Information Technology Standard Eleven PDF (A Textbook)

Summary

This is a textbook for standard eleven students in India, covering Information Technology.

Full Transcript

Practical Notebook for Standard XI Practical Notebook Cum Journal Price: ` 59.00 Price 0 rice : ` 63.0...

Practical Notebook for Standard XI Practical Notebook Cum Journal Price: ` 59.00 Price 0 rice : ` 63.0 : ` 74.00 P Based on Government approved syllabus and textbook Inclusion of all practicals as per Evaluation scheme. Inclusion of various activities and objective questions Inclusion of useful questions for oral examination Separate space for writing answers Practical notebooks are available for sale in the regional depots of the Textbook Bureau. (1) Maharashtra State Textbook Stores and Distribution Centre, Senapati Bapat Marg, Pune 411004  25659465 (2) Maharashtra State Textbook Stores and Distribution Centre, P-41, Industrial Estate, Mumbai - Bengaluru Highway, Opposite Sakal Office, Kolhapur 416122  2468576 (3) Maharashtra State Textbook Stores and Distribution Centre, 10, Udyognagar, S. V. Road, Goregaon (West), Mumbai 400062  28771842 (4) Maharashtra State Textbook Stores and Distribution Centre, CIDCO, Plot no. 14, W-Sector 12, Wavanja Road, New Panvel, Dist. Rajgad, Panvel 410206  274626465 (5) Maharashtra State Textbook Stores and Distribution Centre, Near Lekhanagar, Plot no. 24, 'MAGH' Sector, CIDCO, New Mumbai-Agra Road, Nashik 422009  2391511 (6) Maharashtra State Textbook Stores and Distribution Centre, M.I.D.C. Shed no. 2 and 3, Near Railway Station, Aurangabad 431001  2332171 (7) Maharashtra State Textbook Stores and Distribution Centre, Opposite Rabindranath Tagore Science College, Maharaj Baug Road, Nagpur 440001  2547716/2523078 (8) Maharashtra State Textbook Stores and Distribution Centre, Plot no. F-91, M.I.D.C., Latur 413531  220930 (9) Maharashtra State Textbook Stores and Distribution Centre, Shakuntal Colony, Behind V.M.V. College, Amravati 444604  2530965 E-learning material (Audio-Visual) for Standards One to Twelve is available through Textbook Bureau, Balbharati... Register your demand by scanning the Q.R. Code given alongside. Register your demand for E-learning material by using Google play store and downloading ebalbharati app. ebalbharati www.ebalbharati.in, www.balbharati.in The Coordination Committee formed by GR No. Abhyas - 2116/(Pra.Kra.43/16) SD - 4 Dated 25.4.2016 has given approval to prescribe this textbook in its meeting held on 20.6.2019 and it has been decided to implement it from academic year 2019-20. INFORMATION TECHNOLOGY STANDARD ELEVEN (Arts, Commerce and Science) Maharashtra State Bureau of Textbook Production and Curriculum Research, Pune. Download DIKSHA App on your smartphone. If you scan the Q.R. Code on this page of your textbook, you will be able to access full text. If you scan the Q.R. Code provided, you will be able to access audio-visual study material relevant to each lesson, provided as teaching and learning aids. © Maharashtra State Bureau of Textbook Production and Curriculum Research, Pune- 411004. The Maharashtra State Bureau of Textbook Production and Curriculum Research reserves all rights relating to the book. No part of this book should be reproduced without the written permission of the Director, Maharashtra State Bureau of Textbook Production and Curriculum Research, ‘Balbharati’, Pune. Information Technology Subject Cover & Illusatrations Committee and Study group Smt. Pradnya Kale Shri. Sanjay Kulkarni, Chairman Smt. Julie Kanade Typesetting Textbook Bureau, Pune Smt. Neha N. Katti Shri. Prashant M. Patil Production Smt. Vijaya A. Parekar Shri. Sachchidanand Aphale Smt. Archana K. Mulay Chief. Production Officer Smt. Dipali G. Dhumal Shri. Sachin Mehta Smt. Jyoti J. Barge Production Officer Smt. Aasha C. Mohite Shri. Nitin Wani Smt. Sushama S. Patil Asst. Production Officer Smt. Sangita A. Jaju Paper Shri. Tayyabali M. Sayyed 70 GSM Creamwove Shri. Nilesh S. Ghavate Print Order Shri. Milind Oka N/PB/2022-23/70,000 Shri. Prashant D. Hakim Printer Shri. Satyawan B. Guram M/S. SARASWATI BOOK COMPANY, PUNE Shri. Nitin R. Choubey Dr. Ajaykumar Lolage (Member Secretary) Publisher Vivek Gosavi, Co-ordination Controller Dr. Ajaykumar Lolage Maharashtra State Textbook Special Officer, Work Experience, Bureau, Prabhadevi, Incharge Special Officer, Mumbai-400025 Health and Physical Education, Textbook Bureau, Pune NATIONAL ANTHEM Foreword Dear Students, First of all Congratulations for completing your school education and welcome into the world of 10+2, which is often called as Junior College or Higher Secondary Education. Now you have stepped into the new horizon of education which is waiting for you. In these golden years of education, you are being exposed to many new technologies and skills. The skills, which you will acquire in these two years, are definitely going to help you throughout your life. You all are blessed as you are born in this new era of technology and digital world where the word “Impossible” made it “I-m-possible” where I stand for Internet. Use of Information and communication Technology made your life pleasant and comfortable. It is often seen that to handle the technology is quite easy but nobody is bothered to identify the know-how and pros and cons of the same. In this book you will venture into the new technologies of Information Technology. The book is a combination of theoretical as well as practical skills. The Skill Oriented Practical (SOP) will give you a peek into the world of digital technology. You will certainly master a specific skill set which will help you further to enhance your higher education or job opportunities. In this book new techniques of learning by doing are incorporated such as ‘quizzes’, ‘do it yourself’, ‘activity sheets’ which will promote thought provoking skills within you. The different activity sections in the textbook will definitely improve your logical, analytical and creative skills. You will learn about the emerging technologies of the digital world, which is the need of the era. This book will surely create interest in the field of Information Technology due to its colourful presentation and enriching content. You will definitely appreciate and learn the contents with interest and enthusiasm through Q.R. Code. Please do inform us what part of this book you found useful or difficult to understand. We wish you the best in your future academic life. (Dr. Sunil Magar) Pune Director Date : 20 June 2019 Maharashtra State Bureau of Texbook Production and Curriculum Research, Pune Indian Solar Year : 30 Jyeshtha 1941 For Teachers Dear Teacher, In this world of globalisation, Information Technology is a mature part of curriculum and has become a daily bread of Life. Technology changes with time, but concepts of handling data and converting data into information are constant and it is reflected in the terminology of Information Technology. We present this book which is a combination of Computer basics, concepts, ideas and skill oriented practicals (SOP) in view of Digital India. This duplet is entrusted upon you to bring about advanced computer literacy in our students. This combination of Theory and skill Oriented Practical’s (SOP) will make a remarkable computer based revolution in the knowledge of students. This book will achieve our objective of career developing and enhancing the skills as well as immediate employment in future. This book is designed with eye catching images in order to appeal the students to learn with interest and enthusiasm. The book has different activities to develop the students skills, and give him opportunity to explore different computer related aspects based on different topics. ‘Case studies’ , ‘Quizzez’, ‘Do it yourself’, ‘Test your skills’ these small sections will definitely add a third dimensional thinking skills within the students. The book has been designed in such a way that the contents will be useful to the students from any stream in junior college whether Arts, Commerce or Science. Dear Teachers, the Skill Oriented Practical (SOP) has six topics. You can select any four skills or practicals for your students based on his subject of choice and liking. It is recommended that teachers should conduct one practical based on stream (Science - Client Side Scripting (JavaScript), Commerce - Accounting Packages and Arts - Digital Content Creation). This book will definitely create job opportunities like Jr. web designers, Jr. Account Assistant, Jr. Multimedia Designers/editors etc. at this 10+2 level. It will boosts his further career prospects be it in engineering CS, BCS BCA, B.Pharm CA, ICWA and even creative field like advertisements. The books gives hands on experience to the students and will definitely create confidence to handle the digital equipments. The Students will imbibe digital competency with your guidance and efforts. The ‘Cyber law’ topic will make our youngsters ethical users of digital media and create social awareness. The contents will help learners to develop ideas, find things out, make things happen, exchange and share information. We are confident that enthusiastic teachers and creative teachers like you will welcome the book. This book has potential to create awareness about open source softwares. The book has adopted FOSS policy as per the Government of India regulation. This will definitely take our students towards Digital India Program. Information Technology Subject Committee and Study Group Textbook Bureau, Pune Competency Statements For Information Technology Standard - XI Competency Theory 1. Key Concepts to create basic understanding about IT Enabled Technologies. 2. To acquire technical know-how about different types of software. 3. To acquire knowledge about 'Open source software' 4. To get knowledge about LINUX Commands. 5. To make the students aware about database concepts. 6. To introduce students to different terminologies used in database management systems. 7. To develop logical, problem solving, analytical and cognitive skills. 8. To acquire knowledge about webpage development. 9. To get technical knowledge to create dynamic web pages. 10. To make student socially aware while using internet / computer. 11. To create awareness about ethical ways of dealing with cyber world. 12. To develop problem solving skills using case studies, programs, activities etc. Skill Oriented Practicals (SOP) 1. To develop ability to use workplace productivity tool. 2. To develop ability to create presentations, handle documentation, easy way of calculation or computation. 3. To acquire web development skills. 4. To collect user data with the help of 'Form' feature. 5. To create dynamic web pages with the help of scripting language. 6. To develop logical skill by using different structures. 7. To acquire knowledge about Built-in-Functions in scripting language. 8. To introduce skill sets regarding use of computerized accounting. 9. To maintain & display ledger accounts using accounting software. 10. To create & edit image by using different tools. 11. To develop raster and vector images using image manipulation tools. 12. To enhance the creative ability by developing digital contents. 13. To acquire basic knowledge to use database commands. 14. To create & maintain tables in a database. 15. To acquire knowledge to Insert, update & delete data in tables. 16. Use of computing skills for career opportunities. INDEX Information Technology Standard - XI (Arts, Commerce and Science) No. Title of the Chapter Page No Theory 1. Basics of Information Technology 1 2. Introduction to DBMS 20 3. Impressive Web Designing 30 4. Cyber Law 60 Skill Oriented Practicals (SOP) (Select Any Four Skill Oriented Practicals from the following list) 1. Daily Computing (Libre Office) 72 2. Web Designing (HTML - 5) 84 3. Client Side Scripting (JavaScript) 85 4. Accounting Package (GNUKhata) 86 5. Digital Content Creation (GIMP, Inkscape) 96 6. DBMS (PostgreSQL) 113 Appendix : Steps for Installing Linux OS 119 Libre Office 127 PostgreSQL 129 GNUKhata 131 Abbreviations 133 It is recommended that teachers should conduct one practical based on stream (Science - Client Side Scripting (JavaScript), Commerce - Accounting Packages and Arts - Digital Content Creation). 1 Basics of Information Technology 1 Let us Learn is the foundation of economy and a driving force of social changes in the 21st  Definition of IT and ICT century. Distance is no longer an issue  To understand concepts like data when it comes to accessing information; and information. for example, work-from-home, distance  Various concepts used under IT learning, e-banking, and e-governance  Different types of Operating are now possible from any place with Systems with its features and uses an internet connection and a computing  Architecture of Computer System device. Lets first perceive two important concepts - Data and Information :  Units of Memory  Concepts related to Internet and 1.2 Data and Information Network with its types It is being said that the terms "data"  Recent trends, IT Enabled Services and "information" are interchangeable and careers in IT and mean the same thing. However, they are not same and there is a difference 1.1 An introduction to IT between the two words. Data can be any (Information Technology) character, text, word, number or raw facts. Information Technology has great However, Information is data formatted influence on all aspects of life. Almost in a manner that allows it to be utilized by all work places and living environments human beings in some significant way. In are being computerized and the use of Information Technology is being Example of Data : enhanced. Umbar, 1234, Xyz, MG Road, Calcutta, 9111111111, 84084 Definition of Information Technology : Example of Information : “IT (Information Technology) Xyz, 1234, MG Road, Umbar 84084, encompasses all of the technologies that Calcutta, 9111111111 we use in order to create, collect, process, protect and store information. It refers to the above example, the data appears to hardware, software (computer programs), be a set of random words and numbers. and computer networks”. However, when that data is interpreted, ICT (Information and Communication organized and formatted, one can tell Technology) concept involves transfer that it is contact information of a person and use of all kinds of information. ICT named as XYZ. 1 Need of information : Information is Computer System : required to take short term and long term A computer can process data, images, decisions and also to make strategic audio, video and graphics. A computer decisions in an organization. Since we performs five major computer operations live in the “Information age”, Information or functions irrespective of their size and Technology has become a part of our make. These are - everyday life. 1) It accepts data or instructions by way of input. 1.3 Various concepts used under IT 2) It stores data. Before getting started let us learn 3) It can process data as required by the some of the important concepts used user. under Information Technology : 4) It gives results in the form of output. 1.3.1 Computer : The word Computer is 5) It controls all operations inside a derived from a Latin word “computare” computer. which means to “to calculate”, “to count”, 1.3.2 Architecture of Computer : “to sum up” or “to think together”. An Computer Architecture is a specification electronic device which accepts input detailing of how a set of software and from the user, processes it according to hardware technology standards interact the instructions given to it and gives the to form a computer system. In short, com- required result in the form of output, is a puter architecture refers to how a comput- computer. er system is designed and how it works. SYSTEM UNIT MONITOR The case that contains the CPU, CD/DVD/DRIVE An output device memory, the power supply, disck that lets you see Reads CD/DVD drives, and all other hardware-such as your work as you go. discs. a modem that are in an interal format. PRINTER Produces printed copies SPEAKERS of computer output. Used to produce audio output MICROPHONE HARD DRIVE Used to get Located inside the system spoken input. unit and used to store programe and data. USB FLASH MEMORY PORT CARD READER Used to read flash KEYBOARD memory card. CD/DVD DISCS MOUSE WEB CAMERA The principal input device; Commonly used to deliver A pointing device use to captures either still used to type instructions programs ans store large used to make on- picture or motion video into the computer. multimedia files. screen selections. Fig : 1 Computer System and Peripherals 2 Every computer system has