Computer Notes For CET 2025
Computer Notes For CET 2025
1 2
The CPU is often called the "brain" of the computer as it processes instructions, performs
calculations, and manages the flow of data. Modern CPUs operate at speeds measured in
Gigahertz (GHz), with higher numbers indicating faster processing capabilities.
Computer Types and Classifications
Types of Computers Based on Operation
Computers can be classified based on their Computers can also be classified based on
size, processing power, and purpose: how they process data:
The history of computers is often divided into generations based on the technology used. The first
fully electronic digital computer was ENIAC (Electronic Numerical Integrator and Computer),
developed during World War II. Charles Babbage is credited as the "Father of the Computer" for his
concept of a programmable mechanical computer, the Analytical Engine.
The process of starting or restarting a computer is called booting. This can be a "Cold Boot"
(starting from a completely powered-off state) or a "Warm Boot" (restarting the OS without a power
cycle).
Input/Output (I/O) Devices
This section explores the vast array of peripheral devices used to interact with a computer, directly
addressing the syllabus requirements for "input/output devices" and "PORTS".
The quality of a printer's output is measured in DPI (Dots Per Inch), while its speed may be
measured in PPM (Pages Per Minute) or CPS (Characters Per Second) for dot matrix printers. The
distance between two adjacent pixels on a monitor screen is called the dot pitch, with smaller
values indicating sharper images.
Computer Memory and Storage
Primary Memory Secondary Storage Memory Hierarchy
RAM (Random Access Non-volatile storage for Organized by speed,
Memory) is volatile long-term data retention: capacity, and cost:
memory that loses data
Hard Disk Drives (HDD): Registers: Fastest,
when power is off. It serves
Magnetic storage smallest, inside CPU
as the computer's main
Solid State Drives Cache: Very fast, small,
working memory.
(SSD): Flash memory on or near CPU
ROM (Read-Only Memory) with no moving parts Main Memory (RAM):
is non-volatile and retains
Optical Media: CD- Fast, medium capacity
data when powered off.
ROM, CD-R (WORM), Secondary Storage:
Types include:
CD-RW, DVD, Blu-ray Slower, large capacity
PROM: Programmable USB Flash Drives:
once Portable storage using
EPROM: Erasable with flash memory
UV light
EEPROM: Electrically
erasable
The Universal Serial Bus (USB) is a standard interface for connecting a wide variety of peripherals
to a computer. IPv4 addresses are 32 bits in size, consisting of 4 numbers ranging from 0 to 255
separated by dots (e.g., [Link]).
Part 2: Operating Systems and
Windows Environment
Operating System Functions Types of User Interfaces
An operating system (OS) is the primary Operating systems provide different ways for
system software that manages computer users to interact:
hardware and software resources. Key
Command-Line Interface (CLI): Requires
functions include:
typed commands (e.g., MS-DOS)
Memory Management: Allocating and Graphical User Interface (GUI): Uses visual
deallocating memory space elements like icons and windows
Process Management: Controlling program Menu-Driven Interface: Presents options in
execution menus
File Management: Organizing and tracking Touch-Based Interface: Designed for
files touchscreens
Device Management: Controlling peripheral
devices
User Interface: Providing ways to interact
with the computer
In Windows, deleted files are temporarily stored in the Recycle Bin, from where they can be
restored or permanently deleted. Windows Explorer (now called File Explorer in recent versions) is
the file management application that provides a graphical interface for accessing and managing
files and folders.
The Shift + Delete keyboard shortcut is used to permanently delete a file in Windows, bypassing
the Recycle Bin.
Part 3: Microsoft Word
The Ctrl + Z shortcut is used to undo the last action in MS Word, while Ctrl + S is used to save the
document. A hanging indent is a paragraph format where all lines except the first are indented,
commonly used for bibliographies and reference lists.
Part 4: Microsoft Excel
Microsoft Excel is a powerful spreadsheet application used for data organization, calculation, and
analysis.
The fundamental structure of Excel includes: Different types of cell references in formulas:
Cell: The intersection of a row and column Relative: Changes when copied (e.g., A1)
(e.g., A1) Absolute: Doesn't change when copied
Formula: Begins with an equals sign (=) (e.g., $A$1)
Function: Predefined formulas like SUM(), Mixed: Partially fixed (e.g., $A1 or A$1)
MAX()
Example: =IF(A1>80, "Distinction", "Pass")
Workbook: The entire Excel file containing
checks if the value in A1 is greater than 80 and
worksheets
returns "Distinction" if true, "Pass" if false.
