Professional Documents
Culture Documents
Session: 2021-2022
Class: IX
Chapter # 1
FUNDAMENTALS OF COMPUTER
1
FUNDAMENTALS OF COMPUTER - I
INTRODUCTION
COMPUTER
An advanced, electronic machine that takes raw data as input and processes it
under a set of instructions, gives results, and/or saves it for future use is called
computer.
Characteristics of a computer
1. It is a general-purpose machine.
2. It can store information and data for future use.
3. It can use its own saved data as input.
4. It can retrieve the saved data.
5. It produces accurate results.
6. It produces results based on the instructions given to it.
COMPUTER PROGRAM
The instructions given to a computer to perform a particular task is called a
computer program.
EVOLUTION OF COMPUTER
The evolution of computers means the advancement of computers over time and
its significance of future advancements.
ABACUS
1. Abacus was the earliest calculating device.
2. It was invented in China, nearly 5000 years ago.
Construction and working
1. It consisted of a wooden frame.
2. In it, parallel rods were joined.
3. Each rod had beads in it, which could freely slide up and down.
4. The calculation was performed using these beads.
2
FUNDAMENTALS OF COMPUTER - I
Usage
1. It was used in performing calculations based on addition, subtraction,
multiplication and division.
2. It has been in use till the 20th century.
N AP IER ’S BONE S
In 1614, a Scottish mathematician named John Napier invented the machine
called Napier’s bones. It could multiply, divide and find square roots of numbers.
Construction
1. It consisted of a wooden box.
2. The box contained rotating cylinders.
3. These cylinders had digits from 0 to 9.
PASCALINE
Blaise Pascal, a French Mathematician invented Pascaline in 1642.
Construction
1. It had rotating wheels.
2. Each wheel had ten parts having digits from 0 to 9.
3. Calculations were performed by the rotation of these wheels.
4. It had a number of small slots for displaying results.
5. It could perform addition and subtraction on whole numbers.
3
FUNDAMENTALS OF COMPUTER - I
SLIDE RULE
It was developed by William Oughtred in the 1920s. It was very useful for
solving problems of multiplication, and division.
Construction
1. It had three parts.
a. Slide
b. A rule and
c. A transparent sliding cursor.
MARK-I
It was invented in 1944 by Howard Aiken. Mark-I could add three numbers that have
eight digits in one second.
Construction
1. It was 50 feet long.
2. It was 8 feet high.
3. It weighed 5tons.
4. It used 3000 electric switches.
4
FUNDAMENTALS OF COMPUTER - I
CLOUD COMPUTING
Cloud Computing means storing and accessing data as well as programs over
the internet instead of a computer’s hard drive. This data can then be accessed from
anywhere in the world.
GENERATIONS OF COMPUTER
The history of computers runs from the ancient abacus and the analytical engine
of the nineteenth century, through the modern computers of the present age. It is
generally divided into five generations with respect to major technological
advancements of that time.
CHARACTERISTICS
First-generation computers were,
1. Build using vacuum tubes.
2. Very slow, as the memory was very small.
3. Huge in size, often taking up to entire rooms.
4. Very expensive to build and more expensive to maintain.
5. Very unreliable.
6. used to take print out through electric printer
7. Heat generators, and consumed a lot of power
5
FUNDAMENTALS OF COMPUTER - I
Characteristics
Second-generation computers were,
1. build using transistors
2. Smaller in size than the first generation of computers.
3. Computers became more reliable and cheaper
4. Used punched card readers, magnetic tapes, magnetic disks and printers
5. Assembly language, FORTRAN and COBOL languages were used.
Examples
UNIVAC II, IBM 7030
Characteristics
1. 3rd Generation used IC chips.
2. It improved the speed and memory of the computers
6
FUNDAMENTALS OF COMPUTER - I
3. Computers consumed lesser power, were smaller, cheaper and more reliable
than 2nd generation computers.
4. It used a keyboard and a mouse.
5. These computers could run multiple applications at the same time.
Examples
IBM System/360, System 3 and Burroughs 6700
Characteristics
1. Microcomputers were developed using a microprocessor.
2. 4th generation computers were very fast, reliable, consumed very little power
and had huge storage.
3. A large variety of softwares were available.
4. These computers support multimedia that can combine text, video, image and
sound.
5. They support a wide variety of portable and wireless devices.
Examples
AMD Athlon, Core i3, i5 and i7
Characteristics
1. 5th generation computers are based on Artificial Intelligence.
2. AI will minimize the need to write programs.
3. Allows humans to give command in any natural language.
Examples
ROBOTS and Expert systems.
7
FUNDAMENTALS OF COMPUTER - I
TYPES OF COMPUTERS
ANALOG COMPUTERS DIGITAL COMPUTER
1. Provides Continuous Values 1. Provides Discrete Values.
2. Represents values in the form of 2. Represents values in symbols or
waves numbers
3. Has many states 3. Has 2 states: ON and OFF
4. Special Purpose computer 4. General Purpose Computer
5. Only trained people can operate 5. Easy to Use
6. Very limited memory 6. Large memory
7. Very slow in processing 7. Faster in processing
8. Used in engineering and science 8. Used in a variety of fields
9. Used to calculate weight, 9. Used to calculate mathematical and,
temperature, speed etc. logical operations.
10. Less reliable 10. Very reliable
11. Example:- thermometer, analog 11. Examples:- Digital clock, laptops
clock
HYBRID COMPUTERS
1. A combination of analog and digital computers is called hybrid computers.
2. They combine the characteristics of both analog and digital computers.
3. Hybrid computers are mainly used for scientific applications.
4. These computers are used in spaceships, missile systems. Scientific research,
hospitals etc.
5. Vital Sign Monitoring Unit is used in hospitals to monitor patient's important
data such as blood pressure, temperature, respiration and heartbeat.
8
FUNDAMENTALS OF COMPUTER - I
c. Minicomputer and
d. Microcomputer.
SUPER COMPUTER
1. Supercomputers are designed with massive computing power.
2. They are the largest and most powerful computers.
3. They can handle very large databases
4. These computers are used for engineering and scientific purposes.
5. They have huge computational power.
6. These computers are used for nuclear research and weather forecasting.
7. Examples:- Deep Blue, CRAY-1,
8. The fastest Super computer is SUMMIT in the USA with a speed of 200
petaflops.
MAINFRAME COMPUTER
1. A mainframe computer is a very large, very powerful and expensive computer.
2. It can support hundreds and even thousands of users at the same time.
3. These computers are used in large organizations.
4. These are used in banking, insurance, education, air travel, research, health
care, government and many other public and private organization.
5. These computers can execute more than a trillion instructions per second
(TIPS).
6. Examples: - IBM’s z Enterprise EC12, EC 196, HP 16500 Series and HP Integrity
Superdome.
MINICOMPUTER
1. The minicomputer was introduced in the 1960s.
2. The Minicomputers used IC chips.
3. A minicomputer is bigger than a microcomputer but smaller than a mainframe.
4. These computers can execute billions of instructions per second (BIPS).
5. Therefore, they can process more data than microcomputers.
9
FUNDAMENTALS OF COMPUTER - I
MICROCOMPUTER
1. Microcomputers are the smallest and low-cost computers.
2. These computers are most commonly used in homes and offices.
3. Microcomputer uses microprocessors.
4. Microprocessors were developed in the 1970s.
5. A microprocessor is a single chip that controls the operations of the entire
computer system.
6. Modern microcomputers have large storage capacity and can execute millions
of instructions per second (MIPS).
7. A variety of software is available for use on these computers.
8. Microcomputers are available in various forms such as desktop, laptop and
tablet.
9. Examples:- IBM Lenovo, DELL XPS
ROLES OF COMPUTER
The computer has played a vital role in the current society, from social media to
defense production, the applications are limitless. Computers are playing an
important role in every walk of life. Some of the applications are as below.
BUSINESS
1. Computers are used in all types of businesses.
2. They are used to prepare business documents, reports, charts, presentations.
Invoices, etc.