the following Another example of input devices three basic components : is touch-screens. Users can simply 1. Input Unit touch these screens without using any 2. Central Processing Unit other device to enter commands. From 3. Output Unit smartphones to ATM machines, these input devices are becoming very popular 1. Input Unit : This unit helps users to now a days. enter data and commands into a computer system. Data can be in the form of 2. Central Processing Unit (CPU) : numbers, words, actions, commands, etc. After receiving data and commands from The main function of input devices is to users, a computer system has to process direct commands and data into computer. it according to the instructions provided. Computer then uses its CPU to process Here, it has to rely on a component called data and produce output. the Central Processing Unit. The CPU further uses these three elements : For example, a keyboard is an input device that enters numbers and a) Arithmetic and Logic Unit : characters. Similarly, even a mouse can This part of the CPU performs be an input device for entering directions arithmetic operations. It does basic and commands. Other examples include mathematical calculations like barcode reader, Magnetic Ink Character addition, subtraction, division, Recognition (MICR), Optical Character multiplication, etc. Further, it can Recognition (OCR), etc. Memory Secondary Memory Data Input Output Information Primary Unit Unit Memory Control Unit (CU) Arithmatic And Logical Unit Data Flow (ALU) Control Flow Central Processing Unit (CPU) Fig : 2 Block Diagram of a Computer 3 even perform logical functions Primary Memory holds the data and like the comparison of data. instruction on which computer is currently working. Types of Primary Memory– Primary memory is generally of two types. 1. RAM 2. ROM 1. RAM (Random Access Memory): It stands for Random Access Memory. RAM is known as read /write memory. It is generally referred to as main memory of the computer system. It is a temporary memory. The information stored in this memory is lost as the power Fig : 3 CPU Internal View supply to the computer is switched off. That’s why RAM is also called b) Control Unit : This unit is the back as “Volatile Memory”. bone of computers. It is responsible for coordinating tasks between all 2. ROM (Read Only Memory) : It components of a computer system. stands for Read Only Memory. The control unit collects data ROM is a Permanent Type from input units and sends it to memory. The content is not lost processing units depending on its when power supply is switched nature. Finally, it further transmits off. Content of ROM is decided by processed data to output units to the computer manufacturer and facilitate users. permanently stored at the time of manufacturing. ROM cannot c) Memory Unit : Once a user be overwritten by the computer. enters data using input devices, It is also called “Non-Volatile the computer system stores this Memory”. data in its memory unit. This data will now remain here until other 2) Secondary Memory : It is an external components of CPU process it. memory of the computer. It is used The memory unit uses a set of to store the huge amount of different pre-programmed instructions to programs and information. further transmit this data to other The secondary storage devices are : parts of the CPU. 1. Magnetic (Hard) Disk Types of Memory– There are two types 2. Magnetic Tapes of memory 3. Pen Drive 1) Primary Memory 2) Secondary Memory 4. Flash memory 1) Primary Memory : Primary memory 5. Optical Disk (CD,DVD) is internal memory of the computer. 6. SSD etc. It is also known as main memory. 4 3. Output Unit : The third and final 1.3.4 Concept of Hardware and component of a computer system is Software : the output unit. After processing of Hardware : Computer hardware data, it is converted into a format comprises of the physical components which human can understand. After that a computer system requires to conversion, the output unit displays function. In simple words hardware this data to users. Examples of output are the parts which we can see, we can devices include monitors, screens, touch them, feel them. It encompasses printers and speakers etc. Thus, output everything with a circuit board that units basically reproduce the data operates within a Personal Computer formatted by the computer for user's or Laptop; including the motherboard, benefit. graphics card, CPU (Central Processing  Do it yourself Unit), ventilation fans, webcam, power  Try to find out names of the modern supply, and so on. input devices used in shops/malls. Software : A set of instructions given to the computer is known as a program. 1.3.3 Units of Memory : Computer Program or set of programs are called as storage and memory is often measured in software. This helps us to interact with the Megabytes (MB) and Gigabytes (GB). Let computer in order to perform a particular us understand the evolution of memory. task. Software is a generic term used to Bit : It is a binary digit that holds only describe computer programs. one of two values : 0 or 1. 1.3.5 Categories of a software : Nibble : A group of 4 bits is called a nibble (For example:1011, 1001, Open source software : It refers to the 1111). software which releases code in public domain for anyone to use. The source code Byte : A group of 8 bits is called a can be copied, modified or distributed byte. A byte is the smallest unit, by other users and organizations. As the which can represent a data item software is open to the public, the result is or a character. (For example : 11101100, 10000001) that it constantly updates, improves and expands as more people can work on its Different Units of Memory Data Measurement Size improvement. Many states are following Bit Single Binary Digit FOSS policy i.e. Free Open Source (1 or 0) Software Policy and it enabled them to 1 Byte 8 Bits save some million of rupees each year 1 KiloByte (KB) 1,024 Bytes in licensing costs. The Kerala state is in 1 MegaByte (MB) 1,024 KiloBytes 1 GigaByte (GB) 1,024 MegaBytes news as they have adopted FOSS policy 1 TeraByte (TB) 1,024 GigaBytes and saved rupees 300 crore as a license fee 1 PetaByte (PB) 1,024 TeraBytes for proprietary or closed source software. 1 ExaByte (EB) 1,024 PetaBytes Table: 1 Different Units of Memory 5 Closed source software : It is opposite to  The operating system boots up the Open Source Software and means that the computer and makes sure that software is used by the proprietary and has everything is operational. a closely guarded code. Only the original  The operating system is also what authors of organization of a software can runs the cell phone and most of the access, copy, and alter that software. In electronic devices. case of closed source software, user has to purchase the software before using it.  The operating systems usually come preloaded on any computer, tablet, 1.3.6 Computer software can be laptop or cell phone that you buy. classified into two types based on its  Most people use the operating system utility : that comes with their device as Application Software : Application default. software is a program or group of  It is necessary to use licensed operating programs designed for end users. system and not a copied or a pirated Applications software (also called one. end-user programs) include programs like database programs, word processors,  There are many open source operating web browsers, presentation software, systems available on the web which are spreadsheets etc. freely downloadable. It is advisable to use those OS instead of pirated ones. System Software : System Software is a *Refer Page 61(Software Piracy) set of instructions required for a computer to work. For Example, Linux Operating  Do it yourself system is a program that allows different  List out the open source and closed applications and various components of source software. hardware such as monitor, printer, mouse, keyboard etc. to communicate with each 1.3.7 Operating Systems for Personal other. Computers : DOS : DOS (Disk Operating System) was the dominant operating system for Let’s understand more about an operating system microcomputers in the 1980's and the early 1990's. For working with DOS  A computer would not be able the user needs to know how to input the to function correctly without an commands using the Command Prompt operating system. Window.  