauchl.
 Based on decimal number system.

7. EDVAC (1952): -
 Electronic discrete variable automatic computer.
 By John Eckert and John Mauchl.
 Unlike ENIAC, it was binary rather than decimal and was
designed to be a 1st stored program computer, i.e., it has a
memory to hold both program as well as data.

8. EDSAC ( First preference)


o Electronic delay storage automatic calculator.
o It was the 1st Practical general purpose stored program
electronic computer.
9. MANIAC (1954)
 Mathematical analyzer numerical integrator and computer.
 It was the 1st computer to defeat a human being in a chess –
like game.

10. Osborne-1 (1981)


 1st Portable computer.
 Father of Laptop: - Adam Osborn

11. First computer Company: -


 ECC: Electronic Controls Company
 By John Eckert and John Mauchl.

12. Father of modern computer:- Alan Turing


Father of computer architecture:- John Von Neuman
Mother of computer or First lady programmer :- Ada Lovelace
Generation of Computers
1st Generation, 1942-1956
 Based on Vacuum Tubes and valves (for electricity
supply).

 Memory used:- magnetic drum .


 Input/Output devices:- punch cards and paper tape.
 Language Used:- Binary language ( or machine language).
 Computers Used:- ENIAC, UNIVAC, EDVAC, EDSAC etc.
2nd Generation, 1951-64
 Based on Transistors.

 Memory Used:- Magnetic Core and magnetic tape.

 Language Used:- Assembly Language


 Computers Used:- PDP-1, IBM 7094, IBM 1920, CDC 1604, CDC
3600.
 Batch OS was introduced.
3rd Generation, 1965-71
 Based on IC chips (Semiconductor based, made up of silicon)
 Two types of IC chips- SSI: - Small scale integeration
MSI: - Medium scale integeration
 Input Output Devices:-Keyboard, Monitor, Printer.
 Time sharing Operating System was introduced.
 Computer Used:- Honeywell 6000, PDP-8 (Programmed data
processor), TDC (Torpedo Data Computer)

4th Generation, 1972-2010


 Based on Microprocessor.
 First Processor chip: - Intel 4004
 It uses VLSI ( very large scale integration).
 Mouse was introduced.
 GUI Based.
 Personal computer and work stations, Cray-1.

5th Generation (Present and Beyond) or (2010 and Present)


 Based on Artificial Intelligence.
 Uses ULSI (ultra large scale integration)
 This generation is known for parallel processing of data.
 Father of AI: - John Macauthy.
 Computers Used:-Super Computer, Robots etc.
First Robot citizenship: - Sophia (Saudi Arabia)
MS-Excel
Terminology
1. Spreadsheet Program: - It is a program(or application) that allow
the user to input the data in the form of grid (i.e. rows and columns)
 examples of spreadsheet program: -
a) Microsoft: - (i) MS-DOS
(ii) Windows MS-Excel

b) Apple: -
c) Google: - Google sheets
d) Ist spreadsheet program: - Visicalc

2. Workbook: - It is a collection of one or more spreadsheets.


In MS-Excel 2021 a workbook contain 1 worksheet by-default and we
can insert maximum of 255 sheets.
3. Worksheet: - It is also known as spreadsheet & is in the form of rows
and columns.

MS-Word MS-Excel MS-PowerPoint


By-default file name

Document-1
 Book-1 Presentation-1
Pages  
Worksheet Slides
File extension name

.doc(till MS-Word 2003)

.docx(from MS-word .xlsx .pptx


2007 onwards)

extended
Executable File name

Winword or excel or powerpnt or


Winword.exe excel.exe powerpnt.exe
4.
A B C D _ _ _ ,Z, AA, AB, AC, _ _ _, AZ, BA, BB,
1 BC, _ _ _, BZ, _ _ _,
2 
3 Last Colomn
4
5 Total Columns =
.
.

10,48,576 Active Cell (a cell with dark highlighted border)


It’s address is shown in “ ”.

Data written in active cell will also shown in .


5. Formula: - It is a sequence inside a cell that is used to produce a value.
It must begin with an equal to ‘=’ sign.

6. Function: - Functions are formulas that are pre-built into excel.

7. Filter: - Filters are the rules (or conditions) that you can employ to
decide which rows in a worksheet to display.
8. Mouse Pointer: - It appears as a “ “ sign when it
is positioned in the worksheet.

