You are on page 1of 8

VIJAYABHERI

MALAPPURAM DISTRICT PANCHAYATH


EDUCATIONAL PROJECT 2023-24

LEAP - 24
COMPUTER APPLICATIONS -COM
FIRST YEAR
(Exam Sure Pass Study Material)
2025 മാർച്ചിലെ ഹയർസെക്കൻഡറി/വിഎച്ച്എസ്ഇ പരീക്ഷയിൽ
100% വിജയം ഉറപ്പുവരുത്തുന്നതിനോടൊപ്പം ഗുണമേന്മയുള്ള വിദ്യാഭ്യാസം
എല്ലാവർക്കും ലഭ്യമാക്കുക എന്ന ഉദ്ദേശത്തോടെ ഈ അധ്യായന വർഷം മുതൽ
ഹയർസെക്കൻഡറി വിഎച്ച്എസ്ഇ തലത്തിൽ വിജയഭേരി പദ്ധതി പ്രത്യേകമായി
നടപ്പിലാക്കുകയാണ്. അതിൻറെ ഭാഗമായി എല്ലാ ഹയർസെക്കൻഡറി
വിഎച്ച്എസ്ഇ സ്കൂളുകളിലും വിജയഭേരി കോർഡിനേറ്ററായി ഒരു അധ്യാപകന്
ചുമതല നൽകുകയും വിവിധ പ്രവർത്തനങ്ങൾ ആസൂത്രണം ചെയ്തു നടപ്പിലാക്കി
വരികയുമാണ്. പിന്നാക്കം നിൽക്കുന്ന വിദ്യാർത്ഥികളെ നേരത്തെ തന്നെ
കണ്ടെത്തി പ്രത്യേക പരിശീലനങ്ങൾ ആരംഭിച്ചു കഴിഞ്ഞു. ഇത്തരം
വിദ്യാർത്ഥികൾക്ക് ആത്മവിശ്വാസത്തോടെ പരീക്ഷയെ അഭിമുഖീകരിക്കുന്നതിന്
എല്ലാ വിഷയങ്ങൾക്കും രണ്ടുവർഷങ്ങളിലേക്കുമുള്ള പ്രത്യേക റിവിഷൻ
മെറ്റീരിയൽ അധ്യാപക ശില്പശാലയിലൂടെ രൂപപ്പെടുത്തി സ്കൂളിലേക്ക്
എത്തിക്കുകയാണ്. കമ്പ്യൂട്ടർ അപ്ലിക്കേഷൻ -കോമേഴ്‌സ് വിഷയത്തിന്റെ
മെറ്റീരിയലാണിത്. ഇത് പിന്നോക്കം നിൽക്കുന്ന വിദ്യാർത്ഥികളെ ഉദ്ദേശിച്ച് മാത്രം
തയ്യാറാക്കിയതാണെന്ന് അധ്യാപകർ പ്രത്യേകം ശ്രദ്ധിക്കുമല്ലോ. ആവശ്യമായ
ഭേദഗതി വരുത്തി റിവിഷൻ ക്ലാസുകൾക്ക് ഈ മെറ്റീരിയൽ ഉപയോഗിക്കാം. എല്ലാ
വിദ്യാർത്ഥികൾക്കും മികച്ച വിജയം ലഭ്യമാക്കുക എന്നതാണ് നമ്മുടെ ലക്ഷ്യം. ഈ
റിവിഷൻ മെറ്റീരിയൽ വളരെ കുറഞ്ഞ സമയത്തിനുള്ളിൽ മികച്ച രീതിയിൽ
തയ്യാറാക്കി തന്ന എല്ലാ അധ്യാപകരെയും പ്രത്യേകം അഭിനന്ദിക്കുന്നു.
വിജയഭേരി പ്രവർത്തനങ്ങൾക്ക് എല്ലാഅധ്യാപകരുടെയും
പിന്തുണയുണ്ടാകുമെന്ന പ്രതീക്ഷയോടെ .

