🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Computer 1_b03f4ae8-9359-4835-9f7c-f61ae3599f4a.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Document Details

LucidRococo

Uploaded by LucidRococo

Tags

computer systems operating systems data communications technology

Full Transcript

INDEX Introduction of Computer....................................................................... 3-15 Operating System................................................................................... 16-25 Data Communications and...

INDEX Introduction of Computer....................................................................... 3-15 Operating System................................................................................... 16-25 Data Communications and computer network................................... 26-36 The Internet and World Wide Web..................................................... 37-46 Microsoft Office..................................................................................... 47-71 Programming language......................................................................... 72-80 Number system....................................................................................... 81-91 Abbreviation Related to Computer..................................................... 92-96 Computer 2 YCT Introduction of Computer Computer system- A computer is an electronic device that can be programmed to accept data (input), process it and generate result (output). A computer along with additional hardware and software together is called a computer system. Classification of Development of Computer (i) Based on size and work. Computer Super Mainframe Mini Micro Computer Computer Computer Computer Computer Personal Palmtop Computer Smart Phone Workstation Tablet Computer Notebook Computer Computer 3 YCT (ii) Based on working Technology Computer Analog Digital Hybrid Computer Computer Computer Comparison of computer types Computer Processing Size and Capacity Cost Usage Types Speed It is used in scientific research areas for analyzing Huge amounts of Fastest computer in data obtained from Super Computer Most expensive data, largest size the world exploring the solar system, satellites, weather forecasting etc. It is used in large organizations with Mainframe Large amounts of Expensive Very fast multiple Computer data, very large size simultaneous users e.g. banks It is used in Its low weight and universities and Mini Computer Less expensive Fast small capacity departments of large companies. It is used in home, smallest, can fit on a Micro Computer Cheapest Fast personal use by one desktop user at a time. Analog computer and Digital Computer Analog Computer Digital Computer 1. Analog computers works with continuous values or 1. Digital computers works with discrete values or these types of systems process continuous data. these types of systems process discrete data. 2. Speed of analog computers is less than the digital 2. Speed of digital computers is more than the analog computers. computers. 3. Analog computer has very low or limited memory and 3. Digital computer has very big memory it can store it can store less amount of data. large amount of data. 4. Analog computers are less reliable than digital 4. Digital computers are more reliable than analog computers. computers. 5. Its speed of processing is not so high. 5. Its speed of processing is very high. 6. It provides results with less accuracy as compared to 6. It provides results with higher accuracy as digital computers. compared to analog computers. 7. Analog computers have complex architecture. 7. Digital computers do not have so complex architecture like analog computers. 8. Analog computers show the result in terms of voltage 8. Digital computers show the result in computer signals. display screen. 9. Readability of analog computers is low. 9. Readability of digital computer is high. 10. Examples includes analog clock and thermometer 10. Examples includes digital laptop, digital camera, etc. digital watches etc. Computer 4 YCT Characteristics of Computer Speed- A computer works with much higher Reliability- A computer is reliable as is gives speed and accuracy compared to humans while consistent result for similar set of data. If we performing mathematical calculations. given same set of input any number of times, we will get the same result. Accuracy- Computers perform calculations Consistency- The computer is so consistent with 100% accuracy errors may occur due to that it can perform trillions of processes data inconsistency or inaccuracy. without errors for several hours Diligence- A computer can perform millions of Memory- A computer has built-in memory tasks or calculations with the same consistency called primary memory where it stores and accuracy. data, where it can store instant data immediately. Versatility- Versatility refers to the capability Remembrance Power- The computer has the of a computer to perform different kinds of power to store any data or information for as works with same accuracy and efficiency. long as we like. Data can also be recalled easily if needed. Storage Capacity- Computer can store huge Automation- Computers can also be used amounts of data. to automate routine tasks with the help of a task scheduler. Computer 5 YCT Evolution of Computer Generations of Computers- At a Glance Input/Output Examples of Advantages/ Generations Hardware Software Memory Language Devices Generations disadvantages First Vacuum Machine Magnetic Paper tape Low level ENIAC, Consume lot Generation Tube language tapes and and punched language, EDVAC, of electricity, (1940-1956) binary magnetic cards Machine UNIVAC, expensive, (0, 1) drums language IBM 650, large size, (0,1) IBM 701 higher energy, Consumptio n Greater chance of error Computer 6 YCT Second Transistor Batch Magnetic Magnetic Assembly PDP - 8, Smaller in Generation operating core, tape and and high IBM 1400 size low (1956-1963) system magnetic punched level Series power disk cards language IBM 7090 consumption (FORTR & 7094 and AN, UNIVAC generated ALGOL, 1107 less heat. COBAL) CDC 3600 Third Integrated Time Large Magnetic High- IBM 360, Relatively Generation Circuit (ICs) sharing/ magnetic tape, level IBM 370, fast, small (1964-1975) SSI, MSI multi core, monitor, language PDP-11, and cheap program magnetic keyboard, (PASCA NCR 395 easy to use ming tape/disk printer L, operating etc. BASIC) system Fourth Micro- Graphica Semiconductor Pointing High IBM Highly Generation processor and l user memory devices level PC, STAR reliable and (1975-1989) very large interface keyboard, language 1000, very less scale (GUI), monitor C, C++, APPLE II maintenance integration UNIX, etc. Database APPLE storages (VLSI) Real etc. Macintosh capacity Time, Alter 8800 very large Distribut etc. and faster. ed operating system. Fifth Based on Internet Optical disk, Touch Understa Desktops, Portable and Generation Artificial and virtual screen, nd natural laptops, small in size (1990- intelligence, multimed memory pen, language tablets, fastest. present) uses the Ultra ia (huge speech (human smart large-scale software storage input, language) phone Integration parallel/ capacity) light (ULSI) multi scanner technology processin printer and parallel g etc. processing operating method. system. Computer Hardware & Software Hardware Software 1. Hardware is a physical parts of computer that cause 1. Software is a set of instruction that tells a computer processing of data exactly what to do. 2. It is manufactured 2. It is developed and engineered. 