9. Ribbon: - There is a section of “command tabs” present below the title


bar called the ribbon.
Multiple options are found behind each tab of the ribbon.

10. Title bar: - It is present at the top of MS-Excel application.


It contains,
i) Control buttons - ×
ii) Workbook name
iii) Quick access tool bar (present at top-left).

11. Font size in excel: - (1 to ) point


By-default font size: - 11 point
1 inch = Point

12. Min - 10%


Zoom Max –
By default – 100%
Max zoom in zoom dialog box: - 200%
13. Orientation: - i.Portrait
ii.Landscape
14. Types Of Address:-

a) Relative addressing :–
Relative means change
A1
B2
C5 – Relative column and relative row

b) Absolute addressing: -
Absolute means fixed.
$C$5 – absolute column and absolute row

c) Mixed addressing:-
$C5 – Absolute column and Relative Row
C$5 – Relative column and Absolute Row

Q:- 5 is written in cell A1 and then if we do drag and drop then what will
be the output in cell A2.
Ans:-
Q:- 1,2 is written respectively in cell A1,A2 and then if we do drag and
drop then what will be the output in cell A3.
Ans:-
Q:- Monday is written in cell A1 and then if we do drag and drop then
what will be the output in cell A2.
15. Mathematical operators

* aesterik, (for multiplication)

^ caret, (power of) ex: - 2^4 = 16

% modulus operator, it gives us the remainder. Ex. 5%2 = 1

16. Comparison operators

The output of these operators is either true or false.


Important functions used in MS-Excel

1) =round( )

Q1) Round off i) 63.9463 upto 2 decimal place


ii) 63.9453 upto 3 decimal place
iii) 63.9473 upto 4 decimal place

Q2) what is the output of =round(6.786,1) in MS-excel.


Ans.

Q3) =round (6.989,1)

=round (70.995,2)

=round (8.961,0)

= round (8.361,0)
Q4) = round(728.32,-1)
Sol. =round(728.32,-1)

If it is negative no. then ignore the digits after the decimal point.
= 728.

Roundoff it to the nearest ‘zero’ 720


730 Ans. 730

Q5) = round(723.32,-1)

=round(760.52,-2)

=round(748.52,-2)

=round(750.72,-2)

2) = count ( )
It will count the cells that contain only numbers in a given range.
ex. A B C
1 10 A = count (A1:B3)
2 . B
3 10 10 B = count (A3:B3)
4 5 +
3) =COUNTA( )
It will count the cells that are non- empty in a given range.
ex:- =COUNTA(B1:C4)

4) = countif( )
Syntax:- = countif(range, condition)
ex. =countif(A1:C3, ‘10’)

Q) A
1 Ram
2 Raj
3 Sam
4 Ram
5 Sam
6 Ram
7 Ram

i) = count if(A1:A1,A1)
a) Ram b)1 c) Ram Ram d)2

ii) = count if (A1:A4,A4)


a) Ram b)1 c) Ram Ram d)2
5) =floor( ) // moving downwards
= ceiling( ) // moving upwards
Note:- The output of floor & ceiling is always an integer.

=floor(12,2)

=ceiling(35, 5)

=floor(22,4)

=ceiling(26,8)

= floor (49.7,7) + ceiling(49.7,7)

6) = sum( )
= average ( )
= max ( )
= min ()
i) = sum (3%2 == 2, 2^0, 3)

ii) = average (5> = 4, 3%3, 4<>4, 2, 5%3)

Q:- Write in different ways how to add cells in the range from A1 to A4.
7) = if ( )
Syntax: -= if (Condition, Value1, Value2)

Ex: - = if (5 = = 4, cat, dog)

Marks = 29
= if (Marks < 33, pass, fail)

8) = Sum if ( )

syntax:- = Sum if (range, condition, sum-range)

A B C
1 51 ABC01 10

2 52 DEF02 20 = Sum if (B1:B4, ABC*, C1:C4)


3 53 ABC03 30

4 54 GHI01 40
9) No argument functions: -
i) = now ( )
display current date and time

ii) =today ( )
display current date

10) = left()
= right()
= concatenate()