എംകെ റഫീഖ
പ്രസിഡൻറ് ജില്ലാ പഞ്ചായത്ത്

ഇസ്മായിൽ മുത്തേടം
വൈസ് പ്രസിഡണ്ട് മലപ്പുറം ജില്ലാ പഞ്ചായത്ത്

നസീബ അസീസ്
ചെയർപേഴ് സൺ
ആരോഗ്യ വിദ്യാഭ്യാസ സ്ഥിരസമിതി

ഡോ.അനിൽ പിഎം
ആർ ഡി ഡി മലപ്പുറം
Chapter 1.FUNDAMENTALS OF COMPUTERS (c)Octal->Binary (d)Hexadecimal to Binary
(each digit 3 bit binary) (each digit 4 bit binary)
Data Information
Raw facts and figures Processed data
Similar to raw material Similar to final product (e)Binary-> Octal (f)Binary->Hexadecimal
(binary for 3 bit group) (binary for 4 bit group)
No direct use Helps take decisions
Not precise or clear Clear,meaningful data
Data Representation methods:
Data -----> Processing --------> Information 1. Integers:
(a)Sign & Magnitude (b)1’s complement(c) 2’s
Stages in Data Processing complement
1.Capture Data
2.Input
3.Storage
4.Processing
5.Output
6.Distribution
Functional units(John Von Neumann model)
CPU – Brain 2.Floating point numbers:
of Computer 24 bits- mantissa, 8 bits- exponent .
ALU – Eg: 34.5 (mantissa -> 0.345 exponent->2)
Arithmetic 3. Characters :
Logic Unit a.ASCII (American Standard Code for
CU –Control Information Interchange)7 bits
Unit b.EBCDIC(8 bits, by IBM)
(controls all c.ISCII (Indian Standard Code for Information
other units) Interchange,8 bits, Indian languages)
Merits of computers: Accuracy, Speed, d.UNICODE(Universal code)16 bits, all langs
Diligence, Versatility, Huge memory 4. Image files: (JPEG)Joint Picture Experts Group,
Limitations: No IQ, Cannot take decisions BMP (Bitmap file format), TIFF (Tagged Image File
Format), GIF(Graphics Interchange Format),
Number System: systematic way to represent PNG - (Portable (Public) Network Graphic)
numbers. 5. Audio: WAV, MP3, MIDI, AIFF
System Base/Radix Symbols 6.Video: AVI ( Audio Video Interleave),WMV
Binary 2 0,1
Chapter 2
Octal 8 0-7 COMPONENTS OF THE COMPUTER SYSTEM
Decimal 10 0-9 Hardware - Physical parts of a computer
Hexadecimal 16 0-9, A,B,C,D,E,F Processor: IC with millions of electronic
components in a single chip
Registers: (Temporary storages inside CPU)
MSD of 367 is 3(leftmost ) , LSD is 7(rightmost)
(1) Accumulator
(2) MAR( Memory Address Register)
Number Conversion
(3) MBR(Memory Buffer Register)
(a)Decimal to Binary/Octal/Hexadecimal :
(4) IR(Instruction Register
Divide by 2/8/16, take remainders in up direction
(5) PC(Program Counter)
Motherboard: Large Printed Circuit Board to
which all major components are integrated.
Peripherals and ports: Peripherals are devices
attached to a computer. Ports are used to
connect them.
(b)Binary/Octal/Hexadecimal to Decimal Port Features
Multiply each bit from right to left with powers of Serial 1bit at a time,connect mouse/keyboard
2/8/16 and add up
Parallel Several bits at a time, faster than serial
USB Universal Serial Bus, fast, can charge

Vijayabheri – Malappuram District Panchayat 1


LAN connect to network .RJ45 is connector. Green computing – environment friendly use of
computers
PS/2 by IBM,connect keyboard/mouse, slow (Complementary approaches- green design,
Audio connect audio devices. Line in, Line green manufacturing,green use, green disposal)
out, Mic in
VGA Video Graphics Array, connects
monitor/projector
HDMI High Definition Multimedia Interface,
video and audio in one cable

1.Primary 1.RAM
Memory Type of Use Examples
(Main
2.ROM
s/w (Functions)
memory) 3.Cache(between RAM &
CPU) Management Linux, Dos,Windows
Memory Operating of
2.Second 1.Magnetic (Tape, Hard system 1.Memory
ary disk) 2.Device
Memory 3.Process
2.Optical(CD, DVD,BluRay)
(Auxiliary 4.File
memory) 3. Flash (Memory card)
Converts High 1.Assembler:
level Assembly lang to
Memory in ascending order of: Language language(C++, machine lang
1.Speed: Hard Disk,RAM, Cache, Processors Java) to 2.Compiler:convert
Registers machine s entire HLL program
2.Capacity:Registers,Cache,RAM, language to machine lang in
Hard Disk one run
Types of ROM: PROM, EPROM, EEPROM 3.Interpreter:conv
erts HLL program to
RAM(Random Access ROM( Read Only machine lang line by
Memory) Memory line
Fast, volatile slow, non volatile Utility s/w System (1)Compression
maintenance tools: (reduces file
size )eg:WinZip
8 bits=1 byte,1024 bytes=1 KB,1024 KB=1MB,
(2)Disk defragmen
1024 MB=1 GB, 1024 GB=1 TB,1024 TB=1 PB
ter: rearranges files
(3)Backup s/w
Input Devices: Keyboard, Mouse, Light Pen, (4)Antivirus s/w:
Touch screen, Graphic Tablet, Touchpad, Joystick, scans and removes
Microphone, Scanner, OMR, Barcode/QR(Quick virus
Response) Reader , MICR,Biometric sensor, eg:Kaspersky,
Smartcard reader, Digital Camera Norton Antivirus