3. Hardware cannot perform any task without software 3. Software cannot be executed without hardware 4. As hardware are physical electronic devices, we can 4. We can see and also use the software but cannot see and touch hardware actually touch them. 5. Hardware is not affected by computer viruses. 5. Software is affected by computer viruses. 6. If Hardware is damaged it is replaced with new one. 6. If Software is damaged, its backup copy can be reinstalled 7. Example- Keyboard, Mouse, Monitor, Printer, CPU, 7. Example- MS word, Excel, PowerPoint, Hard disk, RAM, ROM etc. Photoshop, MySQL, etc. Computer 7 YCT Components of Personal Computer Operation Description 1. Take Input The process of entering data and instructions into the computer system 2. Store Data Saving data and instructions so that they are available for processing as and when required. 3. Processing Performing arithmetic and logical operations on data in order to convert them into useful Data information 4. Output The process of producing useful information or results for the user, such as a printed report information or visual display. 5. Control the Directs the manner and sequence in which all of the above operations are performed. work flow Inside view of System Unit Computer 8 YCT Components of Motherboard Mouse Computer 9 YCT Keyboard Computer 10 YCT Input Devices Keyboard Joystick Scanner Mouse Web cam Game Pad Stylus Pen BCR (Bar Code Reader) OCR (Optical Character Reader) Digital camera Microphone Light pen MICR (Magnetic Ink Track ball Pointing stick Graphic tablet character Recognition) Digitizer OMR (Optical Mark Reader Video Capture Hardware Computer 11 YCT Output Devices Monitor (LED, Printer Plotter Projector LCD, CRT etc) Loudspeaker Speech synthesizer Film Recorder Head phones Sound card Video card Computer Output Microfilm (COM) Both Input-Output Devices Modems Facsimile (FAX) Touch Screen Headsets (It has scanner to scan the (Headset consists of document and also have speakers & printer to print the microphone) document) Computer 12 YCT Printer Impact and Non-Impact printer Impact Printer Non-Impact Printer 1. A type of printer that produces characters and 1. A type of printer that produces characters and graphics on a piece of paper by striking. graphics on a piece of paper without striking 2. It prints by hammering a set of metal pin or character 2. Printing is done by depositing ink in any form. set. 3. Electromechanical devices are used 3. No electromechanical device is used. 4. Faster speeds around 250 words per second. 4. Slower speeds around 1 page per 30 seconds. 5. Have banging noise of needle on paper. 5. Works silently 6. They are not suited for printing photograph or any 6. They are best suited for printing photograph or any high quality media. high quality media. 7. Examples of the impact printer are Dot printer, Daisy 7. Example of the Non-impact printers are laser printer, Line printer, Drum printer etc. printers, inkjet, printers, thermal printer etc. Inkjet Printer and Laser Printer Inkjet Printer Laser Printer 1. They have nozzle from which ink is sprayed on to 1. They do not have nozzle. paper and it gets printed. 2. Ink in the cartridges is in liquid form, which dries if 2. Ink is in the form of toner (powder). It does not not used for a long time dries up even if you don't use if for a long time. 3. It is cheap in price 3. It is expensive than inkjet printers. 4. Inkjet reaches maximum speed at only 16 pages per 4. A laser printer can pump out up to 100 pages per minute minute. 5. If you print assignments, projects or print colourful 5. If you want to print only text like documents or pictures, then one can prefer, inkjet printers. PDFs or want to print normal pages, then one can prefer Laser printers. Computer 13 YCT Memory Primary Memory and Secondary Memory Primary Memory Secondary Memory 1. Primary memory is temporary 1. Secondary memory is permanent. 2. Primary memory is directly accessible by 2. Secondary memory is not directly accessible by processor/CPU the CPU. 3. Nature of parts of primary memory varies, 3. It is always Non-volatile in nature. RAM - volatile in nature, ROM - Non- volatile in nature 4. The memory devices used for primary memory are 4. The secondary memory devices are magnetic and semi-conductor memories. optical memories. 5. Primary memory is also known as main memory or 5. Secondary memory is also known as external internal memory. memory or Auxiliary memory. 6. Examples - RAM, ROM, Cache memory, PROM, 6. Examples - Hard Disk, Floppy Disk, magnetic, EPROM, Registers etc. Tapes etc. Computer 14 YCT Memory Hierarchy Memory Access Time Storage Capacity ROM 1 µ Sec 4 to 8 MB Register 1-2 ns 200 Byte Cache Memory 3-10 ns 32 KB to 4 MB RAM 11-60ns 16 MB to 4 GB Magnetic Disk 10-50ms 160 GB to 1600 GB Optical Disk 100-200 ms 700 MB to 60 GB Software Users Application Software Operating System Hardware System Software and Application Software System software Application software 1. System software maintains the system resources and 1. Application software is built for specific tasks. give the path for application software to run. 2. Low level languages are used to write the system 2. While high level languages and used to write the software application software. 3. Without system software, system can't run. 3. while without application software system always runs. 4. System software programming is complex than 4. Application software programming is simpler as application software comparison to system software. 5. Example of system software are operating system, 5. Example of application software are, Photoshop, compiler, etc. MS office, VLC player etc. Computer 15 YCT Operating System Introduction Operating System acts as an interface between computer hardware and user. It manages and controls all the hardware and flow of data, instructions and information to and within the system. The Operating System takes instructions from the user and directs it to CPU, which further passes the instructions to the hardware. Operating System is one of the core software programs that run on hardware and makes is usable. The user can interact with hardware so that they can send commands and receive output. An Operating System provides an interface between user and machine. This interface can be graphical user interface (GUI) in which users. Click on screen elements to interact with Operating System or a command line interface (CLI) to tell the Operating System to do things, it also manages the computer's resource such as CPU, memory, disk drives and printers. It provides services for application software. Functions of an Operating System- Computer 16 YCT Types of Operating System Types of Characteristics Advantages Disadvantages Examples operating systems Batch processing This type of OS does not It is very difficult to Lack of Payroll systems operating system interact with the computer guess or know the time interaction bank statements directly. There is an required for any job to between the etc. operator which takes complete. user and the similar jobs having the job. same the requirement and Multiple users can share group them into batches. the batch system is very Batch It’s also known at the less. systems are ‘First come, First serve.’ hard to debug. Multi-tasking The user directly gives Each task receives equal Due to Multics, Unix, operating system instructions to an OS, and time to use the CPU multiple Linux, the OS executes multiple sharing, it is Windows 2000 tasks at a time. These Reduces CPU idle time unreliable server, windows system are also known as NT servers, etc. time sharing systems. Fewer chances of Data duplication of software. communication is difficult Real-time It is defined as a data These operating Very few MTOS, Lynx, operating system processing system in systems focus more on tasks run at the RTx, Robots, which the time interval running applications than sometime in Medical required to process and those in the queue. order to avoid imaging system, respond to inputs is so errors scientific small that it controls the It provides the best experiments, environment. the time management of memory It needs weapon systems taken by the system to allocation. specific etc. respond to an input and interrupts Computer 17 YCT display of required signals and updated information is devices drivers termed as the response to respond time. earliest to interrupts. Multiprocessor It is allows the use of It helps in increasing the A large amount Linux, Unix, operating system multiple CPUs in a reliability and improving of memory is windows 2000. computer system for the overall performance required for executing multiple and through put of running and processes at the same computer system. executing time. several user programs. Network These types of operating It has stable and In this type of Microsoft operating system system allow shared centralized servers that OS, the failure windows server access of files, printers, can handle security of any node in 2003, Microsoft security, applications and concerns well. a system windows server other networking affects the 2008, UNIX, functions over a small whole system. Linux, Mac private network. OSx, Novell Netware and BSD etc. Distributed In this types of OS, Failure of one will not A single LOCUS, operating system multiple CPUs are used to affect the other network system failure micros, IRIX, serve multiple processes communication as all might not DYNIX, ALX, and users. All the systems are independent affect the SOLARIS, computers have their own from each other. entire mach, OSF/1 memory unit and CPU are communication etc. interconnected and Increased data exchange but the failure communicate with each speed and reduced load of the main other over a shared on the host computer. network can communication network. crash it. Embedded It is installed on an These operating system It is only GPS systems, operating system embedded computer allow the implementation possible to Palm OS, system, which is primarily of embedded systems in perform some windows EC, used for performing an efficient manner. specific medical devices computational tasks in operations with ATMs, etc. electronic devices. The computer system these OS. with embed led operating system is easy to use and These OS maintain. cannot be used in frequently changing environments. Mobile operating It is helps to run other It provides on ease to Some of the Android, iOS, system application software on users. mobile Blackberry mobile device. It is the operating symbian, palm same kind of software as systems are not OS, windows the famous computer user friendly. phone web OS, operating systems like etc. Linux and windows, but now they are light and simple to some extent. Computer 18 YCT MS–DOS MS- DOS was developed and introduced by Microsoft in 1981. MS-DOC is a single user and single tasking operating system developed for personal computers. This operating system provides a command line user interface, which means that a user needs type a command at the command line for performing s specific task. MS–DOS Command List- COMMAND DESCRIPTION Append The append command can be used by programs to open files in another directory as if the were located in the current directory. Assign The assign command is used to redirect drive requests to a different drive. Attrib The attrib command is used to change the attributes of a single file or a directory Break The break command sets or clear extended Ctrl + C single file or a directory. Call The call command is used run a script or batch program from within another script or batch program. The call command has no effect outside of a script or batch files. Chdir The chdir command is used to display the drive latter and folder that you are currently in. Chkdsk The Chkdsk command, often referred to as check disk is used to identify and correct certain hard drive errors. Choice The choice command is used within a script or batch program to provide a list of choices. Cls The Cls command clears the screen of all previously entered commands and other text. Copy The copy command copies one or more files from one location to another. Country The country command is used in the CONFIG. Sys files to tell MS-DOS to use country specific text conventions during processing. Ctty The Ctty command is used to change the default input and output devices for the system. Date The date command is used to show or change the current date. Dblspace The dblspace command is used to create or configure DoubleSpace compressed drives. De bug The debug command starts debug, a command live application used to test and edit programs. De frag The defrag command is use to defragment a drive you specify. The defrag command is the command live version of Microsoft Disk defragmenter. Del The del command is use to delete on or more files. The del commands is same as the erase command. Deltree The deltree command is used to delete a directory and all the files and subdirectories with in it. Devicehigh The devicehigh command is used in the CONFIG.SYS file to load device drivers into upper memory. Dir The dir command is used to display a list of files and folders contained inside the folder that you are currently working in. The dir command also display other important information like hard drive serial number, the total number of file listed, the total amount of free space left on the drive. Computer 19 YCT Drvspace The drvspace command is used to create or configure drive space compressed drives. Drivspace, executed