11 Computer Application Short Notes
11 Computer Application Short Notes
11 Computer Application Short Notes
CLASS XI
7 Control Statements 28
8 Computer Networks 31
Prepared by:
9 Internet 40
ACT MLPM 2
1. Input Unit
Accepts instructions and data for processing.
Eg:- Keyboard, mouse
2. Central Processing Unit (CPU)
The CPU is the brain of the computer. All major computations and comparisons are
made inside the CPU.
The functions of CPU are performed by three components:-
(i) Arithmetic Logic Unit(ALU): It performs all arithmetic and logical operations.
(ii) Control Unit(CU): It manages and co-ordinates all other units of the
computer.
(iii) Registers: These are the temporary storage areas inside the CPU.
3. Storage Unit
Store data and instructions, intermediate results and final results.
4. Output Unit
Supplies the results to the outside world.
Eg:- Monitor, Printer
Computer
It is an electronic device for storing and processing data according to instructions given
to it.
Characteristics of Computers
Advantages: Speed, Accuracy, Diligence, Versatility, Huge memory
Limitations: Lack of IQ, Lack of decision making power
Number system
• The number of symbols used in a number system is called base or radix.
Number
Base Symbols used Example
System
Binary 2 0, 1 (1101)2
Octal 8 0, 1, 2, 3, 4, 5, 6, 7 (236)8
Decimal 10 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 (5876)10
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F
Hexadecimal 16 (A, B, C, D, E, F represents 10, 11, 12, 13, (12AF)16
14, 15 respectively)
• MSD: The leftmost digit of a number is called Most Significant Digit (MSD).
• LSD: The right most digit of a number is called Least Significant Digit (LSD).
Number Conversions
2 15 0
2 7 1
2 3 1
2 1 1
0 1
ACT MLPM 4
(30)10 = (11110)2 Octal to decimal conversion
Multiply octal digit by place value (power of 8) and find their sum.
Example: Convert (167)8 to decimal.
Decimal fraction to binary (167)8 = 1×82 + 6×81 + 7×80
Weight 82 81 80
1. Multiply the decimal fraction by 2. = 64 + 48 + 7 = 119
2. Integer part of the answer will be first digit of binary fraction. (167)8 = (119)10 Octal digit 1 6 7
3. Repeat step 1 and step 2 to obtain the next significant bit of binary fraction.
Example: Convert (0.625)10 to binary. Hexadecimal to decimal conversion
Multiply hexadecimal digit by place value (power of 16) and find their sum.
0.625 x 2 = 1.25
Example: Convert (2B5)16 to decimal.
1 0.25 x 2 = 0.50 (2B5)16 = 2×162 + 11×161 + 5×160
Weight 16 2 16 1 16 0
= 512 + 176 + 5
0 0.50 x 2 = 1.00
= 693 Hexadecimal digit 2 B 5
1 .00 (0.625)10 = (0.101)2 (2B5)16 = (693)10
Octal to binary conversion
Decimal to Octal conversion Converting each octal
Repeated division by 8 and grouping the remainders. Remainders will be either Octal digit 0 1 2 3 4 5 6 7 digit to its 3 bit binary
0,1,2,3,4,5,6 or 7 Binary equivalent 000 001 010 011 100 101 110 111 equivalent.
Example: Convert (120)10 to octal.
8 120 Remainders
Example: Convert (437)8 to binary.
8 15 0
(120)10 = (170)8 3-bit binary equivalent of each octal digits are
8 1 7 4 3 7
8 0 1 (437)8 = (100011111)2
100 011 111
Grouping binary digits to group of 4 bits from right to left and then each group is Example: Represent -23 in sign and magnitude form.
converted to its hexadecimal equivalent. Binary of 23 in 8-bit form = (00010111)2
Sign Magnitude
Example: Convert (100111100111100)2 to hexadecimal. Number is negative, so first bit is 1.