3. They help in staying in contact with employees and customers.
4. They help in running business activities efficiently.
5. Some important business areas where computers are used are as follows
a. Banking
i. Computer technology has revolutionized the banking business.
Deposits and withdrawals are instantly logged into a customer's
account.
ii. Computer networks allow an amount of bill to be transferred
from the customer's bank account to the store.
iii. People can obtain cash anytime anywhere through Automated
Teller Machine (ATM)
b. Retail Stores
i. Bar code readers are linked to a computer system that is used to
read the bar code printed on each product sold to prepare the bill.
ii. With the use of computers at retail stores, the checkout process is
faster and the bill produced is accurate.
c. E-Commerce
i. Electronic commerce allows to sale products and services using
computer networks such as the Internet.
11
FUNDAMENTALS OF COMPUTER - I
d. Others
i. Computers are very helpful in running many other types of
businesses that include hotels, hospitals, schools, travel agencies,
real estate, stock exchanges. etc.
DEFENSE
1. There are various applications of computer technology in defense.
2. Computers are used in tanks, planes and ships to target enemy forces.
3. They help in tracking missiles and destroying them.
4. Modern defense weapons and other equipment are controlled by computers.
5. Computers are used for designing and testing weapons.
6. Computers are also used in communication systems in defense.
MEDIA
1. Computers have a lot of applications in print and electronic media.
2. Computer technology helps in the preparation and production of newspapers,
magazines, booklets and brochures, flyers, press releases and books.
3. Electronic media refers to broadcast media that includes radio broadcast cable
and satellite television broadcast and the new-age media like the Internet and
mobile devices.
4. The computer has enabled electronic media to a wider horizon.
MANUFACTURING INDUSTRY
1. Computer technology is widely used in the manufacturing industry.
2. It has improved the accuracy, quality and speed of manufacturing.
3. Computer-Aided Design (CAD) and Computer-Aided Manufacturing (CAM)
are used for product design and automation of manufacturing processes in
factories.
4. Computer-Aided Design (CAD): CAD involves the use of computer hardware
and graphics software to create product designs.
5. Computer-Aided Manufacturing (CAM): CAM involves the use of computers
in the planning and management of production operations.
6. It helps in automatically producing finished products.
12
FUNDAMENTALS OF COMPUTER - I
SOFTWARE ENGINEER:
A software engineer is responsible for the analysis, design, implementation and
maintenance of computer software. A software engineer can be further classified into
programmer and system analyst.
Programmer:
Computer programmers are IT professionals who have extensive knowledge and
expertise in programming languages. They program the computer by writing step-by-
step instructions that tell the computer what to do. Computer programmers write
programs to solve problems related to business, education, engineering, government
offices, hospitals, entertainment, etc.
System Analyst:
System analysts analyze the data processing requirements of organizations and
develop information systems to implement them. They investigate problems, plan
solutions and recommend the type of hardware and software required for
implementing the solution. They also coordinate with the programmers and database
administrators in developing information systems.
Hardware Engineer:
Hardware engineers design and manufacture computer hardware. Their work also
involves the repair and maintenance of computer hardware. They have in-depth
13
FUNDAMENTALS OF COMPUTER - I
knowledge of the internal working of computers, processors, circuit boards and other
electronic equipment.
Network Administrator:
Network administrators are responsible for the installation, configuration and
maintenance of computer networks in organizations. They are in charge of the
maintenance of computer hardware and software that make up a computer network.
They assign passwords to network users so that unauthorized people do not have
access to the network.
Database Administrator:
A database administrator is a person who is responsible for the design,
implementation and maintenance of a database in an organization. He is also
responsible for maintaining security and monitoring the performance of the database.
Web Designer:
A web designer is a person whose job is to plan and create websites. He designs web
pages that include text, images, sound, video clips and makes the website interactive.
HTML (Hypertext Markup Language) is the most commonly used language for
creating websites.
Multimedia Designer:
Multimedia designers are people who organize and present information in an easy to
understand and attractive manner. They combine text, graphics, animation, audio and
video. Multimedia designers create digital images and arrange them in sequence for
animation using computer software. They usually work in the film/TV industry,
computer software companies and advertising companies.
14
FUNDAMENTALS OF COMPUTER - I
Computer Teacher:
Computer teacher teaches the subject of computer science to students. He conducts
lessons on how to operate computers. He also teaches how to develop computer
programs using various programming languages.
COMPUTER HARDWARE
All the physical components of a computer system are called computer hardware.
INPUT DEVICES
All the devices used to feed data into the computer are known as input devices. Input
devices allow us to communicate with the computer. Some commonly used input
devices are keyboards, mouses, microphones, scanners, etc.
Keyboard
1. It is the main input device to communicate with the computer.
2. It allows the computer user to enter letters, numbers and special symbols into
the computer.
3. QWERTY layout is generally used all over the world.
4. It was designed to let people type as quickly as possible. This same layout is
nearly optimal for pure speed, as it tends to cause the fingers and hands to
alternate.
15
FUNDAMENTALS OF COMPUTER - I
Mouse
1. The mouse is a hand-held device used to control the movement of a cursor or
pointer on the screen.
2. It has two or three buttons at the front that allows the computer to make a
selection in the menu, draw graphics, or open files, folders and programs.
Joystick
1. A joystick is a pointing device with a vertical lever mounted on a base.
2. The lever usually includes buttons called triggers.
3. These triggers are activated when a certain event occurs.
4. Joysticks are mainly used for computer games.
MICROPHONE:
1. It is a device that allows the computer user to input audio into the computer.
2. It changes audio signals into electrical signals which are translated into digital
form by the sound card for processing in the computer.
Scanner:
1. It is a device that captures images from photographs, magazines, books etc. and
stores them on the computer in digital form.
2. These images can be edited, displayed on the screen or inserted in documents.
3. Many scanners also include Optical Character Recognition (OCR) software,
which can convert an image of text into a text file.
4. This file can be edited.
Barcode Reader:
1. It is a device that reads the barcode printed on products that represent product
code, description and price.
2. This information is used by the computer to print a bill for the customer.
16
FUNDAMENTALS OF COMPUTER - I
Digital Camera:
1. It is a device used to capture pictures and store them in digital form.
2. These pictures can be downloaded to a computer for editing, viewing or
inserting into documents.
Touch Screen:
1. It is a pressure-sensitive display screen.
2. It is used to interact with the computer by touching pictures or words with a
finger.
3. The touch screen is more commonly used with mobile phones and tablets.
17
FUNDAMENTALS OF COMPUTER - I
Touch Pad:
1. A touchpad is also an input device used in laptops and multimedia keyboards.
2. As the user moves his finger on the surface, the mouse cursor moves in that
direction.
SYSTEM UNIT
1. The system unit is the main part of the computer.
2. It includes,
a. Motherboard,
b. Power supply and
c. Drives inside the computer casing.
3. All the input/output devices of a computer are connected to the system unit
through the ports.
Motherboard:
1. The motherboard is the main circuit board inside the system unit.
2. It contains,
a. Microprocessor,
b. Main Memory,
c. Expansion Cards,
d. IC Chips,
e. Connectors And
f. Other Electronic Components.
3. It has many buses printed on it.
4. Buses are used to transmit information between various components of the
computer.
5. All the input/output is connected to the motherboard.
Microprocessor:
1. A microprocessor is the main chip on the motherboard.
2. It controls all the activities of the computer. It is also known as Central
Processing Unit (CPU) or simply processor.
18
FUNDAMENTALS OF COMPUTER - I
3. It contains Control Unit (CU), Arithmetic Logic Unit (ALU) and registers.
ALU (Arithmetic Logic Unit):
1. ALU is the part of the computer that performs all the calculations and
comparisons.
2. It consists of an arithmetic unit and a logic unit.
a. Arithmetic Unit: It performs all the arithmetic operations such as
addition, subtraction, multiplication and division.
b. Logic Unit: The logic unit performs logical operations which include
comparisons of numbers or alphabets.
Control unit:
1. It controls the operations of all the components of the computer.
2. It controls the working of all the input/output devices, storage devices and
ALU.