using the drvspace command, is an updated version of double space. Echo The echo command is used to show messages, most commonly from within script and batch file. The echo command can also be used to turn the echoing feature on or off. Edit The edit command starts the MS-DOS editor tool, which is used to create and modify text files. Edlin The edlin command start the edlin tool, which is used to create and modify text files. Emm 386 The emm 386 command is used to given MS-DOS access to more than 640 KV of memory. Exe2bin The exe2bin command is used to convert. EXE files binary Format. Exit The exit command is used to end the command.com session that your currently working it. Expand The expand command is used to extract the files and folders contained in Microsoft cabinet (CAB) files. Fast help The fast help command provides more details information on any of the other MS-DOS command. Fe The Fe command is used to compare to individual or sets of files and then show the differences between them. F disk The F disk command is used to create manage and delete hard drive partitions. Find The find command is used to run a specified text string in one or more files. For The for command is used to run a specified command for each file in a set of files. The for command is most often used within a batch or script. Format The format command is used to format a drive in the fill system that your specify. Intersvr The Intersvr command is used to a start the Interink server and to copy Interink files from one computer to auother. Join The Join command is used to attach a drive letter to a directory located on auother drives. It's command similar to the subst command which associates a drive latter which a local directory. Key b The Key b command is used to configure a keyboard for a specific language. Go to The go to command is used in a batch or script file to direct to command process to a labeled live in the script. Graphics The graphics command in used to load a program that can print graphics. Computer 20 YCT Help The help command provides more detailed information of any other command prompt or ms- dos command. If The command used to perform conditional function in a batch. Interink The interink command is used to connect two computers via a parallel and serial connection to share files and priters. LH The LH command is the shorthand version of Loadhigh command. Load fix The Load fix command is used to load the specified program in the first specified 64 k of memory and then runs program. Load high The Load high command is used to load a program onto high memory and is usually used from within the auto exec. bat file. Md The command is the shorthand version of the Mkdir command. Mem The Mem command shows Information about used and free memory areas and prograns that are currently loaded into memory in the ms-Dos subsystem. Mkdir The Mkdir command is used to create a new folder. Mode The Mode command is used to configure system device. More The More command is used to display the information contained in text file the More command case also be used paginate the result of result of any others prompt or Ms-Dos command. Msav The Msav command starts Microsoft Antivirus. Mscdex The Mscdex command is used to provide CO-RAM access to ms-Dos. Msd The Msd command starts Microsoft Diagnostics, a tool used to display information about your computers. Ms Func The Ms func command is use Load information specific to a particular country or region. Prompt The prompt command is used to customized the appearance to the prompt text in command Prompt or Ms-Dos. Rem The rem command is used to Record comments or Remarks in a batch or script file. Romdir The Ramdir command is used to delete an existing or completely empty folder. Shift The Shift command is used to change the position of replaceable parameters in a batch or script file. Sys The sys command is used to copy the Ms-Dos system files and command interpreter to a disk. The sys command is used most often to create a simple bootable disk or hand drive. Tree The tree command is used to graphically display the folder structure of a specified drive of path. Ver The Ver command is used top display the current Ms-Dos version number. Vsafe The Vsafe command is used to start Vsafe is basic virus protection system for Ms-Dos. Computer 21 YCT UNIX UNIX is an operation system that allows several users to perform a number of tasks simultaneously. The first version of UNIX was introduced during the 1971. The following are the core components of the UNIX Operating System. → Kernel → Shell → Files and processes LINUX Linux is an open-source operating system like other operating systems such as Microsoft Windows. The Linux operating system was developed by Linux Torvalds in 1991, which sprouted as an idea to improve the UNIX Operating System. Examples of Linux operating system is: Ubuntu, Debian, Cent OS, Fedora, Red Hat. Arch Linux, SUSE, Mint etc. LINUX COMMANDS LIST COMMAND Description Pwd The ‘Pwd’ command is used to display the location of current working directory. Mkdir The ‘mkdir’ command is used to create a new directory under any directory. Rmdir The ‘rmdir’ command is used to delete a directory. Is The ‘Is’ command is used to display a list of content of directory. CD The ‘cd’ command is used to change the current directory. Touch The ‘touch’ command is used to create empty files. We can create multiple empty files by executing it once. Cat The ‘Cat’ command is a multi-purpose utility in the Linux system. It can be used to create a file, display context of the file, copy the context of one file to another file, and more. RM The ‘rm’ command is used to remove a file. CP The ‘cp’ command is used to copy a file or directory. MV The ‘mv’ command is used to move a file or a directory from one location to another location. Rename The ‘rename’ command is used to rename files. It is useful for renaming a large group of files. Computer 22 YCT Head The ‘head’ command is used to display the context of a file. It displays the first 10 lines of a file. Tail The ‘tail’ command is similar to the ‘head’ command. It displays the last to 10 lines of the file context and also useful for reading the error message Tac The ‘tac’ command is the reverse of ‘cat’ command. It displays the file context in reverse order. SU The ‘Su’ command provides administrative access to another user. ID The ‘id’ command is used to display the user ID (UID) and group ID (GID). Useradd The ‘useradd’ command is used to add or remove a user on a Linux server. Passwd The ‘passwd’ command is used to create and change the password for a user. CUT The ‘Cut’ command is used to select a specific column of a file. Grep The ‘grep’ command is useful for searching the context from a file. Generally, it is used with the pipe. Comm The ‘comm’ command is used to compare two files or streams. By default, it displays three columns Sed The ‘sed’command is also known as stream editor. It is used to edit files using a regular expression. tee The ‘tee’ command