Q:- What is the output of =left(“computer”,3)

Q:- What is the output of = right(“computer”,3)

Q:- What is the output of =left(“microsoft excel”,10)


a)microsoft_ b)microsoft c)microsoft e

Q:- What is the output of =concatenate(“computer”,”Subject”)

Q:- What is the output of =concatenate(“computer”, ” “ ,”Subject”)


Shortcut keys in Excel

1. Open an new workbook :-

2. Open an existing workbook :-

3. Close a current workbook :-


or

4. Close the MS-Excel application :-

5. Insert a new worksheet in a workbook :- Shift + F11

6. Edit the selected text :- F2

7. F5
Computer : -
Word :-
F5 Excel :-
Powerpoint: -

8. Create a chart :- F11


(by default, bar chart will be created)

9. a)To move one cell downward : - down arrow or


b) To move one cell upward : - up arrow or
c) To move one cell right : - right arrow or
d) To move one cell left : - left arrow or
10. a) Selecting entire row : - shift + spacebar
b) Selecting entire column : - ctrl + spacebar
c)Select the entire worksheet : - ctrl + shift + space
or ctrl + A

11. a) To move to the last of a column :- Ctrl +Down Arrow


b) To move to the beginning of a column :- Ctrl +Up Arrow
c) To move to the end of the row :- Ctrl +Right Arrow
d) To move to the beginning of the row :- Ctrl +Left Arrow

12. a) insert current time :- ctrl + shift + ;


b) insert current date :- ctrl + ;

13. a) To switch between the worksheets in the same workbook (from


sheet 321) :-
b) To switch between the worksheets in the same workbook( from
sheet 123) :-

14. a) To move the beginning of a worksheet :-


b) To move the last of a worksheet :-

15. a) Hide the selected columns :- Ctrl + 0 Used to print


b) Unhide the selected columns :- Ctrl+ shift + 0 require data

16. a) Hide the selected rows :- Ctrl + 9


b) Unhide the selected rows :- Ctrl + shift+ 9

17. Apply & remove the strike through :- Ctrl + 5


18. To write a comment in a cell :- Shift + F2

Tab: - review
(Text will not be printed which is written in a comment)

Cell Tip

19. AutoSum :- Alt + =

20. To write the text in multiple lines (or wrap text) :-


Alt + Enter
Power Point
1) Presentation Making Platform: -
 Microsoft = MS-PowerPoint
 Google = Google slides
 Apple = Key-Note
 Open office organization = Impress

2) Individual page of powerpoint is called: -

3) Font size Range in Powerpoint: - (1 to ) Point

4) That area in powerpoint where we can make presentation or where


we can insert text, image etc is called: -

5) Command to create a new presentation (or blank presentation): -


. Ctrl +

6) Command to insert a new slide in a presentation: - Ctrl +

7) Command to insert the duplicate of current slide: - Ctrl +

8) Command to run a slideshow from beginning: -

9) Command to run a slideshow form the current slide: -

10) Command to end the slide show: -

11) Command to move to the first slide of the presentation: -


12) Command to move to the last slide of the presentation: -

13) Tab: - Home  Slides  Slide Layout

a) Types of Slide Layout = 9

b) By-default slide Layout = Title slide

c) 1. Title slide
2. Title and content
3. Section and header
4. Two content
5. Comparison

6. Title only
7. Blank
8. Content with caption
9. Picture with caption

14) Tab: - View

a) Presentation views: -
1. Normal View (by default)
2. Outline view
3. Slide Sorter view
4. Note Page view
5. Reading view
b) Master Views: -
1. Slide Master view
2. Handout master view
3. Notes master view

Q1. Which powerpoint view displays each slide of a


presentation as a thumbnail and is used for rearranging
slides.
Ans. Slide Sorter view
Slides

Q2. Which of the following operation will not be done


on slides in slide sorter view.
a) insert a slide c) Transpose a slide
b) delete a slide d) edit a slide

Q3. Which type of view in powerpoint is used to apply


universal changes on all the slides.
Ans.

c) Show: -
1. Ruler (shortcut key to insert ruler: - alt + shift + F9)
2. Gridlines
3. Guides
Gridlines (Shift + F9) Guides (alt + F9)

Q4) Rows and Columns in a PowerPoint is called


Ans.

d)Zoom: -
Min: - 10%
Max: - 400%
By default: - 100%
By default max zoom in zoom dialog box = 400%

d)Macros: -
A macro is a series of commands and instructions that
we group together as a single command to accomplish
a task.