Group the given binary number from right as shown below: So -23 can be represented as (10010111)2
1 0 0 1 0 1 1 1
0100 1111 0011 1100
if the left most group
ii) 1’s complement representation
does not have 4 bits,
then add leading zeros 4 15(F) 3 12(C) • 1’s complement of a binary is obtained by replacing every 0 with 1 and every 1
to form 4 bit binary. with 0.
• If the number is negative, it is represented as 1’s complement of 8-bit form
(100111100111100)2 = (4F3C)16 binary.
• If the number is positive, the 8-bit form binary itself is the 1’s complement.
Octal to hexadecimal conversion Example: Represent +23 in 1’s complement form.
Convert octal to binary and then binary to hexadecimal. Binary of 23 in 8-bit form = (00010111)2
Example: Convert (537)8 to hexadecimal equivalent. +23 in 1’s complement form = (00010111)2 (For +ve numbers, no need to find 1’s
First convert (537)8 into binary. complement)
5 3 7 Example: Represent -23 in 1’s complement form.
= (101011111)2 Binary of 23 in 8-bit form = (00010111)2
101 011 111
-23 in 1’s complement form = (11101000)2 (by replacing 0 with 1 and 1 with 0)
Then convert (101011111)2 into hexadecimal.
iii) 2’s complement representation
0001 0101 1111
= (15F)16 • 2’s complement of a binary number is calculated by adding 1 to its 1’s
complement.
1 5 15(F)
(537)8 = (15F)16 • If the number is negative, it is represented as 2’s complement of 8-bit form
binary.
Hexadecimal to octal conversion • If the number is positive, 8-bit form binary itself is the 2’s complement.
Convert hexadecimal to binary and then binary to octal. Example: Represent +23 in 2’s complement form.
Example: Convert (A3B)16 into octal equivalent. Binary of 23 in 8-bit form = (00010111)2
First convert (A3B)16 into binary. +23 in 2’s complement form = (00010111)2 (For +ve numbers, no need to find 2’s
A 3 B
complement)
= (101000111011)2 Example: Represent -23 in 2’s complement form.
1010 0011 1011
Binary of 23 in 8-bit form = (00010111)2
Then convert (101000111011)2 into octal. -23 in 1’s complement form = (11101000)2 (by replacing 0 with 1 and 1 with 0)
101 000 111 011
-23 in 2’s complement form = 11101000 +
= (5073)8 1
= (11101001)2
5 0 7 3
(A3B)16 = (5073)8 Representation of floating point numbers
Representation of integers • Any number in floating point notation contains two parts, mantissa and exponent.
There are three methods for representing an integer number in computer memory. (i) • Eg: 25.45 can be written as 0.2545×102, where 0.2545 is the mantissa and the power 2 is
Sign and magnitude representation, (ii) 1’s complement representation, (iii) 2’s the exponent.
complement representation
Representation of characters
i) Sign and magnitude representation Different methods to represent characters in computer memory are: ASCII, Unicode,
• First find binary equivalent of integer and write it in 8- bit form. ISCII, EBCDIC
• Make the first bit 1 for negative numbers and 0 for positive numbers. ASCII
Example: Represent +23 in sign and magnitude form. • It stands for American Standard Code for Information Interchange
Binary of 23 in 8-bit form = (00010111)2 • ASCII uses 7 bits for each character, can represent only 128 characters.
Sign Magnitude
Number is positive, so first bit is 0. • Another version is ASCII-8, which uses 8 bits, can represent 256 characters.
So +23 can be represented as (00010111)2 0 0 0 1 0 1 1 1
EBCDIC
• It was used to connect modem, mouse and keyboard. Different types of ROMs are:
b. Parallel port • PROM - Programmable ROM
• Parallel ports can transmit several bits of data at a time. • EPROM - Erasable Programmable ROM
• It is used to connect a printer or scanner to the computer. • EEPROM - Electrically Erasable Programmable ROM
c. USB (Universal Serial Bus) port Cache memory
• USB provides high speed data communication between devices. • Cache memory is a small and fast memory between the processor and RAM.
