You are on page 1of 102

FUNDAMENTALS OF COMPUTER - I

Session: 2021-2022

Class: IX
Chapter # 1
FUNDAMENTALS OF COMPUTER

By: Muhammad Nauman Ajmal Khokhar


Computer Instructor
FG Public School No. 1 (Boys) Gujranwala Cantt

1
FUNDAMENTALS OF COMPUTER - I

INTRODUCTION
COMPUTER
An advanced, electronic machine that takes raw data as input and processes it
under a set of instructions, gives results, and/or saves it for future use is called
computer.

Characteristics of a computer
1. It is a general-purpose machine.
2. It can store information and data for future use.
3. It can use its own saved data as input.
4. It can retrieve the saved data.
5. It produces accurate results.
6. It produces results based on the instructions given to it.

COMPUTER PROGRAM
The instructions given to a computer to perform a particular task is called a
computer program.

EVOLUTION OF COMPUTER
The evolution of computers means the advancement of computers over time and
its significance of future advancements.

ABACUS
1. Abacus was the earliest calculating device.
2. It was invented in China, nearly 5000 years ago.
Construction and working
1. It consisted of a wooden frame.
2. In it, parallel rods were joined.
3. Each rod had beads in it, which could freely slide up and down.
4. The calculation was performed using these beads.

2
FUNDAMENTALS OF COMPUTER - I

Usage
1. It was used in performing calculations based on addition, subtraction,
multiplication and division.
2. It has been in use till the 20th century.

N AP IER ’S BONE S
In 1614, a Scottish mathematician named John Napier invented the machine

called Napier’s bones. It could multiply, divide and find square roots of numbers.
Construction
1. It consisted of a wooden box.
2. The box contained rotating cylinders.
3. These cylinders had digits from 0 to 9.

PASCALINE
Blaise Pascal, a French Mathematician invented Pascaline in 1642.
Construction
1. It had rotating wheels.
2. Each wheel had ten parts having digits from 0 to 9.
3. Calculations were performed by the rotation of these wheels.
4. It had a number of small slots for displaying results.
5. It could perform addition and subtraction on whole numbers.

DIFFERENCE ENGINE AND ANALYTICAL ENGINE


1. Charles Babbage, an English mathematician started working on a “difference
engine” in 1822.
2. After working for 19 years he stopped working on the concept.
3. He started to work on an analytical engine.
4. He could not complete it because the technology was not advanced at the time.
5. The idea led to the invention of modern computers.
6. Charles Babbage is also known as the father of the modern computer.

3
FUNDAMENTALS OF COMPUTER - I

HO LLER I TH’ S DES K


1. It was invented by Herman Hollerith in 1890.
2. This machine was used in the census of 1890 in the USA.
3. After building Hollerith’s desk, He formed Tabulating Machine Company.
4. Later its name changed to International Business Machine IBM.
Construction
1. It was made of a desk that could tabulate data.
2. The desk consisted of a card reader which sensed the holes in the cards,
3. A gear-driven mechanism could count.
4. A large set of dial indicators to display results.

SLIDE RULE
It was developed by William Oughtred in the 1920s. It was very useful for
solving problems of multiplication, and division.

Construction
1. It had three parts.
a. Slide
b. A rule and
c. A transparent sliding cursor.

MARK-I
It was invented in 1944 by Howard Aiken. Mark-I could add three numbers that have
eight digits in one second.

Construction
1. It was 50 feet long.
2. It was 8 feet high.
3. It weighed 5tons.
4. It used 3000 electric switches.

4
FUNDAMENTALS OF COMPUTER - I

HIGH PERFORMANCE COMPUTING (HPC)


Is being used in today’s data centers for fast data processing. High Performance
Computing (HPC) is the use of parallel processing for running advanced application
programs efficiently, reliably and fast.

CLOUD COMPUTING
Cloud Computing means storing and accessing data as well as programs over
the internet instead of a computer’s hard drive. This data can then be accessed from
anywhere in the world.

GENERATIONS OF COMPUTER
The history of computers runs from the ancient abacus and the analytical engine
of the nineteenth century, through the modern computers of the present age. It is
generally divided into five generations with respect to major technological
advancements of that time.

FIRST GENERATIONS OF COMPUTERS (1940-1956)


Vacuum tubes were used in the first generations of computers. These generated
so much heat that they had to be cooled by an air conditioner. Vacuum tubes burnt out
and were difficult to repair and maintain.

CHARACTERISTICS
First-generation computers were,
1. Build using vacuum tubes.
2. Very slow, as the memory was very small.
3. Huge in size, often taking up to entire rooms.
4. Very expensive to build and more expensive to maintain.
5. Very unreliable.
6. used to take print out through electric printer
7. Heat generators, and consumed a lot of power

5
FUNDAMENTALS OF COMPUTER - I

8. used to take input from punched cards


9. used by machine language
Examples
ENIAC, Electronic Numerical Integrator and Calculator.
UNIVAC, Universal Automatic Computer
IBM 604

SECOND GENERATIONS OF COMPUTERS (1956-1963)


Transistors were invented in 1947 by three scientists, William Shockey, John
Bardeen and Walter Brattain. Transistors function just like vacuum tubes. It replaced
vacuum tubes in the second generation of computers. Transistors were faster, smaller,
cheaper and more reliable than vacuum tubes.

Characteristics
Second-generation computers were,
1. build using transistors
2. Smaller in size than the first generation of computers.
3. Computers became more reliable and cheaper
4. Used punched card readers, magnetic tapes, magnetic disks and printers
5. Assembly language, FORTRAN and COBOL languages were used.
Examples
UNIVAC II, IBM 7030

THIRD GENERATIONS OF COMPUTERS (1963-1971)


Integrated Circuits (ICs), invented in the 1960s were replaced transistors. ICs
are also called semiconductor chips. A single IC chip can replace a large number of
transistors. The invention of ICs was a breakthrough in advanced computer
technology.

Characteristics
1. 3rd Generation used IC chips.
2. It improved the speed and memory of the computers

6
FUNDAMENTALS OF COMPUTER - I

3. Computers consumed lesser power, were smaller, cheaper and more reliable
than 2nd generation computers.
4. It used a keyboard and a mouse.
5. These computers could run multiple applications at the same time.
Examples
IBM System/360, System 3 and Burroughs 6700

FOURTH GENERATIONS OF COMPUTERS (1971-PRESENT)


A microprocessor is a single chip that can handle all the processing of a
computer. LSI (Large Scale Integration) and VLSI (Very Large Scale Integration) chips
that could handle millions of transistors were developed.

Characteristics
1. Microcomputers were developed using a microprocessor.
2. 4th generation computers were very fast, reliable, consumed very little power
and had huge storage.
3. A large variety of softwares were available.
4. These computers support multimedia that can combine text, video, image and
sound.
5. They support a wide variety of portable and wireless devices.
Examples
AMD Athlon, Core i3, i5 and i7

FIFTH GENERATIONS OF COMPUTERS (PRESENT AND BEYOND)


The goal of fifth generation of computers is to develop devices that can
understand and can think.

Characteristics
1. 5th generation computers are based on Artificial Intelligence.
2. AI will minimize the need to write programs.
3. Allows humans to give command in any natural language.
Examples
ROBOTS and Expert systems.

7
FUNDAMENTALS OF COMPUTER - I

TYPES OF COMPUTERS
ANALOG COMPUTERS DIGITAL COMPUTER
1. Provides Continuous Values 1. Provides Discrete Values.
2. Represents values in the form of 2. Represents values in symbols or
waves numbers
3. Has many states 3. Has 2 states: ON and OFF
4. Special Purpose computer 4. General Purpose Computer
5. Only trained people can operate 5. Easy to Use
6. Very limited memory 6. Large memory
7. Very slow in processing 7. Faster in processing
8. Used in engineering and science 8. Used in a variety of fields
9. Used to calculate weight, 9. Used to calculate mathematical and,
temperature, speed etc. logical operations.
10. Less reliable 10. Very reliable
11. Example:- thermometer, analog 11. Examples:- Digital clock, laptops
clock

HYBRID COMPUTERS
1. A combination of analog and digital computers is called hybrid computers.
2. They combine the characteristics of both analog and digital computers.
3. Hybrid computers are mainly used for scientific applications.
4. These computers are used in spaceships, missile systems. Scientific research,
hospitals etc.
5. Vital Sign Monitoring Unit is used in hospitals to monitor patient's important
data such as blood pressure, temperature, respiration and heartbeat.

CLASSIFICATION OF DIGITAL COMPUTERS


Based on the size, speed, storage capacity and the number of users, computers are
classified into,
a. Super Computer,
b. Mainframe Computer,

8
FUNDAMENTALS OF COMPUTER - I

c. Minicomputer and
d. Microcomputer.

SUPER COMPUTER
1. Supercomputers are designed with massive computing power.
2. They are the largest and most powerful computers.
3. They can handle very large databases
4. These computers are used for engineering and scientific purposes.
5. They have huge computational power.
6. These computers are used for nuclear research and weather forecasting.
7. Examples:- Deep Blue, CRAY-1,
8. The fastest Super computer is SUMMIT in the USA with a speed of 200
petaflops.

MAINFRAME COMPUTER
1. A mainframe computer is a very large, very powerful and expensive computer.
2. It can support hundreds and even thousands of users at the same time.
3. These computers are used in large organizations.
4. These are used in banking, insurance, education, air travel, research, health
care, government and many other public and private organization.
5. These computers can execute more than a trillion instructions per second
(TIPS).
6. Examples: - IBM’s z Enterprise EC12, EC 196, HP 16500 Series and HP Integrity
Superdome.

MINICOMPUTER
1. The minicomputer was introduced in the 1960s.
2. The Minicomputers used IC chips.
3. A minicomputer is bigger than a microcomputer but smaller than a mainframe.
4. These computers can execute billions of instructions per second (BIPS).
5. Therefore, they can process more data than microcomputers.

9
FUNDAMENTALS OF COMPUTER - I

6. These are used for data processing requirements.


7. These are used in PIA, NADRA, police departments, hospitals, etc.
8. Examples: - IBM System/36 and HP 3000.

MICROCOMPUTER
1. Microcomputers are the smallest and low-cost computers.
2. These computers are most commonly used in homes and offices.
3. Microcomputer uses microprocessors.
4. Microprocessors were developed in the 1970s.
5. A microprocessor is a single chip that controls the operations of the entire
computer system.
6. Modern microcomputers have large storage capacity and can execute millions
of instructions per second (MIPS).
7. A variety of software is available for use on these computers.
8. Microcomputers are available in various forms such as desktop, laptop and
tablet.
9. Examples:- IBM Lenovo, DELL XPS

ROLES OF COMPUTER
The computer has played a vital role in the current society, from social media to
defense production, the applications are limitless. Computers are playing an
important role in every walk of life. Some of the applications are as below.

USE OF COMPUTERS IN VARIOUS FIELDS.


EDUCATION
1. Computer technology eases the process of learning.
2. Many softwares and websites are available for students to learn the subjects of
Physics. Mathematics, Chemistry, Biology, etc.
3. Multimedia software makes the process of learning interactive and interesting.
4. It combines text, graphics, sound and video for effective learning.
5. The Internet has enormous information on a wide variety of subjects.
6. Students can refer to the Internet to find information on any topic.
10
FUNDAMENTALS OF COMPUTER - I

7. Nowadays computers with multimedia projectors are being used in


classrooms for effective teaching.
8. All the activities related to examinations are also being controlled using
computers.
9. Computer education is a part of curricula from elementary to university levels.

BUSINESS
1. Computers are used in all types of businesses.
2. They are used to prepare business documents, reports, charts, presentations.
Invoices, etc.
3. They help in staying in contact with employees and customers.
4. They help in running business activities efficiently.
5. Some important business areas where computers are used are as follows
a. Banking
i. Computer technology has revolutionized the banking business.
Deposits and withdrawals are instantly logged into a customer's
account.
ii. Computer networks allow an amount of bill to be transferred
from the customer's bank account to the store.
iii. People can obtain cash anytime anywhere through Automated
Teller Machine (ATM)
b. Retail Stores
i. Bar code readers are linked to a computer system that is used to
read the bar code printed on each product sold to prepare the bill.
ii. With the use of computers at retail stores, the checkout process is
faster and the bill produced is accurate.
c. E-Commerce
i. Electronic commerce allows to sale products and services using
computer networks such as the Internet.

11
FUNDAMENTALS OF COMPUTER - I

d. Others
i. Computers are very helpful in running many other types of
businesses that include hotels, hospitals, schools, travel agencies,
real estate, stock exchanges. etc.

