Computer Classroom Notes
Computer Classroom Notes
Material of CPU: - 1)
2)
Nature: -
Location: -
Cabinet (When Empty)
Monitor
CPU
Parts Of CPU
Characteristics of computer:-
2) Versatile:- The capacity of computer to perform different types of tasks with the
same accuracy and performance.
Memory Units
1) Smallest unit of memory: - bit (Binary digit)
2) 1 Nibble = 4 bits (i.e. a nibble is a combination of 4 bits)
3) 1 byte = 8 bits
(Representation: - Byte B, Bit b)
4) 1 Kilo Byte (KB) = 1024 B
5) 1 Mega Byte (MB) = 1024 KB
6) 1 Giga Byte (GB) = 1024 MB
7) 1 Tera Byte (TB) = 1024 GB
8) 1 Peta Byte (PB) = 1024 TB PG
9) 1 Exa Byte (EB) = 1024 PB
10) 1 Zetta Byte (ZB) = 1024 EB
11) 1 Yota Byte (YB) = 1024 ZB PEZY
12) 1Bronto Byte (BB) = 1024 YB
13) 1 Geop Byte (GPB) = 1024 BB
1) 1PB = MB
(a) 1024 * 1024* 1024* 1024
(b) 1024 * 1024* 1024
(c) 1024 * 1024
(d) 1024
2) 1GB = Byte
(a) 1024 * 1024* 1024* 1024
(b) 1024 * 1024* 1024
(c) 1024 * 1024
(d) 1024
3) 1TB = MB
a) 210 b) 220 c) 230 d) 240
4) 1EB = TB
a) 1 Thousand b) 1 Million c) 1 Billion d) 1 Trillion
5. 4096 PB =
a) 2 PB b) 4 PB c) 4EB d) 4TB
6. 5 MB =
(a) 2 00 00 00 bits (c) 4 00 00 00 bits
(b) 5 00 00 000 bits (d) 4 00 00 000 bits
7. 2B = N
a) 2 b) 4 c) 6 d)8
CPU
Types Of Memory
Memory
• Size (or capacity) comparison between memories wrt data flow diagram
hdd > ram > cache > register
Comparison of Memories
Access Time Of Memory: - It is the time taken by memory to
avail data for CPU.
(Ek memory nu CPU tak data pahuchan layi jina time lagya, uss
time nu memory da access time keha janda hai)
Register
Location: - CPU
Nature: - It stores the data temporary and is volatile in
nature.
Which memory is close to the CPU: - Cache (1st Priority)
RAM (2nd Priority)
Location: - Motherboard.
ROM is used to start the computer.
ROM stores a one special program known as BIOS (Basic
Input Output System).
BIOS is the first program that runs inside the computer and
its key role is to load the OS.
ROM stores the data permanently and thus it is non-volatile
in nature.
Operation on ROM: - Read only
Types Of ROM
1) PROM: - Programmable Read only Memory.
It holds the property of WORM (Write once Read
many)
Dis-adv: - We can’t erase the data from PROM and
thus can’t be updated.
Location: - Motherboard
Nature: - Temporary and volatile
Operation: - both read and write
SRAM DRAM
Virtual Memory
Memory Hardware (Yes/No)
RAM
ROM
VM
Magnetic Disk
1. Floppy Disk: -
It is also known as flexible disk.
Size: - 3.50” ( 768 KB)
5.25” (1.2 MB)
8” (1.44 MB)
1. CD ( Compact Disc): -
Capacity: -
Single sided Single Layer= 4.7GB (standard DVD)
Single Sided Double Layer = 8.5 GB
Double sided Single Layer= 9.4 GB
Double Sided Double Layer = 17 GB (maximum capacity)
Ctrl/spacebar/alt etc)
Types of Keyboard
4. Flexible Keyboard
5. Ergonomic Keyboard
It is designed to reduce the strain of constant typing on wrist.
