Professional Documents
Culture Documents
Hssreporter - Com - CA COM XI ENG
Hssreporter - Com - CA COM XI ENG
LEAP - 24
COMPUTER APPLICATIONS -COM
FIRST YEAR
(Exam Sure Pass Study Material)
എംകെ റഫീഖ
പ്രസിഡൻറ് ജില്ലാ പഞ്ചായത്ത്
ഇസ്മായിൽ മുത്തേടം
വൈസ് പ്രസിഡണ്ട് മലപ്പുറം ജില്ലാ പഞ്ചായത്ത്
നസീബ അസീസ്
ചെയർപേഴ് സൺ
ആരോഗ്യ വിദ്യാഭ്യാസ സ്ഥിരസമിതി
ഡോ.അനിൽ പിഎം
ആർ ഡി ഡി മലപ്പുറം
1.Primary 1.RAM
Memory Type of Use Examples
(Main
2.ROM
s/w (Functions)
memory) 3.Cache(between RAM &
CPU) Management Linux, Dos,Windows
Memory Operating of
2.Second 1.Magnetic (Tape, Hard system 1.Memory
ary disk) 2.Device
Memory 3.Process
2.Optical(CD, DVD,BluRay)
(Auxiliary 4.File
memory) 3. Flash (Memory card)
Converts High 1.Assembler:
level Assembly lang to
Memory in ascending order of: Language language(C++, machine lang
1.Speed: Hard Disk,RAM, Cache, Processors Java) to 2.Compiler:convert
Registers machine s entire HLL program
2.Capacity:Registers,Cache,RAM, language to machine lang in
Hard Disk one run
Types of ROM: PROM, EPROM, EEPROM 3.Interpreter:conv
erts HLL program to
RAM(Random Access ROM( Read Only machine lang line by
Memory) Memory line
Fast, volatile slow, non volatile Utility s/w System (1)Compression
maintenance tools: (reduces file
size )eg:WinZip
8 bits=1 byte,1024 bytes=1 KB,1024 KB=1MB,
(2)Disk defragmen
1024 MB=1 GB, 1024 GB=1 TB,1024 TB=1 PB
ter: rearranges files
(3)Backup s/w
Input Devices: Keyboard, Mouse, Light Pen, (4)Antivirus s/w:
Touch screen, Graphic Tablet, Touchpad, Joystick, scans and removes
Microphone, Scanner, OMR, Barcode/QR(Quick virus
Response) Reader , MICR,Biometric sensor, eg:Kaspersky,
Smartcard reader, Digital Camera Norton Antivirus
H/w, s/w requirements for Internet connctn : ICT- Information and Communication Technology
(1) NIC (2) Modem (3) Telephone Connctn
(4) ISP account (5) Software e Governance – using ICT to deliver Govt
services to citizens .
1. ISDN Types of interaction :
Wired 2. Cable internet 1. G2G(Govt to Govt),
Broadband 3. DSL 2. G2C(Govt to citizen),
4. Leased line 3. G2B(Govt to business),
5. FTTH(Fibre to the 4. G2E(Govt to employees)
Home) Infrastructure:
Wireless 1. Mobile 1. CSC(Common Service Centre),
Broadband 2. WiMax 2. SWAN(State WAN),
3. Satellite 3. SDC (State Data Centre)
Merits: fast, saves time
Internet Access sharing methods:
Demerits: digital divide, cyber attacks
1. Using LAN
eg: www.dhsekerala.gov.in
2. Using Wi Fi
3. Using Li-Fi (Light Fidelity)
eBusiness - conduct business online
Services on Internet
EPS (Electronic Payment System) – online
1. www (world wide web)
financial exchange between buyers and sellers
2. Search engines
Merits: anytime, saves time
Eg:google, ask, yahoo, bing
Demerits: digital divide, cyber attacks
3. Email:
eg:www.amazon.com
Sections: To, Cc(Carbon Copy), Bcc(Blind
Carbon Copy), Subject, Content
eLearning – using ICT in education
Merits: fast, easy, anytime
Tools : ebooks, eText, Online Chat, e Content,
Demerits: virus, junk mail(spam)
Educational TV channels
4. Social Media:
Merits: anytime, saves time
1. Internet Forum (Ubuntu Forum)
Demerits: digital divide,no direct interaction
2. Social blogs (blogger.com
eg: www.ncert.nic.in
3. Microblogs (twitter / X )
4. Wikis (wikipedia.org)
ICT applications in health care:
5. Social Networks(Facebook)
1.Medical equipments
6. Content Communities (Youtube.com)
2.EMR(Electronic Medical Record)
Merits: brings people together, plan events,
3.Web-based support/diagnosis
business promotion
4.Telemedicine
Demerits: addiction, spread rumours
5.Research and development
CyberThreats
ICT enabled services:
1.Virus: harmful programs
1.BPO(Business Process Outsourcing)
2Worms: stand alone,harmful,replicating program
2.KPO(Knowledge Process Outsourcing)
3.Trojan horse: seems useful,but harms when run
3.Call centre:handle telephone calls
4.Spams: unwanted email
4.Teleconferencing: conference between people in
5.Hacking: unauthorised access to computer.
remote locations using ICT
6.Phishing: stealing data using fake websites.
5.Video conferencing: teleconference with video
7.Denial of Service attack: aimed at server.
8.Man-in-the-middle attack: intercept messages
Prepared by: Liju Mathew, MarThoma HSS Chungathara Jessie Mathew, GHSS Vaniyambalam