An operating system is a software Windows : Windows is a series of program that empowers the computer operating systems that are designed by hardware to communicate and operate Microsoft. The first two versions of the with the computer software. Windows operating system, introduced 6 in 1985 and 1987 respectively, were iOS : iOS is Apple's closed source primitive. Windows is the most commonly operating system for Apple's iPhone, used operating system. iPod Touch, iPad and second-generation Mac OS : Apple Corporation’s registered Apple TVs. operating system is called Mac OS. Windows Phone : Windows Phone is Chrome OS : Chrome OS is an developed by Microsoft as a closed source open-source operating system created operating system for mobile phones. by Google to create a better computing 1.4 Introduction to GNU/Linux (GNU experience for people who spend most of Not Unix) their time on the web. GNU/Linux is a family of operating UNIX : UNIX was trademarked in 1969 systems that are created by various by a group of AT&T employees at Bell companies, organizations, and individuals. Labs as a multitasking, and multi-user It is created by using Free Software computer operating system. Philosophies. This means that GNU/ Linux : Linux is an open-source, portable, Linux operating systems are usually free multi-user (multiple users can access of charge, free to distribute, and they system resources like memory/RAM/ are open source. Open Source is when application programs at the same time), a person can view and modify the code multiprogramming, operating system. It for a piece of software. This is important is very similar to other operating systems, because by having the ability to look such as Windows and a source code is and audit the code, user can be sure that available to the public. the program does not perform malicious 1.3.8 Operating Systems for Mobile tasks. It also allows the user to program Phones : their own features, or fix problems, and help the developers. This results in higher There are many different operating quality code and more secure programs. systems for mobile phones and devices. This is why GNU/ Linux is used as the These are Android, Asha, Blackberry, predominantly backbone of the Internet. iOS, Windows Phone etc. Most websites that user visits run on Android : Android is a free and open GNU/Linux. In fact, as of 2018, all the source operating system provided by world’s fastest 500 computers run Linux. Google. It is most popular OS amongst all other OS. Ubuntu is one of the most popular GNU/Linux distribution. Asha : Asha is used by Nokia phones. This is closed source OS. There are two main ways to interact with the computer : The GUI (Graphical Blackberry : This is a closed source User Interface) and the CLI (Command operating system for smartphone and Line Interface) tablet devices. 7 Graphical User Interface (GUI) a list of all the apps installed on the The graphical user interface is when computer. The search option is used for the user interacts with the computer using quick search of the application. images, icons, and dialog boxes. The The home folder is where all the Fig. no. 4 shows what the Ubuntu 18.04 personal documents and settings are looks like. This GUI is called GNOME. stored, and every user has their own home There are a lot of GUI's (Or desktop folder. environment) that user can install, but this is the default. Note : Installing new software on The left bar is called the Panel. There Ubuntu is done using the 'Ubuntu are shortcuts to programs, as well as Software' Center. currently open programs. The top bar has the date and time. If it is clicked a  Do it yourself menu will pop up with the calendar and  Open the Ubuntu Software Center notifications. Fig. no. 4 shows that the from the panel. top right side will show user the battery  Search for GIMP (it is an image information, if on a laptop, network editing program) and install. information (such as WiFi, or Ethernet),  Run updates and uninstall software and options for logging in, restarting, and from the software center. shutting down the computer.  Log out, Log in, and Restart the At the bottom left, there is an icon for computer. the app menu. Clicking on it will show APP Menu Fig. : 4 Desktop Environment of Ubuntu 18.04 8 Command Line Interface (CLI) The command line interface is when  Do it yourself  Open Firefox browser from the user interacts with the computer using command line. text. This is done by typing commands  Create a new file on the Desktop into a terminal. The default CLI on called hello.txt. Ubuntu 18.04 is called 'bash'. It is a  Change directory to Desktop using command processor that runs in a text 'cd' command. window where the user types commands  Open hello.txt in Nano text editor. that causes actions. The commands are programs that are run when user types  Write a message in hello.txt and save it. command name. There are number of different commands that user can use.  Print the contents of hello.txt with 'cat' command. Some are explained in Table no. 2. Fig. : 5 Ubuntu Dashboard Fig. : 6 File Explorer and Software Center 9 Command Short Usage Detailed description Discription example ls List Directories ls [List Directories] Prints the list of directories in the current one. pwd Print Working pwd [Print Working Directory] Prints the path to the cur- Directory. rent directory. whoami Who Am I ? whoami [Who Am I ?] Prints the name of the current user on terminal. lscpu List CPU lscpu [List CPU] Prints information about your CPU on terminal. touch Touch touch [Touch] Creates a new file. filename.txt cd Change cd Down- [Change Directory] Control goes to a different Directory laods directory. nano Nano is a text nano [Nano] Nano is a text editor. This command will editor filename.txt open the file FileName.txt (or create it if it doesn't exist). You can type text in Nano, and when you are done you can press Control + O followed by Enter to save and Control + X followed by Enter to exit Nano. cat Concatenate cat file1.txt [Concatenate] Prints the contents of the files listed file2.txt on the screen. Echo A built in echo -- Used to display line of text or string that are passed command help as an argument. Clear To clear clear To clear the command prompt. Table: 2 Few Linux Commands The GNU/Linux File System Hierarchy  /bin : Essential system programs are Standard stored here. In GNU/Linux, the topmost directory  /dev : All connected devices are is called the root directory, and it is stored here. Including internal devices, written as /. All directories are stored temperature sensors, and batteries. under the root directory. For example if  /etc : System configuration files are the user is ABC, the home directory will stored here. be created at /home/ABC. Everything in Linux is represented as a file, this includes  /proc : Files that provide information Cameras, Storage devices, Microphones, about processes. This is information Network devices, etc. like, how much RAM is free, or how This is a brief summary of the file fast the CPUs are running. system :  /tmp : Temporary files are stored here  / : The root directory. All files and  /home : Users home directories are directories are stored under this stored here. directory, including all hard drives, There are many more directories. pen drives, CD-Drives, etc. The user can read more about them by 10 searching for "File System Hierarchy application on his own. Linux Standard (FHS)" online. distributions mostly use free software Why Learn and Use GNU/ Linux ? so it keeps track of all the softwares through repositories. Repositories is There are huge number of benefits of a collection of software for a Linux learning GNU/Linux. Sooner or later in distribution on the server. The package the career, GNU/Linux will be used in manager updates the operating system the workplace. Millions of desktops and as well as other softwares periodically. servers run on GNU/Linux. The Android operating system, that the smartphone 4. Linux is flexible and easily runs on, is a modified version of GNU/ customizable : The user can change Linux. the desktop, the position of the menus, status bar position, style, default 1. Linux is Free and Open Source : file manager, icon theme and lot The word “Free” here does not