6. Virtual Keyboard:- Type OSK (on screen keyboard) in window
search button to open virtual keyboard.
7. Braille Keyboard:- For blind persons.
8. Multimedia Keyboard:- For web developers.
PDA
KeyBoard
Ergonomic
KeyBoard
Dvorak
KeyBoard
Why Keyboard is QWERTY not ABCD.
Keys were randomly positioned to actually slow down
Typing speed and to prevent KeyJam.
Modifier keys: -
These Keys doesn’t work alone.
Function Keys: -
Number Of function keys:-
a) =13 (F1 to F12 and Fn). Fn key is present in laptops.
b) =12 (F1 to F12), These keys are also known as action keys.
2) F2: - Rename
3) F3: - Search
5) F5: - Refresh
9) F9: - To unselect
2) Mouse: -
Father Of Mouse: - Douglas Engelbert
Mouse is also known as ‘Pointing & Selecting’ device.
Types of Mouse:- a) mechanical mouse( having brass ball at
. bottom)
b) optical mouse
c) wireless mouse
8) MICR: -
It is used to scan the code written on bank cheques.
9) OCR: -
It converts the document to an editable text file.
10) OMR: -
It scans the OMR sheet used in competitive exams.
13) Webcam
14) Digitizer (or Graphical Tablet)
It is typically designed for CAD/CAM professionals.
It allow users to draw and manipulate graphics the screen.
Types
1) Impact Printer 2) Non- Impact Printer
• Dot Matrix Printer • Inkject Printer
• Daisy Wheal printer • Laser printer
• Line Printer • Thermal Printer
• UV Printer
3. Line Printer: -
• It print one line of text at a time.
• It is also known as bar printer.
• Printing speed is measured in LPM(lines per minute)
B) Non-Impact printer
1. Inkjet Printer: -
• Here ink is sprayed on a sheet of paper.
• Liquid (or wet) type of ink is used.
• Colored Printing.
• Combination of 4 colors are used: - CMYK
{cyan (sea Green) , Magenta, Yellow, Key (Black shade)}
2. Laser Printer: -
• ‘Dry ‘type of ink is used.
• Usage of Cartridge and toner.
• Printing is of higher quality
• Best for usage in home and office.
• Printing speed of both inkjet and laser printer is measured
in PPM (Page per Minute)
3. Thermal Printer: -
• Used in ATM (Automatic Teller Machine), bus ticket,
shopping mall etc.
• Carbon is used as a ink.
4. UV Printer: -
• Used by Govt. agencies for confidential data printing.
• Costly Printers.
Plotter
Best Quality Graphic Printer for business purpose for printing
car design, architectural designs etc.
Types: - Drum Plotter and Flatbed Plotter.
Resolution
The word resolution tells about the image Quality.
Types of Virus
d) Polymorphic Virus: -
• It is considered as the most harmful virus because it keeps
on changing its Signature Pattern (or Structure).
• It is also called stealth virus because of its hidden
capabilities.
3. Trojan Horse: -
The virus that pretends to be useful but in actual it is
harmful is called Trojan Horse.
It is also known as fake software because it misleads the
user of its true identity.
4. Spyware: -
It is a tracking software that is used to get the information
of a person or an organization.
ex: - Keylogger (It copies the key impressions).
To prevent from this, user should opt for virtual keyboard.
5. Ransom ware: -
It locks the user out of their files (or device) and then
demands anonymous online payment to restore access.
Famous Ransom ware attack in India: - Wannacry
Famous Ransom ware attack in Ukraine: - Petya
Extra terms
1. Bogus website:- means fake website
Instruction-1
.
.
.
Instruction
Q2) What is Program?
Ans. It is a set of instructions to do a specific Task.