is quite similar to the ‘cat’ command. The only difference between both filters is that is put standard input on standard output and also write them into a file. tr The ‘tr’ command is used to translate the file context like from lower case to upper case. Uniq The ‘uniq’ command is used to from a sorted list in which every word will occur only once. Wc The ‘wc’ command is used to count the lines, words and characters in a file. Od The ‘Od’ command is used to display the context of a file in different, such as hexadecimal, octal and ASCII characters. Sort The ‘Sort’ command is used to sort files in alphabetical order. gzep The ‘gzip’ command is used to truncate the file size. It is a compressing tool gunzip The ‘gunzip’ command is used to decompress of file. It is a reverse operation of ‘gzip’ command. Find The ‘find’ command is used to find a particular file within a directory. Locate The ‘locate’ command is used to search a file by file name. Date The ‘date’ command is used to display date, time, time zone, and more. Cal The ‘cal’ command is used to display the current month’s calendar with the current date highlighted. Sleep The ‘sleep’ command is used to hold the terminal by the specified amount of time. By default, it takes time in seconds. Time The ‘time’ command is used to display the time to execute a command. Zcat The ‘zcat’ command is used to display the compressed files. df The ‘df’ command is used to display disk space used in the file system. mount The ‘mount’ command is used to connect an external device file system to the system’s file system. Exit Linux ‘exit’ command is used to exit from the current shell. Clear Linux ‘clear’ command is used to clear the terminal screen. IP The ‘IP’ command is an updated version of the ipconfig command. It is used to assign an IP address, initialize an interface, disable an interface. SSh Linux ‘ssh’ command is used to create a remote connection through the ‘ssh’ protocol. mail The ‘mail’ command is used to sent mails from the command line. Ping The ‘ping’ command is used to check the connectivity between two nodes that is whether the server is connected. It is a short form of ‘Packet Internet Groper.’ host The ‘host’ command is used to display the IP address for a given domain name and vice versa. man The ‘man’ command is used to display the user manual of any command that we can run on the terminal. Echo The ‘echo’ command is used to display line of text/string that are passed as an argument. Chmod The ‘Chmod’ command is used to change the access permissions of file system objects (files and directories) sometimes known as modes. tar The ‘tar’ stands for tape archive, is used to create archive and extract the archive files. Computer 23 YCT Windows- Microsoft windows, commonly referred to as windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft Microsoft introduced an operating environment named windows on November 20, 1985, as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces (GUI). Name of Operating Date of Significant Features Release System Windows 95 August, 32 Bit File System. 1995 Multitasking. Object Linking and Embedding (OLE). Plug and Play. Optimized memory management. Windows 98 June, 1998 32 Bit data link control (DLC) protocol. Improved GUI. Improved online communication through various tools. Such as outlook express, personal web server and web publishing wizard. Multiple display support. Windows update. Windows 2000 February, More reliable against application failure. 2000 Improved Windows explorer. Secure file system using encryption. Microsoft management console (MMC). Improved maintenance operations. Windows ME September, System restoration against failure. 2000 Universal plug and play. Automatic updates. Image preview. Windows XP October, Attractive desktop and user interface. 2001 System restore. Windows firewall. Files and settings transfer wizard. Windows Server April, Enhanced Internet Information Service (ITS). 2003 2003 Enhanced Microsoft Message Queuing (MSMQ). Enhanced active directory support. Watchdog timer. Windows Vista November, Multilingual User interface. 2006 Enhanced search engine. Enhanced internet explorer. Enhanced Windows media player. Enhanced Windows update. Windows system assessment tool. Windows 7 October, Libraries to improve file access and organization. 2009 Action center for system maintenance backups, and troubles hooting. Improved networking via home group. Device stage for recognizing USB devices faster. Quick Desktop view button. Computer 24 YCT Windows 8 October, Simplified Desktop for increased speed. 2012 Start menu has been replaced. Improved security. Enhanced search bar. Ribbon and Quick access toolbar in office 2007. Windows Reader is a native PDF reader. Windows 8.1 October, Add start Button to the desktop. 2013 Boot directly to the Desktop. Allows Snap start screen apps. Enhanced automatically Windows update. Windows 10 July, 2015 Enhanced New start menu. Voice-controlled digital assistant Cortana integration. Microsoft edge web browser. Multiple desktops and task view. Tablet mode. Enhanced Action Center. Universal Apps. Windows 11 October, 5G supported. 2021 Enhanced Cortana. Microsoft edge with IE mode replaces the internet explorer 1.1. S mode available. Wallet is removed. Android Apps supported. Improved Touch keyboard. Some Operating systems for Mobile Phone and Tables Mobile OS Developer Release Date Google 23 September, 2008 Android Apple 29 June, 2007 iOs (iPhone OS) Samsung electronics February, 2010 Bada Black Berry Black Berry Ltd. 19 January, 1999 OS MeeGo OS Nokia and Intel 26 May, 2010 Symbian Ltd. and Nokia 5 June, 1997 Symbian OS Web OS LG electronics January, 2009 Palm Ltd. 1996 Palm OS Microsoft Corporation 21 October, 2010 Windows Mobile Harmony OS Huawei 9 August, 2019 Computer 25 YCT Data Communications and Computer Network Data communications– The process of electronic transfer of information between two locations is known as data communication. The five basic elements of Data communication are- → Message- it is the information to be communicated. It may be in the form of text, pictures, audio, video or any combination of these. → Sender- It is the device that creates and transmits the information. → Receiver- It is the device that receives the information. → Medium- It is the communication channel through which the information travels from sender to receiver. It could be a physical wire or radio waves. → Protocol- It represents a set of rules that governs the communication process between the senders to the receiver. Measuring capacity of communication media In data communication, the transmission medium is also known as channel. The capacity of a channel is the maximum amount of signals or traffic that a channel can carry. It is measured in terms of bandwidth and data transfer rate as described below. Bandwidth- Bandwidth of a channel is the range of frequencies available for transmission of data through that channel. Bandwidth is measured in Hertz (Hz). 