3. CU loads programs into memory and executes them.
4. It consists of very complicated circuits.
Registers:
1. Registers are small memory units inside the microprocessor.
2. It is used to temporarily store some information during the execution of a
program.
3. Some commonly used registers are Instruction Register, Accumulator Register,
Data Register and Memory Address Register.
STORAGE DEVICES
1. Storage devices are used to store programs and data that are not currently used
by the computer.
2. They have a huge storage capacity.
3. Therefore, they are also known as mass storage devices or secondary memory.
4. Hard disk is the most commonly used storage device.
5. It is fixed inside the system unit.
6. Portable storage devices are CD, DVD, memory cards and USB flash drive.
19
FUNDAMENTALS OF COMPUTER - I
7. Portable storage devices have less storage capacity than hard disk but they are
cheap and easy to carry.
Hard disk:
1. A hard disk is a magnetic storage device.
2. It is used to store data.
3. It has storage capacity of hundreds of Gigabytes (GBs).
4. It is fixed inside the computer casing.
5. Portable hard disk are also available.
6. Portable Hard disk is attached to USB ports.
CD:
1. CD stands for Compact Disk.
2. It is a portable optical storage device with a storage capacity of 700 Megabytes
(MBs).
3. A CD is 1.2 millimeter thick with a diameter of 120 millimeters.
4. CD drive is used to read data from or write data to a CD.
DVD:
1. DVD stands for Digital Versatile Disk.
2. It has the same thickness and diameter as CD.
3. DVD has more storage capacity than CD.
4. Its storage capacity is in the range of 4 to 16 GB.
5. A DVD writer is installed in the computer to read data from or write data to a
DVD.
6. A CD can also be used in a DVD writer.
Memory Card:
1. Memory card is a small storage device having storage capacity of few
Gigabytes.
2. It is available in different sizes and storage capacities.
20
FUNDAMENTALS OF COMPUTER - I
3. Memory cards are generally used in laptop computers and portable devices
such as mobile phone and digital camera for storing pictures, audio and video.
OUTPUT DEVICES:
1. Output devices are used to display text, graphics and images on the monitor or
to print information on paper.
2. Information is played on monitor is known as softcopy.
3. Anything printed on paper is known as hardcopy or printout.
Monitor:
1. It is an output device that has a screen on which information is displayed
2. It has two common types i.e.
a. CRT (Cathode Ray Tube) monitor
b. LCD (Liquid Crystal Display) monitor.
3. CRT is very similar to old television. It is almost obsolete due to its big size and
low display quality.
4. LCD is slim, uses less power and has better display quality than CRT monitor.
Printer:
1. Printer is an output device.
2. It prints graphic and text on paper which is called hard copy.
3. There are two types of printers
a. Impact Printers And
b. Non-Impact Printers.
21
FUNDAMENTALS OF COMPUTER - I
PLOTTER
1. Plotter is an output device used for printing engineering drawings, machine
parts, building designs, maps, and panaflexes etc. on large size papers/sheets.
2. Such large size printing is not possible on printers.
3. It is more expensive than printer.
4. There are two types of plotters. I.e. Ink and Pen Plotter.
5. Ink plotter is used for printing images whereas pen plotter is used for printing
engineering drawings, machine pans, building designs, etc.
6. Plotter is a slow output device but its printing quality is good.
Speaker:
1. Speaker is a device used to produce audio output.
22
FUNDAMENTALS OF COMPUTER - I
MEMORY
1. Memory unit stores data and programs that are being executed.
2. It also stores the results produced by the ALU after processing the data.
3. Types of memories:
a. ROM (Read Only Memory) and
b. RAM (Random Access Memory).
RAM ROM
1. RAM Stands for Random Access 1. ROM stands for Read Only Memory.
Memory.
2. It is a volatile memory. 2. It is a non-volatile memory
3. The data is lost when the power is off 3. The data does not get lost when the
power is lost
4. Stores information temporary 4. Stores information permanently
5. Requires flow of electricity to retain 5. Does not require flow of electricity to
data retain data
6. Large size with higher capacity 6. Small size with less capacity
7. Used for both read and write 7. Used only for reading
8. Costlier 8. Cheaper than RAM
9. Very fast but uses a lot of power 9. Fast but uses very little power
10. It is user programmable 10. It is manufactured programmed
11.Programs are loaded in RAM before 11. BIOS and boot-up process are stored
execution. in ROM
12.Used in CPU cache, primary memory 12. Used in firmware,
microcontrollers
13.There are two types of RAM 13. There are four Types of ROM.
23
FUNDAMENTALS OF COMPUTER - I
Cache memory
1. Cache is extremely fast memory inside the microprocessor.
2. It is faster and more expensive than RAM.
3. Cache Memory stores information that is most frequently used by the
computer.
4. The purpose of using cache is to improve the processing speed of computer.
5. There are three types of cache memories which are:
a. Level 1 (L1),
b. Level 2 (L2) and
c. Level 3(L3)
6. L1 cache is built inside the microprocessor whereas L2 and L3 are on the
motherboard.
7. L1 cache is faster than L2 and L3 cache.
24
FUNDAMENTALS OF COMPUTER - I
EXPANSION SLOTS
1. Expansion slots are long narrow sockets on the motherboard used for installing
expansion cards.
EXPANSION CARDS:
1. Expansion cards are small circuit boards.
2. These cards add new capabilities to the computers.
3. Commonly used expansion cards are sound card, graphics card, modem card
and network card.
4. In modern computers these cards are built-in.
25
FUNDAMENTALS OF COMPUTER - I
b. Processing operation,
c. Storage operation and
d. Output operation
STORAGE
INPUT OPERATION:
1. Users enter data and instructions into the computer through keyboard or
mouse.
2. It can also be provided to the computer from a storage device.
3. The input data/instructions are stored in memory for further processing.
PROCESSING OPERATION:
1. Microprocessor processes the data according to the instruction given to it.
2. The microprocessor fetches the data/instructions from the memory and stores
it in instruction register.
3. The control unit then decodes the instruction to find out which operation is to
be performed.
4. After decoding the instruction, it sends signals to other parts of the computer
to execute it.
STORAGE OPERATION:
1. The results produced after processing are stored in memory before they are
sent to the output device or permanent storage device like hard disk.
26
FUNDAMENTALS OF COMPUTER - I
OUTPUT OPERATION:
1. The results of data processing stored in memory must be output so that they
can be seen by the user.
2. The control unit displays the results on the monitor or prints it on the printer.
3. Results can also be saved in a storage device such as hard disk for use in the
future.
COMPUTER SOFTWARE
Computer software are classified into two categories,
a. System software
b. Application software
SYSTEM SOFTWARE:
1. System software is a collection of programs which makes the use of computer
easy and efficient.
2. Highly experienced computer programmers develop system software.
3. There are four types of system software.
a. Operating system,
b. Utility programs,
c. Device drivers and
d. Language processors
Operating System
1. An operating manages and coordinates all the activities performed by the
computer.
2. The most popular operating system used in microcomputers is the Windows.
3. Operating system performs the following tasks.
a. It loads programs into memory and executes them.
b. It controls the operation of input/output and storage devices.
c. It manages files and folders.
d. It allows to create password to protect computers from unauthorized
use.
27
FUNDAMENTALS OF COMPUTER - I
Device Drivers:
1. A device driver is system software that controls the operation of a computer
device.
2. When users attach a device for the first time, they should install its driver to
make it operational.
3. Device drivers are provided by device manufacturers.
Utility Programs:
1. Utility programs perform specific tasks that are related to the management of
the computer.
2. Some commonly used utility programs:
a. Windows Explorer: It is used to manage files and folders.
b. Backup Utility: It is used to make backup of data.
c. WinZip Utility: It is used to compress files.
d. Diagnostic utility: It is used to detect hardware and software problems
e. Antivirus software: It is used to detect and remove viruses.
Language Processors:
1. A language processor is a system program used to translate computer
programs into machine language.
2. Machine language is directly understood by the computer. Therefore, all the
programs must be translated into machine language before execution.