Output Devices: General For operations 1.Word processor


1.VDU(Visual Display Unit)– CRT,Flat Panel( LCD, purpose in a particular eg:Open Office Writer
application 2.spreadsheet s/w
LED, Plasma,OLED), LCD Projector
eg:Open Office Calc
2. Printer: Impact(touches paper . eg: Dot Matrix)
3.Presentation s/w
Non Impact(does not touch paper eg:Open Office Impress
eg: Inkjet, Laser, Thermal, 3D Printer 4.Database s/w
3. Plotter : Drum, Flat bed ( for making maps) eg:MySQL
4. Speaker (outputs sound) 5.Multimedia s/w
e-Waste – Discarded electronic devices. Contains eg: Adobe Flash
harmful chemicals which will cause diseases. Specific Customised Payroll management
Disposal methods: purpose s/w
1.Reuse(Second hand use), Free and Open Source s/w: S/w that gives
2.Recycle(make new product), freedom to use, copy, distribute, examine and
3.Incineration(Burn at high temp), improve. eg: GIMP, OpenOffice ,GNU/Linux ,
4.Land filling(bury in soil) Mozilla Firefox

Vijayabheri – Malappuram District Panchayat 2


Four Freedom levels by FSF: Algorithm and flowchart to find the sum and
0 -run the program, 1 – study, 2 – distribute, 3 – average of three numbers
improve 1. Start
2. Input A,B,C
Freeware Shareware 3. S =A+B+C
4. Avg=S/3
Free download and use Trial option 5. Print S, Avg
All features are free. All features not given 6. Stop
Can distribute freely. may/may not be
Algorithm and flowchart to find the smaller
distributed freely
of two numbers
Proprietary s/w: Software that needs license to 1. Start
use. eg:MS Windows, MS Office 2. Input a,b
3. If a<b then
Humanware/ liveware: Humans who use 4. Print a
computers. Eg:System Analysts, Programmers 5. Else
6. Print b
Chapter 3.PRINCIPLES OF PROGRAMMING& 7. End of if
PROBLEM SOLVING 8. Stop

Two approaches in problem solving : Algorithm and flowchart to print the


1.Top Down: break into small tasks and solve numbers from 1 to 100
separate. Step 1: Start
2.Bottom Up: solve subtasks first and build up to Step 2: N = 1
main solution Step 3: Print N
Step 4: N = N + 1
Phases in Programming: Step 5: If N <=100 go to Step 3
1.Problem Identification Step 7: Stop
2.Algorithm – finite set of instructions to solve a
problem Criteria for the best
Flowchart – Pictorial representation of algorithm:
algorithm 1. minimum steps
Merits: better communication, effective 2. minimum memory
analysis, synthesis, efficient coding 3. faster execution
Demerits: time consuming, difficult to
modify, no specific standards Chapter 4 Getting started with C++
3. Coding- writing program in a programming
language
Keywords (reserved Eg: if, else, for
4. Translation- converting source code(HLL) to words) - convey specific
object code(machine lang) TOKENS meaning to compiler
5.Debugging – Finding and correcting errors (fundamen
Identifiers - user defined Eg: num, my_score,
Types of errors in a program: tal
names cin
a. Syntax error – if rules are not followed building
b. Semantic(Logical)error – improper blocks / Literals(Constants)- Eg: 2, -15, 2.0, ‘a’, ’\n’,
planning, O/p not correct lexical Data that do not change “abc”
units) value
c. Run Time error – Errors during run.
6. Execution& Testing – Test with known results Punctuators-symbols #{,;:
7. Documentation- for future modification Operators – symbols for Arithmetic operators
Internal – comments in source code an operation (+, -. *, /, %)
External – hard copy(user manual) Relational operators
(<,<=,>,>=, ==, !=)
Logical operators
(&&, ||, ! )

