History and Generations of Computers
History and Generations of Computers
Question:
List the special features of Babbage Analytical engine.
How do you they compare with the modern computers?
Classify the generation of computers.
What is the main difference between different generation computers?
Summary: Babbage in conceded one of the great performs in the trade of compaction for
this foresight to design the analytical engine.
The developments of the computers are closely associated with the development in mechanical
technology, particularly the semi conductor technology.
Application: Now days there are the most widely used machine, education, Business,
Communication, Personal, and Fun.
Such system would integrate the advantage in the both hard were and soft were technology and
would facility computer added problems slowing with the help of organized information many
specialize area.
Reference: Early one chemical compute.
IBM PC CLONES – B Gonvindarajalu.
INTRODUCTION TO MICROPROCESSORS – R. Gaonkar.
Next Lesson: Function of Computer.
LESSON PLAN
Time
Title: Function Of Computer. ( Input, Output, ALU, Control Unit, Memory) & Application of
Computer
Objectives:
Introduction
Development
Components
Application
E-governance Application
Commercial application use like railway reservation, telephone billing etc.
Aids: Chalk, Duster, Black Board, Pointer.
Preparation:
The applications of components are so wide that they will be playing vary important rots and
future life of man to relieve him from many physical and mental ban dens.
The complain does everything as per the instructions given by the programmer in his program.
It cannot think of its own like human being.
Introduction:
The first mechanical calculation machine was made in 1642 by the great French matumatwan and
philosopher Blasé Pascal pres.
Motivation:
Before use of computer all work was done by paper and it was very lengthy process to do and after
use of computer in various application paper is work is reduced and work is become very fast.
Presentation:
Topics Information Points Spot
Hints
Input unit BLOCK DIAGRAM OF
memory unit COMPUTER
A
ALU Input unit: The purpose of the L
Control unit input unit is to accept the input U
Output unit data which is required to store the
I/ O/P
problems Memory unit: the P
memory unit retains the slips for CU
solution and initial input –data,
the intermediate and final results.
MEMORY
Arithmetic unit: the arithmetic
unit per forms all mathematical
computation apon receiving
instruction from control unit.
Control unit: This unit performs the
most vital function in the computer.
It actual all this unit and controls
the data flow between them to solve
the problem.
Output units: The output unit accepts
the final result and translates them from
machine code to the readable from.
Computer Computer- controlled seat It saves your valuable time.
Application in reservation bring benefit to
railway customers. This is achieved by
reservation using computer networks.
Electricity billing by maintaining the You can even get the status
Electricity list of all the user name, connection update.
number, number of units and the
amount to be paid.
Question::Classify
Aids the Computer
Marker, White according to the their speed and storage capacity
Board ,Duster(1),Computer
What do,Projector
you meanPreparation
by ‘Machine: language’?
* Review (2)
: Various Application Of Computer & Various Function Of Computer
Why H.L.L. is required?
(3) Function of Translator.
* Introduction (4)
: various input
Difference & Output
between Compilerdevices are used to give data to system & to get
and Interpreter.
information from system.
Motivation
Summary: : Computers are classified according to their technology and extreme use of its purpose.
Application:
Presentation : Application of each computer varies from business to business and it s potential
capacity of processing. Application in the electronic, petroleum engineering Weather for casting
Spot hints /
Topi Information Points
structural analysis chemistry, medicine and physics. Tell
cs Question
Next Lesson: Input / Output device & their Features (Ask)
Input device Input devices are used to enter data
from outside world into primary storage.
Keyboard devices Allow data entry into a computer system by 101 keys QWERTY
pressing a set of keys key board is most
popular.
Mouse Used to rapidly point to and select a graphic
icon or menu item from multiple options
displayed on GUI of a screen. Most popular point and
draw device.
Scanner Input device that translates paper document Stored image can be
into electronic format for storage in a manipulated with image
computer. processing s/w
Monitor Monitor are most popular o/p devices used for
producing soft-copy o/p. Display o/p on a
television like screen.
Cathode ray tube The cathode ray tube (CRT) is a vacuum tube Its advantages like low
containing an electron gun (a source of energy
electrons) and a fluorescent screen.
LCD consumption, smaller
LCD was introduced in the 1970s and is now and lighter.
applied to display terminals also.