Worksheet: Individual spreadsheet within a
workbook
Advanced features include PivotTables for data analysis, Goal Seek for finding specific input
values, and Data Validation for controlling what users can enter into cells.
Part 5: Microsoft PowerPoint
Slide Transitions Master Slides and Presentation Tools
and Animations Templates Features that help with
PowerPoint offers visual For consistent design delivering
effects to enhance throughout a presentations:
presentations: presentation:
Presenter View:
Transitions: Effects Slide Master: Shows notes and
that occur when Controls the overall upcoming slides on
moving from one design and layout of presenter's screen
slide to the next all slides Notes Pane: Adds
Animations: Effects Templates: Pre- speaker notes visible
applied to individual designed slide only to the presenter
objects within a slide layouts and themes Rehearse Timings:
Animation Painter: Themes: Consistent Practice and record
Copies animation color schemes and presentation timing
settings from one fonts Ctrl + M: Shortcut to
object to another create a new slide
PowerPoint is designed for creating visual presentations that combine text, graphics, audio, and
video elements. It allows for both linear presentations (slides in sequence) and interactive
presentations with hyperlinks and action buttons.
Part 6: Internet, Web, and Electronic
Mail
Web Fundamentals Email Protocols
Key concepts for understanding the World Different protocols serve different functions in
Wide Web: email systems:
URL (Uniform Resource Locator): The SMTP (Simple Mail Transfer Protocol): For
address of a resource on the web sending email
HTTP/HTTPS: Protocols for transferring POP3 (Post Office Protocol): For retrieving
web pages email
HTML: The markup language used to IMAP (Internet Message Access Protocol):
create web pages For syncing email across devices
Browser: Software used to access and
Email fields include:
display web pages
To: Primary recipients
CC (Carbon Copy): Additional visible
recipients
BCC (Blind Carbon Copy): Hidden
recipients
The internet operates on a client-server model. For email, your email client (like Outlook or Gmail)
uses SMTP to send your outgoing messages to the email server. The server then uses SMTP to
route the message to the recipient's server.
Web browsing involves navigating between websites, following hyperlinks, and searching for
information using search engines. Downloading is the process of transferring files from a remote
server to your local device, while uploading is transferring files from your device to a server.
Part 7: Number Systems and Digital
Logic
This section delves into the foundational mathematics of computing, including the binary, octal,
and hexadecimal number systems, and the basic logic gates that form the building blocks of digital
circuits.
Number Systems 1
Computers use different number
systems:
ASCII (American Standard Code for Information Interchange) is a character encoding standard that
represents text in computers using numeric codes. A group of 4 bits is called a nibble, while a
group of 8 bits is a byte.
Part 8: Computer Networks and
Security
This part expands on connectivity and safety, covering network structures, protocols, and the
common threats that users and systems face online.
LAN (Local Area Network): Limited area Bus: All devices connect to a single
like home or office cable
MAN (Metropolitan Area Network): City- Ring: Devices connect in a closed loop
sized area Star: All devices connect to a central
WAN (Wide Area Network): Large hub/switch
geographical area Mesh: Devices connect to multiple other
PAN (Personal Area Network): Very devices
small area around a person
Databases are organized collections of data that provide mechanisms for storing, retrieving, and
manipulating information. They are essential for applications that need to manage large amounts of
structured data, from simple address books to complex enterprise systems.
The relational database model, which organizes data into tables with relationships between them, is
the most common type of database. Other models include hierarchical, network, object-oriented,
and NoSQL databases.
Part 10: Advanced MS Office and
Shortcuts
Going beyond the basics, this section tests knowledge of more powerful features and efficiency-
boosting keyboard shortcuts in the Microsoft Office suite.
Ctrl + C Copy
Ctrl + V Paste
Ctrl + X Cut
Ctrl + Z Undo
Ctrl + Y Redo
Ctrl + S Save
Ctrl + P Print
Ctrl + F Find
These shortcuts significantly increase productivity by reducing the need to navigate through
menus and use the mouse for common tasks.
Part 11: History, Generations, and
Software Concepts
This part covers the evolution of computing technology and the fundamental difference between
the types of software that make a computer useful.