1 KHz = 1000 Hz 1 MHz = 1000 KHz = 1000000 Hz Data transfer Rate- Data transfer rate is the number of bits transmitted between source and destination in one second. It is also known as bit rate. It is measured in terms of bits per second (bps). The higher units for data transfer rates are- 1 Kbps = 210 bps = 1024 bps 1 Mbps = 220 bps = 1024 Kbps 1 Gbps = 230 bps = 1024 Mbps 1 Tbps = 240 bps = 1024 Gbps Types of Data Communication (i) Simplex communication- It is a one way or unidirectional communication between two devices in which are device is sender and other one is receiver. For example, data entered through a Keyboard, Radio broad casting, television broadcasting, etc. (ii) Half-duplex communication- It is two way or bidirectional communications between two devices in which both the device can send and receive data or control signals in both directions, but not at the same time. For example, Walkie-Talkie, Two-way radio that has a push-to-talk button. Channel capacity = Bandwidth × propagation Delay (iii) Full-duplex communication- It is two way or bidirectional communication in which both devices can send and receive data simultaneously. For example, mobile phones and landline telephones. Channel capacity = 2× Band width × propagation delay Computer 26 YCT Transmission Media– In data communication terminology, a transmission medium is a physical path between the transmitter and the receiver. Guided Media and Unguided Media Guided Media Unguided Media The signal energy propagates through wire in guided The signal energy propagates through air in media. unguided media. Guided media is used for point-to-point communication. Unguided media is generally suited for radio broadcasting in all directions. Discrete network topologies are formed by the guided Continuous network topologies are formed by the media. unguided media. Signals are in the form of voltage, current or photons in the Signals are in the form of electromagnetic waves guided media in unguided media. By adding more wires, the transmission capacity can be It is not possible to obtain additional capacity in increased in guided media. unguided media. Example of guided media are twisted pair wires, co-axial Example of unguided media are microwave or cables, optical fiber cables. radio links and infrared light. (A) Twisted Pair Cable Computer 27 YCT (B) Coaxial Cable (C) Optical Fiber Radio wave, Microwave and infrared waves Basis Radio wave Microwave Infrared wave 1. Direction These are omni-directional These are unidirectional in These are unidirectional in nature. nature. in nature 2. Penetration At low frequency they can At low frequency, they can They cannot penetrate penetrate through solid penetrate through solid through any solid object objects and walls but high objects and walls at high and walls. frequency they bounce off frequency, they cannot the obstacle. penetrate. 3. Frequency Frequency range: 3 KHz to Frequency range: 1 GHz to Frequency range: 300 Range 1 GHz 300 GHz GHz to 400 GHz 4. Security These offers poor security These offers medium These offers high security security. 5. Attenuation Attenuation is high Attenuation is variable Attenuation is low 6. Usage Setup and usage cost is setup and usage cost is Usage cost is very less. Cost moderate high Computer 28 YCT Evolution of Networking LAN, MAN and WAN Basis LAN MAN WAN Full-Form MAN stands for WAN stands for Wide Area LAN stands for Local Metropolitan Area Network. Area Network Network. Geographic Operates in small areas Operates in large areas Operates in larger areas such as span such as the same building such as a city country or continent or campus Ownership LAN's ownership is MAN's ownership can be While WAN also might not be private private or public. owned by one organization Transmission The transmission speed of While the transmission Whereas the transmission speed speed a LAN is high speed of a MAN is average of a WAN is low. Propagation The propagation delay is There is a moderate Whereas, there is a long delay short in a LAN. propagation delay in a propagation delay in a WAN MAN Congestion There is less congestion in While there is more Whereas there is more LAN congestion in MAN congestion than MAN in WAN Design & LAN's design and While MAN's design and Whereas WAN's design and Maintenance maintenance are easy maintenance are difficult maintenance are also difficult than LAN than LAN as well MAN Fault There is more fault While there is less fault In WAN, there is also less fault tolerance tolerance is LAN tolerance tolerance Computer 29 YCT Network Devices Modem– Modem stands for 'MOdulator DEModulator'. It refers to a device used for conversion between analog signals and digital bits. Ethernet Card– Ethernet card, also known as Network Interface Card (NIC Card) is a network adapter used to setup a wired network. It acts as an interface between computer and the network. It is installed in computer to establish a LAN. RJ 45– RJ 45 or Registered Jack-45 is an eight-pin connector that is used exclusively with Ethernet cables for networking. It is a standard networking interface that can be seen at the end of all network cables. Computer 30 YCT Repeater– A repeater is an analog device that works with signals on the cables to which it is connected. The weakened signal appearing on the cable is regenerated and put back on the cable by a repeater. Hub– An Ethernet hub is a network device used to connect different devices through wires. Data arriving on any of the lines are sent out on all the others. The limitation of Hub is that if date from two devices come at the same time, they will collide Switch– A switch is a networking device that plays a central role in a Local Area Network (LAN). Like a hub, a network switch is used to connect multiple computers or communicating devices. Computer 31 YCT Router– A router is a network device that can receive the data, analyze it and transmit it to other networks. A router connects a local area network to the internet. Gateway– A gateway, as the name suggests is a passage to connect two networks together that may work upon different networking models, gateways are generally more complex than switches or routers. Gateway is also called a protocol converter. Computer 32 YCT Comparison of Topology types Basis Bus Star Ring Tree Mesh Hybrid Topology Architecture A network A network In ring Tree In this The hybrid topology in topology in topology topology is networking topology is which there which each node is the variation topology, the is a single peripheral connected of star each combinatio line (the bus) node are to two other topology. communicati n of to which all connected to devices, one This ng device is multiple nodes are central node each on topology has connected topologies, connected (such as a either side, a hierarchical with every used for and the node hub, switch the nodes flow of data. other device constructing connect only or router) connected In tree in the a single to this bus. with each topology all network. In large other thus the order to topology. forms a ring