DEFENSE
1. There are various applications of computer technology in defense.
2. Computers are used in tanks, planes and ships to target enemy forces.
3. They help in tracking missiles and destroying them.
4. Modern defense weapons and other equipment are controlled by computers.
5. Computers are used for designing and testing weapons.
6. Computers are also used in communication systems in defense.

MEDIA
1. Computers have a lot of applications in print and electronic media.
2. Computer technology helps in the preparation and production of newspapers,
magazines, booklets and brochures, flyers, press releases and books.
3. Electronic media refers to broadcast media that includes radio broadcast cable
and satellite television broadcast and the new-age media like the Internet and
mobile devices.
4. The computer has enabled electronic media to a wider horizon.
MANUFACTURING INDUSTRY
1. Computer technology is widely used in the manufacturing industry.
2. It has improved the accuracy, quality and speed of manufacturing.
3. Computer-Aided Design (CAD) and Computer-Aided Manufacturing (CAM)
are used for product design and automation of manufacturing processes in
factories.
4. Computer-Aided Design (CAD): CAD involves the use of computer hardware
and graphics software to create product designs.
5. Computer-Aided Manufacturing (CAM): CAM involves the use of computers
in the planning and management of production operations.
6. It helps in automatically producing finished products.

12
FUNDAMENTALS OF COMPUTER - I

7. CAD/CAM technology has been applied in many industries, including


automobile, electronics, machine components, textiles, fashion, etc.

CAREERS IN INFORMATION TECHNOLOGY (IT)


Information Technology (IT) refers to anything related to computer technology, such
as networking, hardware, software, the internet, or the people that work with these
technologies. Almost any company has IT departments for managing the computers,
networks and other technical areas of their businesses. Many jobs are offered in these
departments. Some of these are:

SOFTWARE ENGINEER:
A software engineer is responsible for the analysis, design, implementation and
maintenance of computer software. A software engineer can be further classified into
programmer and system analyst.

Programmer:
Computer programmers are IT professionals who have extensive knowledge and
expertise in programming languages. They program the computer by writing step-by-
step instructions that tell the computer what to do. Computer programmers write
programs to solve problems related to business, education, engineering, government
offices, hospitals, entertainment, etc.

System Analyst:
System analysts analyze the data processing requirements of organizations and
develop information systems to implement them. They investigate problems, plan
solutions and recommend the type of hardware and software required for
implementing the solution. They also coordinate with the programmers and database
administrators in developing information systems.

Hardware Engineer:
Hardware engineers design and manufacture computer hardware. Their work also
involves the repair and maintenance of computer hardware. They have in-depth

13
FUNDAMENTALS OF COMPUTER - I

knowledge of the internal working of computers, processors, circuit boards and other
electronic equipment.

Network Administrator:
Network administrators are responsible for the installation, configuration and
maintenance of computer networks in organizations. They are in charge of the
maintenance of computer hardware and software that make up a computer network.
They assign passwords to network users so that unauthorized people do not have
access to the network.

Database Administrator:
A database administrator is a person who is responsible for the design,
implementation and maintenance of a database in an organization. He is also
responsible for maintaining security and monitoring the performance of the database.
Web Designer:
A web designer is a person whose job is to plan and create websites. He designs web
pages that include text, images, sound, video clips and makes the website interactive.
HTML (Hypertext Markup Language) is the most commonly used language for
creating websites.

Multimedia Designer:
Multimedia designers are people who organize and present information in an easy to
understand and attractive manner. They combine text, graphics, animation, audio and
video. Multimedia designers create digital images and arrange them in sequence for
animation using computer software. They usually work in the film/TV industry,
computer software companies and advertising companies.

Information Security Analyst:


An information security analyst is a person whose job is to protect information and
information systems from unauthorized access, use, modification, recording or
destruction. He implements procedures and policies to ensure information security
within the organization.

14
FUNDAMENTALS OF COMPUTER - I

Computer Teacher:
Computer teacher teaches the subject of computer science to students. He conducts
lessons on how to operate computers. He also teaches how to develop computer
programs using various programming languages.

COMPUTER HARDWARE
All the physical components of a computer system are called computer hardware.

HARDWARE COMPONENTS OF A COMPUTER SYSTEM


Hardware components of a computer system are classified into
1. Input devices,
2. System unit,
3. Storage devices,
4. Output devices and
5. Memory

INPUT DEVICES
All the devices used to feed data into the computer are known as input devices. Input
devices allow us to communicate with the computer. Some commonly used input
devices are keyboards, mouses, microphones, scanners, etc.

Keyboard
1. It is the main input device to communicate with the computer.
2. It allows the computer user to enter letters, numbers and special symbols into
the computer.
3. QWERTY layout is generally used all over the world.
4. It was designed to let people type as quickly as possible. This same layout is
nearly optimal for pure speed, as it tends to cause the fingers and hands to
alternate.

15
FUNDAMENTALS OF COMPUTER - I

Mouse
1. The mouse is a hand-held device used to control the movement of a cursor or
pointer on the screen.
2. It has two or three buttons at the front that allows the computer to make a
selection in the menu, draw graphics, or open files, folders and programs.

Joystick
1. A joystick is a pointing device with a vertical lever mounted on a base.
2. The lever usually includes buttons called triggers.
3. These triggers are activated when a certain event occurs.
4. Joysticks are mainly used for computer games.

MICROPHONE:
1. It is a device that allows the computer user to input audio into the computer.
2. It changes audio signals into electrical signals which are translated into digital
form by the sound card for processing in the computer.

Scanner:
1. It is a device that captures images from photographs, magazines, books etc. and
stores them on the computer in digital form.
2. These images can be edited, displayed on the screen or inserted in documents.
3. Many scanners also include Optical Character Recognition (OCR) software,
which can convert an image of text into a text file.
4. This file can be edited.

Barcode Reader:
1. It is a device that reads the barcode printed on products that represent product
code, description and price.
2. This information is used by the computer to print a bill for the customer.

16
FUNDAMENTALS OF COMPUTER - I

Digital Camera:
1. It is a device used to capture pictures and store them in digital form.
2. These pictures can be downloaded to a computer for editing, viewing or
inserting into documents.

Touch Screen:
1. It is a pressure-sensitive display screen.
2. It is used to interact with the computer by touching pictures or words with a
finger.
3. The touch screen is more commonly used with mobile phones and tablets.

17
FUNDAMENTALS OF COMPUTER - I

Touch Pad:
1. A touchpad is also an input device used in laptops and multimedia keyboards.
2. As the user moves his finger on the surface, the mouse cursor moves in that
direction.

SYSTEM UNIT
1. The system unit is the main part of the computer.
2. It includes,
a. Motherboard,
b. Power supply and
c. Drives inside the computer casing.
3. All the input/output devices of a computer are connected to the system unit
through the ports.

Motherboard:
1. The motherboard is the main circuit board inside the system unit.
2. It contains,
a. Microprocessor,
b. Main Memory,
c. Expansion Cards,
d. IC Chips,
e. Connectors And
f. Other Electronic Components.
3. It has many buses printed on it.
4. Buses are used to transmit information between various components of the
computer.
5. All the input/output is connected to the motherboard.

Microprocessor:
1. A microprocessor is the main chip on the motherboard.
2. It controls all the activities of the computer. It is also known as Central
Processing Unit (CPU) or simply processor.
18
FUNDAMENTALS OF COMPUTER - I

3. It contains Control Unit (CU), Arithmetic Logic Unit (ALU) and registers.
ALU (Arithmetic Logic Unit):
1. ALU is the part of the computer that performs all the calculations and
comparisons.
2. It consists of an arithmetic unit and a logic unit.
a. Arithmetic Unit: It performs all the arithmetic operations such as
addition, subtraction, multiplication and division.
b. Logic Unit: The logic unit performs logical operations which include
comparisons of numbers or alphabets.
Control unit:
1. It controls the operations of all the components of the computer.
2. It controls the working of all the input/output devices, storage devices and
ALU.
3. CU loads programs into memory and executes them.
4. It consists of very complicated circuits.

Registers:
1. Registers are small memory units inside the microprocessor.
2. It is used to temporarily store some information during the execution of a
program.
3. Some commonly used registers are Instruction Register, Accumulator Register,
Data Register and Memory Address Register.

STORAGE DEVICES
1. Storage devices are used to store programs and data that are not currently used
by the computer.
2. They have a huge storage capacity.
3. Therefore, they are also known as mass storage devices or secondary memory.
4. Hard disk is the most commonly used storage device.
5. It is fixed inside the system unit.
6. Portable storage devices are CD, DVD, memory cards and USB flash drive.

19
FUNDAMENTALS OF COMPUTER - I

7. Portable storage devices have less storage capacity than hard disk but they are
cheap and easy to carry.

Hard disk:
1. A hard disk is a magnetic storage device.
2. It is used to store data.
3. It has storage capacity of hundreds of Gigabytes (GBs).
4. It is fixed inside the computer casing.
5. Portable hard disk are also available.
6. Portable Hard disk is attached to USB ports.

CD:
1. CD stands for Compact Disk.
2. It is a portable optical storage device with a storage capacity of 700 Megabytes
(MBs).
3. A CD is 1.2 millimeter thick with a diameter of 120 millimeters.
4. CD drive is used to read data from or write data to a CD.

DVD:
1. DVD stands for Digital Versatile Disk.
2. It has the same thickness and diameter as CD.
3. DVD has more storage capacity than CD.
4. Its storage capacity is in the range of 4 to 16 GB.
5. A DVD writer is installed in the computer to read data from or write data to a
DVD.
6. A CD can also be used in a DVD writer.

Memory Card:
1. Memory card is a small storage device having storage capacity of few
Gigabytes.
2. It is available in different sizes and storage capacities.

20
FUNDAMENTALS OF COMPUTER - I

3. Memory cards are generally used in laptop computers and portable devices
such as mobile phone and digital camera for storing pictures, audio and video.

USB Flash Drive


1. USB flash drive is a small portable drive.
2. It is connected to computer.
3. It is also known as USB memory.
4. It is very fast in operation and its storage capacity is up to 128 GB.

OUTPUT DEVICES:
1. Output devices are used to display text, graphics and images on the monitor or
to print information on paper.
2. Information is played on monitor is known as softcopy.
3. Anything printed on paper is known as hardcopy or printout.
Monitor:
1. It is an output device that has a screen on which information is displayed
2. It has two common types i.e.
a. CRT (Cathode Ray Tube) monitor
b. LCD (Liquid Crystal Display) monitor.
3. CRT is very similar to old television. It is almost obsolete due to its big size and
low display quality.
4. LCD is slim, uses less power and has better display quality than CRT monitor.

Printer:
1. Printer is an output device.
2. It prints graphic and text on paper which is called hard copy.
3. There are two types of printers
a. Impact Printers And
b. Non-Impact Printers.

21
FUNDAMENTALS OF COMPUTER - I

4. Impact Printers uses electro-mechanical mechanism which causes the


Character shape to strike the paper and leave an image of the character on the
paper.
a. Dot matrix printer is the most commonly used impact printer. The
printing speed varies from 50 to 500 cps (characters per second).
b. Their printing is very cheap but print quality is poor.
c. They produce lot of noise while printing.
d. These printers are still in use for printing invoices, bank statements,
utility bills, etc.
5. Non-Impact printer prints without striking the paper.
a. There are two types: - inkjet and laser printers.
b. Inkjet printer stores ink in cartridge and sprays on paper through fine
nozzles on the print-head.
c. Laser printer uses technology similar to photocopying machine. Laser
printer is more expensive. Faster and has very high print quality
compared to inkjet printer.
6. Inkjet printers are used in all sectors such as homes and simple businesses.
7. Laser printers are perfect for large scale businesses.

PLOTTER
1. Plotter is an output device used for printing engineering drawings, machine
parts, building designs, maps, and panaflexes etc. on large size papers/sheets.
2. Such large size printing is not possible on printers.
3. It is more expensive than printer.
4. There are two types of plotters. I.e. Ink and Pen Plotter.
5. Ink plotter is used for printing images whereas pen plotter is used for printing
engineering drawings, machine pans, building designs, etc.
6. Plotter is a slow output device but its printing quality is good.

Speaker:
1. Speaker is a device used to produce audio output.
22
FUNDAMENTALS OF COMPUTER - I

2. A pair of speakers is attached to the sound card on the motherboard.


3. Speakers are commonly used with multimedia software and for playing music
and videos on computer.

MEMORY
1. Memory unit stores data and programs that are being executed.
2. It also stores the results produced by the ALU after processing the data.
3. Types of memories:
a. ROM (Read Only Memory) and
b. RAM (Random Access Memory).
RAM ROM
1. RAM Stands for Random Access 1. ROM stands for Read Only Memory.
Memory.
2. It is a volatile memory. 2. It is a non-volatile memory
3. The data is lost when the power is off 3. The data does not get lost when the
power is lost
4. Stores information temporary 4. Stores information permanently
5. Requires flow of electricity to retain 5. Does not require flow of electricity to
data retain data
6. Large size with higher capacity 6. Small size with less capacity
7. Used for both read and write 7. Used only for reading
8. Costlier 8. Cheaper than RAM
9. Very fast but uses a lot of power 9. Fast but uses very little power
10. It is user programmable 10. It is manufactured programmed
11.Programs are loaded in RAM before 11. BIOS and boot-up process are stored
execution. in ROM
12.Used in CPU cache, primary memory 12. Used in firmware,
microcontrollers
13.There are two types of RAM 13. There are four Types of ROM.