Operating System
Operating System is an system software that acts as an
interface between i) user and hardware,or
ii)Application programs and hardware
Application software
OR OS Hardware
USER
RAM
KERNEL Every application on computer is installed on HDD and run
inside RAM.RAM is known as waiting room memory bcoz 1 CPU
(active code of OS) can process one application at a time and each application is
waiting inside RAM for their turn to be processed by CPU.CPU
whatsapp uses time sharing technique to switch between applications and
give illusion to user that all applications are running at the same
time.
youtube
facebook
Song
Functions of Operating System
1. Process Management: - processing each program (or
application) by the CPU one by one.
2. Memory Management: - To manage the memory shared by
different processes is also done by OS.
4) Unix OS: -
Developed by Dennis Ritche and ken Thompson in 1969
Based on C- Language
Multi-user OS (used as a server)
Closed source OS.
5) Linux: -
Developed by Linux torvald in 1991
It is both CUI and GUI based.
It is used as a server.
Open source OS (here we can change the source code.)
Most secured OS.
Also known as GNU (GNU Not Unix)
Different versions of Linux: - a) Ubuntu
b) Fedora
c) Red-hat
d) Debian
e) Kali linux
Mobile Based OS
1. Google: - Android (Launch in 2008), developed by Andy
Rubin (Open Source OS)
Types of OS
1. Batch OS: -
Program-1
Storage
Program-2 Batchfile (.bat) CPU
Medium
Program-3
Viz, magnetic tape
C JAVASCRIPT PROLOG
JAVA ORACLE
FORTRAN PYTHON
Translator
It is a program that converts the source code to the machine
language that computer can understand.
Loader
The program which load the applications from the HDD to
RAM is called loader.
Location: - inside a sector named as MBR (master boot
record) in a HDD.
Note:- The First instruction of bootstrap loader is
present inside BIOS and is responsible for loading the
initial code necessary to start the operating system.
Debugger
The program that is used by the programmer to find the errors
(or bug) in the syntax of source code is called debugger.
Electric wire
Musical
Midi Instrument
PC Device Ex = Guitar
midi port
System Files
.dll: - Data link library
.sys: - system files
.bat: - batch files
.exe:- executable file
Computer Classification
Seymour Cray left CDC in 1972 to start his own company and
built Cray-1 super computer in 1972.
Minicomputer(1970’s)
They are smaller, less expensive and less powerful than a
mainframe (or supercomputer) but more expensive and
more powerful than a personal computer.
Minicomputers were used for scientific and engineering
computations, file handling and database management.
1st Minicomputer: - PDP-1 (Programmed Data Processor)
Microcomputer
Used for personal/office use.
1st personal computer: - ALTAIR
India’s 1st computer: - SIDDHARTH
History of Computers
1. ABACUS (China)
It was the world first calculating device and is similar to
children’s toy.
2. Pascaline (1642)
Also known as calculator of modern world.
By Blaise Pascal in 1642.
1st Mechanical calculator
6. UNIVAC (1951) : -
Universal automatic computer.
First digital electronic computer for commercial purpose.
By john Eckert and John Mauchl.
Based on decimal number system.
7. EDVAC (1952): -
Electronic discrete variable automatic computer.
By John Eckert and John Mauchl.
Unlike ENIAC, it was binary rather than decimal and was
designed to be a 1st stored program computer, i.e., it has a
memory to hold both program as well as data.
b) Apple: -
c) Google: - Google sheets
d) Ist spreadsheet program: - Visicalc
Document-1
Book-1 Presentation-1
Pages
Worksheet Slides
File extension name
7. Filter: - Filters are the rules (or conditions) that you can employ to
decide which rows in a worksheet to display.
8. Mouse Pointer: - It appears as a “ “ sign when it
is positioned in the worksheet.
a) Relative addressing :–
Relative means change
A1
B2
C5 – Relative column and relative row
b) Absolute addressing: -
Absolute means fixed.
$C$5 – absolute column and absolute row
c) Mixed addressing:-
$C5 – Absolute column and Relative Row
C$5 – Relative column and Absolute Row
Q:- 5 is written in cell A1 and then if we do drag and drop then what will
be the output in cell A2.