3. Compiler and interpreter are language processors used to translate high level
language programs into machine language.
4. A program called assembler is used to translate assembly language programs
into machine language.
APPLICATION SOFTWARE:
1. Application software is developed for computer users to solve their problems
such as preparing a letter, creating a presentation or managing a database.
2. Commonly used application software includes
28
FUNDAMENTALS OF COMPUTER - I
a. productivity software,
b. business software,
c. entertainment software and
d. education software
Productivity Software:
1. Productivity software includes word-processing, spreadsheet and database
management software packages.
2. These software packages are used by individuals to speed up their daily routine
tasks by doing their work in an organized and efficient way.
Business Software:
1. Any software that helps in running business in a more efficient way to improve
productivity is known as business software.
2. Some examples of business software are
a. Accounting,
b. Sales And Marketing,
c. Inventory Control,
d. Project Management And
e. Payroll Software.
Entertainment Software:
1. Software developed to entertain people is known as entertainment software.
2. Video games are one of the most popular forms of entertainment software.
3. Many games are lot of fun to play but sometimes they can also help to improve
skills such as typing or reading.
4. The term edutainment merges games and education software into single
software.
5. Edutainment software is used mainly for entertainment but it educates as well.
Education Software:
1. Software developed for educational purpose is known as education software.
29
FUNDAMENTALS OF COMPUTER - I
SHAREWARE:
1. Shareware is distributed free of cost for a limited period.
2. It is trial version of software given to people to decide whether they would like to
buy the full version of the software. Some shareware is installed on new computers
when they are sold.
3. Examples of shareware:
a. antivirus software and
b. Computer games, etc.
Freeware:
1. Freeware is given free of cost and it is full version of software for an unlimited
period of time.
2. Examples of freeware:
a. Google Chrome,
b. Mozilla Firefox and
30
FUNDAMENTALS OF COMPUTER - I
EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
I. B
II. B
III. D
IV. C
V. B
VI. D
VII. C
VIII. A
IX. B
X. A
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Describe Napier's Bone and Slide Rule. See page 3 & 4.
II. Compare 1st and 3rd generation computers. See page 5 & 6.
III. Differentiate between analog and digital computers. See page 7.
IV. Ahmed, a class IX student is asking his father to replace his home computer
CRT monitor with LCD monitor. How will you justify his demand?
Replacing monitor with LCD is better because,
1. LCD consumes lesser power.
2. LCD has better display quality.
3. LCD has very less effect on eyes.
4. Furthermore, CRT is no longer available as new.
V. What will happen if storage devices are removed from a computer?
Storage devices are used to store installed programs and data that are not being
used at the time. Removing the storage devices shall result in not functioning
of computer.
31
FUNDAMENTALS OF COMPUTER - I
32
FUNDAMENTALS OF COMPUTER - I
a. mobile phones,
b. microwave ovens,
c. cameras,
d. washing machines,
e. Televisions, etc.
X. What are the tasks performed by operating system? See page 26 point 3
33
Class: IX
Chapter # 2
FUNDAMENTALS OF OPERATING
SYSTEM
FUNDAMENTALS OF OPERATING SYSTEMS - II
INTRODUCTION
Operating system is a collection of system software that controls the working of
computer system. It acts as an interface between the computer user and computer.
Process Management
1. Process management is an essential part of operating system (OS).
2. A process is a program in execution.
3. Multiple processes are executing concurrently or waiting for their turn to be
executed.
4. The OS must allocate resources to processes, enable processes to share and
exchange information, and protect the resources of each process from other
processes.
Memory Management
1. Memory management is the process of allocating memory space for user
programs in main memory.
35
FUNDAMENTALS OF OPERATING SYSTEMS - II
2. When programs are run by users, the operating system allocates portions of
free memory to programs.
3. When a program is closed, operating system will free the memory portion used
by that program for reuse.
File Management:
1. File management system is part of operating system that organizes, stores and
keeps track of computer files and folders.
2. Computer files can be documents, programs, images, videos, etc.
3. Operating system controls creating, opening, editing, renaming, moving,
copying, deleting and searching files.
Resource Management:
1. The resources of a computer include microprocessor, memory and all the
devices attached to the computer.
2. Operating system automatically manages the resources of a computer when
application programs are executed by the user.
3. Operating system allocates resources of a computer to the application program
according to the user's requirement in an efficient way to improve the
performance of the computer.
User Management:
1. User management is an important feature of operating system for maintaining
a secure computer system.
36
FUNDAMENTALS OF OPERATING SYSTEMS - II
2. The operating system gives full control over a computer system to a person
known as administrator.
3. Administrator allows the users to run various application programs that are
installed on the computer.
4. A user can login to the computer system by entering the username and
password, run programs and save his files in his personal folder.
5. Operating system does not allow the users to install programs or create new
users.
DOS
1. DOS was the most popular CLI operating system.
2. DOS displays the prompt (C :\>) to enter commands.
3. User must know the syntax of the command.
4. DOS commands are difficult to remember.
5. Some DOS commands are still-supported by the new Windows operating
system.
6. It is a single user and single task operating system.
37
FUNDAMENTALS OF OPERATING SYSTEMS - II
ProDOS:
1. ProDOS was another menu-driven operating system.
2. It was used on some Apple computers.
4. Icon is a graphical symbol that represents a file, folder, program, device, etc.
5. To perform a task, the user has to select icons or make choices in menus using
a pointing device such as mouse.
6. The following are the advantages of GUI.
a. Much easier to learn and use.
b. No need to memorize the commands.
c. Allows users to run more than one program at the same time.
d. Most of the GUls provide good help facilities.
e. Many application programs also use a similar interface so it is easy to
use a new program
7. The following are the disadvantages of GUI.
a. Takes up lot of memory.
b. Needs faster computer as compared to other interfaces.
c. Examples: - Macintosh, Linux and Windows.
Macintosh
1. Mac OS is a series of operating systems developed by Apple Incorporation for
their Macintosh computers.
2. It was introduced in 1984.
3. The latest version is Mac OS X.
4. It is a UNIX based user-friendly operating system.
5. There are some specialized versions of Mac OS X used on devices such as
iPhone, iPod, iPad and new Apple TV.
39
FUNDAMENTALS OF OPERATING SYSTEMS - II
40
FUNDAMENTALS OF OPERATING SYSTEMS - II
OPERATING SYSTEM
SINGLE-USER OPERATING MULTI-USER OPERATING
SYSTEM: SYSTEM:
1. Operating system, used by a single 1. Operating system that allows many
user ·at a time is known as single user users at the same time is known as
operating system. multi-user operating system.
2. It allows a single user to login 2. It allows many users to login into a
big computer
3. Many Programs can be run by a user 3. It can run different programs at the
same time.
4. Resources of the computer are not 4. It shares the resources of the
shared with other computers computer with other users over the
network.
5. User Management is very difficult. 5. A person known as administrator
assigns and manages usernames and
passwords.
6. It is used on microcomputers. 6. It is used on minicomputer and
mainframes.
7. It requires less memory and costs less. 7. It requires a powerful CPU, large
memory and large hard drives
8. Examples:- DOS, Windows XP 8. Examples:- Windows Server, UNIX,
LINUX
41
FUNDAMENTALS OF OPERATING SYSTEMS - II
Batch Processing
1. In a batch processing system, jobs are grouped in batches and the computer
executes them one by one.
2. When the current job terminates, the computer automatically loads the next job
and starts executing it.
3. Batch processing operating systems greatly improved the use of computer
system.
4. Batch processing systems are suitable for tasks where large amount of data has
to be collected and processed on a regular basis.
5. Example:- in examination report card system, all the data of student's
examinations is collected and processed as a batch for printing report cards.
Time-Sharing System:
1. Timesharing system is a feature of operating system in which multiple users
can run different programs on a large-scale computer.
2. It allows many users to have access to a computer at the same time and share
the computer's time.
3. In a time-sharing system, the central processing unit is switched rapidly
between the programs so that all the user programs are executed
simultaneously.