23
FUNDAMENTALS OF COMPUTER - I

a. DRAM (Dynamic Random Access a. PROM (Programmable Read-


Memory) Only Memory)
b. SRAM (Static Random Access b. EPROM (Electrically
Memory) Programmable Read-Only
Memory)
c. EEPROM (Electrically Erasable
Programmable Read-Only
Memory)
d. EAROM (Electrically Alterable
Read-Only Memory)

Cache memory
1. Cache is extremely fast memory inside the microprocessor.
2. It is faster and more expensive than RAM.
3. Cache Memory stores information that is most frequently used by the
computer.
4. The purpose of using cache is to improve the processing speed of computer.
5. There are three types of cache memories which are:
a. Level 1 (L1),
b. Level 2 (L2) and
c. Level 3(L3)
6. L1 cache is built inside the microprocessor whereas L2 and L3 are on the
motherboard.
7. L1 cache is faster than L2 and L3 cache.

24
FUNDAMENTALS OF COMPUTER - I

PORTS, EXPANSION SLOTS AND EXPANSION CARDS


PORTS
1. Port is an interface for connecting various devices to the system unit.
2. These are located on the motherboard and are usually seen at the back of the
system unit.
3. A port provides a direct link for devices such as keyboard, mouse etc. via cables
with the computer's common electrical bus.
4. There are various types of ports for connecting keyboard, mouse, monitor and
other input/output devices.
5. Some types of ports are:
a. USB (Universal Serial Bus),
b. HDM1 (High Definition Multimedia Interface),
c. DVI (Digital Visual Interface) and
d. Audio and LAN (Local Area Network) ports.

EXPANSION SLOTS
1. Expansion slots are long narrow sockets on the motherboard used for installing
expansion cards.

EXPANSION CARDS:
1. Expansion cards are small circuit boards.
2. These cards add new capabilities to the computers.
3. Commonly used expansion cards are sound card, graphics card, modem card
and network card.
4. In modern computers these cards are built-in.

BASIC OPERATION OF A COMPUTER


The following four basic operations are· performed by computers.
a. Input operation,

25
FUNDAMENTALS OF COMPUTER - I

b. Processing operation,
c. Storage operation and
d. Output operation

INPUT PROCESSING OUTPUT

STORAGE

INPUT OPERATION:
1. Users enter data and instructions into the computer through keyboard or
mouse.
2. It can also be provided to the computer from a storage device.
3. The input data/instructions are stored in memory for further processing.

PROCESSING OPERATION:
1. Microprocessor processes the data according to the instruction given to it.
2. The microprocessor fetches the data/instructions from the memory and stores
it in instruction register.
3. The control unit then decodes the instruction to find out which operation is to
be performed.
4. After decoding the instruction, it sends signals to other parts of the computer
to execute it.

STORAGE OPERATION:
1. The results produced after processing are stored in memory before they are
sent to the output device or permanent storage device like hard disk.

26
FUNDAMENTALS OF COMPUTER - I

OUTPUT OPERATION:
1. The results of data processing stored in memory must be output so that they
can be seen by the user.
2. The control unit displays the results on the monitor or prints it on the printer.
3. Results can also be saved in a storage device such as hard disk for use in the
future.

COMPUTER SOFTWARE
Computer software are classified into two categories,
a. System software
b. Application software

SYSTEM SOFTWARE:
1. System software is a collection of programs which makes the use of computer
easy and efficient.
2. Highly experienced computer programmers develop system software.
3. There are four types of system software.
a. Operating system,
b. Utility programs,
c. Device drivers and
d. Language processors
Operating System
1. An operating manages and coordinates all the activities performed by the
computer.
2. The most popular operating system used in microcomputers is the Windows.
3. Operating system performs the following tasks.
a. It loads programs into memory and executes them.
b. It controls the operation of input/output and storage devices.
c. It manages files and folders.
d. It allows to create password to protect computers from unauthorized
use.
27
FUNDAMENTALS OF COMPUTER - I

e. It detects hardware failures and displays messages to fix them.

Device Drivers:
1. A device driver is system software that controls the operation of a computer
device.
2. When users attach a device for the first time, they should install its driver to
make it operational.
3. Device drivers are provided by device manufacturers.
Utility Programs:
1. Utility programs perform specific tasks that are related to the management of
the computer.
2. Some commonly used utility programs:
a. Windows Explorer: It is used to manage files and folders.
b. Backup Utility: It is used to make backup of data.
c. WinZip Utility: It is used to compress files.
d. Diagnostic utility: It is used to detect hardware and software problems
e. Antivirus software: It is used to detect and remove viruses.

Language Processors:
1. A language processor is a system program used to translate computer
programs into machine language.
2. Machine language is directly understood by the computer. Therefore, all the
programs must be translated into machine language before execution.
3. Compiler and interpreter are language processors used to translate high level
language programs into machine language.
4. A program called assembler is used to translate assembly language programs
into machine language.

APPLICATION SOFTWARE:
1. Application software is developed for computer users to solve their problems
such as preparing a letter, creating a presentation or managing a database.
2. Commonly used application software includes
28
FUNDAMENTALS OF COMPUTER - I

a. productivity software,
b. business software,
c. entertainment software and
d. education software

Productivity Software:
1. Productivity software includes word-processing, spreadsheet and database
management software packages.
2. These software packages are used by individuals to speed up their daily routine
tasks by doing their work in an organized and efficient way.

Business Software:
1. Any software that helps in running business in a more efficient way to improve
productivity is known as business software.
2. Some examples of business software are
a. Accounting,
b. Sales And Marketing,
c. Inventory Control,
d. Project Management And
e. Payroll Software.

Entertainment Software:
1. Software developed to entertain people is known as entertainment software.
2. Video games are one of the most popular forms of entertainment software.
3. Many games are lot of fun to play but sometimes they can also help to improve
skills such as typing or reading.
4. The term edutainment merges games and education software into single
software.
5. Edutainment software is used mainly for entertainment but it educates as well.

Education Software:
1. Software developed for educational purpose is known as education software.
29
FUNDAMENTALS OF COMPUTER - I

2. A large variety of education software has been developed.


3. Education software includes typing tutor, spelling tutor, language learning,
medical and healthcare, driving test and flight simulation software, etc.

OPEN SOURCE SOFTWARE, SHAREWARE AND


FREEWARE
OPEN SOURCE SOFTWARE
1. It is computer software that is available in the form of source code that allows users
to study, change and improve it.
2. Open source software is free for use, modification and distribution.
3. Examples of open source software:
a. Linux operating system,
b. Open Office
c. Flight Gear and
d. Java programming language, etc.

SHAREWARE:
1. Shareware is distributed free of cost for a limited period.
2. It is trial version of software given to people to decide whether they would like to
buy the full version of the software. Some shareware is installed on new computers
when they are sold.
3. Examples of shareware:
a. antivirus software and
b. Computer games, etc.

Freeware:
1. Freeware is given free of cost and it is full version of software for an unlimited
period of time.
2. Examples of freeware:
a. Google Chrome,
b. Mozilla Firefox and

30
FUNDAMENTALS OF COMPUTER - I

c. VLC media player. etc.

EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
I. B
II. B
III. D
IV. C
V. B
VI. D
VII. C
VIII. A
IX. B
X. A
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Describe Napier's Bone and Slide Rule. See page 3 & 4.
II. Compare 1st and 3rd generation computers. See page 5 & 6.
III. Differentiate between analog and digital computers. See page 7.
IV. Ahmed, a class IX student is asking his father to replace his home computer
CRT monitor with LCD monitor. How will you justify his demand?
Replacing monitor with LCD is better because,
1. LCD consumes lesser power.
2. LCD has better display quality.
3. LCD has very less effect on eyes.
4. Furthermore, CRT is no longer available as new.
V. What will happen if storage devices are removed from a computer?
Storage devices are used to store installed programs and data that are not being
used at the time. Removing the storage devices shall result in not functioning
of computer.

31
FUNDAMENTALS OF COMPUTER - I

VI. Differentiate between systems software and application software.


System Software Application Software
1. System Software controls and 1. Application software provides
manages the hardware of the user the access to use the
computers computer.
2. It is machine dependent 2. It is machine independent
3. It is a huge collection of programs 3. It is a collection of specially
that enables the user to control the designed softwares,
computer.
4. It runs in the background 4. It runs in the foreground
5. It acts as a platform 5. It acts as an interactive media
6. Example: 6. Example:
Windows, WinZip etc. Games, MS Office etc.

VII. How a student can use computer to improve academic performance?


A student can improve his academic performance by,
1. Using educational softwares, e.g. dictionary, encyclopedia.
2. Visiting education websites.
3. Enhance his understanding by viewing videos.
4. Interacting with online tutors.
5. Access thousands of digital libraries.
VIII. Give any three uses of computers in a school library.
Computers can be very helpful in a school library by the following ways.
1. Record Keeping. The Librarians can digitize the issue and return data.
2. Cataloging. Once completed the librarians can locate and find a book very
easily.
3. Internet Access. Online Digital Libraries can be accessed by using internet
access in the libraries.
IX. Name few house hold appliances in which microprocessor is used.
Today, microprocessor is not only used in microcomputers, they are also used
in the devices including,

32
FUNDAMENTALS OF COMPUTER - I

a. mobile phones,
b. microwave ovens,
c. cameras,
d. washing machines,
e. Televisions, etc.
X. What are the tasks performed by operating system? See page 26 point 3

Q3. WRITE LONG ANSWERS OF THE FOLLOWING QUESTIONS


1. Describe the five generations of computers. See page 5,6,7&8
2. Write a note on mainframe, minicomputer and microcomputer. See page
9&10.
3. Explain the basic operations of a computer. See page 24&25
4. Write short note on the following. See page 13 &14
a. Hardware Engineer
b. Network Administrator
c. Database Administrator
d. Web Designer
e. Multimedia Designer
5. Describe the following types of application software. See page 27,28&29
a. Productivity software
b. Business software
c. Entertainment software
d. Education software.

33
Class: IX
Chapter # 2
FUNDAMENTALS OF OPERATING
SYSTEM
FUNDAMENTALS OF OPERATING SYSTEMS - II

INTRODUCTION
Operating system is a collection of system software that controls the working of
computer system. It acts as an interface between the computer user and computer.

OBJECTIVES OF OPERATING SYSTEM


The main objectives of the operating system are
1. Convenience,
2. Efficiency and
3. Security.
It can also be viewed as a resource manager

FUNCTIONS OF OPERATING SYSTEM


The following are the main functions of operating system.
• Process Management
• Memory Management
• Input / Output Management
• File Management
• Resource Management
• User Management

Process Management
1. Process management is an essential part of operating system (OS).
2. A process is a program in execution.
3. Multiple processes are executing concurrently or waiting for their turn to be
executed.
4. The OS must allocate resources to processes, enable processes to share and
exchange information, and protect the resources of each process from other
processes.

Memory Management
1. Memory management is the process of allocating memory space for user
programs in main memory.

35
FUNDAMENTALS OF OPERATING SYSTEMS - II

2. When programs are run by users, the operating system allocates portions of
free memory to programs.
3. When a program is closed, operating system will free the memory portion used
by that program for reuse.

Input / Output Management


1. Input/output management is the process of controlling the operation of all the
input/output devices attached to computer.
2. User communicates with computer through various input/output devices such
as keyboard, mouse, monitor, printer, etc.
3. Management of these devices is the responsibility of operating system.

File Management:
1. File management system is part of operating system that organizes, stores and
keeps track of computer files and folders.
2. Computer files can be documents, programs, images, videos, etc.
3. Operating system controls creating, opening, editing, renaming, moving,
copying, deleting and searching files.

Resource Management:
1. The resources of a computer include microprocessor, memory and all the
devices attached to the computer.
2. Operating system automatically manages the resources of a computer when
application programs are executed by the user.
3. Operating system allocates resources of a computer to the application program
according to the user's requirement in an efficient way to improve the
performance of the computer.

User Management:
1. User management is an important feature of operating system for maintaining
a secure computer system.