15) Animation and a transition –

An animation is a special effect that applies to an single


element on a slide such as text, shape, image and so on.

A transition is the special effect that occurs


when you exit one slide and moves onto the next during a
presentation.
Q1) What is the meaning of Trigger in PowerPoint?
Ans. It is a tool through which the animation can be played
using a click.
Internet and Networking
• Internet:- It is an network of networks that is used for
communication and data sharing.
• Most of the internet is wired (appx 70%) and remaining is
wireless.

History of Internet
ARPANET (1969)

• Advanced Research Project Agency Network.


• It was the world’s first network developed by US Defence with a
purpose to serve military.
• Initially it connects 3 universities of America.
a. SAI University
b. UTAM University
c. California University
• OSI Model: - Open System Interconnection
a. It explains the working of Arpanet
b. Total layers in OSI Model: - 7
Sender Receiver

7) Application Layer

6) Presentation Layer

5) Session Layer

4) Transport Layer : it provides port number of applications

3) Network Layer : it provides IP addresses of sender and receiver

2) Datalink Layer : it provides MAC addresses of sender and receiver

1) Physical Layer

Mnemonic:- Please Do Not Throw Sandwich Pizza Away

NSFnet (1980)
(National Science Foundation Network)

 In 1980’s,NSFnet was started to make a high-capacity network to


be used strictly for academic and engineering research.

DECNET(1980)
(Digital Equipment Corporation Network)
 It was the world’s first commercial network that connects
American people only.
Internet (1990)
The word internet is made up from two words, i.e.,
Internet = Inter + Networking

 In 1990’s many private companies built their own networks, which


were later interconnected along with ARPANET and NSFnet to form
internet. Thus internet is known as “ network of networks”.
 Internet wire :- Optical fibre
 Father of optical fibre :- Narinder Singh Kapani
 Official Birthdate of Internet :- 1 Jan 1983
 Father of Internet :-
 Internet Services launched in India on:- 15 Aug 1995 by …………..
(1st ISP).
 VSNL:-
ISP :-
 Regulatory Body: -

 Advisory Body: -

Q. Who owns the internet. .


Ans:

Q. What travels inside optical fibre.


Ans:

Q. Which network “sow the seeds “for internet.


Ans:
WWW (World Wide Web)
1. Internet is a broad concept and www is a tool used in internet.
Through www we can access any website (or information) over the
internet.
ex :- www.youtube.com
2. www is also Known as web or w3.
3. Founder: - Developed by Tim Berner Lee in 1989 while working at
CERN.
4. CERN :- European organization for Nuclear Research
5. First website url was:- http://info.cern.ch
6. International standard organization for www = w3c
7. W3C: -
Web Browser
1) First Web Browser: - www (Worldwideweb)  Without space

 Developed by Tim Berner lee in 1990.


 It displays only Text.
 To avoid name confusion it was renamed as “Nexus”.

2) First Graphical web browser: - MOSAIC

3) India’s first web browser:- EPIC

4) (i) Microsoft :- Internet explorer (till 2020)



Microsoft edge
(ii) Apple :- Safari (Launch date: - 7th Jan 2003)
(iii) Google :- Google chrome ( Launch date: - 2nd Sept. 2008)
(iv) Mozilla firefox
(v) UC browser (Chinese)
(vi) Netscape Navigator
(vii) Opera
(viii) TOR (The Onion Routing) :- Most Secured Web Browser
Shortcut Keys
 Ctrl + T :- Open new tab in a browser.
 Ctrl + W :- close the current tab in a browser.
 Ctrl + shift + T :- Open the previously closed tab without going
into history.
 Ctrl + N :- Open new window of Google chrome
 Ctrl + Tab :- To switch between the opened tabs (from left to
right)
 Ctrl + shift + tab :- To switch between the opened tabs (from right
to left)
 Ctrl + (1 to 8) :- To move to specified Tab
 Ctrl + 9 :- To move to last tab
 Ctrl + H :- Open the history
 Ctrl + J :- Open the downloaded file history
 F6: - Given URL will be selected.

