0% found this document useful (0 votes)
26 views

Mathematics and General Awarness Module4

Uploaded by

msrmuhammed97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Mathematics and General Awarness Module4

Uploaded by

msrmuhammed97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Module – 4 Computer Aptitude

Hardware
The term hardware refers to mechanical device that makes up computer.
Computer hardware consists of interconnected electronic devices that we can
use to control computer’s operation, input and output. Examples of hardware
are CPU, keyboard, mouse, hard disk, etc.

Hardware Components
Computer hardware is a collection of several components working together.
Some parts are essential and others are added advantages. Computer
hardware is made up of CPU and peripherals as shown in image below.

1|Page
Software
A set of instructions that drives computer to do stipulated tasks is called a
program. Software instructions are programmed in a computer language,
translated into machine language, and executed by computer. Software can be
categorized into two types −

 System software
 Application software
System Software

System software operates directly on hardware devices of computer. It


provides a platform to run an application. It provides and supports user
functionality. Examples of system software include operating systems such as
Windows, Linux, Unix, etc.

Application Software

An application software is designed for benefit of users to perform one or more


tasks. Examples of application software include Microsoft Word, Excel,
PowerPoint, Oracle, etc.

Differences between Software and Hardware are sorted out below −

Sr.N Software Hardware

2|Page
o.

It is a
collection of
programs to
bring It includes physical components of computer
1
computer system.
hardware
system into
operation.

It includes
numbers,
alphabets,
It consists of electronic components like ICs,
alphanumeri
2 diodes, registers, crystals, boards, insulators,
c symbols,
etc.
identifiers,
keywords,
etc.

Software
products
evolve by
adding new Hardware design is based on architectural
3 features to decisions to make it work over a range of
existing environmental conditions and time.
programs to
support
hardware.

It will vary as
per computer
and its built-
It is mostly constructed for all types of
4 in functions
computer systems.
and
programmin
g language.

5 It is designed The hardware can understand only low-level


and language or machine language.
developed by
experienced
programmer
s in high-
level

3|Page
language.

It is
represented
in any high-
level
language The hardware works only on binary codes 1’s
6
such as and 0’s.
BASIC,
COBOL, C,
C++, JAVA,
etc.

The software
is
categorized
as operating
system,
The hardware consists of input devices, output
7 utilities,
devices, memory, etc.
language
processor,
application
software,
etc.

Operating System

Operating system is a software that controls system’s hardware and interacts


with user and application software.

In short, an operating system is computer’s chief control program.

Functions of Operating System

The operating system performs the following functions −

 It offers a user interface.


 Loads program into computer’s memory.
 Coordinates how program works with hardware and other software.
 Manages how information is stored and retrieved from the disk.
 Saves contents of file on to disk.
 Reads contents of file from disk to memory.
 Sends document to the printer and activates the printer.
 Provides resources that copy or move data from one document to
another, or from one program to another.
 Allocates RAM among the running programs.

4|Page
 Recognizes keystrokes or mouse clicks and displayes characters or
graphics on the screen.

There are four types of operating systems −

 Real-time operating system


 Single-User/Single-Tasking operating system
 Single-User/Multitasking operating system
 Multi-User/Multitasking operating system

Networking

Networking is the process of making connections and building relationships. These connections
can provide you with advice and contacts, which can help you make informed career decisions.
Networking can even help you find unadvertised jobs/internships. Networking can take place in a
group or one-on-one setting.

Networking, also known as computer networking, is the practice of transporting and


exchanging data between nodes...

Types of Computer Networks


Computer networks can be classified based on several criteria, such as the
transmission medium, the network size, the topology, and organizational
intent. Based on a geographical scale, the different types of networks are:

1. Nanoscale networks: These networks enable communication


between minuscule sensors and actuators.
2. Personal area network (PAN): PAN refers to a network used by
just one person to connect multiple devices, such as laptops to
scanners, etc.
3. Local area network (LAN): The local area network connects
devices within a limited geographical area, such as schools,
hospitals, or office buildings.
4. Storage area network (SAN): SAN is a dedicated network that
facilitates block-level data storage. This is used in storage devices
such as disk arrays and tape libraries.
5. Campus area network (CAN): Campus area networks are a
collection of interconnected LANs. They are used by larger entities
such as universities and governments.
6. Metropolitan area network (MAN): MAN is a large computer
network that spans across a city.
7. Wide area network (WAN): Wide area networks cover larger
areas such as large cities, states, and even countries.

5|Page
8. Enterprise private network (EPN): An enterprise private
network is a single network that a large organization uses to
connect its multiple office locations.
9. Virtual private network (VPN): VPN is an overlay private
network stretched on top of a public network.
10. Cloud network: Technically, a cloud network is a WAN whose
infrastructure is delivered via cloud services.