Escape sequences: eg: ‘\n’, ‘\t’


Rules for naming identifiers
1. Use only letters(upper&lower),digits and
underscore(_)
2. Do not use keywords.
3. Do not start with digit

Vijayabheri – Malappuram District Panchayat 3


Chapter 5.Datatypes and Operators int m=5; int m=5;
n=m++; n=--m;
(Now n -> 5 and (Now n -> 4 and m
C++ void char int float double
Datatypes m -> 6) -> 4)
Memory 0 1 4 4 8 Arithmetic assignment operators
+=, -=, *=, /=, %=
Variables: Identifiers of memory locations eg : a=a+5; is same as a+=5;
Aspects of a variable Type conversion:
Convert one datatype to another
1.Implicit ( Type promotion) eg: 5/2.0 -> 2.5
2. Explicit (Type casting ) eg:5/(int)2.0 -> 2

C++ statements to increment the value of


a by 1-> a=a+1; a+=1; a++; ++a;

C++ program to find the sum of two


numbers
#include <iostream>
using namespace std;
int main()
Input operator extraction: >> eg: cin>>a; {
Output operator insertion : << eg: cout<<a; int num1, num2, sum;
cout<<"Enter two numbers: ";
Assignment operator: = eg:a=b; (value in
cin>>num1>>num2;
b given to a) sum=num1+num2;
Expresssion Arithmetic Uses arithmetic operators cout<<"Sum of the entered numbers = "<<sum;
combination }
Relational Uses relational operators a<b
of operator
and operands Logical Uses logical operators !(a<b) Chapter 7.Control Statements
eg: a+b; Control Statements :
1.Selection/Decision statements :
Types of statement if, if else, switch
Statement: 2.Iteration /Looping: for, while, do while
Declaration eg: int a;
Smallest
executable Assignment eg:a=5;
unit (ends
Input eg:cin>>a;
with the
symbol ; ) Output eg:cout<< a;

Cascading of I/O operators : >> or << more


than once in a statement. eg: cin>>a>>b;
Difference between = and == operators.
= ==
Assignment operator Relational operator
Assigns value to a Compares values
variable

Chapter 6.Introduction to Programming


Preprocessor directive - # Conditional operator (? :)
Essential function in a C++ program – main() Qn: Convert using conditional operator.
Comments – for future modification (a) if (score>18) cout<<”pass” ;
Single line - // (b) Multiline - /* .... */ else cout<<”fail”;
Variable initialisation :give value to variable at Ans:
the time of declaration (score>18) ? cout<<”pass”: cout<<”fail”;
eg: int a=5;
Access modifier - const Loop components –
Type modifiers-signed, unsigned, long, short (1)initialisation-start value to loop variable
(2)condition – the test expression.
Increment operator(to add 1) ++ (3)updation– changes value of loop variable
Decrement operator(to minus 1) -- (4)body of loop- statements to repeat

Vijayabheri – Malappuram District Panchayat 4


6. Router:finds best path to receiver
7. Gateway: connects different networks and
protocols
Data Terminal Equipments
1.Modem –uses telephone cables, converts
digital signals to analog(modulation) and vice
versa.
Here, i is the loop variable (its value controls the
2.Multiplexer-many signals over one medium
loop).
Network Topologies: (physical arrangement of
All the above 3 loops give the same output:
nodes in a network)
12345678910
Bus Star
(1) initialisation : i=1;
(2) condition: i<=10;
(3)updation : i++;
(4) body of loop : cout<<i;

Entry controlled loop Exit controlled loop


condition before loop condition after loop body Ring Mesh
body
loop will run only if loop will run at least once
condition is true even if condition is true/false
eg: for, while eg: do while

Chapter 8.Computer Networks

Advantages: Resource sharing


Price performance ration
Communication
Reliability
Scalability
Bandwidth – data transfer rate(bps)
Noise: unwanted external signals
Node : Any device connected to network Identification of Computers on network:
Data communication System – Sender(source),Receiver,
1. MAC Address(Media Access Control)-
Message, Medium, Protocol
12 digit hexadecimal number on NIC
Medium 1.Twisted Pair eg:UTP,STP Format -> MM : MM : MM : SS : SS : SS
1.Guided
(physical 2.Coaxial Cable 2. IP Address (Internet Protocol ): group of 4
(Wired)
path 3.Optical Fibre Cable(LED) bytes Eg: 148. 25.32.11
between Two versions : (IPv4 – 32 bits, IPv6 – 128 bits)
2. 1Radiowaves(radio,mobile
sender
and Unguided 2.Microwave(straight line)
3.Infrared(Short range) Network protocols: rules in a network
receiver) (Wireless) Protocol of internet: TCP/IP: (Transmission
Control Protocol/Internet Protocol)