• It is used to connect devices like keyboard, mouse, printer, scanner, etc. • Frequently accessed data and instructions are stored in cache memory for quick
Advantages: access.
• USB ports are capable of supplying electric power to external devices. • Cache is faster than RAM.
• USB devices can be connected and disconnected even when the power is on. • Cache is more expensive than RAM.
d. LAN (Local Area Network) port / Ethernet port b. Secondary memory (Auxiliary memory)
• It is used to connect a computer to a network. • Secondary memory is used to store large amount of data or programs permanently.
• RJ45 connector is used. • It is non-volatile, i.e. its contents are retained even when the device is powered off.
e. PS/2 port • It is much larger in size than RAM.
• Invented by IBM • It is slower than RAM.
• Used for connecting keyboard and mouse. Very slow. • It acts as a backup.
f. Audio ports The major categories of secondary storage devices are:
• Used to connect audio devices like speakers, microphone, etc. (i) Magnetic storage devices. Eg:- magnetic tapes, floppy disks, hard disks.
• Audio ports are divided into: Line in, Line out, Mic in (ii) Optical storage devices. Eg:- CD, DVD, Blu-Ray DVD
g. Video Graphics Array (VGA) port (iii) Semiconductor storage devices. Eg:- USB flash drive, Flash memory cards
• It is used to connect a monitor or a projector to a computer.
h. High Definition Multimedia Interface (HDMI) Comparison of different types of memory
• Used to transfer both high-definition video and multi channel audio over a single Relative
cable. Storage Speed Capacity Volatile
Cost
Memory
Registers Fastest Lowest Highest Yes
• Memory is used to store data and instructions temporarily or permanently.
• Classified into two: Primary memory and Secondary memory. Cache More Fast Low Very High Yes
Memory measuring units RAM Very Fast Moderate High Yes
Binary Digit = 1 Bit 1 MB (Mega Byte) = 1024 KB Hard Disk Moderate Very High Very Low No
1 Nibble = 4 Bits 1 GB (Giga Byte) = 1024 MB
Input devices
1 Byte = 8 Bits 1 TB (Tera Byte) = 1024 GB
An input device is used to feed data and instructions into the computer.
a.
1 KB (Kilo Byte) = 1024 Bytes 1 PB (Peta Byte) = 1024 TB Different types of input devices are:
Primary memory 1. Keyboard: It is an input device used to input alphabets, numbers and other
Primary memory is used to store data and applications temporarily while the computer characters.
is running. 2. Mouse: It is a hand-held device that controls the movement of the cursor on a display
Three types of primary memory are RAM, ROM and Cache. screen.
Comparison between RAM and ROM 3. Light pen: It is a light-sensitive pointing device used to draw pictures on a computer
RAM (Random Access Memory) ROM (Read Only Memory) screen.
4. Touch screen: It allows the user to operate the computer by simply touching on the
It is faster than ROM. It is a slower memory.
display screen.
It stores the operating system, 5. Graphic tablet: It allows artists to create graphical images.
It stores the program required to boot
application programs and data 6. Touchpad: It is a pointing device used to move the mouse pointer on a display
the computer.
temporarily. screen.
It allows reading and writing. Allows reading only. 7. Joystick: It is a pointing device commonly used for playing video games.
8. Microphone: It is used to input sound.
It is volatile, i.e. it will lose its data It is non-volatile, i.e. it keeps its data
9. Scanner: It is an input device that scans documents such as photos and pages of
if the power is turned off. even if the power is turned off.
text.
a. Operating system • Spreadsheet software Eg: Microsoft Excel, Open Office Calc
• It is a set of programs that acts as an interface between the user and computer • Presentation software Eg: Microsoft PowerPoint, Open Office Impress.
hardware. Example:- DOS, Windows, Unix, Linux • Database software Eg: Microsoft Access, Oracle
• Multimedia software Eg: Adobe Flash, Media Player
Major functions of an Operating System are: b. Specific purpose software
Process management, Memory management, File management and Device • Tailor-made software to satisfy the needs of an organisation. Also known as customised
management software.
