Mathematics and General Awarness Module4
Mathematics and General Awarness Module4
Hardware
The term hardware refers to mechanical device that makes up computer.
Computer hardware consists of interconnected electronic devices that we can
use to control computer’s operation, input and output. Examples of hardware
are CPU, keyboard, mouse, hard disk, etc.
Hardware Components
Computer hardware is a collection of several components working together.
Some parts are essential and others are added advantages. Computer
hardware is made up of CPU and peripherals as shown in image below.
1|Page
Software
A set of instructions that drives computer to do stipulated tasks is called a
program. Software instructions are programmed in a computer language,
translated into machine language, and executed by computer. Software can be
categorized into two types −
System software
Application software
System Software
Application Software
2|Page
o.
It is a
collection of
programs to
bring It includes physical components of computer
1
computer system.
hardware
system into
operation.
It includes
numbers,
alphabets,
It consists of electronic components like ICs,
alphanumeri
2 diodes, registers, crystals, boards, insulators,
c symbols,
etc.
identifiers,
keywords,
etc.
Software
products
evolve by
adding new Hardware design is based on architectural
3 features to decisions to make it work over a range of
existing environmental conditions and time.
programs to
support
hardware.
It will vary as
per computer
and its built-
It is mostly constructed for all types of
4 in functions
computer systems.
and
programmin
g language.
3|Page
language.
It is
represented
in any high-
level
language The hardware works only on binary codes 1’s
6
such as and 0’s.
BASIC,
COBOL, C,
C++, JAVA,
etc.
The software
is
categorized
as operating
system,
The hardware consists of input devices, output
7 utilities,
devices, memory, etc.
language
processor,
application
software,
etc.
Operating System
4|Page
Recognizes keystrokes or mouse clicks and displayes characters or
graphics on the screen.
Networking
Networking is the process of making connections and building relationships. These connections
can provide you with advice and contacts, which can help you make informed career decisions.
Networking can even help you find unadvertised jobs/internships. Networking can take place in a
group or one-on-one setting.
5|Page
8. Enterprise private network (EPN): An enterprise private
network is a single network that a large organization uses to
connect its multiple office locations.
9. Virtual private network (VPN): VPN is an overlay private
network stretched on top of a public network.
10. Cloud network: Technically, a cloud network is a WAN whose
infrastructure is delivered via cloud services.
Internet
6|Page
Ctrl + A Selects all text
Ctrl + X Cuts the selected item
Ctrl + Del Cut selected item
Ctrl + C Copy the selected item
Ctrl + Ins Copy the selected item
Ctrl + V Paste the selected item
Shift + Ins Paste the selected item
Home Takes the user to the start of the current line
Ctrl + Home Go to the beginning of the document
End Go to the end of the current line
Ctrl + End Go to the end of a document
Shift + Home Highlight from the prevailing position to the start of the line
Shift + End Highlight from the prevailing position to end of the line
Ctrl + (Left arrow) Move one term to the left at a time
Ctrl + (Right arrow) Move one term to the right at a time
Introduction to MS Office
Microsoft Office is a closed-source software office suite containing different applications. It was first launched by
Bill Gates on 19th November 1990 soon after the launch of Microsoft Windows.
The first version of MS Office Contained MS Word, MS Excel & MS PowerPoint. While these are called
Applications, Microsoft Office is called Software.
Out of these applications, MS Word, MS Excel & MS PowerPoint are used the most across the world.
7|Page
MS Office -MS Word
Microsoft Word is the most convenient software used for creating text files. These text files can be edited and
transferred from the author to others and edited by them too. As a word processing application, there are the
following functions available:
MS Office-MS Excel
MS Excel is used for processing the data that is in tabular form and then performing mathematical functions on
it to analyze it. MS Excel performs the following basic functions:
o MS PowerPoint is an application that provides the user to work with slides and runs a slideshow.
o PowerPoint mainly comprises slides for making the presentation.
o One can decide the sequence of the slide, layout, design, add media to the slides & can also perform
other word processing functions like font change, size change, etc.
o “.ppt” is the extension for PowerPoint presentations.
o Generally, used to generate audiovisual presentations.