Wireless communication tech using radio Sub Protocols:


waves 1.HTTP (Hyper Text Transfer Protocol):client –
1.Bluetooth server structure.
2.Wi-Fi (Wireless Fidelity) 2. FTP (File Transfer Protocol) : to transfer files
3.Wi-Max (Worldwide Inter operability for 3. DNS(Domain Name System):gives IP address
Microwave Access) of a domain name.
4.Satellite link
Data communication devices URL(Uniform Resource Locator)
1. NIC (Network Interface Card) –
connects computer to network
2. Repeater: strengthens signals.
3. Hub:transmits to all devices
4. Switch:transmits only to receiver 3 parts ->
5. Bridge:segmentises network

Vijayabheri – Malappuram District Panchayat 5


Chapter 9 Internet
Preventing cyber attacks:
1. Firewall
ARPANET - first Wide Area Network
2. Antivirus
Vinton Grey Cerf- Father of Internet
3. Delete Cookies
Internet -global computer network
Intranet - network within an organisation
Extranet: intranet accessible to outsiders Chapter 10. IT Applications

H/w, s/w requirements for Internet connctn : ICT- Information and Communication Technology
(1) NIC (2) Modem (3) Telephone Connctn
(4) ISP account (5) Software e Governance – using ICT to deliver Govt
services to citizens .
1. ISDN Types of interaction :
Wired 2. Cable internet 1. G2G(Govt to Govt),
Broadband 3. DSL 2. G2C(Govt to citizen),
4. Leased line 3. G2B(Govt to business),
5. FTTH(Fibre to the 4. G2E(Govt to employees)
Home) Infrastructure:
Wireless 1. Mobile 1. CSC(Common Service Centre),
Broadband 2. WiMax 2. SWAN(State WAN),
3. Satellite 3. SDC (State Data Centre)
Merits: fast, saves time
Internet Access sharing methods:
Demerits: digital divide, cyber attacks
1. Using LAN
eg: www.dhsekerala.gov.in
2. Using Wi Fi
3. Using Li-Fi (Light Fidelity)
eBusiness - conduct business online
Services on Internet
EPS (Electronic Payment System) – online
1. www (world wide web)
financial exchange between buyers and sellers
2. Search engines
Merits: anytime, saves time
Eg:google, ask, yahoo, bing
Demerits: digital divide, cyber attacks
3. Email:
eg:www.amazon.com
Sections: To, Cc(Carbon Copy), Bcc(Blind
Carbon Copy), Subject, Content
eLearning – using ICT in education
Merits: fast, easy, anytime
Tools : ebooks, eText, Online Chat, e Content,
Demerits: virus, junk mail(spam)
Educational TV channels
4. Social Media:
Merits: anytime, saves time
1. Internet Forum (Ubuntu Forum)
Demerits: digital divide,no direct interaction
2. Social blogs (blogger.com
eg: www.ncert.nic.in
3. Microblogs (twitter / X )
4. Wikis (wikipedia.org)
ICT applications in health care:
5. Social Networks(Facebook)
1.Medical equipments
6. Content Communities (Youtube.com)
2.EMR(Electronic Medical Record)
Merits: brings people together, plan events,
3.Web-based support/diagnosis
business promotion
4.Telemedicine
Demerits: addiction, spread rumours
5.Research and development
CyberThreats
ICT enabled services:
1.Virus: harmful programs
1.BPO(Business Process Outsourcing)
2Worms: stand alone,harmful,replicating program
2.KPO(Knowledge Process Outsourcing)
3.Trojan horse: seems useful,but harms when run
3.Call centre:handle telephone calls
4.Spams: unwanted email
4.Teleconferencing: conference between people in
5.Hacking: unauthorised access to computer.
remote locations using ICT
6.Phishing: stealing data using fake websites.
5.Video conferencing: teleconference with video
7.Denial of Service attack: aimed at server.
8.Man-in-the-middle attack: intercept messages

Prepared by: Liju Mathew, MarThoma HSS Chungathara Jessie Mathew, GHSS Vaniyambalam

Vijayabheri – Malappuram District Panchayat 6

You might also like