Eg: Payroll System, Inventory Management System, HR Management System.
Computer languages Free and open source software
• It gives the user the freedom to use, copy, distribute, examine, change and improve the
Low Level Language: machine-oriented languages. Two types: software. Eg:- GNU/Linux, GIMP, Mozilla Firefox, OpenOffice.org
a. Machine language: The language, which uses only binary digits 0 and 1.
Four Freedoms of Free Software
b. Assembly language: is an intermediate-level symbolic programming language.
Freedom 0 - The freedom to run program for any purpose.
It uses mnemonic symbols like ADD, SUB, etc. Freedom 1 - The freedom to study how the program works and adapt it to your
needs.
High Level Language is like English language and is simpler to understand. Not Freedom 2 - The freedom to distribute copies of the software.
understandable to the computer. Example: C++ Freedom 3 - The freedom to improve the program and release your improvements to
the public.
Freeware and Shareware
b. Language processor Freeware Shareware
• It translates programs written in high level language or assembly language into its
Commercial software give users a
equivalent machine language. Copyrighted software available free
chance to try the software before
of cost for an unlimited period.
buying it.
Types of language processors
Assembler: It converts assembly language into machine language. All the features are free. All features are not available.
Interpreter: It converts a high level language program into machine language line by Freeware programs can be Shareware may or may not be
line. distributed free of cost. distributed freely.
Compiler: It converts the whole high level language program into machine language at
a time. Proprietary software
c. Utility software • It is a software that is an exclusive property of its developer and cannot be copied or
• Utility software is a set of programs which help users in system maintenance tasks. distributed without permission.
Some of the utility programs are: Eg:- Microsoft Windows OS, MS Office
(i) Compression tools: Large files can be compressed so that they take less storage area.
Eg: WinZip, WinRAR Humanware
(ii) Disk defragmenter: Consolidates fragmented files on a computer hard disk. • Humanware or liveware refers to humans who use the computer.
(iii) Backup software: Backup means duplicating the disk information so that in an event Eg:- Computer programmers, Computer Operators, System Administrators, etc.
of disk failure this backup may be used.
(iv) Antivirus software: Antivirus software is a utility program that scans the computer system
for viruses and removes them. Eg: Norton Antivirus, Kaspersky Sample Questions
1. 1 Byte = ............ bits
Application software 2. Name the software that translates assembly language program into machine language
• Software developed for specific purpose is called application software. program.
• It includes general purpose software and specific purpose software. 3. Write the full form of HDMI.
4. OMR stands for .................
a. General purpose software 5. What is the importance of registers in computer system? Name any two registers.
• Software that can be used for a variety of tasks. It is classified as: 6. Name any four ports on the motherboard.
• Word processing software Eg: MS Word, Open Office Writer 7. Give two examples for free and open source software.
Advantages of flowchart
• Better communication
• Effective analysis
• Effective synthesis
• Effective synthesis
Translation
• Translation is the process of converting a program written in high level language into
its equivalent version in machine language.
• The program in machine language (Binary language) is called object code.
Source code -------> Translation ---------> Object
code
Debugging
• Programming errors are known as 'bugs'. The process of detecting and correcting errors
is called debugging.
There are three types of errors:
Syntax errors: Errors which occur when the rules or syntax of the programming
language are not followed.
Logical errors: Logical error, is due to improper planning of the program's logic.
Run-time errors: Errors which occur during program execution. Eg:- division by
zero
Sample Questions
1. Pictorial representation of algorithm is known as ....................
2. .................. is a step by step procedure to solve a problem.
3. Which flow chart symbol has one entry flow and two exit flows?
4. In a flowchart, ................ is used as the input/output symbol.
5. Source code is converted into object code during .................. phase in programming.
(Execution, Coding, Documentation, Translation)
6. A program written in High Level Language is called ........
7. List any two limitations of flowcharts.
8. Write any two advantages of flowcharts
9. Program errors are known as ..................
10. What is debugging?
11. List different phases in programming.
12. Define: (a) Syntax errors (b) Logical errors (c) Run-time errors
13. Write an algorithm to find the sum and average of 3 numbers.
14. What is the importance of proper documentation in programming ?
15. How will you choose the best algorithm for a problem ?
ACT MLPM 20
7. What is the difference between float and “float” ?
8. Categorise the following into different types of tokens
CHAPTER 4 a. result b. % c.# d. Float
Getting Starting with C++ 9. Differentiate between the literals ‘p’ and “p” in C++.