Quantum computing
Machine learning and neural
networks
Natural language processing
System Software: Manages and controls the computer hardware (e.g., operating systems like
Part 12: Miscellaneous Computer
Knowledge
1 Byte = 8 bits
1 Kilobyte (KB) = 1024 Bytes
1 Megabyte (MB) = 1024 KB
1 Gigabyte (GB) = 1024 MB
1 Terabyte (TB) = 1024 GB
Malware (malicious software) comes in various forms, including spyware, ransomware, and
adware. Firmware, on the other hand, is a specific class of computer software that provides low-
level control for a device's specific hardware.
Computer Components and
Characteristics
Core Components Computer Characteristics
The CPU (Central Processing Unit) is the brain Computers are characterized by:
of any computer system. It consists of:
Speed: Ability to process data quickly
Arithmetic Logic Unit (ALU): Performs Accuracy: Correctness of calculations
calculations
Diligence: Ability to work for long periods
Control Unit (CU): Directs operations without fatigue
Registers: High-speed storage locations Versatility: Ability to perform various tasks
The motherboard is the main circuit board that Storage Capacity: Ability to store large
connects all components. amounts of data
The trackball is an example of a pointing device used to control the cursor on a screen. It functions
like an upside-down mouse, allowing the user to move the ball with their fingers.
SMPS stands for Switch Mode Power Supply, an electronic power supply that incorporates a
switching regulator to convert electrical power efficiently. It is the standard power supply unit used
in modern personal computers.
The process of dividing a disk into tracks and sectors is called formatting. This prepares a data
storage device for initial use.
Part 13: Programming Fundamentals &
Languages
This section introduces basic programming concepts, the evolution of programming languages,
and the tools used to translate human-readable code into machine-executable instructions.
Debugging is the process of finding and fixing errors in a program's source code. It is a critical part
of the software development process where a programmer identifies and removes "bugs" that
prevent the program from functioning correctly.
In a standard flowchart, a diamond shape is used to indicate a decision point, where the flow of
logic can branch based on a "Yes/No" or "True/False" condition.
Part 14: Advanced Computer Networks
& Internet
This part explores the layered architecture of networks, specific protocols, and the infrastructure of
the internet.
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the
functions of a telecommunication or computing system in seven distinct layers. The Network Layer
(Layer 3) is responsible for routing and forwarding data packets between different networks.
UDP (User Datagram Protocol) is a connectionless protocol that offers faster but less reliable data
transmission compared to TCP (Transmission Control Protocol). DNS (Domain Name System)
translates human-readable domain names into machine-readable IP addresses.
HTTPS differs from HTTP by encrypting the data exchanged between the browser and the website
using SSL (Secure Sockets Layer) or TLS (Transport Layer Security) protocols.
Part 15: Software Concepts and Types
This section differentiates between various categories of software, from operating systems to the
applications users interact with daily.
System Software
Manages hardware and Application Software
provides platform for
Performs specific tasks for
applications:
users:
Operating Systems
Productivity (Word,
(Windows, Linux, macOS)
Excel, PowerPoint)
Device Drivers
Web Browsers
Firmware (software
Graphics and Multimedia
stored in hardware
devices) Games and
2
Entertainment
Utility Programs (disk
defragmenters, antivirus)
Distribution Models
How software is licensed
Programming Software
and distributed: Tools for creating other
software:
Commercial Software
(paid) Compilers and
Freeware (free but closed Interpreters
source) Integrated Development
Shareware (try before Environments (IDEs)
you buy) Debuggers
Open Source (source Code Editors
code available)
Firmware is software that is permanently stored in a hardware device, such as on a ROM chip. It
provides low-level control for a device's hardware. The BIOS of a computer is a prime example of
firmware.
Utility software is a type of system software designed to help analyze, configure, optimize, or
maintain a computer. Antivirus programs, disk defragmenters, and backup software are all
examples of utilities.
Part 16: Specific Features in MS Office
This part tests knowledge on specific, powerful tools within Word, Excel, and PowerPoint that go
beyond basic functions.
Powerful tools for data analysis and lookup: Advanced document and presentation tools:
VLOOKUP: Searches for a value in the first Styles: Define formatting characteristics
column of a table and returns a and apply them with a single click
corresponding value Track Changes: Mark and display all edits
HLOOKUP: Similar to VLOOKUP but made to a document
searches horizontally Non-breaking space: Prevents line breaks
INDEX/MATCH: More flexible alternative to within specific phrases
VLOOKUP Custom Animation: Controls how objects
IFERROR: Handles errors in formulas by appear, behave, and exit slides
displaying custom messages
In MS Excel, Data Validation is a feature that allows you to control what users can enter into a cell.