Q1) Name the 1st Web Browser.


a) www c) Mosaic
b) Nexus d) CERN

Q2) Name the animal shown in logo of Mozilla Firefox.


a) Fox
b) Red Panda
c) Lion
d) Tiger
Q3) Name the first open source web browser?
a) Google Chrome
b) Mozilla Firefox
c) Internet explorer
d) Netscape Navigator
Q4) Name the first software to run internet?
a) Operating system c) Internet
b) Search engine d) web browser
A web browser is the client which makes a request to the server, and
the server sends the website(or information) to the browser.

Q5) Five essential requirements to connect with internet?


1. Device
2. ISP (Internet Service Provider, ex :- Airtel, Jio, idea)
3. NIC (Network interface card): It provides the physical connection
between the network and the host.
4. MODEM
5. Web Browser
Q6) Who develop MOSAIC browser.
a) Tim Berner Lee
b) Ray Tomlinson
c) Vint cerf
d) Marc Andressen
Q7) Name the browser used for anonymous web surfing?
a) Chrome
b) Edge
c) TOR
d) Mozilla
Q8) IOT stands for: -
Ans:- Internet of Things (connecting electronic devices to internet)
Q9) It is the portion of the internet that is hidden and not shown from
conventional search engine.
a) Surface web
b) Deep web
c) Dark web
d) TOR
1) surface web: - normal search in the primary search engine
2) Deep Web: - ex – Govt. confidential data
3) Dark Web: - doing illegal activities through internet, ex- child
pornography.
Search Engine
 It is an website through which we interact with the server or it is
an website through which we open other websites.

Google chrome (Web Browser)

Google
Search Engine

 First search Engine = ALIWEB (Archie like indexing for web)


 Other search Engines:-
i. Microsoft :- Bing
ii. Google:- Google search engine
iii. Baidu (Chinese)
iv. Yandex (Russia)
v. ask.com
vi. alta vista
vii. Looksmart
viii. Yahoo search engine
ix. Duck Duck go ( most secured search engine and it is also a
metasearch engine). Metasearch engine is also a search engine but
its working is different from conventional search engines like
Google, Bing etc.

List of Metasearch Engine


1. Duck Duck Go
2. Excite
3. Metacrawler
4. Yippy
5. Dogpile
6. Start Page
7. Million Short
IP ADDRESS
 Full Form – Internet Protocol
 It is provided by ISP.
 It is also Known as logical address.
 It is dynamic and unique (i.e.no two host will have same IP
address)
 In IPV-4, IP address is of 32 bits (currently used).
(IPV-4, Internet protocol version-4)
In IPV-6, IP address is of 128-bits
 IP address is represented using decimal number system.
 Format of IP address (32 bit) :- The IP address is divided into 4
parts & each part is separated by the symbol dot.
8bit . 8bit . 8bit . 8Bit

a) There are total 4 octets in IP address


b) With 8 bits we have 28 = 256 combinations.
c) Each valid IP- address will have a range of 0 to 255 in every octet.
ex :- 100.10.20.30 (valid)
255.100_10_1 (Invalid)
255.100.10 (Invalid)
100.300.10.1 (Invalid)

It is the responsibility of the network layer of OSI Model to provide IP


address to a host.
MAC Address (Media Access Control)

 It is also Known as physical address or hardware address.


 It is provided by Manufacturer.
 It is hardcoded on NIC card which is present inside every device. It
is static and unique.
 It is of 48 bits and is written in hexadecimal number system.
 There are total 12 hexadecimal digits in MAC address and are
separated by hyphen or colon.

ex: - 5A : 7B : C3 : FF : 13 : C4
5A -7B -C3 - FF - 13 -C4

 It is the responsibility of the Data Link Layer of the OSI Model to


examine the MAC address of a device before sending the data.

PORT NUMBER
 It is the address of a application (or process) inside a host.
 It is of 16 bits.
 It is the responsibility of transport layer to provide port Number.
 Socket(complete address) = IP address (32 bit) + Port number (16
bit)
Therefore, Socket is of 48 Bits.

IMEI Number
 International mobile equipment identity.
 Code to check IMEI number of device: *#06#
 Total digits in IMEI no. = 15
E-MAIL (Electronic mail)
 It is one of the way of digital communication medium.