36
FUNDAMENTALS OF OPERATING SYSTEMS - II

2. The operating system gives full control over a computer system to a person
known as administrator.
3. Administrator allows the users to run various application programs that are
installed on the computer.
4. A user can login to the computer system by entering the username and
password, run programs and save his files in his personal folder.
5. Operating system does not allow the users to install programs or create new
users.

OPERATING SYSTEMS INTERFACES


There are three types of operating systems based on ways of interaction with
computer (interface). The three types of interfaces are
• Command Line Interface. (CLI)
• Menu Driven Interface. (MDI)
• Graphical User Interface (GUI).

Command Line Interface (CLI)


1. CLI is based on textual input. The user types in a command and presses the
Enter key to execute it.
2. Two commonly used operating systems that use CLI are DOS (Disk Operating
System) and UNIX.
3. CLI is difficult to use because users have to remember the commands to
perform any task.

DOS
1. DOS was the most popular CLI operating system.
2. DOS displays the prompt (C :\>) to enter commands.
3. User must know the syntax of the command.
4. DOS commands are difficult to remember.
5. Some DOS commands are still-supported by the new Windows operating
system.
6. It is a single user and single task operating system.
37
FUNDAMENTALS OF OPERATING SYSTEMS - II

7. Examples of DOS Commands


a. DIR Display the contents of the folder
b. FORMAT D: Format the D Drive
c. CD CD stands for Current Directory
UNIX.
1. UNIX is a multi-user CLI operating system introduced in 1969.
2. It allows multiple users to run different programs at the same time.
3. UNIX was developed for use on large computer system (Mainframe).
4. It uses a command line interface but later Graphical User Interface was also
introduced.

Menu Driven Interface (MDI)


1. Menu driven interface presents a menu on the screen, user makes a choice and
then the next menu appears.
2. The user makes another choice and so on.
3. Menu driven interface is easy to use as compared to CU.
4. The user reads the options and makes his choices.
5. Menus contain the commands to use the operating system.
6. Menu driven interface is also used in some application programs and other
devices such as mobile phone and iPod.
7. The following are two common menu driven operating systems
Novell's Netware:
1. Novell's Netware was released in 1993.
2. It was a menu-driven operating system that was used in the past.

ProDOS:
1. ProDOS was another menu-driven operating system.
2. It was used on some Apple computers.

GRAPHICAL USER INTERFACE:


1. GUI is a graphical interface for computer users to interact with computer.
2. It uses windows, icons, menus and pointer.
3. Window is a rectangular portion of monitor in which information is displayed.
38
FUNDAMENTALS OF OPERATING SYSTEMS - II

4. Icon is a graphical symbol that represents a file, folder, program, device, etc.
5. To perform a task, the user has to select icons or make choices in menus using
a pointing device such as mouse.
6. The following are the advantages of GUI.
a. Much easier to learn and use.
b. No need to memorize the commands.
c. Allows users to run more than one program at the same time.
d. Most of the GUls provide good help facilities.
e. Many application programs also use a similar interface so it is easy to
use a new program
7. The following are the disadvantages of GUI.
a. Takes up lot of memory.
b. Needs faster computer as compared to other interfaces.
c. Examples: - Macintosh, Linux and Windows.

Macintosh
1. Mac OS is a series of operating systems developed by Apple Incorporation for
their Macintosh computers.
2. It was introduced in 1984.
3. The latest version is Mac OS X.
4. It is a UNIX based user-friendly operating system.
5. There are some specialized versions of Mac OS X used on devices such as
iPhone, iPod, iPad and new Apple TV.

Linux Operating System:


1. Linux is a free open-source operating system introduced by Linus Torvalds in
1991.
2. It is faster but difficult to use.
3. It is not a popular operating system.
4. Millions of programmers around the world work on Linux to improve it.
5. Its source code is freely available on Internet.

39
FUNDAMENTALS OF OPERATING SYSTEMS - II

6. Programmers can view, edit and publish an improved version.


7. Linux OS can be installed on all types of computers.
8. The Linux OS is frequently packaged as a Linux distribution for both desktop
and server use, and includes the Linux kernel.
9. Example: - Ubuntu, Fedora, Red Hat and openSUSE.

Windows Operating System


1. Windows is the most popular operating system used on microcomputers.
2. It was developed by Microsoft.
3. Many different versions of Windows operating system were developed and
used successfully in the past.
4. Some of these versions are Windows 95, Windows 98, Windows 7, 8 and 10.
5. The latest version is Windows 10.

40
FUNDAMENTALS OF OPERATING SYSTEMS - II

OPERATING SYSTEM
SINGLE-USER OPERATING MULTI-USER OPERATING
SYSTEM: SYSTEM:
1. Operating system, used by a single 1. Operating system that allows many
user ·at a time is known as single user users at the same time is known as
operating system. multi-user operating system.
2. It allows a single user to login 2. It allows many users to login into a
big computer
3. Many Programs can be run by a user 3. It can run different programs at the
same time.
4. Resources of the computer are not 4. It shares the resources of the
shared with other computers computer with other users over the
network.
5. User Management is very difficult. 5. A person known as administrator
assigns and manages usernames and
passwords.
6. It is used on microcomputers. 6. It is used on minicomputer and
mainframes.
7. It requires less memory and costs less. 7. It requires a powerful CPU, large
memory and large hard drives
8. Examples:- DOS, Windows XP 8. Examples:- Windows Server, UNIX,
LINUX

TYPES OF OPERATING SYSTEM


There are three types of operating systems.
1. Batch Processing,
2. Time-Sharing and
3. Real-Time operating systems.

41
FUNDAMENTALS OF OPERATING SYSTEMS - II

Batch Processing
1. In a batch processing system, jobs are grouped in batches and the computer
executes them one by one.
2. When the current job terminates, the computer automatically loads the next job
and starts executing it.
3. Batch processing operating systems greatly improved the use of computer
system.
4. Batch processing systems are suitable for tasks where large amount of data has
to be collected and processed on a regular basis.
5. Example:- in examination report card system, all the data of student's
examinations is collected and processed as a batch for printing report cards.

Time-Sharing System:
1. Timesharing system is a feature of operating system in which multiple users
can run different programs on a large-scale computer.
2. It allows many users to have access to a computer at the same time and share
the computer's time.
3. In a time-sharing system, the central processing unit is switched rapidly
between the programs so that all the user programs are executed
simultaneously.
4. The operating systems used in minicomputers and mainframe computers
support timesharing.
5. Example: - hundreds of students access the university's mainframe computer
at the same time and they run different programs in a timesharing system in
interactive mode.

Real-Time System:
1. Real time operating systems must process information and produce a response
within a specified time.
2. These operating systems are developed for special applications.
3. These are used to control industrial processes such as oil refining.
42
FUNDAMENTALS OF OPERATING SYSTEMS - II

4. Real time operating systems are used to supply immediate response within
limited time.
5. For example, a measurement from an oil refinery indicating that temperatures
are getting too high might demand quick response to prevent an explosion.
6. Real-time operating system is used to monitor the position of rocket in the
space.

GETTING STARTED WITH GUI OPERATING SYSTEM


1. A GUI Operating System provides a user-friendly interface.
2. This makes it easier for people with little computer skills to operate the
computer.
3. A GUI combines four elements which are Windows, Icon, Menu and Pointer.
4. All the information displayed on the screen is presented inside a window.
5. Small graphical symbols known as icons are used to represent files, folders,
drives programs and commands.
6. Mouse or touchpad is used as pointing device for performing different tasks
such as selecting an option or opening a file, folder or program.

BASIC ICONS OF GUI OPEARING SYSTEM


1. An icon is a small graphical symbol that represents a file, folder, application or
device.
2. There are some special system icons such as Recycle Bin and Computer that are
kept on the desktop Icon has a label at the bottom describing its name.

Recycle Bin:
1. It is a temporary place (folder) for items that the user deletes from the hard
disk.
2. When a file or folder is deleted from a hard disk it goes to the Recycle Bin.
3. The user can restore it to its original location.
4. User can also delete a file or folder permanently from the Recycle Bin.

43
FUNDAMENTALS OF OPERATING SYSTEMS - II

Computer Icon:
1. Computer icon allows the user to access the contents of computer drives and
manage files and folders.
2. When user double-clicks on Computer icon, it will open a window that displays
the drives present in the computer.

Folder Icon:
1. Folder icon resembles a physical file folder.
2. It is used to store files.
3. A folder can have another folder inside it which is known as subfolder.
4. Folders are used to keep files in an organized manner on a storage device such
as hard disk so that they can be accessed easily.

File Icon:
1. In a GUI, files are also represented by icons.
2. A file may contain text, image, music or video.
3. Users recognize a file by its icon.

Program Icon:
1. Executable program files are also represented by icons.
2. Different graphical symbols are used for different program icons.
Shortcut Icon:
1. Shortcut icons are created to access a program, file or folder quickly.
2. They have an arrow at the bottom left corner and the name below it.

MANAGING DATA (FILES/FOLDERS):


1. Managing data means storing files in secondary storage devices such as hard
disk or USB flash drive in an organized way.
2. This helps in finding files easily and quickly.
3. Files are stored in folders.

44
FUNDAMENTALS OF OPERATING SYSTEMS - II

4. The Document folder in Windows is the default folder where the user saves
files.
5. File management tools of GUI operating system provide facilities to quickly
and easily create folders and copy or move files into them.
6. It also allows the user to delete files and folders that are not needed any more.

45
FUNDAMENTALS OF OPERATING SYSTEMS - II

EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. B
ii. A
iii. C
iv. D
v. B
vi. B
vii. D
viii. B
ix. C
x. B
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Why operating system is important software for a computer? Give any five
reasons.
Operating System in an essential software in the computer because it,
1. Manages I/O Devices,
2. Controls Users,
3. Manages Files,
4. Execute Processes and
5. Handles Memory

II. Give any three objectives of operating system? See page 34


III. Mention few disadvantages of using DOS.
Following are the disadvantages of DOS.
1. It is a single user Operating system.
2. It is not secure
3. Application softwares are not supported.
4. Cannot handle modern day workload
5. Need experts to use it
6. Graphics are not supported.
IV. Name two operating systems which are used in modern mobile phones.
Operating systems used in modern mobile phones are,
1. Android OS (Google Inc.)
2. iPhone OS/ iOS (Apple)
3. Windows Mobile (Microsoft)

46
FUNDAMENTALS OF OPERATING SYSTEMS - II

V. What difficulties a student may face if he/she is not familiar with the
operating system of a computer?
A student may face following problems if he/she s not familiar with operating
system. He cannot,
1. Boot up a computer.
2. Install new applications.
3. Manage files and folders
4. Run utility programs
5. Make data secure

VI. Define UNIX and Windows operating system. See pages 37&39
VII. Differentiate between single-user and multi-user operating systems. See
page 39
VIII. What is meant by managing data and why is it important? See page 44
IX. What is meant by resources of computer? See page 35
X. What types of problems may a student face if no antivirus is installed in
his/her computer system.
In case there is no antivirus installed on the computer, it may result in,
1. Attack from viruses
2. Deletion of files
3. Corruption of files
4. Loss of data
5. Slowing of computer speed
6. Theft of personal information
7. Adware flooding the system.
Q3. WRITE LONG ANSWERS OF THE FOLLOWING QUESTIONS
1. Explain the main functions of operating system. See page 34-36
2. Describe the following computer Interfaces. See page 36
a) Command Line Interface
b) Graphical User Interface
c) Menu-driven Interface
3. Describe the following types of operating systems. See Page 40
a) Batch Processing System
b) Time-sharing System
c) Real-time System
4. Describe the basic icons of Windows operating system. See Page 42

47
Class: IX
Chapter # 3
OFFICE AUTOMATION
OFFICE AUTOMATION - III

OFFICE AUTOMATION
Office Automaton refers to technology used for creation, storing, processing and
communicating information for accomplishing basic tasks performed in offices. The
system that facilitates office automation is known as Office Automation System (OAS).

EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. B
ii. D
iii. C
iv. D
v. C
vi. B
vii. A
viii. C
ix. C
x. B
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. What is a word processor? Write some advantages of it over a typewriter.
i. Word processor is a computer application software.
ii. It is used for the creation of different types of documents on computer.
iii. Word processor allows user to delete, modify and rearrange document
without retyping any of the existing text.
iv. Commonly used word processors are MS Word, Open Office.

II. Name any three types of documents which can be prepares in Word.
Word processing programs can be used to create many types of documents
such as letters, reports, resumes, newsletters, memos flyers, etc.

III. Differentiate between page break and section break.


Page break is a marker that tells word program that the contents which follow
are to reappear on a new page. Whereas, section break inserts a new page but
it allows the user to change the page format without having any effect on the
formatting of the previous pages.