Hacking
Ethical Hacking
An approved attempt to acquire unauthorized access to a computer system, program, or data is known as hacking. Duplicating
the techniques of malevolent attackers is part of carrying out an ethical hack. This approach aids in the detection of security
flaws, which can subsequently be addressed prior to a malicious attacker having a chance to misuse them.
8|Page
Hackers adhere to four important protocol principles:
Stay legal: Before accessing and executing a security evaluation, ensure you have the right permissions.
Report Vulnerabilities: All vulnerabilities uncovered during the assessment should be reported to the organization. Provide
remediation suggestions for correcting these vulnerabilities.
Define the scope of the assessment to ensure that the ethical hacker’s work is legal and within the organization’s approved
parameters.
Respect data sensitivity: Ethical hackers may be forced to sign a non-disclosure agreement and additional terms and restrictions
imposed by the examined firm, depending on the data sensitivity.
Types of hacking
Depending on the hacker’s goal, we can categorize hack type into several sorts.
Website Hacking: Taking unauthorized control over a web server and its accompanying software, such as databases.
Network Hacking: Hacking a network based gathering data using several tools to cause damage to the full network system and
interfere with its operation.
Email hacking: It involves gaining illegal access to any email account and utilizing to send spam, threats, and other damaging
activities without permission.
Password hacking: It is the process of sourcing passwords from data stored in computer systems.
Computer hacking: It is the process of illegal access to a PC by hacking its ID and password using manytechniques.
When it comes to organized crime, hacking is often a huge business and can be pretty sophisticated. Hacking for profit has
proven to be incredibly profitable, and the strategies used by hackers allow them to elude law authorities frequently.
Computer virus
Types of viruses
PC viruses that infect files and viruses that copy themselves in the boot sector are the two types of viruses that can be
distinguished, depending on the method of infection. The boot sector viruses are activated automatically when the computer
starts up.
9|Page
Non-subscription and subscription viruses are the two types of viruses. The former is placed at the start and end of an
executable file.
Worms
These are malicious programs that self-replicate and execute but do not infect your computer’s other programs. The infection is
active when a user accepts and runs the Worm-infected file through a network connection. Worms can increase indefinitely,
clogging computers and triggering equipment failures.
Trojans
These are self-contained, possibly beneficial programs that a programmer has tampered with to achieve an unexpected (and
occasionally destructive) consequence. These creatures do not self-replicate, but Email attachments and Worms can distribute
them.
Bugs
These are vulnerabilities in some programs’ computer coding that allow remote computers (and their users) to gain administrator
rights (access.)
The technique of protecting computers or any electronic systems, networks, from illegal intrusions is known as cyber security. A
good network security system can help limit the danger of data leakage.
Attacks can occur at various levels, and network security requires three levels of control:
Physical: Designed to prevent unauthorized access to components such as routers by physical means. It could include cameras,
fingerprint scanners, and other devices.
Technical: Designed to keep data on the network safe from unauthorized access and hacking.
Administrative: Consists of rules and security regulations aimed at limiting user behavior.
Security tools
Firewalls
A firewall is a crucial security tool since it protects against malware, unauthorized logins, and other security concerns. It is used
to safeguard data from security breaches by blocking IP ranges and URLs.
10 | P a g e
Antivirus protection software
If you aren’t familiar with cybersecurity, you must have up-to-date anti-virus software installed to keep your PC secure.
If a possible threat is found, an Intrusion Detection System (IDS) monitors network and system traffic for unusual or suspicious
activities and notifies the administrator.
Packets sniffers
A packet sniffer, known as a packet analyzer, protocol analyzer, or network analyzer, intercepts, logs, and analyses network
traffic and data.
Protect yourself against cyber attacks with this cyber safety advice
How can businesses and individuals safeguard themselves against cyber-threats? Here are a few of our top cyber-security tips:
What Is a Database?
A database is an organized collection of structured information, or data, typically stored electronically in a
computer system. A database is usually controlled by a database management system (DBMS). Together,
the data and the DBMS, along with the applications that are associated with them, are referred to as a
database system, often shortened to just database.
11 | P a g e