Based on organizational intent, networks can be classified as:

1. Intranet: Intranet is a set of networks that is maintained and


controlled by a single entity. It is generally the most secure type of
network, with access to authorized users alone. An intranet usually
exists behind the router in a local area network.
2. Internet: The internet (or the internetwork) is a collection of
multiple networks connected by routers and layered by networking
software. This is a global system that connects governments,
researchers, corporates, the public, and individual computer
networks.
3. Extranet: An extranet is similar to the intranet but with
connections to particular external networks. It is generally used to
share resources with partners, customers, or remote employees.
4. Darknet: The darknet is an overlay network that runs on the
internet and can only be accessed by specialized software. It uses
unique, customized communication protocols.

Internet

Internet is a global communication system that links together thousands of


individual networks. It allows exchange of information between two or more
computers on a network. Thus internet helps in transfer of messages through
mail, chat, video & audio conference, etc. It has become mandatory for day-to-
day activities: bills payment, online shopping and surfing, tutoring, working,
communicating with peers, etc.

Short cut keys


t+F File menu options in the current program
Alt + E Edits options in the current program
F1 Universal help (for any sort of program)

6|Page
Ctrl + A Selects all text
Ctrl + X Cuts the selected item
Ctrl + Del Cut selected item
Ctrl + C Copy the selected item
Ctrl + Ins Copy the selected item
Ctrl + V Paste the selected item
Shift + Ins Paste the selected item
Home Takes the user to the start of the current line
Ctrl + Home Go to the beginning of the document
End Go to the end of the current line
Ctrl + End Go to the end of a document
Shift + Home Highlight from the prevailing position to the start of the line
Shift + End Highlight from the prevailing position to end of the line
Ctrl + (Left arrow) Move one term to the left at a time
Ctrl + (Right arrow) Move one term to the right at a time

Introduction to MS Office
Microsoft Office is a closed-source software office suite containing different applications. It was first launched by
Bill Gates on 19th November 1990 soon after the launch of Microsoft Windows.

The first version of MS Office Contained MS Word, MS Excel & MS PowerPoint. While these are called
Applications, Microsoft Office is called Software.

The list of Applications launched by MS Office are as follows:

o MS Word- First launched in 1983.


o Main Function-Creating text files.
o MS Excel-First launched in 1985.
o Main Function-Creating Spreadsheets.
o MS PowerPoint-First launched in 1987.
o Main Function-Creating Presentations.
o MS Access- First launched in 1992.
o Main Function-Database Management.
o MS Outlook-First launched in 1997.
o Main Function-Emailing & Work Calendar.
o MS OneNote-First launched in 2003.
o Main Function-Keeping Notes.
o MS Publisher-First launched in 1991.
o Main Function-Desktop Publishing.
o Skype-First launched in 2003.
o Main Function-Video Conferencing.

Out of these applications, MS Word, MS Excel & MS PowerPoint are used the most across the world.

Know more about the Generations of Computers here.

MS Office Applications and their Features

7|Page
MS Office -MS Word

Microsoft Word is the most convenient software used for creating text files. These text files can be edited and
transferred from the author to others and edited by them too. As a word processing application, there are the
following functions available:

o “.doc” is the extension for Doc files.


o It helps generate text documents.
o Features like colors, work art, images, animations can be inserted along with the text in the same file.
o Authors or Writers can use it for writing/ editing reports, letters, documents, resumes, and more.
o Spell-checks facility on the writing doc file is also available.

Read more about MS Word, here.

MS Office-MS Excel

MS Excel is used for processing the data that is in tabular form and then performing mathematical functions on
it to analyze it. MS Excel performs the following basic functions:

o MS Excel is majorly utilized for making spreadsheets.


o In MS Excel, there are rows and columns. The intersection of rows and columns forms a cell.
o The unique functions that MS Excel has are Formulas & Data. Users can perform the formula on data to
analyze it quickly; which can be easily managed and can be applied as a replacement for paper.
o Right from basic functions like addition & subtraction, the user can perform complex statistical functions
like correlation & t-test.
o File extension, for MS Excel, is “.xls”
o MS Excel is a data processing application where large data can be easily managed and saved in tabular
format.

MS Office -MS PowerPoint

o MS PowerPoint is an application that provides the user to work with slides and runs a slideshow.
o PowerPoint mainly comprises slides for making the presentation.
o One can decide the sequence of the slide, layout, design, add media to the slides & can also perform
other word processing functions like font change, size change, etc.
o “.ppt” is the extension for PowerPoint presentations.
o Generally, used to generate audiovisual presentations.