You can set rules to restrict input to a list of items, a range of numbers, a date range, or a specific
text length.
In MS PowerPoint, Presenter View is a powerful feature for delivering presentations. It lets the
speaker see the current slide, the next slide, speaker notes, and a timer on their screen, while the
audience only sees the main slide show.
Part 17: Data Communication and
Storage Devices
1 2
3 4
Solid State Drives (SSDs) offer several advantages over traditional Hard Disk Drives (HDDs),
including faster data access speeds, greater durability due to no moving parts, lower power
consumption, and silent operation. However, HDDs typically offer lower cost per gigabyte and
higher maximum storage capacities.
Part 18: Cybersecurity and Threats
Malware Types Attack Methods Security Measures
Different forms of Common techniques used Protections against cyber
malicious software: by attackers: threats:
A digital signature is a cryptographic mechanism that serves two main purposes: Authenticity
(verifying that the sender is who they claim to be) and Integrity (ensuring the message has not
been altered in transit).
When using public Wi-Fi networks, there is a risk that your data could be intercepted by attackers
on the same network. Using a VPN (Virtual Private Network) creates a secure, encrypted "tunnel"
for your data, enhancing privacy and security.
Part 19: General and Emerging
Technologies
Cloud Computing
The on-demand availability of
Internet of Things (IoT) computer system resources,
A network of physical objects especially data storage and
embedded with sensors, computing power, without direct
software, and other active management by the user.
technologies to connect and Services like Google Drive,
exchange data over the OneDrive, and Dropbox provide
Internet. Examples include cloud storage.
smart home devices, wearable
fitness trackers, and industrial Artificial Intelligence
sensors. The simulation of human
intelligence in machines
programmed to think and
learn. The Blue Brain
Project is a Swiss research
initiative that aims to create
a digital reconstruction of
Blockchain the brain.
A distributed, immutable ledger
technology that securely Mobile Computing
records transactions across Technology that allows
many computers. Best known transmission of data via a
as the technology behind computer without having to be
cryptocurrencies like Bitcoin. connected to a fixed physical
link. This includes smartphones,
tablets, and laptops with
wireless capabilities.
CC in email stands for Carbon Copy, which means that those addresses will receive a copy of
the message
A bit is the smallest unit of data in a computer, short for binary digit (0 or 1)
The printed output from a computer is called a hard copy
A GUI (Graphical User Interface) allows users to interact with electronic devices through
graphical icons and visual indicators
Internet Browsers and Online Security
Web Browsers Online Security Concerns
The ".com" top-level domain typically represents a commercial organization, while ".org" was
originally intended for non-profit organizations, ".edu" for educational institutions, and ".gov" for
government agencies.
Computer Memory and Storage
Concepts
Registers
1 Fastest, smallest memory inside CPU
Cache Memory
2
Very fast SRAM between CPU and main memory
Secondary Storage
4 Non-volatile storage for long-term data (HDDs,
SSDs)
Tertiary Storage
5 Removable media and offline storage (optical
discs, tapes)
RAM (Random Access Memory) is a volatile memory, meaning its contents are lost when the
computer is powered off. The main memory of a computer is also known as primary storage
because it is the only storage that the CPU can access directly.
The capacity of a hard drive is measured in gigabytes (GB) or terabytes (TB), while memory units
follow a binary progression:
1 Byte = 8 bits
1 Kilobyte (KB) = 1024 Bytes
1 Megabyte (MB) = 1024 KB
1 Gigabyte (GB) = 1024 MB
1 Terabyte (TB) = 1024 GB
Cache memory is typically made of Static RAM (SRAM) because it is much faster than Dynamic
RAM (DRAM), which is used for the main memory. SRAM doesn't need to be refreshed, making it
quicker but more expensive per unit of storage.
Operating Systems and Software Types
Safe Mode is a diagnostic mode in operating systems like Windows. It starts the OS in a basic state,
using a limited set of files and drivers, for troubleshooting purposes. This is useful when the
system is having problems starting or is unstable.
Software piracy is the unauthorized copying and distribution of software. It is a form of copyright
infringement and is illegal in most countries.
File Systems and Data Representation
This section covers how operating systems manage data on storage devices and the different ways
data can be encoded.