just more. Almost everything in Linux is mean free of charge but also means customized. “Freedom”. Anyone is free to use this software, distribute them freely and 5. Excellent Support : There are even study and modify the source thousands of forums and millions code to suit one's own need. of people ready to help open source software users. Each distribution has its 2. Linux Operating System is free from own community of users and they help viruses : The user need not install any each other. Many software companies anti-virus software. This saves money and developers of free software as well as valuable time. The users also offer solutions to the problems are free from the trouble of updating through community platforms and the virus definitions and checking also through professional channels. unknown USB disk that is plugged in. Moreover, anti-virus software is 1.5 Computer Network not hundred percent reliable. The user 1.5.1 Introduction : It is a group always runs the risk of losing the data of interconnected computers or devices to if the computer is infected due to the have communication within themselves. failure of anti-virus software. Finally, A computer network consists of a anti-virus software often gives a collection of computers, printers and other false alarm and may delete the files equipment that is connected together so assuming the existence of the virus. that they can communicate with each 3. Easy to keep all the software up- other. to-date : Proprietary operating 1.5.2 Types of networks : There are systems can update themselves. But three types of network based on the they cannot update other software, geographical area they cover : LAN, especially proprietary software. MAN and WAN. The user has to keep track of each 11 The entire use and implementation  Examples of a MAN are the part of these types depends upon the of the telephone company network geographical area they cover, i.e. LAN that can provide a high-speed DSL covers the smallest area; MAN covers line to the customer or the cable an area larger than LAN and WAN TV network in a city. comprises the largest of all.  Wide Area Network (WAN) :  Local Area Network (LAN) :  Wide Area Network is a computer  LAN covers smaller geographical network that extends over a large area (Size is limited to a few geographical area. kilometers) and are privately  It might be confined within the owned. bounds of a state or country.  Usage area is limited to areas  A WAN could be a connection of such as an office building, home, LAN connecting to other LAN’s hospital, schools, etc. via telephone lines and radio  It covers a short distance, and so waves. the error and noise are minimized.  The technology is high speed and  LAN is easy to setup. relatively expensive.  Data transmits at a very fast rate  A Communication medium used as the number of computers linked for WAN is Telephone Network or are limited. Satellite Link.  It is a less expensive hardware and  Due to long distance transmission, maintenance cost is also low. the noise and error tends to be more  Metropolitan Area Network in WAN. (MAN) : 1.6 Network Configurations :  MAN is larger area than that Network architecture is the design of of a LAN and smaller area as a computer network. It is a framework compared to WAN. for the specification of a network's  It connects two or more separate physical components and their functional computers that reside in the same organization and configuration. or different cities. Two of the most widely used types of  It covers a large geographical area network architecture are peer-to-peer and and may serve as an ISP (Internet client/server. Service Provider). 1. Peer-to-Peer Architecture : In this  It is hard to design and maintain a type of architecture, all the machines, Metropolitan Area Network. called as “peers”, have the same status and they can communicate with 12 any other peer directly. A Peer-to-Peer for a network user to browse in network has no dedicated servers. Its internet or do spreadsheet work. implementations are meant for small For Example : Multimedia server, File networks. For Example, when students storage servers, Webserver etc. creates a network to share files through Bluetooth or SHAREit, the mobile device forms peer-to-peer network for transfer of files. Fig. : 8 Client-Server Architecture Fig. :7 Peer-to-Peer Architecture 1.6.1 Internet : 2. Client-Server Architecture : This Internet means connecting computer type of architecture is most suitable to any other computer anywhere in for larger network. So there are two the world. Internet is the highway of types of machines in network, client information. and server. The Internet has one very simple Client : A computer which is seeking job: to move computerized information any resource from another computer (known as data) from one place to is a client computer. For Example: another. The Internet is generally defined Downloading an image file from a as a global network connecting millions website, browsing Intranet/Internet of computers. etc. The network user normally uses a The Internet is a massive network of client computer to perform his day to networks, a networking infrastructure. day work. With the help of the internet one can Server : If a computer has a resource easily be in touch with any one in the which is served to another computer, whole world by sending electronic mail, it is a server computer. The client by chatting. Travel bookings can be establishes a connection to a server made very easily, one can order books or and accesses the services installed buy anything online. In simple terms it on the server. A server is not meant can be said that internet provides a very 13 strong connection or network between  DNS : Domain Name System-It computers globally, bringing people and translates network address (such as their working close to each other. IP addresses) into terms understood 1.6.2 History of Internet : by humans (such as Domain Names) and vice-versa. The first workable prototype of the internet came in the late 1960's with the  DHCP : Dynamic Host Configuration creation of ARPANET, or the Advanced Protocol - It can automatically assign Research Projects Agency Network. internet addresses to computers and Originally funded by the U.S. Department users. of Defense, ARPANET used packet  FTP : File Transfer Protocol - A switching to allow multiple computers protocol that is used to transfer and to communicate on a single network. manipulate files on the internet. The technology continued to grow in  HTTP : HyperText Transfer Protocol- the 1970's after scientists Robert Kahn and Vinton Cerf developed Transmission An internet-based protocol for sending Control Protocol and Internet Protocol, and receiving web pages. or TCP/IP, a communications model  IMAP : Internet Message Access that set standards for how data could be Protocol - A protocol for receiving transmitted between multiple networks. e-mail messages from server on the ARPANET adopted TCP/IP on January 1, Internet. It maintains a copy of all the 1983, and from there researchers began to emails on server. We can sort, filter assemble the “network of networks” that emails. became the modern Internet. The online  IRC : Internet Relay Chat - A world then took on a more recognizable protocol used for Internet chat and form in 1990, when computer scientist other communications. It facilitates Tim Berners-Lee invented the World communication in the form of text. Wide Web (WWW). 1.6.3 Protocols :  POP3 : Post Office Protocol Version 3 - A protocol used for receiving e-mail A protocol is a set of rules that from remote mail servers. It does not governs the communications between maintain copy on the server. computers on a network. In order to have two computers to talk to each other, they  SMTP : Simple Mail Transfer must be speaking the same language. Protocol - A protocol for sending e-mail messages to the Server on the Examples of Protocols are- Internet.  TCP/IP : Transmission Control Protocol & Internet Protocol - It breaks down the message into packets and sends them out into the network. 