Ans:-
Q:- 1,2 is written respectively in cell A1,A2 and then if we do drag and
drop then what will be the output in cell A3.
Ans:-
Q:- Monday is written in cell A1 and then if we do drag and drop then
what will be the output in cell A2.
15. Mathematical operators
1) =round( )
=round (70.995,2)
=round (8.961,0)
= round (8.361,0)
Q4) = round(728.32,-1)
Sol. =round(728.32,-1)
If it is negative no. then ignore the digits after the decimal point.
= 728.
Q5) = round(723.32,-1)
=round(760.52,-2)
=round(748.52,-2)
=round(750.72,-2)
2) = count ( )
It will count the cells that contain only numbers in a given range.
ex. A B C
1 10 A = count (A1:B3)
2 . B
3 10 10 B = count (A3:B3)
4 5 +
3) =COUNTA( )
It will count the cells that are non- empty in a given range.
ex:- =COUNTA(B1:C4)
4) = countif( )
Syntax:- = countif(range, condition)
ex. =countif(A1:C3, ‘10’)
Q) A
1 Ram
2 Raj
3 Sam
4 Ram
5 Sam
6 Ram
7 Ram
i) = count if(A1:A1,A1)
a) Ram b)1 c) Ram Ram d)2
=floor(12,2)
=ceiling(35, 5)
=floor(22,4)
=ceiling(26,8)
6) = sum( )
= average ( )
= max ( )
= min ()
i) = sum (3%2 == 2, 2^0, 3)
Q:- Write in different ways how to add cells in the range from A1 to A4.
7) = if ( )
Syntax: -= if (Condition, Value1, Value2)
Marks = 29
= if (Marks < 33, pass, fail)
8) = Sum if ( )
A B C
1 51 ABC01 10
4 54 GHI01 40
9) No argument functions: -
i) = now ( )
display current date and time
ii) =today ( )
display current date
10) = left()
= right()
= concatenate()
7. F5
Computer : -
Word :-
F5 Excel :-
Powerpoint: -
Cell Tip
c) 1. Title slide
2. Title and content
3. Section and header
4. Two content
5. Comparison
6. Title only
7. Blank
8. Content with caption
9. Picture with caption
a) Presentation views: -
1. Normal View (by default)
2. Outline view
3. Slide Sorter view
4. Note Page view
5. Reading view
b) Master Views: -
1. Slide Master view
2. Handout master view
3. Notes master view
c) Show: -
1. Ruler (shortcut key to insert ruler: - alt + shift + F9)
2. Gridlines
3. Guides
Gridlines (Shift + F9) Guides (alt + F9)
d)Zoom: -
Min: - 10%
Max: - 400%
By default: - 100%
By default max zoom in zoom dialog box = 400%
d)Macros: -
A macro is a series of commands and instructions that
we group together as a single command to accomplish
a task.
History of Internet
ARPANET (1969)
7) Application Layer
6) Presentation Layer
5) Session Layer
1) Physical Layer
NSFnet (1980)
(National Science Foundation Network)
DECNET(1980)
(Digital Equipment Corporation Network)
It was the world’s first commercial network that connects
American people only.
Internet (1990)
The word internet is made up from two words, i.e.,
Internet = Inter + Networking
Advisory Body: -
Google
Search Engine
ex: - 5A : 7B : C3 : FF : 13 : C4
5A -7B -C3 - FF - 13 -C4
PORT NUMBER
It is the address of a application (or process) inside a host.
It is of 16 bits.
It is the responsibility of transport layer to provide port Number.
Socket(complete address) = IP address (32 bit) + Port number (16
bit)
Therefore, Socket is of 48 Bits.
IMEI Number
International mobile equipment identity.
Code to check IMEI number of device: *#06#
Total digits in IMEI no. = 15
E-MAIL (Electronic mail)
It is one of the way of digital communication medium.