Methods for organizing and storing files on Methods for encoding different types of data:
storage media:
ASCII: 7-bit character encoding for English
NTFS: Default for modern Windows, offers text
security and large file support EBCDIC: 8-bit encoding developed by IBM
FAT32: Older Windows system, limited to for mainframes
4GB files Unicode: Comprehensive encoding for
exFAT: Extended FAT, for flash drives and characters from all languages
cross-platform use Image formats: JPEG (lossy), PNG
HFS+: Used by older macOS systems (lossless), GIF (limited colors with
APFS: Apple's newer file system optimized animation)
for SSDs Audio formats: MP3, WAV, FLAC
ext4: Common in Linux systems Video formats: MP4, AVI, MOV
The primary advantage of Unicode over ASCII is that it can represent characters from virtually all
languages in the world. While ASCII is limited to 128 (or 256 in extended versions) characters,
primarily for English, Unicode provides a unique code point for every character, regardless of the
platform, program, or language.
File formats serve different purposes. For example, PNG supports lossless compression and
transparency, making it ideal for logos and line drawings, while JPEG uses lossy compression that
works well for photographs.
Advanced Operating System Concepts
This part delves deeper into how operating systems handle multitasking, memory, and user
interaction.
The BIOS (Basic Input/Output System) is firmware stored on a chip on the motherboard. When you
turn on your PC, the BIOS is the first software to run. Its primary job is to perform a Power-On Self-
Test (POST) and then find and load the operating system from a storage device.
Deeper Dive into MS Office &
Productivity
This section explores more complex functions and features within the Microsoft Office suite.
Excel includes powerful tools for data analysis: Advanced document organization features:
Goal Seek: Finds the specific input value Styles: Define formatting for consistent
required to achieve a desired result in a appearance
formula Outline View: Organize document by
Scenario Manager: Compares multiple sets headings
of input values Master Documents: Combine multiple
Solver: Finds optimal solutions for complex documents
problems Cross-references: Link to other parts of the
Data Tables: Shows how changing inputs document
affects results
The Gutter margin is extra space added to the
The COUNTA function counts the number of side or top of a document that is intended to
cells in a range that are not empty, including be bound, ensuring no text is obscured by the
text, numbers, and errors. binding.
In MS Access, a Form is primarily used for displaying and entering data into tables in a user-
friendly way. While tables store the data, forms provide a graphical interface for users to view,
enter, and edit data in the tables.
In MS PowerPoint, the Notes Pane is used to add speaker notes that are visible to the presenter
during the slide show but not to the audience. This allows the speaker to have reminders, talking
points, or a full script for each slide.
The Freeze Panes feature in Excel keeps specific rows and columns visible while you scroll through
the rest of the worksheet. This is essential for working with large datasets, allowing headers to
remain visible as you navigate through the data.
Network Security and Cryptography
This part focuses on the methods used to secure data and communications over networks.
1 2
3 4
Cookies are small text files that websites store on your computer to remember stateful information
(like items in a shopping cart) or to record your browsing activity. They are essential for many web
functions but can also raise privacy concerns.
When using public Wi-Fi networks, your data could be intercepted by attackers on the same
network. Using a VPN encrypts your connection, protecting your sensitive information from
eavesdropping.
Miscellaneous and Emerging Topics
A hotspot in the context of mobile computing is a physical location offering Wi-Fi access. Mobile
phones can also create personal hotspots to share their cellular data connection with other
devices.
Cloud storage services provide remote file storage accessible via the internet. Examples include:
The term 'blog' is a portmanteau of "web log," referring to a journal or diary maintained on the
World Wide Web.
Computer Hardware Components
A Trojan Horse is malware disguised as legitimate software. Named after the Greek story, it appears
useful but actually causes damage when installed or run on your computer. Unlike viruses and
worms, Trojans do not replicate themselves.
Hot-swapping is the ability to replace a component while the computer system is running, without
shutting it down. This is a crucial feature for servers and systems that need to run continuously.
USB devices are a common example of hot-swappable hardware.
Networking and Internet Concepts
Internet Service Providers Network and Web Technologies
ISP (Internet Service Provider) is a company Key concepts in networking and web
that provides individuals and organizations development:
with access to the Internet and other related
IP Address: Unique identifier for devices on
services. They serve as the gateway between
a network (e.g., [Link])
users and the global internet infrastructure.
Domain Name System (DNS): Translates
Different connection types include: domain names to IP addresses
An IPv4 address is composed of four octets, and the value of each octet must be between 0 and
255. Therefore, [Link] is not a valid IP address because 256 exceeds the maximum value of 255.
In a relational database, a foreign key is a field (or collection of fields) in one table that refers to the
PRIMARY KEY in another table. This creates the relationship between the two tables, allowing data
to be linked across multiple tables.