14 1.7 IT Enabled Services 1.8 Careers in IT 1.7.1 Meaning of IT Enabled Services : Various career opportunities are IT Enabled Services (ITES), also available for IT professions. These vary called web enabled services or remote from operator to Specialised skilled services or tele-working, covers the programmers. Some of the career entire amount of operations which exploit opportunities are as follows : Information Technology for improving 1. Web Designer and Developer : One efficiency of an organization. The most can develop interactive websites important aspect is the value addition of using knowledge of HTML, PHP IT Enabled Service. The value addition and various other programming could be in the form of Customer languages. relationship management, improved 2. Software Developer : It is possible to database, improved look and feel, etc. have career as a software developer The outcome of an IT Enabled Service is with the scripting skills. in two forms : 3. Database Manager : After getting  Direct Improved Service. knowledge about Database  Indirect Benefits. management one can work as a Database Manager with the help of Whereas direct benefits can be SQL skills. realised immediately, indirect benefits can occur over a period of time, and can 4. Information Security Analyst : be harnessed very effectively, if planned Information Security Analysts are well up front. responsible for ensuring that networks are watertight. They educate staff to 1.7.2 Popular IT Enabled Service avoid unintended disclosures and keep centers : up to speed with potential external Popular IT Enabled Service centers are - threats.  Call Centers 5. Professional Accountant : Using computerized accounting software one  Electronic Publishing can successfully handle accounting  Medical Transcription work of any small or large scale  Data Centers organization.  GIS Mapping 6. Financial Advisor : After getting (Geographic Information System) IT knowledge one can advise and guide others in investing the money in  ERP ( Enterprise Resource Planning ) various investment schemes with their  Knowledge Management & calculations and benefits in future. archiving. 7. Cyber Advisor : Anyone can develop his or her career as a cyber-advisor. 15 8. Animator : This is the most demanding home appliances, and other items career in today’s era. It is possible to embedded with electronics, software, become a successful animator using sensors, actuators, and connectivity one's own creation and innovation which enables these things to with the help of software like GIMP, connect, collect and exchange data Inkscape etc. creating opportunities for more direct 9. Games developer : Perhaps one of integration of the physical world into the trendiest and most fun jobs in the computer-based systems, resulting in sector, a games developer gets to work efficiency improvements, economic on titles for consoles, computers, smart benefits, and reduced human phones, tablets and online. Creativity exertions. and imagination are important but the 3. Cloud Computing : It is the delivery of ability to work in a highly pressurised computing services - servers, storage, environment is also crucial. databases, networking, software, data 10. Audio / Video Editor : As a career analytics and more - over the internet. opportunity, to become an Audio / 4. Data Analytics (DA) : It is the process Video Editor, one should be good in of examining data sets in order to draw tools such as Kdenlive, Audacity. conclusions about the information With the help of these tools one can they contain, increasingly with the develop a career as a video journalist. help of specialized systems and software. Data analytics technologies 1.9 Recent trends in IT and techniques are widely used in 1. Green Computing : It is the study commercial industries to enable and practice of environmentally organizations to make more-informed sustainable computing or IT. business decisions and by scientists The goals of green computing are and researchers to verify or disprove similar to green chemistry : scientific models, theories and hypothesis.  To reduce the use of hazardous materials 5. Artificial Intelligence (AI) : It is intelligence demonstrated by  To maximize energy efficiency machines, in contrast to the natural during the product's lifetime intelligence displayed by humans  To recycle or biodegradation of non- and other animals. Computer science functional products and factory defines AI research as the study of waste. "intelligent agents": any device that Green computing is important for perceives its environment and takes all classes of systems, ranging from actions that maximize its chance of handheld systems to large-scale data successfully achieving its goals. centers. 6. Machine Learning (ML) : It is the 2. Internet of Things (IoT) : The scientific study of algorithms and Internet of Things (IoT) is the statistical models that computer network of physical devices,vehicles, systems use to effectively perform a 16 specific task without using explicit many cases offer greater statistical instructions, relying on patterns and power, while data with higher inference instead. It is seen as a subset complexity may lead to a higher false of artificial intelligence. discovery rate. 7. Big Data : It refers to data sets that are 8. Blockchain : It is a growing list of too large or complex for traditional records, called blocks, which are data-processing application software linked using cryptography. It can be to adequately deal with. Data with defined as a distributed, decentralized, public ledger. Summary  Data can be any character, text, word, number or raw facts. Information is data formatted in a manner that allows it to be utilized by human beings in some significant way.  IT (Information Technology) involves all of the technology that we use to collect, process, protect and store information.  Computer architecture refers to how a computer system is designed and how it works.  Computer hardware is the set of physical components that a computer system re- quires to function.  Software is a set of instructions or programs instructing a computer to do specific tasks.  Computer storage and memory is often measured in MegaBytes (MB) and GigaBytes (GB).  Computer software can be classified into two types-Application Software and System Software.  Open Source Software is a code free software available freely to copy and modify.  Closed source Software is having proprietary rights with the developers and are paid ones.  GNU/Linux operating systems are usually free of charge, free to distribute, and they are open source.  There are two main ways to interact with the computer : GUI and CLI  Internet means connecting computer to any other computer anywhere in the world.  A protocol is a set of rules that governs the communications between computers on a network.  A computer network consists of a collection of computers, printers and other equip- ment that is connected together so that they can communicate with each other.  LAN, MAN, WAN are types of network  Massive career opportunities are available for IT professionals. 17 Exercise Q.1 Complete the following activity 5) 1) Disk MAN Area DOS Network System Q.2 Divide the following list of devices 2) Tick the appropriate box into appropriate categories. Internet is a.................. network (Monitor, Barcode reader, Printer, connecting millions of computer. Keyboard, Optical character reader, Speaker) Regional Global Local Categories Names 3) Input Devices Output Devices Q.3 Multiple choice two correct answers. USB Serial 1) The primary memory consists of.................. and.................. Bus a) Pendrive b) Hard Disk c) RAM d) Scanner e) ROM 2) The network architectures which are 4) Tick the appropriate box. widely used are.................. Print CPU a) Server b) Client c) Peer to peer information d) Client-server e) Internet Print path of Q.4 Match the following. whoami current directory (1) IS (a) change directory Print the name (2) FTP (b) Translates Network Address of current user (3) CD (c) List of Directory (4) DNS (d) To transfer file on interent 18 Q.5 Name the following and complete Q.8 Complete the following Long the diagram. form. LAN Local.........Network Mobile GUI.........User interface Operating System OSS Open Source........... Q.9 Identify the following activity. Q. 6 Complete the following with Linux You are typing a letter using a commands with their use. computer and suddenly there is a power failure. IT's Use Which type of Memory does this Commands activity deal ? Q.10 Answer the following pwd 1) What is Data and Information? Give examples of data and information. ls 2) Explain functional units of a computer system. Q.7 Complete the list of following protocols. 