10. What are the rules to define an identifier ?
Character set 11. Define token in C++. Name the tokens available in C++ with one example each.
• Fundamental units of C++ Language. It consists of letters, digits, special characters, 12. What are escape sequence characters in C++? Give an example.
white spaces 13. Differentiate between character literal and string literal.
14. Distinguish between keywords and identifiers.
Tokens 15. The following are invalid identifiers in C++. Write reason for each
• Tokens are Fundamental building blocks of C++ program. (Lexical units) a) Id# b) void c) 2ab d) avg hgt
16. Name any two types of identifiers.
Classification of Tokens
Sample Questions
1. The non graphic symbols in C++ can be represented by using …………
2. The tokens that convey a specific meaning to the language compiler are called ............
3. Which among the following is not a character literal ?
( 'a' , '\a', a , '8' )
4. Pick odd one out
(sum , break, add, num_1 )
5. Classify the following identifiers as valid or invalid. If invalid, give a reason.
a) Height_1 b) _Height1 c) 1Height d) Height 1
6. Identify the tokens in the following C++ statement
int x=100;
2. Based on nature of operation Statements: Smallest executable unit of a program. C++ statement ends with semicolon (;)
(a) Arithmetic operators : Used for arithmetic operations such as addition(+), 1. Declaration statement: Specifies the type of data that will be stored in a variable.
subtraction(-), multiplication(*), division(/) and modulus (%). Syntax: datatype var_name;
x y x+y x-y x*y x /y x%y eg: float avg;
2. Assignment statements: It stores a value to a variable. Eg: a=15;
7 3 10 4 21 2 1(remainder)
3. Input statements: Specifies an input operation. Eg: cin>>score;
(b) Relational operators: 4. Output statement: Specifies output operation. Eg: cout<<score;
Used for comparing numeric data, resulting in either true (1) or false (0). The relational
The multiple use of input/output operators in a single statement is called cascading of
operators are <(less than), >(greater than), <=(less than or equal to), >=(greater than or
I/O operators.
equal to, ==(equal to), !=(not equal to).
Type modifiers
• Used to change the range and size of data_type
• Type modifiers in C++ are long, short, signed and unsigned
Type conversion
• Conversion of the data_type of an operand to another.
Two types of conversion:
1. Implicit (Type promotion): This is done by the compiler and the conversion is from
lower data_type to higher.
Eg: 5/2.0 => 2.5 (Here, int datatype of 5 is converted to float by compiler. Thus the result
of the float expression is also float)
2. Explicit (Type casting): This is done by the programmer explicitly and conversion
can be to any data_type.
Eg: 5/(int)2.0 => 2 (Here, programmer uses type casting (int) to convert the float
data_type of 2.0 to int. Thus the result of this integer expression is also an integer.)
Sample Questions
1. .............. is the essential function for every C++ program.
2. Pick out the symbol which indicates a preprocessor directive.
( “ , $ , #, { )
3. Give the output for the following C++ code segment
int a=10, b=20;
a=b++;
cout<<a<<’\n’<<b;
4. Give the equivalent statement using arithmetic assignment operator for the following.
(a) a=a*35; (b) sum=sum+num;
5. What is variable initialisation? Give examples
6. Write four statements to increment the value of x by 1.
7. Write the output of given C++ statements giving explanations
1. cout << 5/2;
2. cout << 5.0/2;
8. Write C++ statements/expression for the following.
a) Display the message “We shall overcome”
b) Initialise an integer variable num with 25.