The modulation process converts digital signals to analog signals, allowing digital data to be
transmitted over analog communication channels like traditional phone lines.
File Formats and Software
Development
Common File Graphics and Display Programming
Extensions Key concepts in digital
Concepts
Different file types are imaging: Fundamental elements in
identified by their software development:
Pixel: Smallest
extensions:
addressable element in Variable: Named storage
.docx: Microsoft Word a display or image location for data that
document Resolution: Number of can change
.xlsx: Microsoft Excel pixels in an image (e.g., Function: Set of
spreadsheet 1920x1080) instructions that perform
.pptx: Microsoft DPI: Dots Per Inch, a specific task
PowerPoint presentation measure of print Algorithm: Step-by-step
.pdf: Portable Document resolution procedure for solving a
Format Vector vs. Raster: Vector problem
In typography, serif fonts have small decorative lines (serifs) at the ends of strokes, while sans-
serif fonts do not. Fonts like Times New Roman are serif fonts, traditionally used for long passages
of text in print. Fonts like Arial and Helvetica are sans-serif, often seen as cleaner and more
modern.
Adobe developed PostScript in the early 1980s. It is a page description language that describes the
appearance of a printed page and was instrumental in the desktop publishing revolution.
Computer Security and Privacy
A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a
challenge-response test used to determine whether the user is human or a bot. It helps prevent
automated software from performing actions like submitting forms or creating accounts.
Biometric input devices, such as fingerprint scanners, use unique physical characteristics for
identification and authentication. Other examples include facial recognition systems, iris scanners,
and voice recognition technology.
The Windows Key + L keyboard shortcut is used to lock the screen in Windows, requiring a
password to regain access. This is a quick security measure when stepping away from your
computer.
E-Commerce and Digital Economy
E-commerce refers to buying and selling of goods or services using the internet. It encompasses
online retail, electronic funds transfer, online auctions, and business-to-business transactions.
Digital Payments
Electronic methods for
Online Shopping transferring money,
Retail websites and including credit cards, digital
marketplaces where wallets, and
consumers purchase cryptocurrencies.
products directly.
Logistics
Systems for order
fulfillment, shipping, and
delivery of physical goods
Digital Marketing purchased online.
Promotion of products and
services through online Customer Service
channels, including social Support systems including
media and email. chatbots, email support, and
online help centers.
The first email was sent by computer engineer Ray Tomlinson in 1971. He is credited with inventing
the email system on the ARPANET and for using the "@" symbol to separate the user name from
the computer name.
A website is a collection of publicly accessible, interlinked web pages that share a single domain
name. The components of a web ecosystem include:
The ipconfig /all command displays detailed network configuration information, including the
Physical Address (MAC address), which is the unique hardware identifier for the network card. This
address is often required when registering devices on secure networks.
Comparative Technology Analysis
This part requires a deeper understanding by comparing and contrasting related technologies.
Network Devices: Hub vs. Switch Image Formats: JPG vs. PNG
A hub is a simple, unintelligent device that JPG uses lossy compression, making it ideal
operates at Layer 1 of the OSI model. When it for photographs with millions of colors. It
receives data, it broadcasts it to all connected produces smaller file sizes but loses some
devices, creating unnecessary traffic and quality each time it's saved.
potential collisions.
PNG uses lossless compression and supports
A switch is more intelligent (Layer 2) and transparency. It's best for images with text,
learns the MAC addresses of connected line art, or areas of solid color, and when a
devices. It directs traffic only to the specific transparent background is needed.
port of the intended recipient, making it more
efficient and secure.
The CPU cache is a small amount of extremely fast memory located on or very near the CPU, used
to store frequently accessed data from RAM. It acts as a high-speed buffer between the CPU and
the main RAM, significantly reducing the time the CPU has to wait for data and thus speeding up
the entire system.
Software Development and Database
Nuances
This section explores the software creation process and more specific database concepts.
Requirements Analysis 1
Gathering and documenting the
customer's needs and constraints for
the software.
2 Design
Creating the architecture, interfaces,
and components based on the
Implementation 3 requirements.
Writing the actual code according to
the design specifications.
4 Testing
Verifying that the software meets
requirements and finding defects
Deployment 5 through systematic examination.
Releasing the software to users and
installing it in the target environment.