4. The operating systems used in minicomputers and mainframe computers
support timesharing.
5. Example: - hundreds of students access the university's mainframe computer
at the same time and they run different programs in a timesharing system in
interactive mode.
Real-Time System:
1. Real time operating systems must process information and produce a response
within a specified time.
2. These operating systems are developed for special applications.
3. These are used to control industrial processes such as oil refining.
42
FUNDAMENTALS OF OPERATING SYSTEMS - II
4. Real time operating systems are used to supply immediate response within
limited time.
5. For example, a measurement from an oil refinery indicating that temperatures
are getting too high might demand quick response to prevent an explosion.
6. Real-time operating system is used to monitor the position of rocket in the
space.
Recycle Bin:
1. It is a temporary place (folder) for items that the user deletes from the hard
disk.
2. When a file or folder is deleted from a hard disk it goes to the Recycle Bin.
3. The user can restore it to its original location.
4. User can also delete a file or folder permanently from the Recycle Bin.
43
FUNDAMENTALS OF OPERATING SYSTEMS - II
Computer Icon:
1. Computer icon allows the user to access the contents of computer drives and
manage files and folders.
2. When user double-clicks on Computer icon, it will open a window that displays
the drives present in the computer.
Folder Icon:
1. Folder icon resembles a physical file folder.
2. It is used to store files.
3. A folder can have another folder inside it which is known as subfolder.
4. Folders are used to keep files in an organized manner on a storage device such
as hard disk so that they can be accessed easily.
File Icon:
1. In a GUI, files are also represented by icons.
2. A file may contain text, image, music or video.
3. Users recognize a file by its icon.
Program Icon:
1. Executable program files are also represented by icons.
2. Different graphical symbols are used for different program icons.
Shortcut Icon:
1. Shortcut icons are created to access a program, file or folder quickly.
2. They have an arrow at the bottom left corner and the name below it.
44
FUNDAMENTALS OF OPERATING SYSTEMS - II
4. The Document folder in Windows is the default folder where the user saves
files.
5. File management tools of GUI operating system provide facilities to quickly
and easily create folders and copy or move files into them.
6. It also allows the user to delete files and folders that are not needed any more.
45
FUNDAMENTALS OF OPERATING SYSTEMS - II
EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. B
ii. A
iii. C
iv. D
v. B
vi. B
vii. D
viii. B
ix. C
x. B
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Why operating system is important software for a computer? Give any five
reasons.
Operating System in an essential software in the computer because it,
1. Manages I/O Devices,
2. Controls Users,
3. Manages Files,
4. Execute Processes and
5. Handles Memory
46
FUNDAMENTALS OF OPERATING SYSTEMS - II
V. What difficulties a student may face if he/she is not familiar with the
operating system of a computer?
A student may face following problems if he/she s not familiar with operating
system. He cannot,
1. Boot up a computer.
2. Install new applications.
3. Manage files and folders
4. Run utility programs
5. Make data secure
VI. Define UNIX and Windows operating system. See pages 37&39
VII. Differentiate between single-user and multi-user operating systems. See
page 39
VIII. What is meant by managing data and why is it important? See page 44
IX. What is meant by resources of computer? See page 35
X. What types of problems may a student face if no antivirus is installed in
his/her computer system.
In case there is no antivirus installed on the computer, it may result in,
1. Attack from viruses
2. Deletion of files
3. Corruption of files
4. Loss of data
5. Slowing of computer speed
6. Theft of personal information
7. Adware flooding the system.
Q3. WRITE LONG ANSWERS OF THE FOLLOWING QUESTIONS
1. Explain the main functions of operating system. See page 34-36
2. Describe the following computer Interfaces. See page 36
a) Command Line Interface
b) Graphical User Interface
c) Menu-driven Interface
3. Describe the following types of operating systems. See Page 40
a) Batch Processing System
b) Time-sharing System
c) Real-time System
4. Describe the basic icons of Windows operating system. See Page 42
47
Class: IX
Chapter # 3
OFFICE AUTOMATION
OFFICE AUTOMATION - III
OFFICE AUTOMATION
Office Automaton refers to technology used for creation, storing, processing and
communicating information for accomplishing basic tasks performed in offices. The
system that facilitates office automation is known as Office Automation System (OAS).
EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. B
ii. D
iii. C
iv. D
v. C
vi. B
vii. A
viii. C
ix. C
x. B
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. What is a word processor? Write some advantages of it over a typewriter.
i. Word processor is a computer application software.
ii. It is used for the creation of different types of documents on computer.
iii. Word processor allows user to delete, modify and rearrange document
without retyping any of the existing text.
iv. Commonly used word processors are MS Word, Open Office.
II. Name any three types of documents which can be prepares in Word.
Word processing programs can be used to create many types of documents
such as letters, reports, resumes, newsletters, memos flyers, etc.
49
OFFICE AUTOMATION - III
Header appears at the top of a page and footer appears at the bottom of a page.
The type of information that may appear includes book title, document title,
chapter number and title, page number, company name, etc.
50
OFFICE AUTOMATION - III
II. Write the mouse commands used for selecting various items is a Word
document such as single word, sentence, paragraph, etc.
To move or copy words, sentences or paragraphs to another location in the
document, first select the text and then use cut-and-paste or copy-and-paste
technique. Commands used for selecting various items in a document with
mouse are given below.
52
OFFICE AUTOMATION - III
53
Class: IX
Chapter # 4
DATA COMMUNICATION
DATA COMMUNICATION - IV
DATA COMMUNICATION
Data communication is the transmission of data between two points.
Data Transmission:
Data transmission means sending information from one place to other using computer
networks and data communication systems. It also means sending stream of bits or
bytes from one place to another using copper wire, Fibre optics, satellite
communication etc.
Analog and Digital Signals:
A signal is a variation of physical quantity with time.
An electrical signal is a change in voltage or current with time.
Electrical signals can be divided into two main types, analog and digital signals.
Analog Signals Digital Signals
It is in continuous form These are in discrete form
It varies continuously within a range They switch between two discrete, low
and high voltage level.
Represented by sine waves Represented by square waves
It has many states It has only two states
Example:- Human Voice Example:- Computers, Optical Drives
55
DATA COMMUNICATION - IV
(3) Message
(5) Protocol
Sender: It is the device which sends the message. It is the source of message that can
be a computer, telephone handset, etc.
Receiver: It is the device which receives the message. It is the destination of message
that can be a computer, radio, telephone handset, etc.
Message: It is the data to be transmitted. It can be text, graphics, image, sound or
video.
Transmission Medium: It is the physical pathway over which the message is sent
from sender to receiver. Some examples of transmission media are coaxial cable, Fibre
optic cable, microwaves, etc.
Protocol: It is the set of rules between the two communicating devices that governs the
process of data communication. Without a protocol, two devices may be connected but
they cannot communicate with each other.
56
DATA COMMUNICATION - IV
Delivery:
1. Data communication system must deliver the message to the correct destination.
2. Message must be received by only the device or user to whom it is sent.
3. For example, when e-mail is sent to a person, it is received only by the person.
4. This is managed by the protocol used in the data communication system.
Accuracy:
1. System must deliver the message accurately without any change.
2. Incorrect data is not usable by the receiver.
3. For example, data may get corrupted due to transmission errors over long
distances. Such data is retransmitted from the source. This is ensured by the
protocol used in the data communication system.
Timeliness:
1. The system must deliver the data without significant delay in a timely manner.
2. It is very important in real time transmission such as video conferencing.
3. Data delivered late may be useless.
4. Some real time systems require immediate transmission of data within limited
time.
5. For example, a computerized real time system is used to monitor the
temperature in an oil refinery. If the temperature is gets too high, it must be
transmitted immediately preventing an explosion.
57
DATA COMMUNICATION - IV
Synchronous Transmission:
1. When time interval between the characters is always the same, it is known as
synchronous transmission.
2. In synchronous transmission, there is no control information added with the
characters.
3. Data consisting of 0s and 1s is transmitted as one long stream of bits.
4. The receiver counts the bits as they arrive and recognizes the characters.
5. Synchronous transmission is faster because it does not require extra start and
stop bits.