computers connect n the link in a are nodes. Mesh ring connected topology topology is like the require n(n- unidirection branches of 1)/2 al. tree. communicati on links Advantages Usually Allows Each node Supported Message It is more requires less easy error has an equal by most delivery is effective as cabling detection and access to hardware and more it uses The failure correction other nodes software reliable. multiple of one Star in the Date is Network topologies computer topology is network receive a by congestion is It is does not easy to Addition all the nodes minimum contains the effect the install. of new node efficiently due to large best and other does not because of number of efficient computers in degrade the point-to- links. feature of the network performanc point link. the e of the combined network topology form which it is constructed. Disadvantages The failure The hub It is When the It is very It is of the failure leads relatively root node expensive to relatively backbone to the overall expensive fails, the implement. more cable results network to construct whole It is very complex in the crash. the ring network difficult to than the breakdown Requires topology. crashes. configure other of entire more amount The It is and install. topology network of cable for failure of difficult to It is It is connecting one node in configure. difficult to difficult to the nodes. the ring install and reconstruct topology configure. in case of affects the faults other nodes in the ring. Computer 33 YCT Delay/ Slow Good Data has to Slowly Manages Worst Response time response response make a lot because of high amounts response time because time, of stops more traffic. of traffic time. of one depends on because computer lot of stops multiple transmit at a devices can time transmit data simultaneous ly Common Coaxial Coaxial Twisted Overall All king of Cabling Cable cable, cable twisted pair length of cable that can depends on twisted pair, pair fiber requires each segment be used with the types of fiber No more more cables is limited by LAN and networks, than 100 than other the of cabling WAN. twisted pair, meters from topologies used coaxial the computer (Coaxial. fiber. to the Twisted pair- connection Fiber) device Congestion One Compared Information A A few of Often used control computer at a bus topology goes in one transmission congestion across long time sends it gives for direction from any direct from distances, information. much better around the station source to information Information performance ring and propagates destination on transfer goes along signals don't passes throughout except the can happen the cable and necessarily along the the medium station with in different the computer get ring until it and can be less ways, accesses the transmitted reaches the received by connection depending information to all the correct all other on the other off the cable work stations computer, stations. topologies. no buffering at repeater. Reliability If the In hub fails If the cable In case of A failure of Extremely common then the fails or any any node one device rare cable fails, whole computer failure, other does not reliability then the system will shuts down, hierarchical cause a break whole crash down. then the network are in the system will whole not affected network or crash down. system will transmission crash down. of data. Complexity Easy to Average Complexity Move Installation is the most connect or complexity because of complex complex in complicated remove each device simple to because of mesh one nodes in a connects to data to tree is topology, as network central devices. combination each node is without device with a star connected to affecting any only one link network more than other node. only. topology and one node. a bus topology. Security Any Security data travels The data pass The data pass The worst computer depends on from one over more over more security that is central device to than one than one connected to device the next node node bus topology security. until they network will reach their be able to see destination. all the data transmissions on all the other computers Computer 34 YCT Communication using OSI Model OSI (Open Source Interconnection) Model Layer Application Functions Protocols Central Devices Application These application Networks virtual SMTP, HTTP, FTP, – Layer produce the data terminal POP3, SNMP, (Layer 7) which has to be Mail services Telnet. transferred over the Directory services network. This layer also serves as a window for the application services to access the network and for displaying the received information to the user. Example- browsers, Skype, Messenger etc. Presentation It is also called the Translation ASCII MPEG, XDR, SSL, – Layer Translation Layer. to EBCDIC TLS, MIME (Layer 6) the data from the Encryption/ application layer is Decryption extracted here and Compression manipulated as per the required format to transmit over the network. Computer 35 YCT Session layer This layer is Session Net BIOS, SAP Gateway phone, (Layer 5) responsible for the establishment, PPTP, ADSP, RTCP, Servers establishment of maintenance and PAP,RPCP connection termination maintenance of synchronization sessions, Dialog controller authentication and also ensures security. Transport Layer The data in the Segmentation and TCP, Firewall, (Layer 4) transport layer is reassembly UDP, Gateway referred to as Services point SPX segments. It is addressing responsible for the Message end to end delivery acknowledgement of the complete message. The transport layer also provides the acknowledgement of the successful data transmission and re-transmits the data if an error is found. Network Layer It works for the Routing IPv4, IPv6, ICMP, Router (Layer 3) transmission of data Logical IPSEC, MPLS Brouters from one host to the Addressing other located in Subnet traffic different networks. control. It also takes care of packet routing. the sender and receiver's IP addresses are placed in the header by the network layer Data Link Layer It is responsible for Framing PPP, ARP Frame, Switch (Layer 2) the node-to-node Physical Relay, ATM, Fiber Bridge delivery of the addressing Cable etc. Access point message. The main Error control function of this Flow control layer is to make Access control sure data transfer is error free from one node to another, over the physical layer, it collects the packets to from frames, which are then transmitted over the network. Physical Layer It is responsible for Bit RJ-45 100 Base Tx, Hub, NIC, (Layer 1) transmitting synchronization ISDN. Cable, Modem, individual bits from bit rate control wireless one node to the Physical Repeaters next. When topologies receiving data, this Transmission layer will get the mode signal received and convert it into 0s and 1s and send them to the data link layer. Which will put the frame back together Computer 36 YCT The Internet and World Wide Web Evolution of Internet Internet Architecture Model Internet Connection Computer 37 YCT Domain Name System (DNS) Internet Protocol (IP) Address Computer 38 YCT IPv4 and IPv6 IPv4 IPv6 1. IPv4 has a 32-bit address length. 