 Email services :-
1. First email service :- hotmail
Founder: - Sabeer Bhatia
(Later Hotmail was purchased by Microsoft and renamed it
as ‘MS-Outlook’)
2. Apple :- icloud
3. Google :- gmail
4. Yahoo mail
5. Zoho mail
6. Yandex mail ( Russian)
7. mail.com
8. Mozilla thunderbird

 The first email was send by Ray Tomlinson in 1971 to himself.


Text in the first email :- “QWERTYUIOP”

 Father of email :- 1) Ray Tomlinson


2) Shiva Ayyadurai

 Parts of email-id :- 2
 Spam email :- The spam e-mail is also Known as unsolicited mail
or junk mail or unwanted mail.
Most of the spam emails are company’s advertisement.

 Storage area of email is called :- mailbox


 We can access email from :- inbox

 Maximum file size attachment limit in gmail :- 25 MB


 Can we send a file whose size is greater than 25 MB in a gmail.
Ans. Yes, it will be send as a google drive link.
 Free online storage provide in gmail :- 15 GB

 Automatically attached fields when we send the email are :- date/


time/ from/signature

 CC (Carbon Copy): - all the recipients will able to see each other
email address.
BCC (Blind Carbon Copy): - none of the recipient will able to see
each other email address.
to: std1, std2
cc: hod-1, hod-2
bcc: principal, vice-principal
from: teacher

Q:- When principal receives the email then he will able to see the
email id of.
Ans:-
Q:- When hod-1 receives the email then he will able to see the email
id of.
Ans:-

Q:- Can we interchange “to and cc” fields in order to send email.
Ans:-

Q:- In order to send email to a person such that the email doesn’t
received in his spam folder, the sender should write the email id of a
person in which field.
Ans:-

Q:- In order to send a email which option needs to be selected.


a) send b) compose c) attach d) none of these
PROTOCOLS IN EMAIL:-
1) SMTP: - (Simple Mail transfer protocol)
This protocol is used for sending the email.
2) Protocol for receiving (or downloading) email:- 1) POP-3 2)IMAP
POP: - Post office protocol
IMAP: - Internet message access protocol
It is the extension of POP.POP3 allows only a single device at a time
to access the emails. IMAP allows multiple devices at a time to
access and read the available mails.
3) MIME: - Multipurpose internet mail extension.
 It is the extension of SMTP protocol.
 It is used in exchanging non-textual email attachment.
Non-text (audio, video, image etc)
4) PGP (Pretty Good Privacy)
It is an Email security protocol and it comes in combination with other
protocols.
 Port no’s: -
SMPT = 25
POP-3 = 110
IMAP = 143
MIME = not have a port no.
Networking Protocols
It is a set of rules and regulations for communication between network
devices.
1) TCP: - (Transmission Control Protocol)
 It establishes a connection between applications before sending
any data.
That is, it is responsible for end to end connectivity or process to process
connectivity
2) IP: - ( Internet Protocol)
It is responsible for host to host connectivity. i.e. it is a protocol through
which data is send from one host to another over the internet in the form
of packets.
3) TCP/IP:-
 It is the standard protocol of the internet.
 TCP/IP protocol makes it possible for any pair of computers
connected to internet to communicate, despite of their hardware
differences.
4) HTTPS:- Hypertext Transfer protocol Secure.
 It is the updated verson of HTTP.
 This protocol ensures secure communication between two
computers over the internet.
5) FTP:- File transfer protocol.
6) TELNET:- Telecommunication Network or Teletype Network.
 It is a protocol that allows the user for remote connectivity.
Ex. AnyDesk software, TeamViewer software
7) SNMP:- Simple Network Management Protocol
 It is an internet protocol used for monitor and manage network
devices connected over the internet.
8) DHCP:- Dynamic Host Configuration Protocol.
 Using this protocol an ISP dynamically provides IP addresses to an
host in a network.
Network Topology
 It refers to the geometrical arrangement of computers in a LAN.
 Types of Topology: - 1. Star Topology
2. Bus Topology
3. Ring Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
1. Star topology: -

It is an arrangement of network in which every node is connected to


central device such as hub, switch or central computer.
 The nodes communicate with each other through the central
device.
 Not a reliable Topology because the whole system well shut down
in case the failure of central device.
2. Bus Topology: -

It is also called linear Topology.