Printer
Printers are used to produce paper (commonly they can be classified as
known as hardcopy) output. Based on Impact or Non-impact
the technology used. printers.
LESSON PLAN
Impact printers they use typewriting LESSON printingPLAN mechanism Dot-matrix and
Name: wherein Unit/Block
a hammer strikes paper through Week a Lessonprinters fall
Character
Trade : COPA ribbon inNo.:orderDate:
to produce output. No.: under no.
this :category.
Name : Unit/Block No.: Week
Time : Lesson
No.:Non-impact printers do not touch the paper while printing. Inkjet,no.Deskjet,
: Laser,
Topic
Trade /: Aim
printers :COPA BIOS Settings & Various
Date: Type of Memories
They use chemical, heat or electrical signals Time : Thermal printers fall
Objective : (1) types
to etchofthe
memory
symbols device , primary
on paper. memory
Inkjet, device: ram,
Deskjet, underrom this category of
Topic / Aim : Secondary
Internal memory
Command
Laser, Thermal device:
of Floppy Disk ,Hard Disk, Cd/ Dvd, Flash
printers.
DOS Objective :Memory ,Blue Ray
(1) Operating
printers Disk
System
fall under this LESSON
categoryPLAN of printers.
Aids : Marker,
(2) CUI & White
GUIBoard ,Duster ,Computer,
Projector
Aids
Name : Preparation
APPLICATIO : :: Duster, Unit/Block No.:
Chalk, Week Lesson no. :
*
Pointer.
N Review
Trade :COPA : Types
Preparation :Bootingof Memory
Process and
Date: It’s Example No.:
Review
SUMMARY : : Input devices are the devices throughTime which :we can give instruction to
* Introduction
Intoduction : : various types
DOS is asystem. Oneof storage
Type
outputof CUI devices
device are the
Operating
gives used to store
System
output of data temporary
our given or
instructions .
permanent..:Motivation
Motivation :
Command.com file is the set of Internal
ASSIGNMEN
Topic / Aim :: Basic : Hardware
(1) What&isSoftware
the full formIssues of &VDU,LCD?
Software Installation
Presentation
command
T/
Objective :: What is hardware and software, Types Copy?
(2) What is Soft Copy & Hard of Software and It’s
Presentation
QUESTION Spot hints /
Topics (3) Explain it’s feature
Information Points
Installation Aids : Marker, White Board ,Duster ,Computer ,Projector Tell
Question
Spot hints /
REFERENCE
Topics:
Preparation : ComputerInformation
Operator & PointsProgramming
Tell Assistant – NIMI
(Ask)
Question
* NEXT
Types Review
of memory: Types : ofBIOS
-Input Settings
/ Output
Primary
&device
storage
Various TypeFeatures
& their of Memories
(Ask)
LESSON
device
DOS -● Secondarty
Date storage --> What is the full form
* Introduction : various Hardware & Software It’s
Internal ● Time of DOS? computer
Every has
Example Motivation :
Command
Primary RAM (Random Access Memory) ---->
a Detail discussion
Presentation : ● CLS
storage Primary storage of a computer is often of all the internal
temporary storage
devices
● Ver
referred as RAM because of its random access commandsSpotOf hints
DOS/ built
Topics Information Points Tell into computer hardware.
● Vol
capabilities. Question
This temporary storage is
● DIR
known (Ask) as main
Hardware & RAM ● Copy
1)Continue chips ConareComputer
Restart volatile First Start Computer and
memory.==
Software 2)Do ●notType
Display Monitor Check It’s Problem
Issues
ROM (Read memory.● Copy Data is burnt by 1)What is Problem
only memory ) 3)Do not Work Keyboard and Mouse
● Ren
manufacturer to Restart
4)Boot Disk Failure Computer? as auxiliary
Also known
● Del
5)Do not out Volume In Speaker memory.
● MD,CD,RD 2) What is Problem to do
Secondary storage 6) Netcan Work
User loadProblem
● Prompt and store “read-only” programs not Display Monitor?
7)Dodata
and notin
Start
it. Internet. Example : magnetic
● Edit 3) Describe problem do
tape ,
8)Problem To take Printout thought Printer mot Work, floppy
keyboard
User ● Exiterase information stored in it and CDROM diskand
,
9) To cancome Bip Bip volume in CPU Mouse
hard disk.
Installation chips can be toreprogrammed to store new.