IV. Why header and footer are important in a Word document?

49
OFFICE AUTOMATION - III

Header appears at the top of a page and footer appears at the bottom of a page.
The type of information that may appear includes book title, document title,
chapter number and title, page number, company name, etc.

V. What is the purpose of control buttons in Word window?


Control buttons refer to 3-buttons grouped together. These buttons are
Maximize/restore, minimize and close. These control buttons provide quick
and basic functions for manipulating each Window currently visible

VI. Why hyperlinks are created in Word document?


i. Hyperlinks are used in a document giving readers instant access to
information in another part of the same document.
ii. The hyperlink can be text or graphics.
iii. Hyperlinks are used to provide information to the readers without
repeating the same information on different pages.
iv. To add links that jump from one part of a document to another part of the
same document mark the destination and then add a link to it.

VII. Name any three areas of application of Excel.


Excel has strong applications in the fields of industry, data management and
education. Excel can be used for accounting, finances and sales, data of
employees and students etc.

VIII. Differentiate between relative and absolute cell addressing in Excel.


Relative Cell Addressing Absolute Cell Addressing
1. Cell addresses included in a 1. Absolute cell addressing keeps a
formula or function are relative cell reference constant when
cell addresses. copying a formula or function
2. Relative cell address means when 2. Absolute cell addresses begin
a formula is copied to other cells, with a dollar sign in the formula
the cell references in the formula
change to reflect the formula's
new location.
3. Example:- =B5+C5+D5 at A5 3. Example:- =$B$5+$C$5+$D$5 at
becomes = B6+C6+D6 at A6, A5 remains the same at A6, when
when copied copied

IX. What are the advantages of protecting an Excel worksheet?


I. The worksheets may contain important information that others cannot
edit or delete.

50
OFFICE AUTOMATION - III

II. Fortunately, sensitive information in the sheet can be protected down to


the cell level in Excel.
III. When a worksheet is protected, other users can only view the
information in it but changes cannot be made.

X. How graphical representation of spreadsheet data can be helpful in business.


I. A chart is used to represent data graphically.
II. Charts are very helpful in explanation and representation of data.
III. A common1y used chart is the column chart.
IV. Data is presented very clearly through charts.
Q3. WRITE LONG ANSWERS OF THE FOLLOWING QUESTIONS
I. Which shortcut keys are used in Word to move cursor to the beginning of
line, end of line, top of the document and end of the document?
Cursor Movement Shortcut Key
Beginning of the line HOME
End of line END
Top of document CTRL+HOME
End of document CTRL+END

II. Write the mouse commands used for selecting various items is a Word
document such as single word, sentence, paragraph, etc.
To move or copy words, sentences or paragraphs to another location in the
document, first select the text and then use cut-and-paste or copy-and-paste
technique. Commands used for selecting various items in a document with
mouse are given below.

III. Explain text and paragraph formatting in Word.


Text Formatting:
Formatting text means changing the font type, size, style, color and
effects of text.
Changing the Font Type and Size of Text:
1) Open the Home tab,
2) Click the arrow on the right side of the currently selected font type.
3) Choose another font type.
4) To change the font size. Click the arrow on the right side of the font size
and select a font size from the drop-down list or type a new font size.
5) To change the font type or size of existing text
6) Select the text and then make the changes.
Changing Font Styles and Effects:
The following are the steps for changing font styles and effects
51
OFFICE AUTOMATION - III

1. Click the Home tab.


2. Click the dialog box launcher on the lower-right corner of the Font
group.
3. This will open the Font dialog box,
4. The user can change font styles and effects of text
5. Font dialog box. Some changes that are available in the Font dialog
box can be made directly from the Font group in Home tab.
6. Steps to clear the text formatting.
7. Select the text you want to clear the formatting.
8. Click the Home tab.
9. Open the Styles dialog box and select Clear all.

IV. Describe the Paste Special command used in Excel.


1. Excel copies all the information in the selected range of cells when you paste
data.
2. Excel's Paste Special command allows many other options while pasting
cells such as paste only formats of selected cells without contents or paste
contents without formulas.
Steps describe the use of Paste Special command:
1. Select the cell range to paste.
2. Open the Paste drop-down menu in Clipboard group of Home tab and
select Paste Special
3. Paste Special dialog box will open.
4. Select an option from the Paste Special dialog box and click OK.
Commonly used options of Paste Special dialog box:
Commonly used options of Paste Special dialog box are explained below.
All: Used to paste all the information in the selected cell range. This is same as
normal paste command.
Formulas: Used to paste text, numbers and formulas without formatting.
Values: Used to convert formulas in the selected cell range to their calculated
values and then apply the paste command.
Formats: Used to paste only the formatting of selected cell range without cell
contents.
All except borders: Used to paste all the information in the selected range
without copying any borders if used:

52
OFFICE AUTOMATION - III

V. Describe how functions are used in Excel with examples.


Working with Functions in Excel:
Functions are built-In formulas in Excel that allow user to easily perform
common calculations on data. Functions can be entered in a worksheet using
keyboard. Insert Function command or AutoSum drop-down menu.
Using Keyboard to Find Average:
The following are the steps to calculate average sale for DELL laptop
computer during the first quarter using the AVERAGE function.
1. Select cell E5 where the result will appear.
2. Type =AVERAGE(B5:D5)
3. Press Enter key.

VI. Describe how formulas are used In Excel with examples.


A formula is an expression that performs calculations. It consists of operators,
constants and cell addresses. All the Excel formulas begin with equal sign (=)
just like functions.
EXAMPLE:-
To multiply two numbers 4 and 7, the formula will be =4·and 7. User can also
use cell addresses in formulas such as = (A4+B4)/5. This formula wi11 first add the
contents of cell A4 and B4 and then divide the sum by 5.

53
Class: IX
Chapter # 4
DATA COMMUNICATION
DATA COMMUNICATION - IV

DATA COMMUNICATION
Data communication is the transmission of data between two points.

BASIC TERMS OF DATA COMMUNICATION


The following terms are associated with data communication.
• Data
• Data transmission
• Analog Signals
• Digital Signals
Data
Data means any type of raw facts and figures which can be provided as input. Data
can be in the form of text, sound, graphics, image or video.

Data Transmission:
Data transmission means sending information from one place to other using computer
networks and data communication systems. It also means sending stream of bits or
bytes from one place to another using copper wire, Fibre optics, satellite
communication etc.
Analog and Digital Signals:
A signal is a variation of physical quantity with time.
An electrical signal is a change in voltage or current with time.
Electrical signals can be divided into two main types, analog and digital signals.
Analog Signals Digital Signals
It is in continuous form These are in discrete form
It varies continuously within a range They switch between two discrete, low
and high voltage level.
Represented by sine waves Represented by square waves
It has many states It has only two states
Example:- Human Voice Example:- Computers, Optical Drives

55
DATA COMMUNICATION - IV

COMPONENTS OF A COMMUNICATION SYSTEM


Communication system consists of the following five basic components.
1. Sender
2. Receiver
3. Message
4. Transmission Medium
5. Protocol

(3) Message

(4) Transmission Medium

(2) Receiver (1) Sender

(5) Protocol

Sender: It is the device which sends the message. It is the source of message that can
be a computer, telephone handset, etc.
Receiver: It is the device which receives the message. It is the destination of message
that can be a computer, radio, telephone handset, etc.
Message: It is the data to be transmitted. It can be text, graphics, image, sound or
video.
Transmission Medium: It is the physical pathway over which the message is sent
from sender to receiver. Some examples of transmission media are coaxial cable, Fibre
optic cable, microwaves, etc.
Protocol: It is the set of rules between the two communicating devices that governs the
process of data communication. Without a protocol, two devices may be connected but
they cannot communicate with each other.

CHARACTERISTICS OF A GOOD COMMUNICATION SYSTEM:


Following are the properties of a good communication system.
• Delivery
• Accuracy
• Timeliness

56
DATA COMMUNICATION - IV

Delivery:
1. Data communication system must deliver the message to the correct destination.
2. Message must be received by only the device or user to whom it is sent.
3. For example, when e-mail is sent to a person, it is received only by the person.
4. This is managed by the protocol used in the data communication system.
Accuracy:
1. System must deliver the message accurately without any change.
2. Incorrect data is not usable by the receiver.
3. For example, data may get corrupted due to transmission errors over long
distances. Such data is retransmitted from the source. This is ensured by the
protocol used in the data communication system.

Timeliness:
1. The system must deliver the data without significant delay in a timely manner.
2. It is very important in real time transmission such as video conferencing.
3. Data delivered late may be useless.
4. Some real time systems require immediate transmission of data within limited
time.
5. For example, a computerized real time system is used to monitor the
temperature in an oil refinery. If the temperature is gets too high, it must be
transmitted immediately preventing an explosion.

ASYNCHRONOUS AND SYNCHRONOUS TRANSMISSION


MODES:
Asynchronous and synchronous transmissions are the methods by which characters
are transferred from one computer to another, as well as between components.
Asynchronous Transmission:
1. When time interval between each character is not the same it is known as
asynchronous transmission.
2. In asynchronous transmission, each character is transmitted with additional
control information consisting of additional start and stop bits.

57
DATA COMMUNICATION - IV

3. Start bit is generally 0 and Stop bit is 1.


4. Between the start and stop bits, the bits representing a character are transmitted
at uniform time intervals.
5. Asynchronous transmission is slow due to extra bits.
6. It is suitable for low speed connection between system unit and keyboard or
mouse.
7. Example:-A Telephone Call, Video Conferencing and IP-TV

Synchronous Transmission:
1. When time interval between the characters is always the same, it is known as
synchronous transmission.
2. In synchronous transmission, there is no control information added with the
characters.
3. Data consisting of 0s and 1s is transmitted as one long stream of bits.
4. The receiver counts the bits as they arrive and recognizes the characters.
5. Synchronous transmission is faster because it does not require extra start and
stop bits.
6. It is used for fast data communication between computers in computer
networks.
7. Example: - Weather Report, Data from Stock Exchanges and Online Gaming.

58
DATA COMMUNICATION - IV

TRANSMISSION MEDIA
Transmission media provide the means by which data travels from source to
destination. It is the pathway for transmitting data.

TYPES OF TRANSMISSION MEDIA


There are two types of transmission media: -
1. Guided Media and
2. Unguided Media.

GUIDED MEDIA
Guided media uses cabling system that guides the data signals along a specific path.
Types of guided media are:-
1. twisted pair,
2. coaxial cable and
3. Fibre optic cable.
Twisted pair cable:
1. Twisted pair cable is the most commonly used cable for data communication.
2. It consists of pairs of copper wires twisted around one another.
3. The purpose of twisting the cables is to reduce cross talk, electromagnetic
interference, thus making the transmission more reliable.
4. Telephone cable consists of two twisted insulated wires.
5. Computer network cable consists of 4 pairs of twisted cables
6. Transmission speed of twisted pair cable ranges from 2 million bits per second
to 10 billion bits per second.

Coaxial cable:
1. Coaxial cable is mainly used for local area networks and cable television
systems.
2. It consists of copper wire surrounded by insulating layer.
3. The insulating layer itself is surrounded by conductive layer.
4. Insulation reduces interference and distortion.

59
DATA COMMUNICATION - IV

5. Transmission speed ranges from 200 million bits per second to more than 500
million bits per second.

Fiber optic cable:


1. Fiber optic cable is more expensive than twisted pair and coaxial cables.
2. It is used for data transmission over long distances.
3. Fibre optic cable consists of smooth hair-thin strands of transparent material.
4. Fibre optic uses transmitter that converts electrical signals into light waves.
5. These light waves are transmitted over the Fibre optic cable.
6. At the receiving end, a receiver converts the light waves back to electrical
signals.
7. A single Fibre optic cable can carry up to 50,000 communication lines.
8. It provides high quality transmission at extremely fast speed.
9. It can transmit trillions of bits per second.
10. It is not affected by electromagnetic fields and can transmit both analog and
digital signals.