Hacking
Ethical Hacking

An approved attempt to acquire unauthorized access to a computer system, program, or data is known as hacking. Duplicating
the techniques of malevolent attackers is part of carrying out an ethical hack. This approach aids in the detection of security
flaws, which can subsequently be addressed prior to a malicious attacker having a chance to misuse them.

Key concepts of hacking

8|Page
Hackers adhere to four important protocol principles:

Stay legal: Before accessing and executing a security evaluation, ensure you have the right permissions.

Report Vulnerabilities: All vulnerabilities uncovered during the assessment should be reported to the organization. Provide
remediation suggestions for correcting these vulnerabilities.

Define the scope of the assessment to ensure that the ethical hacker’s work is legal and within the organization’s approved
parameters.

Respect data sensitivity: Ethical hackers may be forced to sign a non-disclosure agreement and additional terms and restrictions
imposed by the examined firm, depending on the data sensitivity.

Types of hacking
Depending on the hacker’s goal, we can categorize hack type into several sorts.

Website Hacking: Taking unauthorized control over a web server and its accompanying software, such as databases.

Network Hacking: Hacking a network based gathering data using several tools to cause damage to the full network system and
interfere with its operation.

Email hacking: It involves gaining illegal access to any email account and utilizing to send spam, threats, and other damaging
activities without permission.

Password hacking: It is the process of sourcing passwords from data stored in computer systems.

Computer hacking: It is the process of illegal access to a PC by hacking its ID and password using manytechniques.

When Is It Illegal To Hack?


It is illegal for a hacker to breach a system without authorization. Black Hat Hackers are the name for these types of hackers.
They’re the kind of hackers recognized for hacking for malicious purposes rather than for enjoyment. Then there’s the hacker
who wants to expose someone or release information.

When it comes to organized crime, hacking is often a huge business and can be pretty sophisticated. Hacking for profit has
proven to be incredibly profitable, and the strategies used by hackers allow them to elude law authorities frequently.

Computer virus
Types of viruses

PC viruses that infect files and viruses that copy themselves in the boot sector are the two types of viruses that can be
distinguished, depending on the method of infection. The boot sector viruses are activated automatically when the computer
starts up.

9|Page
Non-subscription and subscription viruses are the two types of viruses. The former is placed at the start and end of an
executable file.

Worms

These are malicious programs that self-replicate and execute but do not infect your computer’s other programs. The infection is
active when a user accepts and runs the Worm-infected file through a network connection. Worms can increase indefinitely,
clogging computers and triggering equipment failures.

Trojans

These are self-contained, possibly beneficial programs that a programmer has tampered with to achieve an unexpected (and
occasionally destructive) consequence. These creatures do not self-replicate, but Email attachments and Worms can distribute
them.

Bugs

These are vulnerabilities in some programs’ computer coding that allow remote computers (and their users) to gain administrator
rights (access.)

Cyber threat defense

The technique of protecting computers or any electronic systems, networks, from illegal intrusions is known as cyber security. A
good network security system can help limit the danger of data leakage.

Attacks can occur at various levels, and network security requires three levels of control:

Physical: Designed to prevent unauthorized access to components such as routers by physical means. It could include cameras,
fingerprint scanners, and other devices.

Technical: Designed to keep data on the network safe from unauthorized access and hacking.

Administrative: Consists of rules and security regulations aimed at limiting user behavior.

Security tools
Firewalls

A firewall is a crucial security tool since it protects against malware, unauthorized logins, and other security concerns. It is used
to safeguard data from security breaches by blocking IP ranges and URLs.

10 | P a g e
Antivirus protection software

If you aren’t familiar with cybersecurity, you must have up-to-date anti-virus software installed to keep your PC secure.

Network intrusion detection

If a possible threat is found, an Intrusion Detection System (IDS) monitors network and system traffic for unusual or suspicious
activities and notifies the administrator.

Packets sniffers

A packet sniffer, known as a packet analyzer, protocol analyzer, or network analyzer, intercepts, logs, and analyses network
traffic and data.

Protect yourself against cyber attacks with this cyber safety advice

How can businesses and individuals safeguard themselves against cyber-threats? Here are a few of our top cyber-security tips:

1. Update your operating system


2. Install Anti-virus softwares. It detects and removes threats.
3. Make sure your passwords are hard to guess.
4. Never open attachments from unknown senders because they may contain malware.
5. Do not open any emails from unknown senders or unfamiliar websites.
6. Don’t use public WiFi networks that aren’t secure.

What Is a Database?
A database is an organized collection of structured information, or data, typically stored electronically in a
computer system. A database is usually controlled by a database management system (DBMS). Together,
the data and the DBMS, along with the applications that are associated with them, are referred to as a
database system, often shortened to just database.

11 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy