MAIND MAP COUMPTERS
MAIND MAP COUMPTERS
A. Hardware
Hardware refers to the physical components of a computer system. These components can be
categorized into four major types:
2. Processing Devices – The central part of the computer responsible for processing
instructions.
o Central Processing Unit (CPU): The "brain" of the computer. It consists of:
B. Software
Software is a set of instructions that tell a computer how to perform specific tasks. It is categorized
into two types:
1. System Software: Software that manages computer hardware and provides a platform for
application software.
o Operating System (OS): Controls hardware, manages files, and runs applications
(e.g., Windows, macOS, Linux).
o Utility Programs: Software that helps maintain the computer (e.g., Antivirus, Disk
Cleanup).
o Language Translators:
Compiler: Converts high-level code into machine code at once (e.g., C, C++).
C. Memory
RAM (Random Access Memory): Temporary memory used by the system while running
programs. It is fast but erased when the computer is turned off.
o Types of RAM:
ROM (Read-Only Memory): Stores permanent data like firmware. It cannot be modified
easily.
3. Cache Memory
4. Registers
D. Units of Memory
1 Byte 8 Bits
A. System Software
Examples:
B. Application Software
Examples:
A. Boolean Algebra
o OR (+): A + B = 1 if either A or B is 1.
Truth Table
0 00 0 1
0 10 1 1
1 00 1 0
1 11 1 0
Logic Gates:
B. Number System
Binary 2 0,1
Decimal 10 0-9
Octal 8 0-7
C. Encoding Schemes
2. Unicode
o Uses 16 or 32 bits.
o Example: 5 → 0101.
A. Flowchart
A flowchart is a diagram that visually represents the flow of an algorithm or process using different
symbols.
Flowchart Symbols
Start ➝ Input A, B ➝ Decision (A > B?) ➝ Yes: Print A ➝ No: Print B ➝ End
B. Pseudocode
Pseudocode is a way of writing an algorithm using a structured format similar to programming but
without strict syntax.
BEGIN
INPUT A, B
SUM = A + B
PRINT SUM
END
A. Python Tokens
Tokens are the smallest units of Python code. There are five types:
B. Comments in Python
Comments are ignored by the Python interpreter and are used for documentation.
Multi-line comment:
"""
This is a
multi-line comment.
"""
Example:
x = 10 # int
y = 3.14 # float
z = "Hello" # str
a = True # bool
b = [1,2,3] # list
B. Operators in Python
Example:
a = 10
b=5
C. Type Conversion
2. x = 5 # int
3. y = 2.5 # float
7. a = "10"
9. print(b) # 10
D. Errors in Python
4. print(10 / 0) # ZeroDivisionError
A. Conditional Statements
1. if Statement
2. age = 18
5. if-else Statement
6. num = 10
7. if num % 2 == 0:
8. print("Even")
9. else:
10. print("Odd")
12. marks = 85
B. Looping Statements
1. for loop
2. for i in range(5):
3. print(i) # Prints 0 to 4
4. while loop
5. x = 1
6. while x <= 5:
7. print(x)
8. x += 1
11. if i == 5:
13. print(i)
A. Strings
B. Lists
C. Tuples
D. Dictionaries
Key-value pairs.
Example:
x=5
y=x*2
print(y)
Output: 10
8. Python Modules
A. math Module
import math
B. statistics Module
import statistics
C. random Module
import random
With the rapid growth of technology, digital advancements have transformed how we interact,
communicate, and conduct business. However, this also brings ethical, legal, and social challenges
related to privacy, security, and cyber laws.
A. Positive Impacts
1. Communication – Social media, emails, video calls have made global communication easy.
2. Education – E-learning, online courses, and digital libraries provide knowledge access
worldwide.
5. Entertainment – Streaming services, gaming, and digital art have enhanced creativity.
B. Negative Impacts
1. Privacy Issues – Personal data is often collected and misused by companies and hackers.
2. Cybercrime – Hacking, phishing, identity theft, and ransomware attacks are increasing.
4. Mental Health Issues – Excessive social media use can lead to stress, anxiety, and addiction.
Governments worldwide have implemented laws to regulate cyberspace and protect users from
cyber threats.
1. IT Act 2000 (India) – Covers digital transactions, cybercrimes, and electronic signatures.
2. General Data Protection Regulation (GDPR) – A European law that protects user privacy and
data security.
3. Digital Millennium Copyright Act (DMCA) – Protects intellectual property rights online.
4. Computer Fraud and Abuse Act (CFAA) – A U.S. law against hacking and unauthorized data
access.
B. Types of Cybercrimes
1. Hacking – Unauthorized access to computer systems.
2. Phishing – Fraudulent emails tricking users into revealing passwords and credit card details.
5. Ransomware Attacks – Malware that locks user data until a ransom is paid.
C. Cybersecurity Measures
1. Privacy Concerns – Companies collecting and selling user data without consent.
2. AI and Automation – Ethical concerns about AI decision-making, job replacement, and bias.
B. Digital Citizenship
Being a responsible digital citizen means using technology ethically and legally. This includes:
Respecting privacy.
Avoiding cyberbullying.
Reporting cybercrimes.
Intellectual property refers to creations of the mind, such as inventions, literary works, and artistic
works.
With the increasing use of online services, protecting user data is essential.