UNGUIDED MEDIA
Unguided media do not use cables for data transmission. Signals travel through
open space and nothing guides them along any specific path. Unguided media
can be classified into:
• Radio waves,
• Microwave,
• Infra-red,
• Bluetooth and
• Satellite communication.
Radio Waves:
1. Data can be transmitted over long distance using radio waves.
2. Radio waves are electromagnetic waves that are transmitted by antennas.
3. These waves are invisible and undetectable to human beings.
4. Radio transmission uses a transmitter and a receiver.
5. A transmitter transmits a radio signal and the receiver receives it.
6. Radio waves are used to transmit music, conversation, pictures and data.
60
DATA COMMUNICATION - IV

7. Examples:-
a. Radio and television broadcast
b. Cell phone communication
c. Radio-controlled toys
d. Satellite communication
e. Wireless networks and wireless Internet

Microwave:
1. Microwave signals travel through open space like radio waves.
2. Microwaves provide much faster transmission rate than telephone lines or
coaxial cables.
3. Microwave antennas are installed on high buildings or high towers.
4. The transmitting and the receiving sites must be within sight of one another.
5. Microwaves are used for satellite communication and other long distance
wireless communications.
6. Examples:-
a. Backbone links for ISPs and WISPs.
b. Building to building and campus sites
c. Television Broadcast with HDSDI and SMPTE standards.
Infra-red:
1. Infra-red waves are light energy that we cannot see.
2. It travels through space at the speed of light.
3. It is used for short distance communication.
4. Infra-red waves are used in remote controls.
5. Infra-red wireless signals are disrupted by persons or objects in between the
transmitter and receiver.
6. It does not get interference of other radio signals.
7. Examples:-
a. Remote Controls for TV, Music Players and Fans Etc.
b. Night Vision Devices.
c. industrial, scientific and medical appliances

61
DATA COMMUNICATION - IV

Bluetooth:
1. Bluetooth is a wireless communication technology that uses radio waves to
connect portable electronic devices over short distance.
2. It eliminates the need for cable connection and provides fast and reliable
transmission.
3. It supports networking of wide range of portable devices.
4. The most common use of Bluetooth is connecting a mobile phone to a
wireless headset or to a laptop computer to transfer voice data.
5. Bluetooth technology can transmit text, image, voice and video.
6. Example:-
a. mobile phone,
b. mouse,
c. keyboard,
d. wireless speaker and
e. Personal computer etc.

Satellite:
1. A satellite is placed in an orbit around the earth.
2. It revolves around the earth.
3. It is a wireless Receiver and Transmitter used for transmitting data over
long distance at high speed.
4. Ground stations beam signals to satellites.
5. Satellites amplify and retransmit the signals to another ground station many
thousands of miles away.
6. Satellite communication is high cost.
7. Satellites are launched by rockets or space shuttles.
8. It exactly matches with the rotation speed of the earth.

TRANSMISSION IMPAIRMENTS:
1. The errors that occur during data communication from one point to another
are called transmission impairments.
62
DATA COMMUNICATION - IV

2. Impairments occur due to imperfect characteristics of communication


medium.
3. As a consequence, the received and the transmitted signals are not always
the same.
4. Types of impairments:
a. Attenuation,
b. Amplification,
c. Distortion and
d. Cross talk

Attenuation:
1. Attenuation is the fall of signal strength with the distance as signal travels
through the communication media.
2. If the attenuation is too much, the receiver may not be able to detect the
signal at all.

Amplification:
1. Amplification refers to strengthening of signal to solve the problem of
attenuation in data transmission.
2. An amplifier is a device used in data communication that receives weak
signals, amplifies it and then retransmits.

Distortion:
1. Distortion refers to change in shape or frequency of digital signal.
2. Communication line delays the signal frequency.

63
DATA COMMUNICATION - IV

3. The delays occur by different amounts because different frequency


components travel at different speed.
4. Therefore, various frequency components of a signal are received at
different delays.
5. This causes distortion in digital signals.

Cross Talk:
1. Cross talk occurs in guided media.
2. As signal is transmitted through a wire, undesired signals enter the path of
the transmitted signal due to electromagnetic radiat1on.
3. It is caused because of putting several wires together in a single cable.
4. Sometimes, user can hear another conversation in the background when
talking on the phone.
5. This happens by the coupling between two wires that are close to each
other.

COMMUNICATION DEVICES
A communication device is hardware that is used for transmission of information from
one place to another between computers and other devices. The following
communication devices are commonly mostly used.
• Dial-up Modem
• Router
• Network Interface Card
• Switch/Access Point

DIAL-UP MODEM
1. Modem is abbreviation of Modulator-Demodulator.
2. A modem convers digital computer signal to analog form for transmission over
telephone line.
64
DATA COMMUNICATION - IV

3. This process is called modulation.


4. Another, modem at the receiving end, converts the analog signal back to digital
form.
5. This is called demodulation.
6. Dial-up modem provides Internet connection through telephone line.
7. Maximum speed of Dial-up modem is 56 Kilobits per second which is very
slow.
8. It has being replaced by faster DSL connection.

NETWORK INTERFACE CARD (NIC):


1. A Network Interface Card (NIC) or simply network card is used to connect
computers together to create computer network.
2. It is a card that is installed on the motherboard.
3. In modern computers, it is integrated on the motherboard.
4. There are two types of network cards:
a. Wired Network Card
b. Wireless Network Card

ROUTER:
1. Router is a communication device that is used when two networks have to be
connected for communication.
2. They send information from one network to another by selecting the best
pathway available.
3. There are two types of routers
a. Wired and
b. Wireless.

SWITCH/ ACCESS POINT:


1. A switch/access point is used for connecting computers together in local area
network (LAN).
2. A switch/access point receives information from a computer in the network,
inspects it and then transmits it appropriately to the destination computer.
3. Switch is used in wired networks whereas access point is used in wireless
networks.

65
DATA COMMUNICATION - IV

COMMUNICATION TERMINOLOGIES
Communication Terminologies refers to terms or words that are related with data
transmission or characteristics of communication channel.

DATA TRANSMISSION TERMINOLOGIES:


The following terms are used to determine the data transmission capabilities of a
transmission media.
• Data rate
• Baud rate
• Bandwidth
• Signal to Noise Ratio

Data Rate:
1. Data rate is the speed with which data can be transmitted from one device to
another.
2. It is generally measured in Kilobits (thousand bits) or Megabits (million bits)
per second.
3. kbps, is used for kilobits per second and mbps for million bits per second.

Baud Rate:
1. baud rate is measure of the speed of communication over a data channel.
OR,
2. It is also defined as,
“Baud is the rate of change of electrical signals per second during data
communications.”

Bandwidth:
1. The amount of data that can be transmitted within a fixed amount of time is
called bandwidth.
OR
2. Bandwidth describes the overall data transmission capacity of a medium or
channel.
3. Bandwidth is also measured in bits per second like data rate.

Signal-to-Noise Ratio:
It means the ratio of useful data transmission to errors caused by noise over a
transmission medium. The measurement of Signal-to-noise ratio defines the data
transmission quality of a communication medium.

66
DATA COMMUNICATION - IV

EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. B
ii. A
iii. D
iv. C
v. B
vi. C
vii. D
viii. C
ix. B
x. B
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Differentiate between analog and digital signals. See page 53
II. Why digital signals are used in computer systems?
The computer system handles only binary 0 and 1. The digital signals represents
0 as low voltage and 1 as high voltage. This stream can be easily transmitted
across the computer system. Moreover, digital signals have only discrete
values.
III. Name the properties of a good communication system. See page 54
IV. Give any three reasons why guided communication medium is more reliable
than unguided medium.
V. What is meant by transmission impairment? See page 60
VI. Differentiate between attenuation and distortion. See page 66
VII. What is cross talk? See page 62
VIII. What is Dial-up modem? Why is it used? See page 62
IX. Define data rate and baud rate. See page 64
X. Define bandwidth. See page 64

67
DATA COMMUNICATION - IV

Q3. WRITE LONG ANSWERS OF THE FOLLOWING QUESTIONS


I. Describe the components of communication system with the help of
diagram. See page 54
II. Explain asynchronous and synchronous transmission modes with examples.
See page 55
III. Describe the following guided media. See page 57
a. Twisted pair cable
b. Coaxial cable
c. Fiber optic cable
IV. Describe any three types of unguided media. See page 58
V. Describe the functions of the following communication devices. See page 63
a. Router
b. Network Interface Card (NIC)
c. Switch/ Access point

Attenuation Distortion
1. It is the power loss of signal due to 1. It is the attenuation of original
long distances signal
2. It occurs due to refraction, 2. This happens due to the
electromagnetism and diffraction properties of the medium
3. Removal of effects of attenuated 3. Removal of distorted signal is
signals is easy. very difficult.

68
Class: IX
Chapter # 5
COMPUTER NETWORKS
COMPUTER NETWORKS - V

INTRODUCTION TO NETWORKS
A computer network is interconnection between computers and devices to provide
facilities among users to exchange information and share resources. These resources
can be programs, documents, printers and Internet connection.

COMPUTER NETWORK
A computer network can be defined as an interconnection of two or more computers
to share data and other resources such as documents, printers and internet connection.
Example:-
Computer 2

Switch
Computer 1 Server

Computer 3

USES OF NETWORKS
The following are some common uses of networks.
• Hardware Sharing
• Software Sharing
• File Sharing
• Internet Sharing
Hardware Sharing:
1. Network allows sharing of computer hardware such as hard disk and printer.
2. A single large hard disk can provide storage space to many users.
3. Every user on a network can use a shared printer for printing documents and
there is no need to buy a printer for every user.

70
COMPUTER NETWORKS - V

Software Sharing:
1. Application software can be installed on a server and shared over the network.
2. Hundreds of users can use it at the same time.
File Sharing:
1. A user of a network can easily share files with other users over the network.
2. Users can access, view and modify information stored on another computer in
the network.

Internet Sharing:
1. A single high speed Internet connection can be shared with all the users over a
network.
2. There is no need to provide a separate Internet connection to every user on the
network.

DATA TRANSMISSION MODES


Data transmission is the process of sending data from one device to another. It consists
of sender, receiver and the medium which carries the information.
There are three modes of data transmission:
• Simplex,
• Half-duplex and
• Full-duplex
Simplex Transmission Mode:
1. A simplex mode provides data transmission in only one direction.
2. One end is the sender and the other is receiver.
3. Example:-
a. Radio and TV Broadcast
b. I/O Devices to CPU and Vice Versa

Printer

Computer

71
COMPUTER NETWORKS - V

Half-duplex Transmission Mode:


1. Half-duplex mode can send and receive data/information in both directions
but not at the same time.
2. During data transmission, one end is the sender and the other is receiver.
3. Example:-
a. ATM Machine
b. Walkie-Talkie
c. Intercom

ATM Machine

Computer

Full-duplex Transmission Mode:


1. A Full-duplex mode is used to transmit data/information in both directions at
the same time.
2. It can transmit more data/info1mation at higher rate.
3. Example:-
a. Internet
b. IP-TV
c. Telephone

Computer Computer

NETWORK ARCHITECTURE:
Network architecture refers to layout of network devices.
A computer network can be as small as two computers linked together by a single

cable whereas large networks connect thousands of computers and other devices.

TYPES OF NETWORK ARCHITECTURES:


Three types of network architectures are commonly used which are:
• Client/Server network
• Peer-to-peer network
• Point-to-point network

72
COMPUTER NETWORKS - V

Client/Server network
1. A Server is a main computer in a network which is used to manage network
resources and facilitates other computers.
2. Clients are computers in a network that access services made available by a
server.
3. In a client/server network, each computer on the network acts as either a server
or a client.
4. Servers are not used as client computers and client computers are not used as
servers.
5. In a client/server network, server shares its resources such as hard disk,
printers and Internet connection with client computers.
Computer 2

Server
Computer 1 Computer 4

Computer 3

Characteristics of Client/Server Networks:


1. Client/server network can be as small as two computers and it can have
hundreds and even thousands of computers as well.
2. It provides centralized security
3. In a client/server network, resources are shared, user accounts are created and
privileges of different level are assigned.

Peer-to-Peer Network
1. In Peer-to-Peer network every computer is capable of playing the role of client,
server or both at the same time.
2. Each computer on the network is known as peer.

73
COMPUTER NETWORKS - V

3. A peer on the network can share as well as access available resources on the
network.

Characteristics of Peer-to-Peer Networks:


1. In a peer-to-peer network, each computer can be a server, client or both at the
same time.
2. Peer-to-peer networks are suitable for a small number of users, between two
and ten computers.
3. It does not provide centralized security.
4. Each users have complete control over resources of their computer.

Computer 2

Computer 1 Computer 4

Computer 3

Point-to-Point Networks
1. It is a type of network in which a message is sent from one computer to another
via other computers in the network.
2. Large networks such as wide area networks that connect cities and countries is
an example of Point-to-Point Network.

Characteristics of Point-to-Point Networks:


1. Point-to-Point networks are used for long distance communication.
2. There may be different paths for transmission of information.

74
COMPUTER NETWORKS - V

Server 1 Server 2

LAN 1
LAN 2

Server 3

LAN 3

TYPES OF NETWORKS
TYPES OF NETWORKS BASED ON GEOGRAPHICAL AREA:
Based on the geographical distance covered, computer networks are classified into:
1. Local Area Network,
2. Wide Area Network and
3. Metropolitan Area
Local Area Network (LAN):
1. Local area network is the most commonly used network.
2. It covers a limited area usually ranging from a small office to a campus of
nearby buildings.
3. Examples: networks within a school, college, business and organization.
Characteristics of LAN:
1. LAN stands for Local Area Network.
2. LAN is restricted to a limited geographical area.
3. Data transmission speed is fast.