10) Become hide file & Folder
any Software 11)Cd and Dvd do not open and 1) Explain Step to install
It has
Write unlimited capacity.
APPLICATION Run all the internal commands. Microsoft Office
: 12)Speed low computer’s
Speed is far slower than primary storage.
SUMMARY Installation
Use InternalofCommand
Basic softwareany time when your system is on.
: 1)Minimum
Used to storeSystemlarge Requirement
volumes of data on
ASSIGNMENT/ permanent
2) What isbasis.
(1)Software SetupSystem?
CUI File or It’S cd Driver
: 3)User Manual
APPLICATION : (2) Difference Between Type & Edit
QUESTION
SUMMARY
APPLICATION :: Input devices
(3) Explain DOSare Prompt
the devices through which we can give instruction to
SUMMARY : system. output between
(4) Difference device gives Del & theRDoutput of our given instructions .
ASSIGNMEN
REFERENCE
ASSIGNMEN :: (1) Describe
(1) What Types oftoMemory
is Required Install any andSoftware
it’s Function
T/
:T/ (2)
(2) What is key
Describe to Enterand
Hardware in BIOS
Software setting
Issue
QUESTION
QUESTION
NEXT LESSON (3) What is use
DOS External Command of BIOS Setting.
REFERENCE : Computer Operator & Programming Assistant – NIMI
:NEXT LESSON : Basic DOS Internal
Hardware Commands
& Software Issues & Software Installation
LESSON PLAN
Syntax : cd directory_name
Mkdir E.g. mkdir iti_babra
Command :
This command is use to make new
directory in to current directory. The new
directory must not be in the same directory.
Insert menu. In Insert menu following Options are available. Detail Discussion of
Break, Page Number, date & Time, auto text, all above option of
Field, Symbol, Comment, Footnote, Caption, Insert Menu.
Cross reference, index & Tab, picture, Book
mark, file, object.
APPLICATION : Edit , View and Insert menu is useful for editing word document.
SUMMARY : View for Different view of document, Insert and Edit menu for editing
document
ASSIGNMEN : (1) Work all short cut key of option of edit, view and insert menu?
T/ (2) What is the use of Header & Footer?
QUESTION (3) difference between paste and paste special?
(4) How to add new page in document?
REFERENCE :
NEXT LESSON : Format & Tools menu, Table and Windows menu.
LESSON PLAN
Motivation : Window & dos base program like typing tutor ,Ms-Office etc.
Presentation :
Spot hints /
Topi Information Points Tell
cs Question
(Ask)
Format menu --> Font: This will change the font attributes of --> What is the use of
either the currently selected text font command?
-->Paragraph: select the text you wish to
change and then use this command to make --> What is the use of
the alterations, such as alignment, borders and shading?
indentation, and spacing.
-->Bullets and Numbering: This is a handy --> What is the use of
command, it creates indented lists with change case?
various formats.
-->Borders and Shading: This command allows
you to create borders and shading on elements
within your Microsoft Word document.
-->Columns: The Columns command will
split the current document into the number of
columns you specify.
-->Drop Cap:This tool allows you to either
add a drop cap character to your document
or change an existing letter (at the start of a
sentence) to a drop cap.
-->Text Direction: This allows you to change
the text direction of a text object, for
example a text box.
-->Change Case: The Change case tool allows
you to alter the case of existing text.
-->Background: This changes the background
color of your Microsoft Word document. It
also allows you to add watermarks and use
different gradient effects.
-->Styles and Formatting: This will open
the Styles and Formatting toolbar,
allowing you create headings, lists and
more.
Tools Menu -->Spelling and Grammar: This command --> What is the use of
will check the spelling and grammar of the spelling and grammer?
current Microsoft Word document.
--> Explain mail merge.
-->Language: The language tool has
various options, including setting the explain macro.
language of the document, translating text,
open the thesaurus and manage
hyphenation.
-->Word Count: This will open the Word
Count dialogue box, enabling you to count
the amount of words in the whole document,
or the currently selected text.
-->Protect Document: This command
allows you to control the protection of the
document, including tracked changes,
comments and forms.
-->Letters and Mailing: Gives you access to
various features, including the Mail Merge
Wizard, the Letter Wizard, the Envelopes and
Labels tool, and the Mail Merge Toolbar.