3) What is a storage unit ? Explain types of primary memory storage. 4) Explain how Linux is different from Windows. 5) Write down the difference between LAN, MAN and WAN. Internet Protocol  19 2 Introduction to DBMS Let us Learn card. In a report card, the combined (marks) data of all subjects speaks about  Concept of Database. students performance. Thus when data  Introduction to DBMS and RDBMS is maintained in an organized manner  Advantages of using database it becomes meaningful or organized management system. information.  Type for storage of data in a database. Data vs Information  To understand Structured Query Data Information Language. Data is raw facts Information is processed data 2.1 Introduction Data does not help Information in decision making helps in decision In our day to day life every person making uses database in various ways. Like people use phone diary or phone book Data could Without data which contains name, address email id, be relevant or information phone number etc. irrelevant cannot be Doctor maintains medical history of processed patients. Librarian maintains records of Each student's The average their book details, issue date, return date. exam score is one score of a etc. Teacher keeps records of students like piece of data. class or of the name, roll number, Marks etc. In these entire school is examples every one maintains records in information that a systematic manner. can be derived In a computer system, we always from the given maintain our records. At this point a data. database is very useful. 2.2 Definition of a Database Table: 1 Data vs Information Database is collection of interrelated data which helps in efficient retrieval, inserting and deleting of data. In exams,  Do it yourself  Collect five examples of data and marks obtained by the student in subjects information is data before it is entered in the report 20 2.3 Introduction to Database customers can send or get money Management System (DBMS) through banks. All this is possible just because of DBMS that manages all A database, often abbreviated as DB, the bank transactions. is a collection of information organized in such a way that a computer program  Universities and Colleges : can quickly select desired pieces of data. Examinations are done online today A Database Management System and universities and colleges maintain (DBMS) is a software for creating all these records through DBMS. and managing databases. The DBMS Student’s registration details, results, provides users and programmers with a courses and grades all the information systematic way to create, retrieve, update is stored in a database. and manage data. It stores data in such  Credit Card Transactions : a way that it becomes easier to retrieve, For purchase of credit cards and manipulate, and update information. all the other transactions are made Examples of popular DBMS are : possible only by DBMS. A credit card holder knows the importance of MySQL, PostgreSQL, Access, Oracle, his information that all are secured SQL Server, IBM, DB2 and Sybase. through DBMS. 2.4 Some Applications of DBMS  Social Media Sites :  Railway Reservation System : We all are on social media websites to Database is required to keep record of share our views and connect with our ticket booking, train’s departure and friends. Daily, millions of users sign arrival status, status of seats available up for these social media accounts etc. like Facebook, Twitter, Pinterest and Google plus. But how is all the  Library Management System : information of users stored and how There are thousands of books in the are we able to connect to other people? library so it is very difficult to keep Yes, this is all because of DBMS. a record of all the books in a copy or register. So DBMS is used to maintain 2.5 Advantages of DBMS all the information related to book  Reducing Data Redundancy : issue dates, name of the book, author The file based data management and availability of the book. systems contained multiple files  Banking : that were stored in many different People make thousands of locations in a system or even across transactions through banks daily and multiple systems. Because of this, they can do this without going to the there were sometimes multiple copies bank. So now banking has become of the same file which lead to data so easy that by sitting at home bank redundancy. 21 This is prevented in a database  Privacy : as there is a single database and any The privacy rule in a database means change in it is reflected immediately. only the authorized users can access Because of this, there is no chance of a database according to its privacy encountering duplicate data. constraints. There are levels of  Sharing of Data : database access and a user can only In a database, the users of the view the data. For example - In social database can share the data among networking sites, access constraints themselves. There are various are different for different accounts a levels of authorisation to access user may want to access. the data, and consequently the data  Backup and Recovery : can only be shared based on the Database Management System correct authorisation protocols being automatically takes care of backup followed. and recovery. The users don't need Many remote users can also access to backup data periodically because the database simultaneously and share the data between themselves. this is taken care of by the DBMS. Moreover, it also restores the database  Data Integrity : after a crash or system failure to its Data integrity means that the data previous condition. is accurate and consistent in the database. Data Integrity is very  Development and Maintenance Time : important as there are multiple DBMS reduces application databases in a DBMS. All of these development and maintenance databases contain data that is visible time. It supports many important to multiple users. So it is necessary functions that are common to many to ensure that the data is correct and applications, accessing data stored consistent in all the databases and for in the DBMS, which facilitates the all the users. quick development of application.  Data Security : 2.6 Data types in the DBMS Data Security is vital concept in a database. Only authorised users When you create a table or add a should be allowed to access the field to a table in the database, fields database and their identity should be are created with specific data type. Data authenticated using a username and types are classifications that identify password. Unauthorised users should possible values for and operations that not be allowed to access the database can be done on the data, as well as the under any circumstances as it violates way the data in that field is stored in the the integrity constraints. database. 22 2.7 Data model Class Data Type Description Database is designed according to Holds a certain rules. This logical structure of fixed length string (can database is known as a model. Data contain letters, models define how the data is connected CHAR numbers, to each other and how they are processed and special and stored inside the system. characters). The fixed size It describes the method of storing and is specified in retrieving the data. There are different parenthesis. models like network model, hierarchical Text Holds a model and relational model. Let us see variable length relational model. string (can Relational Model : contain letters, VARCHAR numbers, The most popular data model in DBMS and special is the Relational Model. Relational data characters). model is the primary data model, which The maximum is used widely around the world for data size is specified in parenthesis. storage and processing. This model is simple and has all the properties and It can represent capabilities required to process data with numbers with DECIMAL or storage efficiency. without the  A transaction is a unit of work that Numeric fractional part is performed against a database. It is used for For example, if you are creating INT storing integer a record or updating a record or values. deleting a record from the table, then It holds the date you are performing a transaction on Date DATE including day, that table. It is important to control month and year these transactions to ensure the data It holds time. integrity and to handle database Time TIME() Format: errors. HH:MM:SS Properties of Transactions : Table: 2 Data types in DBMS Transactions have the following four standard properties, usually referred to  Do it yourself by the acronym ACID.  