1. IPv6 has a 128-bit address length. 2. It supports manual and DHCP address 2. It supports Auto and renumbering address configuration. configuration. 3. It can generate 4.29×109 address space. 3. Address space of IPv6 is quite large it can produce 3.4×1038 address space. 4. Address representation of IPv4 is in decimal. 4. Address representation of IPv6 is in hexadecimal 5. In IPv4 checksum field is available. 5. In IPv6 checksum field is not available. 6. It has broadcast message transmission scheme. 6. In IPv6 multicast and any cast message transmission scheme is available. 7. IPv4 has a header of 20-60 bytes. 7. IPv6 has header of 40 bytes fixed. 8. Example -192.0.2.1. 8. Example – 2001 : 0db8 : 85a3 : 0000 : 0000 : 8a2e : 0370 : 7334 Class of IP addresses Address Class Address Range Default subnet Mask Bit Assignment Class A 1.0.0.0 to 126.255.255.255. 255.0.0.0 Class B 128.0.0.0 to 191.255.255.255 255.255.0.0 Class C 192.0.0.0 to 223.255.255.255 255.255.255.0 Class D 224.0.0.0 to 239.255.255.255 Reserved for Multicasting (Multicast) Class E 240. 0.0.0 to 254.255.255.255 Experimental (Reserved) Computer 39 YCT Internet and World Wide Web Website Computer 40 YCT Static and Dynamic web Pages 8. Uniform Resource Locator (URL)- Computer 41 YCT Web Browsers Web Browser Release Date Developers World Wide Web 1990 Tim Berners Lee Marc Andreessen (NCSA) Mosaic 1993 Netscape Navigator 1994 Netscape Communications AOL Internet Explorer 1995 Microsoft Mozilla Firefox 2002 Mozilla Foundation Apple Safari 2003 Google Google Chrome 2008 Opera 1995 Opera Computer 42 YCT Some Popular Search Engines. Google YAHOO 4 September, 1998 Bing Baidu 2 March 1995 18 January 2000 3 June 2009 Yandex 23 September 1997 Ask.com Excite Duck Duck Go 3 June, 1996 October 1995 29 February 2008 LYCOS 13 April 1995 Most Commonly used tags in HTML HTML tags Description Syntax HTML It is the root of the html document which is statements ……… used to specify that the document is html. Head Head tag is used to contain all the head statements ……….. element in the html file. Body It is used to define the body of html statements ………. document. It contains image, tables, lists etc. Title It is used to define the title of html < title > statements ………. document. Heading It is used to define the heading of html < h1 > Statements ………. < /h1 > document. < h2 > Statements ………. < /h2 > < h3 > Statements ………. < /h3 > Computer 43 YCT Paragraph It is used to define paragraph content in html < P > Statements ……… < /P > document. Emphasis It is used to renders as emphasized text. < em > Statements ……... < /em > Bold It is used to specify bold content in html < b > Statements ……… < /b > document. Italic It is used to write the content in italic format. < i > Statements ……… < /i > Small It is used to set the small font size of the Statements ………… content. < /Small > Underline It is used to set the content underline. < u > Statements ……… < /u > Deleted text It is used to represent as deleted text. It cross Statements ……… the text content. < /Strike > Anchor It is used to line one page to another page. Statements ……< /a > List It is used to list the content. < li > Statements ……… < /li > Ordered List It is used to list the content in a particular < ol > Statements ……… < /ol > order. Unordered List It is used to list the content without order. < ul > Statements ……… < /ul > Comment It is used to set the comment in html < ! - - Statements ……… > document in html document. It is not visible on the browser. Scrolling Test It is used to scroll the text or image content. Statements ……… Center It is used to set the content into the center. Statements ……… Font It is used to specify the font size, font color Statements ……… and font – family in html document. Line break It is used to break the like. < br > Image It is used to add image element in html < img > document. Computer 44 YCT Link It is used to link the content from external < link > source. Tables Table tag is used to create a table in html Statements ……… document. < /table > Tr It is used to define row of html table. < tr > Statements ……… < /tr > Th It defines the header cell in a table. By < th > Statements ……… < /th > default it set the content with bold and center property. Td It defines the standard cell in html document. < td > Statements ……… < /td > Form It is used to create html form for user. Statements ……… < /form > Submit Input It is used to take the input from the user. < input > Dropdown option It is used to select an option from a drop statements ………… down list. E-mail (Electronic Mail) An email address consists of 3 parts Computer 45 YCT Some Popular Social Media Site Sites Launched Founders 2004 Mark Zuckerberg Facebook 2005 Jawed Karim, Steve Chen, Chad Hurley YouTube 2009 Brian Acton, Jan Koum WhatsApp 2010 Kevin Systrom, Mike Krieger Instagram 2016 Byte Dance Ltd, Zhang Yiming Tik ToK 2011 Evan Spiegel, Bobby Murphy, Reggie Brown Snapchat 2005 Steve Huffman, Alexis Ohanion, Aaron Swartz. Reddit 2010 Ben Silberman, I Paul Sciarra, Evan Sharp Pinterest 2006 Jack Dorsey, Evan Williams, Biz Stone. Twitter 2003 Reid Hoffman LinkedIn 2013 Nikolai Durov Pavel Durov Telegram Computer 46 YCT Microsoft Office 1. MS Word System Accessing MS Word- → We can start MS Word by using the start menu. Start → All program → Microsoft Office → Microsoft word. → We can start MS Word by using Run Command. (i) Select start → Run to display the Run dialog box. OR Press ‘Window’Key + R (ii) Type ‘winword’ in the open text box and click ok of or press the Enter Key. Quick Access toolbar Computer 47 YCT Home Toolbar: font style & clipboard Home Toolbar: format paragraphs Home toolbar: editing tools Computer 48 YCT Insert Tab Insert Tab Computer 49 YCT Insert Tab Page layout tab Computer 50 YCT References tab Review Computer 51 YCT View v Outlining Computer 52 YCT Basic Operations Performed in MS Word. Creating a document 1. Open word 2. go to file tab → New → Blank document OR Press ctrl + N keys Add and Format Text- 1. Place the cursor and type some text 2. To format, select the text and then Computer 53 YCT Add Pictures, Shapes, SmartArt and more Step-1: Select the Insert tab. Step-2: Select what you want to add: o Tables - select Table, hover over the size you want, and select it. o Pictures - select Pictures, browse for pictures from your computer, select a stock image, or even search Bing. Note: Older versions of Word may have Online Pictures on the ribbon next to Pictures. o Shapes - select Shapes, and choose a shape from the drop-down. o Icons - select Icons, pick the one you want, and select Insert. o 3D Models - select 3D Models, choose from a file or online source, go to the image you want, and select Insert. o SmartArt - select SmartArt, choose a SmartArt Graphic, and select OK. o Chart - select Chart, select the chart you want, and select OK. o Screenshot - select Screenshot and

Use Quizgecko on...
Browser
Browser