-->Macro: This opens the Macro Dialogue
box, allowing you to manage subsequent and
existing macros. We will be covering
Microsoft Word macros in a future tutorial.
-->Templates and Add-Ins: Opens the
Templates and Add-Ins Dialogue box,
allowing you to add, remove or update styles
and template.
-->AutoCorrect Options: Opens the
AutoCorrect dialogue box, enabling you to
manage capitalization, and also the replace
text as you type settings.
-->Options: This opens the main options
dialogue box in Microsoft Word. It allows
you to change many aspects of the current
document
and Microsoft Word environment.
Table menu -->Draw Table: This command opens the --> What is the use of
Tables and Borders dialogue box with the merge cells?
draw table tool active.
--> What is the use of split
-->Insert: Allows you to insert a whole table or cells?
just columns, rows and cells into the current
document. --> What is the use of
-->Delete: Delete complete tables, columns, sort?
rows and selected cells.
-->Select: This command allows you to
select the current table, column, row or cell.
-->Merge Cells: This tool will merge the
currently selected cells into one.
-->Split Cells: This will split the selected
cell/s into your chosen amount of columns
and rows, it will also offer (if more than one
cell selected) to merge the selected cells
before the split.
-->Table AutoFormat: This command will
open the Microsoft Word Table AutoFormat
dialogue box, where you can choose from a
number of different table templates, including
preset fonts and cell background colours
(colors).
-->Convert: This command will convert
existing text into a table format. The text will
have to have a common separator to indicate
the different columns, it will also needs new
paragraphs where you would like each row.
-->Sort: This opens the Sort Table dialogue
box. You can choose which column you
would like to sort and by what order.
APPLICATIO :
N
SUMMARY : Thus, format,tools and table menu is very useful for making document
attractive.
ASSIGNMEN : (1) Explain mostly used commands of format menu in word.
T/ (2) Explain mostly used commands of tools menu in word.
QUESTION (3) Explain mostly used commands of table menu in word.
REFERENCE :
LESSON PLAN
Motivation : Window & dos base program like typing tutor ,Ms-Office etc.
Presentation :
Spot hints /
Topics Information Points Tell
Question
(Ask)
Introduction to Microsoft excel is a spreadsheet software and --> What is the use of
excel a software of micrsoft office suite. It is used Microsoft excel?
to sotore numeric data very easily. You can
--> Explain different
also add formula and function to analyze the ways to start excel
data. You can also add graphics like charts to
manipulate the data very easily. Excel files
called workbook. Each workbook has three
worksheets. Worksheets are the are where
you can enter data in tabular format. Each
worksheet
File menu Worksheet all Worksheets in your --> What is the use of
Workbook. Properties Allows you to look new,open,save
up or add detailed information about your command ?
document.
Below this is a list of the files opened --> Explain page
recently by Excel. setup,print
--> Exit Closes Excel and all open Workbooks. preview,print area.
APPLICATION
:
SUMMARY Thus, Microsoft excel is very useful software for calculations on data.
:
ASSIGNMENT/ (1) Write short note on Microsoft excel
: (2) Explain mostly used commands of file menu.
QUESTION
REFERENCE
:
NEXT LESSON Edit, View & Insert Menu
:
LESSON PLAN
DATA MENU : Sort :- Use to sort data according to How can you arrange
specific sort order like ascending or data in particular
descending. order ?
If data in one column will be same
then it will checks the 2nd and 3rd column
which we specify in sort option of data menu.
Filter :- We can filter data as per our E.g. In result sheet we
requirement. Sheet contains different cell have to see only those
values in different rows but if we want to see rows which contains
particular cells which contains same value or “Science” as a stream
value to above or below to specific criteria , then it should be possible
then it should be done only with filter option. with filter option.
DBMS
Name :ABHISH ● Full form of DBMS
Unit/Block Week -->what is DBMS ?
Lesson
EK ● Maintaining
No.: Date: Different Types No.: --> what
no.is: Full form
Trade :COPA of Information Time : of DBMS ?
● Example.Foxpro,dbase etc. -->Explain Advantages of
DBMS
Topic / Aim : Rules for designing good tables,
● Advantages Data Integrity
of DBMS PackagesConstraints and Relationships
in tables. 1. Complex Relationship
Objective : (1)Rules for Designing Table
2. Data redundancy
(2) Data Integrity 3. User Define Table Form
constraints (3)Relationship
4. Maintain Dictionary
In Table. 5. Automatic Backup And
Aids : Chalk, Duster, Recovery
Pointer. Preparation :
* RDBMS
Review : -->what is RDBMS ?