 Again not a reliable topology because whole network will be
impacted if one workstation shuts down.
3. Ring Topology: -
 In this topology each device is directly connected with two other
devices.

 The major disadvantage of a ring topology is that if any individual


connection in the ring is broken then the entire network will be
affected.
4. Mesh- Topology: -

 It is also known as interconnected Topology.


 In this topology each node communicated directly with all the
remaining nodes.
 It is a reliable topology.
 It is most expensive topology.
5. Tree Topology: -
 It is a combination of bus and star topology.

6. Hybrid Topology: -
 It is the combination of two or more different types of topologies.

Q:- If there are n-nodes in interconnected topology then each node is


connected to .............. number of nodes.
Ans:-
Q:-If there are 10 nodes in mesh topology then number of connecting
wires required are.
Ans:-
Q:- The combination of bus and star topology is called.
a) tree b) hybrid c) both a and b d) mesh
Computer Network Types
1. PAN : - (Personal area network)
 Smallest network.
 Also known as adhoc network.
 Ex: - Bluetooth, mobile hotspot, body area network (It is a
network that moves with a person).
 Range: - upto 30m
2. LAN: - (Local Area Network)
 Range: - upto 1 km
 LAN is a group of computers that are connected to each other in a
small area such as building, office, college, school etc.
 If a LAN is wired then it is called ethernet and if it is wireless then
it is called WLAN.
3. MAN: - (Metropolitan Area Network)
 It is a network that covers a larger geographic area by
interconnecting a different LANs.
 In MAN, various LANs are connected to each other through a
telephone line exchange.
Ex: - 1) Cable TV network in a city.
2) Communication between banks in a city.
 Range: - upto 100 km
4. CAN: - (Campus Area Network)
 It is bigger than LAN and smaller than MAN.
 Ex. Thapar University, Punjabi university Campus.
5. WAN: - (Wide Area Network)

 It is a between that extends over a large geographical area such as


states/ countries/ world.
Ex. Internet is one of the biggest WAN in the world.
Networking Devices: -
These are devices used in the internet for connectivity.
• Modem
• Repeater used at physical layer
Hub
• Switch used at data link layer
Bridge
• Router used at network layer
• Gateway used at transport layer or above
• Firewall
1. Modem: - (Modular – Demodular)
 It is used to convert analog signal to digital signal and vice-versa.

 First commercial modem developed is “DATA PHONE’ by AT&T


lab.
2. Repeater: -
 They are incorporated in network to expand its coverage area.
 They are also known as ‘signal booster” because it amplify or
regenerate an incoming signal before retransmitting it.
 Weakened Signal Regenerated Signal

Repeater

3. Hub: -
 It is used to connect multiple devices in a network, mainly LAN.
Ex- printer, speaker and multiple computers can be connected in a
LAN using Hub.
 It is an central device.
 A hub has many ports in it. When a message arrives at a port then
it is broadcast to every other port without considering whether it is
destined for that particular destination or not.
Thus it is an non-intelligent or dump device.
4. Switch: -
 A switch is a Data link layer networking device which connects
multiple devices in a network like a hub.
 It is an intelligent device because it first checks the MAC address of
the computer to send the data in the network.
5. Bridge: -
 Bridge connects two or more different LAN’s together that has a
same protocol to form a bigger LAN.

LAN-1

 Bigger LAN
Bridge

24
LAN-2
6. Router: -
 They are responsible for receiving, analyzing and forwarding data
packets among the connected computer networks.
 A router can be used both in LANs and WANs.