6. It is used for fast data communication between computers in computer
networks.
7. Example: - Weather Report, Data from Stock Exchanges and Online Gaming.
58
DATA COMMUNICATION - IV
TRANSMISSION MEDIA
Transmission media provide the means by which data travels from source to
destination. It is the pathway for transmitting data.
GUIDED MEDIA
Guided media uses cabling system that guides the data signals along a specific path.
Types of guided media are:-
1. twisted pair,
2. coaxial cable and
3. Fibre optic cable.
Twisted pair cable:
1. Twisted pair cable is the most commonly used cable for data communication.
2. It consists of pairs of copper wires twisted around one another.
3. The purpose of twisting the cables is to reduce cross talk, electromagnetic
interference, thus making the transmission more reliable.
4. Telephone cable consists of two twisted insulated wires.
5. Computer network cable consists of 4 pairs of twisted cables
6. Transmission speed of twisted pair cable ranges from 2 million bits per second
to 10 billion bits per second.
Coaxial cable:
1. Coaxial cable is mainly used for local area networks and cable television
systems.
2. It consists of copper wire surrounded by insulating layer.
3. The insulating layer itself is surrounded by conductive layer.
4. Insulation reduces interference and distortion.
59
DATA COMMUNICATION - IV
5. Transmission speed ranges from 200 million bits per second to more than 500
million bits per second.
UNGUIDED MEDIA
Unguided media do not use cables for data transmission. Signals travel through
open space and nothing guides them along any specific path. Unguided media
can be classified into:
• Radio waves,
• Microwave,
• Infra-red,
• Bluetooth and
• Satellite communication.
Radio Waves:
1. Data can be transmitted over long distance using radio waves.
2. Radio waves are electromagnetic waves that are transmitted by antennas.
3. These waves are invisible and undetectable to human beings.
4. Radio transmission uses a transmitter and a receiver.
5. A transmitter transmits a radio signal and the receiver receives it.
6. Radio waves are used to transmit music, conversation, pictures and data.
60
DATA COMMUNICATION - IV
7. Examples:-
a. Radio and television broadcast
b. Cell phone communication
c. Radio-controlled toys
d. Satellite communication
e. Wireless networks and wireless Internet
Microwave:
1. Microwave signals travel through open space like radio waves.
2. Microwaves provide much faster transmission rate than telephone lines or
coaxial cables.
3. Microwave antennas are installed on high buildings or high towers.
4. The transmitting and the receiving sites must be within sight of one another.
5. Microwaves are used for satellite communication and other long distance
wireless communications.
6. Examples:-
a. Backbone links for ISPs and WISPs.
b. Building to building and campus sites
c. Television Broadcast with HDSDI and SMPTE standards.
Infra-red:
1. Infra-red waves are light energy that we cannot see.
2. It travels through space at the speed of light.
3. It is used for short distance communication.
4. Infra-red waves are used in remote controls.
5. Infra-red wireless signals are disrupted by persons or objects in between the
transmitter and receiver.
6. It does not get interference of other radio signals.
7. Examples:-
a. Remote Controls for TV, Music Players and Fans Etc.
b. Night Vision Devices.
c. industrial, scientific and medical appliances
61
DATA COMMUNICATION - IV
Bluetooth:
1. Bluetooth is a wireless communication technology that uses radio waves to
connect portable electronic devices over short distance.
2. It eliminates the need for cable connection and provides fast and reliable
transmission.
3. It supports networking of wide range of portable devices.
4. The most common use of Bluetooth is connecting a mobile phone to a
wireless headset or to a laptop computer to transfer voice data.
5. Bluetooth technology can transmit text, image, voice and video.
6. Example:-
a. mobile phone,
b. mouse,
c. keyboard,
d. wireless speaker and
e. Personal computer etc.
Satellite:
1. A satellite is placed in an orbit around the earth.
2. It revolves around the earth.
3. It is a wireless Receiver and Transmitter used for transmitting data over
long distance at high speed.
4. Ground stations beam signals to satellites.
5. Satellites amplify and retransmit the signals to another ground station many
thousands of miles away.
6. Satellite communication is high cost.
7. Satellites are launched by rockets or space shuttles.
8. It exactly matches with the rotation speed of the earth.
TRANSMISSION IMPAIRMENTS:
1. The errors that occur during data communication from one point to another
are called transmission impairments.
62
DATA COMMUNICATION - IV
Attenuation:
1. Attenuation is the fall of signal strength with the distance as signal travels
through the communication media.
2. If the attenuation is too much, the receiver may not be able to detect the
signal at all.
Amplification:
1. Amplification refers to strengthening of signal to solve the problem of
attenuation in data transmission.
2. An amplifier is a device used in data communication that receives weak
signals, amplifies it and then retransmits.
Distortion:
1. Distortion refers to change in shape or frequency of digital signal.
2. Communication line delays the signal frequency.
63
DATA COMMUNICATION - IV
Cross Talk:
1. Cross talk occurs in guided media.
2. As signal is transmitted through a wire, undesired signals enter the path of
the transmitted signal due to electromagnetic radiat1on.
3. It is caused because of putting several wires together in a single cable.
4. Sometimes, user can hear another conversation in the background when
talking on the phone.
5. This happens by the coupling between two wires that are close to each
other.
COMMUNICATION DEVICES
A communication device is hardware that is used for transmission of information from
one place to another between computers and other devices. The following
communication devices are commonly mostly used.
• Dial-up Modem
• Router
• Network Interface Card
• Switch/Access Point
DIAL-UP MODEM
1. Modem is abbreviation of Modulator-Demodulator.
2. A modem convers digital computer signal to analog form for transmission over
telephone line.
64
DATA COMMUNICATION - IV
ROUTER:
1. Router is a communication device that is used when two networks have to be
connected for communication.
2. They send information from one network to another by selecting the best
pathway available.
3. There are two types of routers
a. Wired and
b. Wireless.
65
DATA COMMUNICATION - IV
COMMUNICATION TERMINOLOGIES
Communication Terminologies refers to terms or words that are related with data
transmission or characteristics of communication channel.
Data Rate:
1. Data rate is the speed with which data can be transmitted from one device to
another.
2. It is generally measured in Kilobits (thousand bits) or Megabits (million bits)
per second.
3. kbps, is used for kilobits per second and mbps for million bits per second.
Baud Rate:
1. baud rate is measure of the speed of communication over a data channel.
OR,
2. It is also defined as,
“Baud is the rate of change of electrical signals per second during data
communications.”
Bandwidth:
1. The amount of data that can be transmitted within a fixed amount of time is
called bandwidth.
OR
2. Bandwidth describes the overall data transmission capacity of a medium or
channel.
3. Bandwidth is also measured in bits per second like data rate.
Signal-to-Noise Ratio:
It means the ratio of useful data transmission to errors caused by noise over a
transmission medium. The measurement of Signal-to-noise ratio defines the data
transmission quality of a communication medium.
66
DATA COMMUNICATION - IV
EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. B
ii. A
iii. D
iv. C
v. B
vi. C
vii. D
viii. C
ix. B
x. B
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Differentiate between analog and digital signals. See page 53
II. Why digital signals are used in computer systems?
The computer system handles only binary 0 and 1. The digital signals represents
0 as low voltage and 1 as high voltage. This stream can be easily transmitted
across the computer system. Moreover, digital signals have only discrete
values.
III. Name the properties of a good communication system. See page 54
IV. Give any three reasons why guided communication medium is more reliable
than unguided medium.
V. What is meant by transmission impairment? See page 60
VI. Differentiate between attenuation and distortion. See page 66
VII. What is cross talk? See page 62
VIII. What is Dial-up modem? Why is it used? See page 62
IX. Define data rate and baud rate. See page 64
X. Define bandwidth. See page 64
67
DATA COMMUNICATION - IV
Attenuation Distortion
1. It is the power loss of signal due to 1. It is the attenuation of original
long distances signal
2. It occurs due to refraction, 2. This happens due to the
electromagnetism and diffraction properties of the medium
3. Removal of effects of attenuated 3. Removal of distorted signal is
signals is easy. very difficult.