6 Maintenance
Modifying and updating the software
after delivery to correct faults and
improve performance.
In database design, a Primary Key is a column (or set of columns) in a table that uniquely identifies
each row. It must contain a unique value for each record and cannot contain null (blank) values.
This makes it perfect for implementing a unique customer ID that cannot be left blank.
Data refers to raw, unorganized facts and figures (e.g., the number 192)
Information is data that has been processed, organized, and given context to make it meaningful
(e.g., "The student's test score is 92")
In a database query, the GROUP BY clause is used with aggregate functions (like COUNT, SUM,
AVG) to collect data across multiple records and group the results by one or more columns. For
example, it could be used to find the number of customers in each city or the total sales per region.
Cybersecurity and Real-World
Scenarios
This part presents security concepts in the context of practical examples.
A cookie is a small text file that a website stores on your computer to remember your preferences,
login status, or shopping cart items. While cookies are essential for many web functions, they can
also raise privacy concerns as they can be used to track your browsing habits.
More Miscellaneous & Application
Knowledge
Hot-swapping is the ability to replace a component while the computer system is running, without
shutting it down. This is a crucial feature for servers and systems that need to run continuously.
USB devices are a common example of hot-swappable hardware.
A pixel is the smallest addressable element in a raster image or on a display screen. A digital image
is a grid of thousands or millions of tiny dots of color, and each one of these dots is a pixel. The
resolution of a display or image is measured by its dimensions in pixels (e.g., 1920x1080).
The primary purpose of defragmenting a hard disk drive (HDD) is to organize the parts of files into
contiguous blocks, improving performance. As files are saved, edited, and deleted, parts of them
can end up in different physical locations on the drive's platters. This fragmentation slows down
access time because the read/write head has to move around to find all the pieces.
Domain Name System and Web
Technologies
The Domain Name System (DNS) is often compared to a phone book for the internet. Humans
remember names (like [Link]), but computers communicate using IP addresses (like
[Link]). DNS is the system that looks up the name you type and finds the corresponding
number.
Client-side scripting (e.g., JavaScript) runs in the user's web browser, making pages interactive
without requiring server communication for every action
Server-side scripting (e.g., PHP, Python, Java) runs on the web server, processing data before
sending it to the browser
Open-source software is defined by the availability of its source code to the public to use, modify,
and distribute. While it is often free of charge, this is not a requirement. The freedom to view,
change, and distribute the code is the defining characteristic.
Computer Security Threats
A Denial-of-Service (DoS) attack is designed to make a machine or network resource unavailable to
its intended users. It accomplishes this by overwhelming the target with a flood of traffic or sending
it information that triggers a crash.
Software piracy is the illegal copying and distribution of software. It is a form of copyright
infringement and can result in legal penalties. Types of piracy include:
Quantum computing
Machine learning and neural
networks
Natural language processing
The development of the microprocessor led to the fourth generation of computers. The
microprocessor integrated all the components of a CPU onto a single chip, paving the way for
microcomputers and the personal computer revolution.
ARPANET (1969) 1
The original network that formed the
foundation of the modern Internet was
called ARPANET. It was commissioned
2 TCP/IP (1970s)
by the U.S. Department of Defense and
is the direct predecessor of the global The development of the TCP/IP
A web server is a computer or software that stores website files and makes them available to users
on the Internet. When you enter a URL in your browser, you are sending a request to a web server.
Apache and Nginx are popular web server software.
The browser cache is a temporary storage area on your local computer. By saving static assets
from a website locally (like images and CSS), the browser doesn't have to re-download them every
time you visit the same site, which significantly improves page load times and reduces bandwidth
usage.
Deeper Dive into Network Protocols
and Hardware
This part explores more specific network hardware and the nuanced differences between common
protocols.
POP3 is designed to
download emails to a
single device and then
(usually) delete them
from the server.
The ping command is used to check the connectivity between two devices and measure the round-
trip time for messages. It sends an ICMP (Internet Control Message Protocol) "echo request"
packet to a target host and waits for an "echo reply." This is the most common tool used to test if a
host is reachable on a network and to get a rough idea of the latency between the two hosts.
1 2
This will execute the VLOOKUP, and if it Insert citations in your text
results in any error (like #N/A), it will display Generate a formatted bibliography in
your custom message instead. various styles (APA, MLA, Chicago)
3 4
In Excel, if you want to refer to cell A1 in a different worksheet named "Data", the correct syntax
would be Data!A1. If the worksheet name contains spaces, it must be enclosed in single quotes
(e.g., 'My Data'!A1).