* Introduction : Designing Good Table With --> Rules For
Relationship. Motivation : Data integrity
● Full Forminof RDBMS RDBMS
Relationship of Tables. ● “ Edgar F. Codd” Rules of RDBMS PACKAGES
Presentation : ● Concept of Row, Column, Table, --> what is Row
Record Spot hints
and Column ? /
Topics Information Points Tell
, Field , Attribute --> What is Attribute ?
Question
● Concept and Types of Relationship -->What is
(Ask) Table ?
Rules for ● Field name Must be Between 0 to -->--> whatis isTable?
What Record
Designing 255 Characters. and Field ?
● Select proper Data type of Field. -->Explain types
Table
of Relationship.
APPLICATIO : ● Set the primary key. For NO- -->what is Row and
Duplication Column?
N
● Set Default Value . For Blank Value
SUMMARY : Concept and Terminology of Data, Information, --> Database andthe
What are DBMS
rules of
● Set Validation of Field
ASSIGNMEN : (1) What is Data, Information and Database? Table Designing ?
T/ ● Set Format of Number Field
(2) Explain DBMS with Advantages.
QUESTION ● Set Yes of Field for Data Must
(3) Explain Difference Between Data and Information
Be entered
(4) what is RDBMS? Explain with E.F. Codd Rules.
Set validation
(5) Explain text for Validation
Row, Column, ErrorField and Attribute.
Table, Record,
Data
REFERENCE : ● What Office
Microsoft is Data-2003
Integrity?
by Bible -->what is Data Integrity?
Integrity
NEXT : Rules for designing
● Primary -->what is and
key good tables, Data Integrity Constaints Primary key?
Relationships
Constraints
LESSON in●a tables.
Check Constraints --> what is Check
● Default Constraints Constraints ?
● Foreign Key -->What is Default
Constraints ?
-->What is Foreign Key?
● Unique Constraints
--> What is Unique Key?
Relationship In ● What is Relationship? -->what is RDBMS ?
Table ● Explain Types of Relation ship --> what is Relationship?
1. One – to –one --> Explain Types of
2. One – to – many Relationship.
3. Many –to –many
4. Many – to – one
APPLICATION :
SUMMARY : Rules of Designing Table with Data Integrity and Relationship
ASSIGNMEN : (1) Explain Rule of Designing Table .
T/ (2) Explain Data integrity .
QUESTION (3) Difference Between Primary key and Foreign key
(4) Explain Check, Default and Unique Constraints
APPLICATION :
SUMMARY : Reports organize and summarize data for viewing online or for printing.
ASSIGNMENT/ (1) What is the Report?
(2) How can we create report?
:
QUESTION
REFERENCE : .
LESSON PLAN
:
LESSON PLAN
Topic / Aim : Understanding concepts of Proxy Server, Firewall Server & Network
Topologies Objective : (1) Server Details
(2) Different Types of Servers & Network Topologies
(3) Difference between Proxy , Firewall and other Servers
Presentation :
Spot hints /
Topi Information Points Tell
Question
cs
(Ask)
About Proxy It is a computer or --> What is Server?
Server, computer program which manages
Firewall Server access to a centralized resource or
service in a network. --> What is the Difference
A firewall and a between Proxy and
Firewall Proxy Server?
proxy server are both components of
network security.
Proxy Server acts as a firewall between
internal and external network.
Firewalls can block ports and programs
that try to gain unauthorized access to
your computer, while proxy servers
basically hide your internal network
from
the Internet.
Network ● Types of Networks are LAN, MAN, --> What is full form of
Topologies WAN. LAN, MAN & WAN?
● Network topology is the arrangement
of --> Why Network
Topologies are
the various elements (links, nodes, etc.) used?
of a computer network.
● Types of Network Topologies are Bus
Topology, Ring Topology, Star
Topology etc.
Terminology : ● LAN: LAN stands for Local Area --> What are network
Network which is used for networking terminologies?
in particular office or building.
● MAN: MAN stands for Metropolitan
Area Network which is a large
computer network that spans a
metropolitan area or campus.
● WAN: WAN stands for Wide Area
Network which is a network that
covers a broad area using different
communication mediums.