68
Class: IX
Chapter # 5
COMPUTER NETWORKS
COMPUTER NETWORKS - V
INTRODUCTION TO NETWORKS
A computer network is interconnection between computers and devices to provide
facilities among users to exchange information and share resources. These resources
can be programs, documents, printers and Internet connection.
COMPUTER NETWORK
A computer network can be defined as an interconnection of two or more computers
to share data and other resources such as documents, printers and internet connection.
Example:-
Computer 2
Switch
Computer 1 Server
Computer 3
USES OF NETWORKS
The following are some common uses of networks.
• Hardware Sharing
• Software Sharing
• File Sharing
• Internet Sharing
Hardware Sharing:
1. Network allows sharing of computer hardware such as hard disk and printer.
2. A single large hard disk can provide storage space to many users.
3. Every user on a network can use a shared printer for printing documents and
there is no need to buy a printer for every user.
70
COMPUTER NETWORKS - V
Software Sharing:
1. Application software can be installed on a server and shared over the network.
2. Hundreds of users can use it at the same time.
File Sharing:
1. A user of a network can easily share files with other users over the network.
2. Users can access, view and modify information stored on another computer in
the network.
Internet Sharing:
1. A single high speed Internet connection can be shared with all the users over a
network.
2. There is no need to provide a separate Internet connection to every user on the
network.
Printer
Computer
71
COMPUTER NETWORKS - V
ATM Machine
Computer
Computer Computer
NETWORK ARCHITECTURE:
Network architecture refers to layout of network devices.
A computer network can be as small as two computers linked together by a single
cable whereas large networks connect thousands of computers and other devices.
72
COMPUTER NETWORKS - V
Client/Server network
1. A Server is a main computer in a network which is used to manage network
resources and facilitates other computers.
2. Clients are computers in a network that access services made available by a
server.
3. In a client/server network, each computer on the network acts as either a server
or a client.
4. Servers are not used as client computers and client computers are not used as
servers.
5. In a client/server network, server shares its resources such as hard disk,
printers and Internet connection with client computers.
Computer 2
Server
Computer 1 Computer 4
Computer 3
Peer-to-Peer Network
1. In Peer-to-Peer network every computer is capable of playing the role of client,
server or both at the same time.
2. Each computer on the network is known as peer.
73
COMPUTER NETWORKS - V
3. A peer on the network can share as well as access available resources on the
network.
Computer 2
Computer 1 Computer 4
Computer 3
Point-to-Point Networks
1. It is a type of network in which a message is sent from one computer to another
via other computers in the network.
2. Large networks such as wide area networks that connect cities and countries is
an example of Point-to-Point Network.
74
COMPUTER NETWORKS - V
Server 1 Server 2
LAN 1
LAN 2
Server 3
LAN 3
TYPES OF NETWORKS
TYPES OF NETWORKS BASED ON GEOGRAPHICAL AREA:
Based on the geographical distance covered, computer networks are classified into:
1. Local Area Network,
2. Wide Area Network and
3. Metropolitan Area
Local Area Network (LAN):
1. Local area network is the most commonly used network.
2. It covers a limited area usually ranging from a small office to a campus of
nearby buildings.
3. Examples: networks within a school, college, business and organization.
Characteristics of LAN:
1. LAN stands for Local Area Network.
2. LAN is restricted to a limited geographical area.
3. Data transmission speed is fast.
75
COMPUTER NETWORKS - V
Computer 2
Printer
Switch
Computer 1 Server
Computer 3
Characteristics of WAN:
1. WAN stands for Wide Area Network.
2. WAN spans large geographical area.
3. It can connect computers between cities and countries
4. Data transmission speed is slow.
5. Data communication problems often occur.
6. Transmission medium is leased lines or public systems such as telephone lines
or satellite links.
7. Example: Bank Branches spread across the country
76
COMPUTER NETWORKS - V
Leased Line
Switch Switch
LAN 1 LAN 2
Characteristics of MAN:
1. MAN stands for Metropolitan Area Network.
2. MAN can connect computers within several blocks of buildings to entire city.
3. Data transmission speed is slower than LAN but faster than WAN.
4. Fibre optic cable or wireless microwave transmission is used as communication
medium.
77
COMPUTER NETWORKS - V
Bluetooth Network:
1. It is possible to pair one device to multiple devices using Bluetooth technology.
2. The process of setting up a Bluetooth network is referred to as "Pairing". Pairing
is done through interaction between two users.
78
COMPUTER NETWORKS - V
NETWORK TOPOLOGY
The physical arrangement of network nodes is called network topology. A node is a
computer or a network device.
Terminator
BUS
Terminator
79
COMPUTER NETWORKS - V
Ring Topology:
1. The ring network topology is virtually shaped just like a ring.
2. It is like a bus with both ends connected together.
3. All the messages travel in the same direction.
4. Message from one node is sent to the next node until it reaches its destination.
Star Topology:
1. In star topology all the nodes are connected to a central device called switch or
hub.
2. It is a one of the commonly used network topologies.
3. A switch can connect 4, 8, 16, 24 or 32 nodes.
4. A switch can be connected to another switch to expand the network.
80
COMPUTER NETWORKS - V
Switch/Hub
Mesh Topology:
1. In mesh network topology, all the network nodes are connected to all the other
nodes.
2. Message sent on a mesh network, can take any possible path from source to
destination.
3. It is not commonly used since it is costly and difficult to implement.
81
COMPUTER NETWORKS - V
Dial-up Line:
1. Dial-up line uses standard telephone lines for internet connection.
2. It requires a Dial-up modem.
3. It has maximum Internet connection speed of 56Kbps.
4. It uses complex network of telephone lines that allows data to be transmitted
to almost any location in the world.
5. It is becoming outdated due to very slow Internet connection.
DSL:
1. DSL stands for Digital Subscriber Line.
2. It provides a very high speed broadband Internet connection.
3. Internet speed of 256Kbps or above is known as Broadband.
82
COMPUTER NETWORKS - V
ISDN:
1. ISDN stands for Integrated Services Digital Network.
2. It provides a maximum speed of 128Kbps.
3. It is faster than Dial-up connection but slower than DSL.
4. It can transmit both voice and data at the same time over a single cable.
5. It requires that the user has ISDN digital telephone service and uses a faster
modem than Dial-up modem.
6. ISDN service is being replaced by faster DSL service.
CDMA technology
1. CDMA stands for Code Division Multiple Access.
2. It is a wireless cellular communication technology.
3. CDMA services include short messaging, voice, data and video transmission.
4. It can provide speed of several Mbps for video transmission.
TYPES OF MODEMS:
There are three types of modem which are commonly used.
1. Dial•up modem,
2. DSL modem and
3. ISDN modem.
Dial-up Modem:
1. A Dial-up modem is required for Dial-up Internet connection.
2. It is the short form of MODulator/DEModulator.
3. Modulation: the process of converting digital signals into analog signals.
4. Demodulation: the process of converting analog signals into digital signals.
83
COMPUTER NETWORKS - V
5. Modem accepts digital data from the computer in the form of two-level signals
and converts them into analog signals for transmission over the telephone line.
6. A second modem at the receiving end is used to convert the analog signals back
to digital form.
DSL Modem:
1. A DSL modem is used to connect computers to high-speed DSL connections.
2. It is designed to provide high-speed Internet access.
3. A DSL modem is an external device that connects to a computer via USB or
Ethernet port.
4. Wireless DSL modems are also available for connecting laptop and other
wireless devices.
5. DSL modem converts the digital signals into analog high frequency signals.
6. These signals are carried by the telephone lines and vice versa.
ISDN Modem:
1. ISDN modem is a device that converts digital signals used in computers to the
signals that can be transmitted over the ISDN lines.
2. It provides both voice and data transmission on a single line at the same time.
EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. B
ii. B
iii. A
iv. C
v. D
vi. A
vii. C
viii. B
ix. B
x. C
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Describe any three difficulties a company may face in running a business
without having computer network.