9. Explain type conversion in C++, listing out the different types with examples.
10. Write a C++ program to display the message, “Stay home, stay safe”.
ACT MLPM 27
break; Initialisation; i=1 ;
case constant_3 : statement 3; break; while (test expression) while (i<=10)
break; default : { {
while loop
............................................. cout<<”Invalid”; Body of the loop; cout<<i;
default : statement n; } Update expression ; ++i;
} } }
Initialisation; i=1 ;
Comparison between switch and if else if ladder do do
switch if else if ladder { {
do....while loop
Permits multiple branching. Permits multiple branching. Body of the loop; cout<<i;
Update expression ; ++i;
Any relational or logical condition can be
Can be used only for checking equality }while(test expression); }while(i<=10);
checked
Can compare against a set of values including Entry controlled loop Exit controlled loop
Case constant is integer or character
floating numbers 1. condition before loop body 1. condition after loop body
Uses default when no match is found, and 2. loop will run only if condition is true 2. loop will run at least once even if condition
When no condition is true, else block executes.
break is used to exit. eg: for, while is true/false eg: do while
All switch statements can be converted to else if ladder. But not all if-else if can Sample Questions
be converted to switch. 1. The ................. block is executed in a switch, if no matching conditions are found.
(case, break, default, else)
2. Iteration (Looping) statements 2. Pick the odd one out
Statements that allow repeated execution of a set of one or more statements. ( while , do ... while , for )
There are 3 loops in C++ : while, for, do-while 3. Control Statements can be classified in to two. Explain each with example.
A loop has the following components: 4. Write any two selection statements in C++ ?
Loop components:(1) initialisation: statement that gives starting value to loop 5. Explain loop elements with a suitable example
variable( i=1) 6. How is entry controlled loops different from exit controlled loops ?
(2) condition – the test expression. (i<=10) 7. Compare switch and if else if ladder
(3) updation – statement that changes the value in loop variable (i++) 8. “There are situations where if ..else if ladder cannot be rewritten using switch statement.
(4) body of loop- set of statements to execute repeatedly (cout<<i;) What
are the situations?
for loop while loop do while loop 9. Do as instructed :
for (i=1;i<=10;i++) i=1; i=1; (a) Rewrite using switch
cout << i; while(i<=10) do if(ch==1) cout<<”Red”;
{ { else if (ch==2) cout<<”Blue”;
cout<<i; cout<<i; else if (ch==3) cout<<”Green”;
i++; i++; else cout<<”Wrong code”;
} }while(i<=10); (b) Rewrite using do while and identify the loop components.
Here, i is the loop variable (its value controls the loop). for (a=5; a<=20; a++)
[All the three loops given above produce the same output – displays numbers from 1 to {
10] cout<<a*a ;
Statement Syntax Example }
for (initialisation ; test expression ; update
expression)
for (i=1;i<=10;++i)
for loop {
cout<<i;
Body of the loop;
}
• In bus topology, all the nodes are connected to a main cable called bus.
• A small device called a terminator is attached to each end of the bus.
• If a node has to send data to another node, it sends data to the bus. The signal travels • In ring topology, all nodes are connected using a cable that loops the ring or circle.
through the bus and each node checks the bus and only the intended node will accept • A ring topology is in the form of a circle.
the data. When the signal reaches the end of the bus, the terminator absorbs the signal • Data travels only in one direction in a ring.
from the bus. • Each node regenerates the signal and passes to the next node until it reaches the
intended node reaches.
➢ Characteristics of bus topology Characteristics of ring topology
1) Easy to install. 1) No signal amplification is required as each node amplifies the signal.
2) Requires less cable length and hence it is cost-effective. 2) Requires less cable length and hence is cost-effective.
3) Failure of a node does not affect the network. 3) If one node fails, the entire network will fail.
4) Failure of cable (bus) or terminator leads to a breakdown of the entire network. 4) Addition of nodes to the network is difficult.
5) Fault diagnosis is difficult. Mesh Topology
6) Only one node can transmit data at a time.