Email services :-
1. First email service :- hotmail
Founder: - Sabeer Bhatia
(Later Hotmail was purchased by Microsoft and renamed it
as ‘MS-Outlook’)
2. Apple :- icloud
3. Google :- gmail
4. Yahoo mail
5. Zoho mail
6. Yandex mail ( Russian)
7. mail.com
8. Mozilla thunderbird
Parts of email-id :- 2
Spam email :- The spam e-mail is also Known as unsolicited mail
or junk mail or unwanted mail.
Most of the spam emails are company’s advertisement.
CC (Carbon Copy): - all the recipients will able to see each other
email address.
BCC (Blind Carbon Copy): - none of the recipient will able to see
each other email address.
to: std1, std2
cc: hod-1, hod-2
bcc: principal, vice-principal
from: teacher
Q:- When principal receives the email then he will able to see the
email id of.
Ans:-
Q:- When hod-1 receives the email then he will able to see the email
id of.
Ans:-
Q:- Can we interchange “to and cc” fields in order to send email.
Ans:-
Q:- In order to send email to a person such that the email doesn’t
received in his spam folder, the sender should write the email id of a
person in which field.
Ans:-
6. Hybrid Topology: -
It is the combination of two or more different types of topologies.
Repeater
3. Hub: -
It is used to connect multiple devices in a network, mainly LAN.
Ex- printer, speaker and multiple computers can be connected in a
LAN using Hub.
It is an central device.
A hub has many ports in it. When a message arrives at a port then
it is broadcast to every other port without considering whether it is
destined for that particular destination or not.
Thus it is an non-intelligent or dump device.
4. Switch: -
A switch is a Data link layer networking device which connects
multiple devices in a network like a hub.
It is an intelligent device because it first checks the MAC address of
the computer to send the data in the network.
5. Bridge: -
Bridge connects two or more different LAN’s together that has a
same protocol to form a bigger LAN.
LAN-1
Bigger LAN
Bridge
24
LAN-2
6. Router: -
They are responsible for receiving, analyzing and forwarding data
packets among the connected computer networks.
A router can be used both in LANs and WANs.
7. Gateway: -
A gateway is a network device that connects two or more networks
with different protocols.
8. Firewall: -
It can be a hardware or software or both.
A firewall is a network security device that monitors incoming and
outgoing network traffic and decides whether to allow or block
specific traffic based on a defined set of security rules.
ex: - Sometimes we get a message while download that this file
might be harmful to your computer, do you want to download it or
not.
Important Topics
1. Domain Names: -
2. Communication Modes: -
Simplex Mode
Half-duplex mode
Full duplex mode
a) Simplex Mode:- Known as one way communication.
ex:- Keyboard, Radio, TV communication, OTP (One Time Password)
etc.
Y|
Youtube
yahoo
G. Chrome
Application is in the
Google form of icon & is short
flipkart to this page
Link to
flipkart
Then fill
username &
password
Your Data
9) Cookies: -
Cookies are small text files of information that a web server
generates and sends to a web browser.
Cookies can be: -
a) First Party Cookies: - These are the cookies that store your own login
id, passwords, auto fill information etc for some website that you
frequently visit.
b) Third Party Cookies: - These are the cookies that websites store to
know about you search history and web browsing history. Third party
cookies may result in unwanted advertisement on your webpages.
10) VOIP: - (Voice over Internet Protocol)
VOIP is a technology that allow you to make voice calls over
broadband internet connected instead of an analog (regular)
phone line (or PSTN).
PSTN: - Public Switched Telephone Network.
PSTN: -
1. It is known as landline telephone system.
2. PSTN was circuit switching i.e. dedicated path.
3. It was designed for purely analog voice communication by using
wire network, i.e. higher cost for long distance.
Advantages: -
1. Cheaper than traditional voice communication.
2. Reducing the overall maintenance cost.
Protocols used for VOIP
1) H.323