● Topology: Refers to layout of
a network.
● Bus Topology: Simplest Network
topology whose components are
connected by bus bar.
● Ring Topology: It is a topology in
which
each node connects to exactly two
other nodes.
● Star Topology: In this topology, every
node is connected to a central node
called a hub or switch.
APPLICATIO :
N
SUMMARY : Network Topologies makes network work easily. Server makes network and
information fast and secure.
ASSIGNMEN : (1) What is the full form of LAN, MAN, WAN?
T/ (2) What is Topology?
QUESTION (3) Difference between Proxy Server and Firewall Proxy Server.
(4) Give the difference between network topologies.
REFERENCE :
NEXT : Network Components
LESSON
LESSON PLAN
Presentation :
Spot
Topics Information Points Tell
hints /
Question
(Ask)
Network ● Basically the Hardware we use for What is Network
Components Networking is called Network Components?
Components.
● Generally network components includes
Why it is essential
devices like gateways, routers, network
to use network
bridges, switches, hubs, and repeaters.
components in
● Apart from traditional network devices it
network?
also includes hybrid network components
for hybrid network.
Topic / Aim : Understanding Network Cables, Wireless Networking & Blue Tooth
Technology Objective : (1) Types of cables.
(2) Wireless technology
(3) Bluetooth
technology. Aids : Chalk, Duster,
Pointer. Preparation :
* Review :
* Intoduction : Networking Cables and
Mediums. Motivation :
Presentation :
Spot hints /
Topi Information Points Tell
Question
cs
(Ask)
Network Cables Networking cables are used to connect Types of Network
one network device to other network Cables.
devices or to connect two or more
computers to share printer, scanner etc.
Different types of network cables
like Coaxial cable, Optical fiber
cable, Twisted Pair cables are used
depending on
the network's
topology, protocol and size.
Twisted pair cabling is a form of
wiring in which pairs of wires are
twisted together for the purposes of
canceling out electromagnetic (EMI)
from other wire pairs and from
external sources. This type of cable is
used for home and corporate Ethernet
networks.
An optical fiber cable consists of a
center glass core surrounded by several
layers of protective material. The outer
insulating jacket is made of Teflon or
PVC to prevent interference. It is
expensive but has higher bandwidth
and can transmit data over longer
distances.
Coaxial lines confine the
electromagnetic wave to area inside the
cable, between the center conductor
and the shield. The transmission of
energy in the line occurs totally
through the dielectric inside the
cable between the conductors.
Wireless ● Using Infrared Signals or Radio What is Wireless
Networking Frequency Signals connect computer Technology?
or anyPLAN
LESSON other device in the home or any What is Ad-
other place is called Wireless hoc Network?
Networking.
Name : Unit/Block Week Lesson
● Two types of Wireless LANs are
Trade : COPA No.: Date: No.: no. :
there. Time :
(1) Infrastructure Network (2) Ad-hoc
Topic / Aim : OSI-7 Layer ModelNetwork.
& Network Protocol
Objective : (1) Standard Model for Data
Communications ● Wireless Network mediums are Radio
(2) Strategy forWaves and Microwave.
connecting host computers and other communicating equipment.
Blue Tooth (3) Defines ● Blue Tooth
necessary is a Wireless
elements Protocol.
for data communication Whatdevices.
between is Bluetooth
Technology ● It is used to connect devices without technology?
Aids : Chalk, Duster, using LAN but those devices must be Where we use
Pointer. Preparation : in the range of Bluetooth. Bluetooth technology
* Review : ● Bluetooth can communicate up to now days?
* Intoduction : Network Communication
1MBPS Speed.Model
Motivation : OSI (Open Systems
● It canInterconnection) is reference
transmit the signals comes inmodel
the for how messages
should be transmitted
range ofbetween
0 to 30any
feet.two points in a telecommunication network
Presentation :
● Bluetooth network Spot hints /
Topi Information PointsisTellcomparatively
cs slower than wifi. Question
Terminology : ● Protocol: A protocol is a set of rules (Ask)
OSI-7 Layer ● Application
and standards
layer:that
Userbasically
Level define a --> What is the full
Model: language that devices can use to
Processing. form of OSI?
communicate.
Ex. Telnet, FTP, Mail, HTTP
APPLICATIO : ● Presentation layer: Data --> HTTP, telnet, and
N ftp protocols run in
Representation & Syntax. which layer?