Star Topology
• It can cover an area of hundreds of Kilometers in radius. • It is the easiest way to transfer files between computers over the internet
Summary of PAN, LAN, MAN, WAN • A FTP client program can be used to upload and download files(FileZilla, CuteFTP etc.)
DNS
Parameter PAN LAN MAN WAN
• Domain Name System
Entire
Small area A few meters to A city and its • Returns the IP address of the domain name that we type in the browser’s address bar
Area country,
(Up to 10 m few Km (Up to 10 vicinity (Up to • DNS maintain a database to store domain names and IP address information of all
covered continent, or
radius) Km radius) 100 Km radius) websites
globe
on the internet
Transmissio Moderate
High speed High speed Low speed
n speed speed Identification of computers over a network
Networking Moderately
Negligible Inexpensive Expensive
cost expensive Media Access Control (MAC) addresses
• A universally unique address (12 digit hexadecimal number) assigned to each NIC
Logical classification of networks (Network Interface Card) by its manufacturer.
• Based on the role of the computer in the network • MAC addresses are usually written in one of the following two formats:
• Two categories: peer to peer and client server • MM : MM : MM : SS : SS : SS or MM – MM – MM – SS – SS – SS
• The first half (MM:MM:MM) of a MAC address contains the ID number of the adapter
Peer to peer
manufacturer.
• No dedicated servers
• The second half (SS:SS:SS) of a MAC address represents the serial number assigned to
• Any computer can act as a client or as a server at any instance
the adapter (NIC) by its manufacturer.
• Ideal for small networks
• eg. 00:A0:C9 : 14:C8:35
Client-Server
• The client server architecture consists of high end computer called server.
Internet Protocol (IP) Address
• Classification of servers are:
• An IP address is a unique 4 part numeric address assigned to each node on a network,
File server: A computer that holds and manage files on a network
for their unique identification.
Web server: A computer dedicated to responding to requests for webpages
Print server: Redirect the print job from the clients to specific printers
• An IP address is a group of four bytes (or 32 bits) each of which can be a number from 0
to
Database server: Allow clients to modify, view or delete data in a common database
255.
Network protocols
• Its a set of rules to be followed in a network when devices in the network exchange data
each other
TCP/IP
• Transmission Control Protocol/Internet Protocol
• Used to interconnect network devices on the local networks and then internet
• The data is first broken in to smaller packets by TCP then send
• Internet Protocol(IP) is responsible for the delivery of each of these packets to the right Uniform Resource Locator(URL)
destination • Its a formatted string used to identify a network resource on the internet
• e.g. Ubuntu Forum. • It is an attempt to get other information such as username, password, bank a/c
b) Social blogs details etc by posing as the original website, mostly that of banks and other financial
• It is a discussion or informational website consisting of entries or posts institutions.
displayed.e.g. Blogger and WordPress • Phishing websites have URLs and home pages similar to their original ones.
c) Microblogs • The act of creating such a misleading website is called spoofing.
• Microblogs allow users to exchange short sentences, individual images or video 7) Denial of Service attack
links. e.g. Twitter.com • Due to this attack the computer forced to restart and this result refusal of service to
d) Wikis the genuine users.
• Wikis allow people to add content or edit existing information in a web page, to form 8) Man in the Middle attacks
a community document.e.g.wikipedia.org • It is an attack in which the an attacker secretly intercepts electronic messages send
e) Social networks by the sender to the receiver and then modifies the messages and retransmit it to
• Social networking sites allow people to build personal web pages and then connect the receiver.
with friends to communicate and share content. e.g. facebook.com and LinkedIn. Preventing network attacks
f) Content communities 1) Firewall
• Content communities are websites that organise and share contents like photos, • A firewall is a system of computer hardware and software that provides security to
videos, etc. e.g. YouTube the computer network in an organisation.
Advantages of social media • A firewall controls the incoming and outgoing network traffic by analysing the data
• Bring people together, Plan and organise events, Business promotion, Social skills 2) Antivirus scanner
Limitations in use of social media • It is a tool used to scan computer files for viruses, worms and Trojan horses and cure
• Intrusion to privacy, Addiction, Spread rumours the infected system.