75
COMPUTER NETWORKS - V

4. Data communication problems rarely occur.


5. Transmission medium is owned by the user organization.
6. Example: Computer network in the lab of a school or college.

Computer 2

Printer

Switch
Computer 1 Server

Computer 3

Wide Area Network (WAN):


1. A WAN is often made up two or more LANs.
2. Wide Area Network spans a large area, connecting several locations of an
organization across cities, countries and continents.
3. A WAN can also be made of combination of multiple LANs and/or WANs.
4. Example:
a. National Databases like NADRA
b. Internet

Characteristics of WAN:
1. WAN stands for Wide Area Network.
2. WAN spans large geographical area.
3. It can connect computers between cities and countries
4. Data transmission speed is slow.
5. Data communication problems often occur.
6. Transmission medium is leased lines or public systems such as telephone lines
or satellite links.
7. Example: Bank Branches spread across the country

76
COMPUTER NETWORKS - V

Leased Line
Switch Switch

LAN 1 LAN 2

Metropolitan Area Network (MAN):


1. A Metropolitan Area Network (MAN) falls between LAN and WAN.
2. It spans area larger than a LAN but smaller than a WAN.
3. Examples:
a. Cable TV
b. Internet Services by a Telecom Company

Characteristics of MAN:
1. MAN stands for Metropolitan Area Network.
2. MAN can connect computers within several blocks of buildings to entire city.
3. Data transmission speed is slower than LAN but faster than WAN.
4. Fibre optic cable or wireless microwave transmission is used as communication
medium.

PERSONAL AREA NETWORK (PAN):


1. A personal area network (PAN) is a computer network organized around an
individual person.
2. Personal area networks typically involve a mobile computer, a cell phone
and/or a handheld computing device.
3. Users can use these networks to sync data across multiple devices.
4. Personal area networks can be wired or wireless.
5. Example:- PAN using Bluetooth Technology.

77
COMPUTER NETWORKS - V

Bluetooth Network:
1. It is possible to pair one device to multiple devices using Bluetooth technology.
2. The process of setting up a Bluetooth network is referred to as "Pairing". Pairing
is done through interaction between two users.

Characteristics of Bluetooth Communication


1. Bluetooth transmission eliminates the need of cable to form a network.
2. Transmission is secure, reliable and fast.
3. It creates Personal Area Network in which Bluetooth devices are close to each
other.
4. It can transmit text, images, audio files and video files.
Internet (International Network):
1. Internet connects millions of computers all over the world.
2. Computers on the Internet are connected together using telephone lines, fiber
optics or wireless signals.
3. An IP address identifies each computer on the Internet with its location
4. IP stands for Internet Protocol.
5. Internet allows people to send e-mail, chat with friends and obtain information
on any topic.
6. Computer users pay bills, do shopping, find jobs, work at home and make
reservation for trains, flights and hotels through Internet.
7. Social networking websites allows millions of people to communicate with
each other and share their views and ideas.
8. World Wide Web (www) or Web in short, is the most popular and widely used
system to access the Internet.
9. It is a collection of websites available on the Internet.
10. A webs site contains related webpages that can be accessed using a browser.
11. To access a website, computer users enter a string of characters called Uniform
Resource Locator (URL) into a browser.
12. For example to access the website of Federal board, the user will enter the URL
www.fbise.edu.pk into a browser.

78
COMPUTER NETWORKS - V

NETWORK TOPOLOGY
The physical arrangement of network nodes is called network topology. A node is a
computer or a network device.

TYPES OF NETWORK TOPOLOGIES:


Four types of network topologies are:
1. Bus Topology,
2. Ring Topology,
3. Star Topology And
4. Mesh Topology
Bus Topology:
1. It consists of a single central cable known as bus.
2. All the devices are connected to the bus along its length.
3. A computer sends a message on the bus.
4. The recipient computer receives it while others ignore it.
5. At each end of bus a device called terminator is attached so that the signals do
not bounce back on the bus causing errors.

Advantages of Bus Topology:


1. Lowest cost topology to implement due to short cable length.
2. Easy to add new computers.
3. Easy to setup as compared to Star or Mesh topology.
4. Suitable for small networks.

Limitations of Bus Topology:


1. If bus is damaged at any point, the entire network stops working.
2. Difficult to detect and fix faults.

Terminator
BUS

Terminator

79
COMPUTER NETWORKS - V

Ring Topology:
1. The ring network topology is virtually shaped just like a ring.
2. It is like a bus with both ends connected together.
3. All the messages travel in the same direction.
4. Message from one node is sent to the next node until it reaches its destination.

Advantages of Ring Topology:


1. High network performance.
2. Server or switch is not required to manage the network.
3. All the computers have equal opportunity to transmit data.

Limitations of Ring Topology:


1. If ring is broken at any point, the entire network stops functioning.
2. Detection of fault is difficult.
3. If any computer in the ring is not working the whole network is affected.
4. Expansive than Star and Bus topologies.

Star Topology:
1. In star topology all the nodes are connected to a central device called switch or
hub.
2. It is a one of the commonly used network topologies.
3. A switch can connect 4, 8, 16, 24 or 32 nodes.
4. A switch can be connected to another switch to expand the network.

Advantages of Star Topology:


1. Provides fast communication between computers.
2. Easy to connect new devices to the network.

80
COMPUTER NETWORKS - V

3. Easy to detect and fix faults.


4. Failure of one computer does not stop functioning of the entire network.

Limitations of Star Topology:


1. At least one switch/hub is required for connecting two computers.
2. Lengthy cable is required to connect all the computers to the switch.
3. Costly to implement.

Switch/Hub

Mesh Topology:
1. In mesh network topology, all the network nodes are connected to all the other
nodes.
2. Message sent on a mesh network, can take any possible path from source to
destination.
3. It is not commonly used since it is costly and difficult to implement.

Advantages of Mesh Topology:


1. It is the most reliable network topology.
2. Alternative paths are available in case a path is broken from source to
destination.

Limitations of Mesh Topology:


1. Most expensive topology to implement since it requires more cable then Bus,
Ring or Star topologies.
2. Difficult to implement as compared to other topologies.
3. Difficult to add new computer

81
COMPUTER NETWORKS - V

COMMUNICATION VIA TELEPHONE NETWORKS:


Communication over network refers to transmission of data/information from one
computer to another through a communication medium.

COMMUNICATION VIA TELEPHONE NETWORKS:


Four types of communication lines are provided via telephone networks.
1. Dial-up line
2. Digital Subscriber Line (DSL)
3. Integrated Services Digital Network (ISDN) lines
4. Code Division Multiple Access (CDMA)

Dial-up Line:
1. Dial-up line uses standard telephone lines for internet connection.
2. It requires a Dial-up modem.
3. It has maximum Internet connection speed of 56Kbps.
4. It uses complex network of telephone lines that allows data to be transmitted
to almost any location in the world.
5. It is becoming outdated due to very slow Internet connection.
DSL:
1. DSL stands for Digital Subscriber Line.
2. It provides a very high speed broadband Internet connection.
3. Internet speed of 256Kbps or above is known as Broadband.

82
COMPUTER NETWORKS - V

4. It is also called broadband because data is transmitted over a broad range of


frequencies.
5. A DSL modem is required for setting up the DSL Internet connection.
6. Internet Service Providers (ISPs) have several DSL speeds available with
different monthly rates.

ISDN:
1. ISDN stands for Integrated Services Digital Network.
2. It provides a maximum speed of 128Kbps.
3. It is faster than Dial-up connection but slower than DSL.
4. It can transmit both voice and data at the same time over a single cable.
5. It requires that the user has ISDN digital telephone service and uses a faster
modem than Dial-up modem.
6. ISDN service is being replaced by faster DSL service.

CDMA technology
1. CDMA stands for Code Division Multiple Access.
2. It is a wireless cellular communication technology.
3. CDMA services include short messaging, voice, data and video transmission.
4. It can provide speed of several Mbps for video transmission.

TYPES OF MODEMS:
There are three types of modem which are commonly used.
1. Dial•up modem,
2. DSL modem and
3. ISDN modem.

Dial-up Modem:
1. A Dial-up modem is required for Dial-up Internet connection.
2. It is the short form of MODulator/DEModulator.
3. Modulation: the process of converting digital signals into analog signals.
4. Demodulation: the process of converting analog signals into digital signals.
83
COMPUTER NETWORKS - V

5. Modem accepts digital data from the computer in the form of two-level signals
and converts them into analog signals for transmission over the telephone line.
6. A second modem at the receiving end is used to convert the analog signals back
to digital form.

DSL Modem:
1. A DSL modem is used to connect computers to high-speed DSL connections.
2. It is designed to provide high-speed Internet access.
3. A DSL modem is an external device that connects to a computer via USB or
Ethernet port.
4. Wireless DSL modems are also available for connecting laptop and other
wireless devices.
5. DSL modem converts the digital signals into analog high frequency signals.
6. These signals are carried by the telephone lines and vice versa.

ISDN Modem:
1. ISDN modem is a device that converts digital signals used in computers to the
signals that can be transmitted over the ISDN lines.
2. It provides both voice and data transmission on a single line at the same time.

COMPARISON BETWEEN DATA COMMUNICATION LINES:


Dial-up line:
1. Maximum speed is 56 Kbps.
2. Easily available anywhere, no extra lines required.
3. Cheaper than other Internet services.
4. Internet connection is not permanently available.
5. Voice communication is not possible while using Internet.
DSL (Digital Subscriber Line):
1. Typical speed is 256Kbps or above.
2. DSL connection is always available.
3. Telephonic conversation and Internet access are available simultaneously.
84
COMPUTER NETWORKS - V

4. Costly than other types of Internet services.


5. Various monthly rates are charged depending on the speed.
6. Connection is available as soon as computer and DSL modem are turned on.
ISDN (Integrated Services Digital Network):
1. Maximum communication speed is 128 Kbps.
2. Costs more than Dial-up service.
3. Can simultaneously transmit both voice and data.
4. Allows multiple devices to share a single line.
CDMA (Code Division Multiple Access)
1. It is a wireless cellular communication technology.
2. Transmission speed can be up to a several Mbps.
3. Can provide service to many people at the same time.
4. Provides improved voice quality.

EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. B
ii. B
iii. A
iv. C
v. D
vi. A
vii. C
viii. B
ix. B
x. C
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Describe any three difficulties a company may face in running a business
without having computer network.
In absence of a reliable computer network, the company may not be able to
enjoy the benefits of
1. File Sharing

85
COMPUTER NETWORKS - V

2. Hardware sharing
3. Internet access
4. Communication and coordination
5. Data protection.
II. What is meant by data transmission? See page 69
III. Differentiate between Half-duplex and Full-duplex transmission modes. See
page 68
IV. Define network architecture? See page 70
V. Differentiate between a server and a client computer. See page 71
VI. Compare LAN and WAN. See page 73 74
VII. Why star topology is more reliable than bus or ring topologies?
Star topology is more reliable than bus or ring because it does not stop
functioning in case one node is broken. Furthermore, the problem resolution is
simpler in star than the others.
VIII. Mention any three problems which may occur if peer-to-peer network is
used for a large number of users in an organization.
Three problems that can occur are:-
1. Network speed gets slow.
2. Attacks of viruses, Trojans etc are greatly increased.
3. Administration is difficult to manage.
IX. What is ISDN? See page 81
X. What is CDMA technology? See page 81

Q3. WRITE LONG ANSWERS OF THE FOLLOWING QUESTIONS


I. What are the advantages of using networks? See page 68
II. Describe Client/Server and Peer-to-Peer networks. See page 71
III. Describe the types of networks based on area covered. See page 73
IV. Explain the types of network topologies. See page 77
V. Write a note on Dial-up and DSL Internet connections. See page 81

86
Class: IX
Chapter # 6
COMPUTER SECURITY AND
ETHICS
COMPUTER SECURITY AND ETHICS - VI

COMPUTER SECURITY
Computer security refers to protecting computer hardware, software and information
stored on computer from threats.

IMPORTANCE OF COMPUTER SECURITY:


1. Computer users often exchange information with each other or communicate
over Internet.
2. This can infect a user's computer.
3. Some users are aware of computer threats but do not know how to protect their
computers.
4. Computer security or safety is important for computer users to protect their
computer from different threats.
5. It is necessary to install security software such as firewall, antivirus and spyware
on computers.