You have scored 75.56% in the recent examination. Which data  Atomicity : It ensures that all operations within the work unit are type would you prefer to use for completed successfully. Otherwise, storing this data ? the transaction is aborted at the 23 point of failure and all the previous stored in a table. Database designer operations are rolled back to their decides the name of the table and former state. titles of columns.  Consistency : It ensures that the da-  Field : A table consists of information tabase properly changes states upon a which is stored under different successfully committed transaction. headings, called as fields or columns.  Isolation : It enables transactions to Columns are shown vertically in a operate independently of and table. Each field or column has an transparent to each other. individual name. Two columns cannot have the same name. In Fig. no. 1, the  Durability : It ensures that the result first row represents the different field or effect of a committed transaction names or titles of columns. persists in case of a system failure.  Record : All the columns in a table 2.8 Introduction of RDBMS make a row. Each row contains RDBMS stands for Relational information on individual topics. Database Management System. In A record is composed of fields and RDBMS a database is considered as a contains all the data about one collection of interrelated data. particular person, company, or item in a database. Record is also called Basic Database Concept as a Tuple.  Table : The table is the basic data  Key : A column or a combination of storage unit in a Relational database. columns which can be used to identify Table consists of columns and rows. one or more rows (tuples) in a table is A database consists of one or more called a key of the table. tables according to which data is Column (field) Position Title Education Requirements Functional Area Max Pay Min Pay Executive Assitant Associate degree Human Resource 60,000 40,000 Row (record) Recruiter Bachelor's degree Human Resource 110,000 85,000 SW Engineer Bachelor's degree Engineering 140,000 110,000 SQA Engineer Bachelor's degree Engineering 140,000 110,000 Data Value Table (object) Fig. 1 : Table in Database 24  Primary Key : The group of one each Passport_ ID is assigned to only one or more columns used to uniquely person. identify each row of a relation is A one-to-one relationship looks like called its Primary Key. below in the relationships graph :  Foreign Key : It is a field (or collection of fields) in one table that refers to the Primary Key in another table. Relationships in database : Relationships link data from individual tables to increase the usefulness of the database. A relationship in the context of Fig. 2 databases, is a situation that exists between two relational database tables One-to-Many (or Many-to-One) when one table has a foreign key that is used as a reference to the primary key of This is the most common relationship the other table. type. In this type of relationship, a row in table City can have many matching For example, a table called Employees rows in table Customer, but a row in table has a primary key called employee_id. Customer can have only one matching Another table called Employee Details row in table City has a foreign key which references employee_id in order to uniquely identify the relationship between the two tables. There are 3 types of relationships in relational database design. They are :  One-to-One Fig. 3  One-to-Many (or Many-to-One) Example of one-to-many relationship  Many-to-Many One-to-Many relationships can also These are explained below. be viewed as Many-to-One relationships, One-to-One : depending on which way you look at it. In a one-to-one relationship, one In the above example, the Customer record in a table is associated with one table is the “many” and the City table and only one record in another table. For is the “one”. Each customer can only example, in a company database, each be assigned one city,. One city can be employee has only one Person_ ID, and assigned to many customers. 25 Many-to-Many  Delete records from a database A many-to-many relationship occurs  Execute queries against a database when multiple records in a table are  Create stored procedures in a associated with multiple records in database another table.  Create views in a database. Multiple records in Table Product are linked to multiple records in Table  Do it yourself Suppliers.  Explain the purpose of SQL Product Supplier 2.10 Categories of SQL Commands Prod ID Supplier ID Description Description Price Address Data Definition Language (DDL) Supplier Telephone Commands Fig. 4 DDL statements or commands are used to define and modify the database 2.9 Introduction to SQL structure of your tables or schema. When SQL is Structured Query Language, you execute a DDL statement, it takes which is a computer language for effect immediately. storing, manipulating and retrieving data stored in a relational database. SQL is Data Definition Language the standard language for Relational (DDL) commands Database Management System. All COMMAND USED FOR relational database management systems like MySQL, Base, Oracle, Sybase, CREATE DATABASE Creates database Informix, Postgres and SQL Server use CREATE TABLE Creates a new table SQL as standard database language. ALTER TABLE Modifies a table SQL became a standard of the American DROP TABLE Deletes a table or National Standards Institute (ANSI) in 1986, and of the International DROP DATABASE Database Organization for Standardization (ISO) in 1987. Table: 3 DDL Commands Using SQL You Can : Data Manipulation Language (DML) Commands  Create new databases.  Create new tables in a database Data Manipulation Language (DML)  Insert records in a database statements or commands are used for managing data within tables.  Retrieve data from a database  Update records in a database 26 DCL is used to control user access Data Manipulation Language (DML) Commands in a database. it is related to security issue. it is also deals with the rights and COMMAND USED FOR permissions of the databse access. SELECT Extracts data from a table Data Control Language UPDATE Updates data in a table (DCL) commands DELETE Deletes data from a table COMMAND USED FOR INSERT Insert data into a table GRANT To provide access or INTO privileges on the database objects. Table: 4 DML Commands REVOKE To remove access rights or Data Control Language (DCL) privileges on the database Commands object. Table: 5 DCL Commands Summary  Basic concepts of database.  We get to know difference between Data and Information.  Database management system(DBMS) is used to create, manipulate and retrieve database.  DBMS is used in various fields like railway, library, schools, colleges, credit transactions, banking.  Benefits of DBMS are data sharing, data integrity, security, consistency, recovery.  RDBMS means relational database management system.  Relations in database are one to one, one to many or (many to one) and many to many.  Categories of SQL Commands : DDL, DML and DCL 27 Exercise Q. 1 Complete the following activity. Q. 2 Observe the field names of a 1. Tick whichever box is not valid. database given below in ‘Column A’ related to Bus reservation. Write suitable data types for each Graphic field in front of the respective field in ‘Column B’ Date Column A Column B Data type (Field Name) (Data Type) Number Passenger Name Age Text Gender Mobile Number Q. 3 Write the use of following SQL 2. Student wants to create a field command. pincode in a table, which data type he will choose ? Command Use INSERT ________________ 3. Tick the appropriate box. is also called UPDATE ________________ Primary key foreign key Uniquely identifies Q.4 Create a table for the information a record given below by choosing appropriate data types. Specify 4. Tick the appropriate circle. proper primary key for the table

Use Quizgecko on...
Browser
Browser