Cyber Security • When an antivirus program scans a file and notices that the file matches a known
• It is used to provide protection of valuable information such as credit card information piece of malware, the antivirus program stops the file from running, and puts it into
from unauthorized access. ‘quarantine’.
1) Computer Virus • Quarantine is a special area for storing files probably infected with viruses.
• A virus is a bad program to damage routine working of a computer system. 3) Cookies
• A computer virus is a program that attaches itself to another program or file • Cookies are small text files that are created when we visit a website that keep track
enabling it to spread from one computer to another without our knowledge and of our details.
interfereswith the normal operation of a computer. • Cookies remembers our user name, preferences, e-mail address, etc.
2) Worm Guidelines for using computers over Internet
• It is a stand alone malware program that replicates itself in order to spread to other • Do not open any e-mail attachment that you are not sure about the sender.
computers. • Download files only from reputed sources.
• Worms spread from computer to computer on its own. • Do not use/copy software that you cannot confirm the origin.
3) Trojan Horse • Avoid clicking on pop-up advertisements.
• It appears as a useful software but it is harmful software’s and it will delete useful • Make sure the firewall is set and turned on.
softwares or files. • Use strong passwords. Change passwords at regular intervals.
4) Spams • Update the virus definitions of your antivirus program periodically online.
• Sending an email without recipients consent to promote a product or service is • Keep a regular backup of your important files.
called spaming. Such an email is called spam • Be careful about giving personal data online.
5) Hacking
• It is a process of trespassing computer networks.
• In computer networking, hacking is a technical effort to manipulate the normal
behavior of network connections and connected systems.
• Hacking performed by computer security experts are called ethical hacking and
such hackers are called white hats
• Computer criminals break into secure networks to destroy data or make the network
unusable. Such hackers are called black hats
• Grey hat hackers fall between white and black hackers
6) Phishing
• Electronic Medical Record (EMR): It is a digital version of a paper chart that contains
all of a patient's medical history from one practice.
• Web based support: Internet is used by the doctors to acquire information to
diagnose and give treatments to the patients who are suffering from diseases.
• Telemedicine: With the help of Tele-Medicine equipment doctors and nurses can
examine patients in remote location by monitoring patients condition. Telemedicne is
implemented with a telephone and computer.
• Research and development: The role of computers in different field of research and
development unavoidable.
ICT enabled services:
• Business Process Outsourcing (BPO): The process of hiring a third party service
provider to do the operations and responsibilities of specific business functions. It may
also involve transferring of employees and asset from one firm to another. It increases
the efficiency in services and saves cost.
Eg. Costumer care service.
• Knowledge Process Outsourcing (KPO): Knowledge and information related work is
carried out by different company or subsidiary within the organization. It includes data
search, data integration, market research etc.
• Call center: A call center (also called service center, sales center, contact center etc..)
is a telephone service facility set up to handle a large number of incoming and outgoing
calls for supporting various responsibilities of an organization.
• Teleconferencing: Teleconferencing is a meeting or conference held between two or
more parties in remote locations by use of IT infra structure and services.
• Video Conferencing: Video conferencing is a type of teleconferencing in which the
video of the parties involved in the conference is also included. A video camera and
microphone and communication system is needed.
Sample Questions
1. Write any two challenges for implementing e-Governance.
2. e-Learning allows us to overcome many limitations of conventional teaching-learning
process.
a) Name any three e-Learning tools for enhancing e-Learning process.
b) Write any three advantages of e-Learning.
3. Compare the advantage and disadvantages of implementing e-Business.
4. Almost all services and business are available online now.
a) Name the system that facilitates money transaction between buyers and sellers in
such cases.
b) Explain the infrastructure of e-Governance.
5. Briefly describe any two benefits of e-Governance.
6. Distinguish between teleconferencing and video conferencing?
7. What is the role of ICT in Health care?
8. What is mean by Knowledge Process Outsourcing (KPO)?
ACT MLPM 47