Olive Live Computer
Olive Live Computer
UNIVAC
1951 -UNIVAC (Universal Automatic Computer) was release which was the world’s first commercial
computer. by J. Presper Eckert and John Mauchly.
Mouse
In 1964 Douglas Engelbart invented first mouse.
System Software System software provides a base platform to execute and development different
types of other programs.
Ex:- Operating system, BIOS, Linker and Loader, Language translators, Utility software.
Language translators - Assembler, compiler, Interpreter.
Utility Software
Utility Softwares are used to enhance the performance of a system and devices.
Ex:- Antivirus, Data backup software, Desktop cleaner, Disk cleanup, Firewall,
File management tools, Compression software, Disk Defragmenter,Driver, etc.
Monitor
It is known as standard output device. The monitor displays video and graphics information,
user interface and other programs, allowing the user to interact with the computer.
Types of monitors:
1.CRT (cathode ray tube)
2.TFT (thin film transistor)
3.LCD (Liquid crystal display)
4.LED (Light emitting diode)
Types of Printers
1. Impact printer – Daisy wheel, dot matrix, drum, chain/band printer
2. Non-Impact printer – Inkjet, laser, thermal
Projector
A projector is an output device that projects an image onto a large surface, such
as a white screen or wall. It may be used an alternative to a monitor or television
when showing video or images to a large group of people.
Functions of OS
• Process Management
• Device management
• Memory management
• File management
• Messaging service
• Error detection
• Security
• Command interpretation
DOS
• MS – DOS – Microsoft disk operating system by (Microsoft).
• PC – DOS – Personal Computer disk operating system (IBM).
• DR – DOS – Digital Research disk operating system (DR).
• It is command line operating system.
• It is Single user and single tasking Operating system.
SASD DASD/RASD
Cache Memory
• Cache is a very high speed, expensive memory.
• Cache is used to speed up the memory retrieval process.
• Cache is used to match the speed of RAM and CPU.
• The cache memory is used to store data that is frequently accessed.
Types of Networks
4. Mesh Topology
In Mesh Topology, every node in the entire network is directly connected to every other.
1. It is a Point to point Structure.
2. Fast Transmission.
3. Secured Transmission
4. Highly complex structure.
5. Most expensive topology due to the amount of cables.
5. Tree topology
Tree topology is a combination of bus and star topology. Tree topology is made by
connecting various star topologies via central bus backbone cable.
1. It is used for expansion of the network.
2. It is highly expensive.
3. Even more Complex installation.
4. Error detection and correction is easy.
5. If one segment is damaged, other segments are not affected.
6. Hybrid topology
1. Hybrid topology is a custom topology.
2. It is a combination of two or more standard topology including Bus, Ring & Star
topology.
Transmission media
What is ISDN?
ISDN stands for Integrated Services Digital Network. It’s a set of communication standards
that uses digital transmission to make phone calls, video calls, transmit data and other
network services over the circuits of the traditional PSTN (Public Switched Telephone
Network). ISDN was introduced in 1986 by BT.
• Short for electronic mail, e-mail or email is information stored on a computer that is
exchanged between two users over telecommunications.
• More plainly, e-mail is a message that may contain text, files, images, or
other attachments sent through a network to a specified individual or group of
individuals.
• The first e-mail was sent by Ray Tomlinson in 1971.
E-mail address overview
abc@gmail.com
Public IP address :
• A public IP address is the address allow direct access to internet.
• IT can be found at www.whatismyipaddress.com
• Some authorities are responsible to manage these public addresses
• ICANN : Internet Corporation Authority Name and Numbers
• IANA : Internet Assigned Name and Numbers
• RIR : Regional Internet Registry
• ISP : Internet Service provider
Static IP address :
1. A permanent address that is assigned to a system by network admin manually.
2. Less secure.
3. Does not change automatically after it is assigned to a computer.
Dynamic IP address :
1. A Temporary address that is assigned to a host automatically by DHCP Sever.
2. More secure as compared to Static IP.
3. Changes automatically if connection is reset or
DHCP Lease expires.
What is Database?
Collection of interrelated data is known as Database.
What is DBMS?
DBMS is a collection of interrelated data and set of programs
that enables user to create and maintain a database.”
Functions of SQL
• Data Definition
• Data Retrieval
• Data Manipulation
• Access Control
• Data Integrity
SQL is divided in four major parts
WORM
Write Once Read Many.
A computer worm is a program that replicates itself.
Worms are distinct from viruses in that they do not require a
host program to run.
Trojan Horse
By definition a Trojan does not self-replicate. Like the horse, a Trojan program is a
delivery vehicle; the Trojan horse appears to be a very useful program of some type but
when a certain event occurs, it does something nasty and often destructive to the system.
Spyware
Spyware is a type of malware that is installed on a user's computer to collect personal
information or monitor internet browsing activities.
Rootkit
Rootkit is an application consists of spyware that hides its own
presence or presence of another malwares on the computer, using
some of the lower layers of the operating system, which makes
them almost undetectable by common anti-malware software.
Packet Sniffing
Packet sniffing is the act of capturing packets of data flowing across a computer
network. The software or device used to do this is called a packet sniffer.
Spoofing
A spoofing attack is when an attacker or malicious program successfully
acts as another person’s (or program’s) behalf by impersonating data.
Some common types of spoofing attacks include ARP spoofing, DNS
spoofing and IP address spoofing.
Watermark - A watermark is a faded background image that displays behind the text in a
document.
Mail merge - Mail Merge is a useful tool that allows you to produce multiple letters, labels,
envelopes, name tags, and more using information stored in a list, database, or
spreadsheet. When performing a Mail Merge, you will need a
Word document (you can start with an existing one or create a
new one) and a recipient list, which is typically an Excel workbook.
Endnote - An endnote is similar, but they are only found at the end of a document.
Hyperlink - A hyperlink is a word, phrase, or image that you can click on to jump to a new
document or a new section within the current document. (Ctrl + Click).
Excel is a computer application program to create electronic spreadsheets. With in excel user
can organize data, create charts and perform calculations. You can use it to organize your data
into rows and columns. Excel is a convenient program because it allows the user to create large
spreadsheets, reference information from other spreadsheets, and it allows for better storage
and modification of information.