7. Gateway: -
A gateway is a network device that connects two or more networks
with different protocols.

8. Firewall: -
 It can be a hardware or software or both.
 A firewall is a network security device that monitors incoming and
outgoing network traffic and decides whether to allow or block
specific traffic based on a defined set of security rules.
ex: - Sometimes we get a message while download that this file
might be harmful to your computer, do you want to download it or
not.
Important Topics
1. Domain Names: -

 .com :- for commercial websites (or profitable websites)


ex. www.youtube.com

 .org :- for organizational websites (or non-profitable websites)


ex. www.Redcross.org

 .ac:- for academic websites


ex. www.pup.ac.in

 .nic :- national informative center


ex:- www.ssc.nic.in

 .gov :- government websites


 .mil :- military websites
 .res :- research websites

2. Communication Modes: -
 Simplex Mode
 Half-duplex mode
 Full duplex mode
a) Simplex Mode:- Known as one way communication.
ex:- Keyboard, Radio, TV communication, OTP (One Time Password)
etc.

b) Half-Duplex Mode:- It is two way communication but one at a time.


ex:- Walkie-talkie, Bluetooth, Sms (Short message service) , email etc.

c) Full duplex mode:- It is two way communication at the same time.


ex:- Telephonic conversation, instant messaging apps (sms + video call)
ex- signal, viber, line, hangout, wechat.
3. Communication Medium: -
 It is the physical path between the sender and the receiver.
4) Broadband Internet Connection: - (High speed internet connection)
• Broadband internet service is the most used form of internet
access because of its high access speeds.
• Broadband comes in four different forms: -
1. DSL (digital subscriber line)
2. Optical Fibre
3. Satellite
Note:- Dial-up connection is also an internet connection but not a broadband
connection.
5) Web crawler (or spider): -
 A spider is a program that travels the web, locating and indexing
websites for search engines.
 All the major search engines such as Google, yahoo uses spider
program to build and update their indexes.
Google Chrome

Google

Y|

Youtube
yahoo

Attributes (or fields)


Rank Website Name Category Domain Name
1 youtube video .com
Records or
2 facebook social .com
Tuples 
3 gmail Comm. .com
6) Website: -
 It is collection of webpages.
 Front page of any website is Known as ‘Home page’
 HTML, CSS, Javascript are used in making webpages.
 HTML: - Hypertext markup language
CSS: - Cascading style sheets

 Requirements in making a website: -


a) Backend: - Here we require a text editor to write the code. Ex: -
Notepad and the file is saved with file extension .html or .htm
Notepad :- .txt (by default)
Notepad (When creating website ): - .html or .htm
b) Frontend: - Here we require web browser to display the website.

7) URL (or URI): -


 Uniform Resource Locator (or identifier)
 It is also termed as “website address”.
 Total parts of URL :- 4
 Ex: - https://www.google.com
1. http:// :- protocol
2. www : - Subdomain
3. .google :- domain
4. .com :- Top Level Domain
8) Application: -
 Application is a shortcut to a webpage in a website.

G. Chrome
Application is in the
Google form of icon & is short
flipkart to this page
Link to
flipkart
Then fill
username &
password
Your Data

9) Cookies: -
 Cookies are small text files of information that a web server
generates and sends to a web browser.
 Cookies can be: -
a) First Party Cookies: - These are the cookies that store your own login
id, passwords, auto fill information etc for some website that you
frequently visit.

b) Third Party Cookies: - These are the cookies that websites store to
know about you search history and web browsing history. Third party
cookies may result in unwanted advertisement on your webpages.
10) VOIP: - (Voice over Internet Protocol)
 VOIP is a technology that allow you to make voice calls over
broadband internet connected instead of an analog (regular)
phone line (or PSTN).
PSTN: - Public Switched Telephone Network.

 TCP/IP: - It is the protocol by which data is sent from one host to


another host through the internet in form of data packets.
Internet works on packet switching.

 PSTN: -
1. It is known as landline telephone system.
2. PSTN was circuit switching i.e. dedicated path.
3. It was designed for purely analog voice communication by using
wire network, i.e. higher cost for long distance.

 VOIP is also known as internet telephony or broadband


telephony.
 It supports real time full duplex digital voice over the internet.
 VOIP is used not only to make phone calls but for general
communication over internet like fox, video, files etc.

 Advantages: -
1. Cheaper than traditional voice communication.
2. Reducing the overall maintenance cost.
Protocols used for VOIP

1) H.323

2. Session Initiation Protocol (SIP) <- UPDATED VERSION of


H.323
 SIP is a protocol to establish, modify and
terminate multimedia session.

3. Session Description Protocol (SDP)


4. Media gateway control protocol (MGCP)
5. Real- Time Transport protocol (RTP)
6. Skype protocol

You might also like