In absence of a reliable computer network, the company may not be able to
enjoy the benefits of
1. File Sharing
85
COMPUTER NETWORKS - V
2. Hardware sharing
3. Internet access
4. Communication and coordination
5. Data protection.
II. What is meant by data transmission? See page 69
III. Differentiate between Half-duplex and Full-duplex transmission modes. See
page 68
IV. Define network architecture? See page 70
V. Differentiate between a server and a client computer. See page 71
VI. Compare LAN and WAN. See page 73 74
VII. Why star topology is more reliable than bus or ring topologies?
Star topology is more reliable than bus or ring because it does not stop
functioning in case one node is broken. Furthermore, the problem resolution is
simpler in star than the others.
VIII. Mention any three problems which may occur if peer-to-peer network is
used for a large number of users in an organization.
Three problems that can occur are:-
1. Network speed gets slow.
2. Attacks of viruses, Trojans etc are greatly increased.
3. Administration is difficult to manage.
IX. What is ISDN? See page 81
X. What is CDMA technology? See page 81
86
Class: IX
Chapter # 6
COMPUTER SECURITY AND
ETHICS
COMPUTER SECURITY AND ETHICS - VI
COMPUTER SECURITY
Computer security refers to protecting computer hardware, software and information
stored on computer from threats.
CYBERCRIME:
1. Cybercrime refers to any crime that is committed by means of computer and
Internet technology.
2. Criminals are exploiting the convenience and anonymity of the Internet to
commit various types of crimes.
3. Cyber Crimes is now considered a global epidemic.
4. It is a serious concern for governments.
5. Many governments fine and imprison cybercriminals.
The following are the commonly committed cybercrimes.
a. Computers have been involved in crimes of various natures, stealing money
from bank and Credit Card Company.
b. Criminals use Internet to steal personal information of other users.
c. Personal information includes username, password, credit card number, bank
account number. etc.
d. Downloading illegal software, music files and videos are also cybercrimes.
e. Internet harassment or cyber bullying is also a serious crime.
88
COMPUTER SECURITY AND ETHICS - VI
HACKER
1. A person who illegally breaks into others' computer systems is known as
hacker.
2. Hacking is a cybercrime.
3. Hackers are computer experts who try to gain unauthorized access for stealing
and corrupting information.
4. Most of the hackers break into computers for financial benefits.
5. Hackers can create tools and malicious software for others to break into
networks and create problems.
CRACKER:
1. Cracker is a computer user who breaks into computer systems without
permission.
2. Most of the crackers use hacking tools.
3. Crackers break into computers and cause serious damage.
4. These criminals are dangerous and harder to catch.
Computer viruses
1. A computer virus is a type of malware that spreads by inserting a copy of itself
into another program or file.
89
COMPUTER SECURITY AND ETHICS - VI
Worms:
1. A worm is a malware that transmits itself over a network to infect other
computers.
2. Worm can be harmful like a virus.
3. It spreads automatically in computer networks and replicates itself.
4. It can travel from computer to computer without any human action.
5. It enters a computer through a weakness in the operating system of the
computer
6. Worms may cause some harm to the network such as slowing down
communication by increasing network traffic.
7. Examples: Code Red and Fizzer Spyware:
Spyware
1. Spyware programs are developed to spy on computer users by gathering
information about their activities on the computer.
2. Spyware is developed for the personal benefit of the creator.
3. It performs secret operations such as stealing password or banking PIN
(Personal Identification Number)
90
COMPUTER SECURITY AND ETHICS - VI
Adware:
1. Adware is a malware that attaches itself to free software on the Internet and
infects computer when such software is downloaded.
2. It pops up advertisements.
3. Pop-up block option in browsers helps protect computer from adware.
4. Some adware may also collect user information without their permission.
Pirated Software:
Pirated software on CDs is a very common source of spreading malware on computers
because these are often infected.
If users download pirated music, movies, programs, etc. for free, their computers may
be infected.
91
COMPUTER SECURITY AND ETHICS - VI
Antivirus Software:
1. Antivirus software is a computer program that detects and removes viruses
and other types of malware.
2. Computer user should install it on computer and update it regularly.
3. Most antivirus programs have an auto-update feature that automatically
updates the antivirus program.
4. This enables it to detect and remove new versions of viruses as well.
5. On attaching a flash drive or any other type of storage device to computer, the
antivirus ensures that it does not contain viruses.
6. Example: Norton Antivirus, Kaspersky, AVG, Bit Defender etc.
Anti-Spyware:
1. Anti-spyware is a computer program that detects spyware infections on
computer and removes them.
2. It helps to protect computer against security threats caused by spyware and
other types of malware.
92
COMPUTER SECURITY AND ETHICS - VI
AUTHENTICATION METHODOLOGIES
The following are common methodologies used for authentication purpose.
1. Username and password
2. Personal Identification Number
3. Access card
4. Biometrics
Username and Password:
1. A username is a name that identifies a person on a computer system.
93
COMPUTER SECURITY AND ETHICS - VI
94
COMPUTER SECURITY AND ETHICS - VI
MULTIMODAL AUTHENTICATION
Multimodal authentication means combination of two or more types of authentication
methods. Multimodal authentication uses multiple sources of information for
identification. For example, fingerprint and face recognition can be combined for a
multimodal biometric authentication system. As another example, a multimodal
authentication can combine access card and PIN to open security gate.
COMPUTER ETHICS:
1. Computer ethics means an acceptable behavior for using computer technology.
2. It is a code of behavior for moral and social issues.
3. Computer user should be honest, respect the rights of others on the Internet and obey
laws that apply to online behavior.
4. We should not use bad language while chatting and social networking.
5. We need to respect other’s views and should net criticize people.
6. We should not pretend as someone else and fool others.
7. We should not download copyrighted material such as music, movies, etc.
8. People should not do something on the Internet that is morally objectionable or illegal.
6. People should not commit any type of crime with the help of computer
technology.
7. Computer users should respect the privacy of others.
Intellectual Property:
Intellectual property means the legal rights of an individual or a corporation that result
from intellectual activity in literary, artistic, scientific and industrial fields. Countries
have law to protect intellectual property to foster innovation and promote creativity.
Software Piracy:
Software piracy means making illegal copies of software for use or sale for financial
benefit. When computer users buy licensed software, they have the right to use it on
a single computer. It allows software developers to benefit financially from their work.
96
COMPUTER SECURITY AND ETHICS - VI
Information Privacy:
Information privacy refers to an individual's right to the privacy of personal
information. The Data Protection Act (Law) protects the rights of the individuals
against misuse of personal information by organizations.
EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. C
ii. D
iii. B
iv. C
v. C
vi. D
vii. D
viii. C ix.
D
x. B
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Define cybercrime. See page 86
II. What is the importance of computer security? See page 86
III. Differentiate between hacker and cracker. See page 87
IV. Describe any five symptoms of malware. See page 89
V. Differentiate between authentication and authorization. See page 91
VI. Which authentication methodology provides highly secure identification and
verification? Justify your answer. See page 92 Biometrics
VII. What is meant by Information privacy? See page 95
VIII. Give any three drawbacks of software piracy? See page 94
97
COMPUTER SECURITY AND ETHICS - VI
IX. What types of problems may be faced if computer users do not comply with the
moral guidelines of computer ethics?
People will get into eve, corrupt, ill and malicious behavior should they not abide
by computer ethics. Online trading and businesses will get destroyed.
X. Name any three places where authentication of people is required.
Authentication is required to,
1. Gain access to a computer,
2. Use vault of a bank
3. E-mail accounts.
Q3. WRITE LONG ANSWERS OF THE FOLLOWING QUESTIONS
I. Define malware and describe its types. See page 87
II. Explain how malware spreads. See page 89
III. Explain how to protect computer systems from virus attacks. See page 90
IV. What are the common methodologies used for authentication? See page 91
V. Define computer ethics and write some important moral guidelines for
ethical use of computer technology. See page 93
98
100
101
102