SUMMARY : Ex. ISO Presentation
ASSIGNMEN : ● (1)Session
Types oflayer:
Network
SyncCables.
Points and Dialogs. --> Explain layer of
T/ (2)Ex.
UseISO
of different
Session cables. OSI model.
QUESTION ●(3)Transport
What is Wireless
layer: Technology?
Reliable End to
(4)End..
Difference between
Ex. TCP, UDP.Bluetooth and Wifi.
REFERENCE : ● Network layer: Unreliable Thru
NEXT : OSI-7 Layer Model & Network Protocol
Network
LESSON Protocol: ● TCP/IP (Transmission Control --> To which OSI
Protocol) TCP is known as a layer does TCP/IP
connection- oriented protocol, which protocol belong?
means that a connection is established
and maintained until the application --> What is the full
programs at each end have completed form of SMTP ?
exchanging messages.
● FTP (File Transfer Protocol): This is a --> Explain FTP
popular way to transfer files from protocol.
machine to machine across a network.
● SMTP (Simple Mail Transfer
Protocol): It's a set of communication
guidelines that allow software to transmit
email over the Internet.
● HTTP (Hyper Text Transfer Protocol):
HTTP is the underlying protocol used by
the World Wide Web.
● POP (Post Office Protocol): POP is an
application layer internet standard
protocol used by local e-mail clients to
retrieve e- mail from remote server over
a TCP/IP connection.
APPLICATIO : Firewalls are software programs or hardware devices that filter the traffic
N that flows into you PC or your network through a internet connection.
They sift through the data flow & block that which they deem (based on
how & for what you have tuned the firewall) harmful to your network or
computer
system.
SUMMARY : A firewall is a system designed to prevent unauthorized access to or from a
private network or also controls the incoming and outgoing network traffic
ASSIGNMEN : (1) What is firewall??
T/
QUESTION (2) What is the full form of DHCP?
(3) What is DHCP ?.
(4) Explain Benefits of DHCP.
REFERENCE :
NEXT : Concept of Internet, Web Browser, Search Engines & E-Mail
LESSON Communication
LESSON PLAN
Topic / Aim : Concept of Internet, Web Browser, Search Engines & E-Mail
Communication Objective : (1) Services provided by Internet.
(2) Access Internet
Aids : Chalk, Duster, Computer with Internet
connectivity Preparation :
* Review :
* Intoduction : Internet Services & Application
Motivation : Internet is very famous nowadays for satisfying people with various services
related to each and every different field. It is a very versatile facility which can
help you in completing many tasks easily and conveniently with few clicks.
Presentation :
Spot hints /
Topi Information Points Tell
cs Question
(Ask)
Introduction Of ● The Internet is the physical Ex.
Internet & connection of millions of networks. 1. Apply for jobs
history ● It’s the first mass medium that or schools
involves 2. Fill out
computers and uses digitized data. government
● ARPANET was the network that forms
3. Check bank accounts
became the basis for the Internet
4. Communicate with
● loosely hierarchical “network of
family, friends and
networks” co- workers
● Uses TCP/IP protocols and 5. Do research
packet switching 6. Learn new skills
7. Read news
8. Watch videos
APPLICATIO : (1)Explain
The Internet Application
changed ourOf lifeInternet.
enormously; there is no doubt about that. The
N (2)What is aFull
computer fix Form
part ofOfevery
WWW? modern office, companies, schools etc and
(3)Give Different Web browser name.
also
at our home and the greatest part has also an access to the Internet.
SUMMARY : The Internet is a global system of interconnected computer networks
ASSIGNMENT/
: QUESTION
REFERENCE
:
NEXT LESSON Concept of Cloud Storage & Internet Security
:
LESSON PLAN
Types of security
Network layer security
TCP/IP which stands for Transmission Control
Protocol (TCP) and Internet Protocol (IP)
aka Internet protocol suite can be made secure
with the help of cryptographic methods and
protocols. These protocols include Secure
Sockets Layer (SSL), succeeded by Transport
Layer Security (TLS) for web traffic, Pretty
Good Privacy (PGP) for email, and IPsec for
the network layer security.
LESSON PLAN
You have learned how to use CSS to add backgrounds, format text, add and
format borders, and specify padding and margins of elements.
● Indirect Attacks