CYBERCRIME:
1. Cybercrime refers to any crime that is committed by means of computer and
Internet technology.
2. Criminals are exploiting the convenience and anonymity of the Internet to
commit various types of crimes.
3. Cyber Crimes is now considered a global epidemic.
4. It is a serious concern for governments.
5. Many governments fine and imprison cybercriminals.
The following are the commonly committed cybercrimes.
a. Computers have been involved in crimes of various natures, stealing money
from bank and Credit Card Company.
b. Criminals use Internet to steal personal information of other users.
c. Personal information includes username, password, credit card number, bank
account number. etc.
d. Downloading illegal software, music files and videos are also cybercrimes.
e. Internet harassment or cyber bullying is also a serious crime.

88
COMPUTER SECURITY AND ETHICS - VI

f. It includes sending threatening e-mail, spreading rumors or virus, making


defamatory comments, sending pornography or other bad material.

HACKER
1. A person who illegally breaks into others' computer systems is known as
hacker.
2. Hacking is a cybercrime.
3. Hackers are computer experts who try to gain unauthorized access for stealing
and corrupting information.
4. Most of the hackers break into computers for financial benefits.
5. Hackers can create tools and malicious software for others to break into
networks and create problems.

CRACKER:
1. Cracker is a computer user who breaks into computer systems without
permission.
2. Most of the crackers use hacking tools.
3. Crackers break into computers and cause serious damage.
4. These criminals are dangerous and harder to catch.

MALWARE AND ITS TYPES


Malware is malicious software. Malware is created for attack on privacy, spying,
destruction and financial benefits. Most common types of malware are:
1. Computer viruses
2. Spyware
3. Computer Viruses:
4. Worms
5. Adware

Computer viruses
1. A computer virus is a type of malware that spreads by inserting a copy of itself
into another program or file.

89
COMPUTER SECURITY AND ETHICS - VI

2. Most of the viruses are attached to executable files.


3. Viruses spread and infect other files when a user opens the infected program
or file.
4. Viruses also spread when infected files are transferred from one computer to
another through network, USB flash drive, CD/DVD or infected e-mail
attachments.
5. Some viruses are not very harmful they are simply annoying while others can
seriously damage the hardware, software or the information stored on the
computer.
6. Viruses can slow down the computer and some can even stop its operation.
7. Examples:- I Love You, MyDoom, etc.

Worms:
1. A worm is a malware that transmits itself over a network to infect other
computers.
2. Worm can be harmful like a virus.
3. It spreads automatically in computer networks and replicates itself.
4. It can travel from computer to computer without any human action.
5. It enters a computer through a weakness in the operating system of the
computer
6. Worms may cause some harm to the network such as slowing down
communication by increasing network traffic.
7. Examples: Code Red and Fizzer Spyware:

Spyware
1. Spyware programs are developed to spy on computer users by gathering
information about their activities on the computer.
2. Spyware is developed for the personal benefit of the creator.
3. It performs secret operations such as stealing password or banking PIN
(Personal Identification Number)
90
COMPUTER SECURITY AND ETHICS - VI

4. It infects computers through installation of software form Internet.


5. It slows down the performance of infected computer.
6. Most of the spyware is designed to be difficult to remove
7. Examples: Flame is a spyware that was discovered in 2012.

Adware:
1. Adware is a malware that attaches itself to free software on the Internet and
infects computer when such software is downloaded.
2. It pops up advertisements.
3. Pop-up block option in browsers helps protect computer from adware.
4. Some adware may also collect user information without their permission.

How malware spreads.


Following are different ways malware can spread in computers.

Infected Flash Drives/CDs:


Flash drives and CDs are a major source of pirated softwares. These pirated softwares
can spread viruses, spywares and other malwares.

Pirated Software:
Pirated software on CDs is a very common source of spreading malware on computers
because these are often infected.
If users download pirated music, movies, programs, etc. for free, their computers may
be infected.

Network and Internet:


Computers get infected with malware when information is exchanged with other
computers and also while browsing infected websites.
E-mail Attachments:
Opening e-mail attachments can infect computer with malware. This attachement can
be from a stranger or a known person. They may pass the user a virus or other malware
without knowing about it.

91
COMPUTER SECURITY AND ETHICS - VI

COMMON SYMPTOMS OF MALWARE ATTACKS:


A list of common symptoms of infected computers is given below.
1. The computer does not start or it reboots automatically when it is on.
2. Different types of error messages appear on the screen.
3. Unexpected messages appear on the screen.
4. Programs do not run in a normal way.
5. Computer is running very slow.
6. New files or folders are created on the hard disk.
7. Folders are deleted or changed on the hard disk.
8. Hard disk activity is noticed without running any program.
9. Web browser does not run in a normal way.
10. Strange noise is heard when the computer is on.

PROTECTING COMPUTER FROM MALWARE/VIRUS ATTACKS:


Anti-spyware and Antivirus Programs are used to safeguard computer against
viruses, worms, adware and spyware.

Antivirus Software:
1. Antivirus software is a computer program that detects and removes viruses
and other types of malware.
2. Computer user should install it on computer and update it regularly.
3. Most antivirus programs have an auto-update feature that automatically
updates the antivirus program.
4. This enables it to detect and remove new versions of viruses as well.
5. On attaching a flash drive or any other type of storage device to computer, the
antivirus ensures that it does not contain viruses.
6. Example: Norton Antivirus, Kaspersky, AVG, Bit Defender etc.
Anti-Spyware:
1. Anti-spyware is a computer program that detects spyware infections on
computer and removes them.
2. It helps to protect computer against security threats caused by spyware and
other types of malware.

92
COMPUTER SECURITY AND ETHICS - VI

3. Computer user should install it in computer and regularly update it to


safeguard computer against new threats.
4. Anti-spyware program runs in the background of computer and continually
scans for spyware threats.
5. A user can also start Anti-spyware program to scan computer to find and
remove spyware.
6. Examples: Norton Anti-spyware, SpySweeper, Spybot-Search & Destroy,
Spyware Doctor, and AVG Anti-spyware.

AUTHENTICATION AND AUTHORIZATION


Authentication means identifying a person based on a method such as Username and
Password, (PIN), Access Card or Biometrics. It verifies who the person is.
Authorization means to give someone permission to do something

AUTHORIZED AND UNAUTHORIZED ACCESS


When a person’s identity is approved by entering information such as username and
password, he has authorized access to a computer or computer network. If a person
gains access to a computer system without approval he has unauthorized access which
is a crime.
When a hacker breaks into a computer system to steal, change or destroy information,
he has unauthorized access to the computer system.

AUTHENTICATION METHODOLOGIES
The following are common methodologies used for authentication purpose.
1. Username and password
2. Personal Identification Number
3. Access card
4. Biometrics
Username and Password:
1. A username is a name that identifies a person on a computer system.

93
COMPUTER SECURITY AND ETHICS - VI

2. Username is generally used with a password.


3. The username and password combination is known as login information.
4. Username is the known part of user's login information whereas password is
secret.
5. If it is known by a person it could be misused with bad intentions.
6. Username and password are used to authorize users to have access to computer
systems, email account, bank account and other services available on computer.

Personal Identification Number (PIN):


1. PIN is a confidential numeric password used to authenticate a user to get access
to a computer system.
2. When a user enters the PIN, it is searched in the database.
3. If it matches, the user is authorized to use the computer.
4. PINs are most commonly used with debit and credit cards.
5. It is also used with ATM cards.
Access Cards:
1. Access cards are very similar in appearance to credit cards.
2. They are commonly used to open security gates in offices where unauthorized
people are not allowed to enter.
3. Access cards are also used to open barriers in parking areas.
4. They are an alternative to key for opening hotel room, etc.
Biometrics:
1. Biometrics refers to authentication methods based on physical characteristics
of individuals such as features of face, hand geometry, retina, voice and
fingerprint.
2. It provides highly secure identification and personal verification technologies.
3. Biometrics based systems are used for financial transactions, electronic banking
and personal data privacy.
4. It provides more accurate authentication.
5. Biometrics is associated with a particular individual.
6. Hence, it cannot be borrowed, stolen or forgotten.
7. Forging in biometrics is practically impossible.

94
COMPUTER SECURITY AND ETHICS - VI

MULTIMODAL AUTHENTICATION
Multimodal authentication means combination of two or more types of authentication
methods. Multimodal authentication uses multiple sources of information for
identification. For example, fingerprint and face recognition can be combined for a
multimodal biometric authentication system. As another example, a multimodal
authentication can combine access card and PIN to open security gate.

COMPUTER ETHICS:
1. Computer ethics means an acceptable behavior for using computer technology.
2. It is a code of behavior for moral and social issues.
3. Computer user should be honest, respect the rights of others on the Internet and obey
laws that apply to online behavior.
4. We should not use bad language while chatting and social networking.
5. We need to respect other’s views and should net criticize people.
6. We should not pretend as someone else and fool others.
7. We should not download copyrighted material such as music, movies, etc.
8. People should not do something on the Internet that is morally objectionable or illegal.

ETHICAL USE OF COMPUTER:


The following are some important moral guidelines for ethical use of computer
technology.
1. Computer should not be used to harm other people.
2. Computer users should not break into others' computer systems to steal,
change or destroy information.
3. Computer users should not read documents and e-mails of other users without
their consent.
4. People should not make illegal copies of copyright software and sell it for
financial benefit.
5. Computer users who have special computer knowledge and ability should not
create malicious software (such as computer virus) and spread it to other
computers.
95
COMPUTER SECURITY AND ETHICS - VI

6. People should not commit any type of crime with the help of computer
technology.
7. Computer users should respect the privacy of others.

AREAS OF COMPUTER ETHICS:


The following are main areas of computer ethics.
1. Information accuracy
2. Information ownership/Intellectual rights
3. Intellectual Property
4. Software piracy
5. Information privacy
6. Internet and Privacy
Information Accuracy:
Information stored on computers must be accurate, up-to-date and complete. If wrong
information is entered in computer, it can be very harmful. People may suffer because
of inaccurate information. For example, a credit card holder may be wrongly
blacklisted if wrong information is entered into the computer.

Information Ownership/Intellectual Rights:


Information ownership or intellectual rights mean persons who create ideas in any
form are the actual owners. Ideas may be in the form of poems, plays, novels, films,
drawings, paintings, software, etc.

Intellectual Property:
Intellectual property means the legal rights of an individual or a corporation that result
from intellectual activity in literary, artistic, scientific and industrial fields. Countries
have law to protect intellectual property to foster innovation and promote creativity.

Software Piracy:
Software piracy means making illegal copies of software for use or sale for financial
benefit. When computer users buy licensed software, they have the right to use it on
a single computer. It allows software developers to benefit financially from their work.

96
COMPUTER SECURITY AND ETHICS - VI

Information Privacy:
Information privacy refers to an individual's right to the privacy of personal
information. The Data Protection Act (Law) protects the rights of the individuals
against misuse of personal information by organizations.

Internet and Privacy:


People who use Internet are worried that it may be eroding their privacy. Internet
users post their personal information such as full name, date of birth, place of
residence, phone numbers, pictures, videos etc. on the Web and it stays there. This
information can be accessed by hackers and used for harmful purpose. This poses a
serious threat to privacy as unauthorized people can access personal information of
individuals.

EXERCISE
Q1. SELECT THE BEST ANSWER FOR THE FOLLOWING MCQS.
i. C
ii. D
iii. B
iv. C
v. C
vi. D
vii. D
viii. C ix.
D
x. B
Q2. WRITE SHORT ANSWERS OF THE FOLLOWING QUESTIONS
I. Define cybercrime. See page 86
II. What is the importance of computer security? See page 86
III. Differentiate between hacker and cracker. See page 87
IV. Describe any five symptoms of malware. See page 89
V. Differentiate between authentication and authorization. See page 91
VI. Which authentication methodology provides highly secure identification and
verification? Justify your answer. See page 92 Biometrics
VII. What is meant by Information privacy? See page 95
VIII. Give any three drawbacks of software piracy? See page 94

97
COMPUTER SECURITY AND ETHICS - VI

IX. What types of problems may be faced if computer users do not comply with the
moral guidelines of computer ethics?
People will get into eve, corrupt, ill and malicious behavior should they not abide
by computer ethics. Online trading and businesses will get destroyed.
X. Name any three places where authentication of people is required.
Authentication is required to,
1. Gain access to a computer,
2. Use vault of a bank
3. E-mail accounts.
Q3. WRITE LONG ANSWERS OF THE FOLLOWING QUESTIONS
I. Define malware and describe its types. See page 87
II. Explain how malware spreads. See page 89
III. Explain how to protect computer systems from virus attacks. See page 90
IV. What are the common methodologies used for authentication? See page 91
V. Define computer ethics and write some important moral guidelines for
ethical use of computer technology. See page 93

98
100
101
102

You might also like