In Word, the Gutter margin is an extra margin space added to the side or top of a document that is
intended to be bound. This ensures that no text is obscured by the binding process when a
document is printed and bound.
Computer Ethics and Cyber Law
This section introduces fundamental concepts related to the responsible use of computers and the
legal framework surrounding digital activities.
The trail, traces, or "footprints" that people Legal rights granted to creators of original
leave online as a result of their internet activity works:
are collectively known as a digital footprint. It
Copyright: Protects original works of
can be:
authorship (software, books, music)
Passive: Data collected without the user's Patent: Protects inventions and discoveries
knowledge (IP address, browsing history)
Trademark: Protects brands, logos, and
Active: Data the user intentionally shares slogans
(social media posts, comments)
Open-Source License: Allows free use,
Managing your digital footprint is important for modification, and distribution with certain
privacy and reputation. conditions
Hacktivism is the act of hacking into a computer system for politically or socially motivated
purposes. It is a portmanteau of "hacking" and "activism" and refers to the use of computer
hacking to promote a political agenda or social change.
In India, the primary legislation that deals with cybercrime and electronic commerce is the
Information Technology (IT) Act, 2000. It provides legal recognition for electronic transactions and
digital signatures and defines various cybercrimes, such as hacking and data theft, along with their
penalties.
Edge computing is a distributed computing paradigm that brings computation and data storage
Video and Display Technologies
In the context of video resolution, 4K refers to a display with a horizontal resolution of
approximately 4,000 pixels. More specifically, it typically refers to a display resolution of 3840 x
2160 pixels. The name "4K" comes from the fact that the horizontal pixel count is close to 4,000.
The refresh rate of a monitor, measured in Hertz (Hz), refers to the number of times per second the
display redraws the image on the screen. A higher refresh rate (e.g., 120Hz vs. 60Hz) results in
smoother motion, which is especially noticeable in fast-paced gaming and video.
Vector graphics (like SVG format) use mathematical equations to draw shapes and can be scaled to
any size without losing quality. This is in contrast to raster graphics (like JPG, PNG, GIF) which are
made of pixels and can become pixelated when enlarged.
Mobile and Wireless Technologies
A hotspot in the context of mobile computing is a physical location offering Wi-Fi access. Mobile
phones can also create personal hotspots to share their cellular data connection with other
devices.
VoIP (Voice over Internet Protocol) is the technology used to make telephone calls over the Internet
instead of a regular phone line. Services like Skype, WhatsApp calls, and Google Voice all use VoIP
technology.
Computer Ports and Connectivity
1 2
3 4
Ethernet (RJ-45): Wired network 3.5mm Audio Jack: For headphones and
connection microphones
Modem (RJ-11): Traditional telephone Color coding: Green (output), Pink
line (microphone), Blue (line-in)
Digital audio: HDMI, Optical, Coaxial
The Parallel Port (also known as an LPT port) was traditionally used to connect printers. It could
send multiple bits of data simultaneously (in parallel), making it faster than the serial port for this
purpose.
A Serial Port transmits data one bit at a time, sequentially. While slower than parallel ports, it was
used for devices like older modems and mice that did not require high speed.
The Kensington Security Slot is a small, reinforced hole found on most portable electronic
equipment. You can attach a special cable lock to it to secure the device to an immovable object,
preventing theft.
Backup Devices and Data Protection
The primary purpose of making regular backups of your important data is to protect against data
loss. This safeguards against hardware failure, software corruption, malware, accidental deletion,
and other potential causes of data loss.
A backup is a copy of data created to be used in case the original data is lost or damaged. Different
backup strategies include:
Solid State Drives (SSDs) offer several advantages over traditional Hard Disk Drives (HDDs) for
backup, including faster data access speeds, greater durability due to no moving parts, lower
power consumption, and silent operation.
Computer Memory Hierarchy
Registers
1 Fastest, smallest memory inside CPU
Cache Memory
2
Very fast SRAM between CPU and main memory
Secondary Storage
4 Non-volatile storage for long-term data (HDDs,
SSDs)
Tertiary Storage
5 Removable media and offline storage (optical
discs, tapes)
Cache memory is typically made of Static RAM (SRAM) because it is much faster than Dynamic
RAM (DRAM), which is used for the main memory. SRAM doesn't need to be refreshed, making it
quicker but more expensive per unit of storage.
The CPU cache acts as a high-speed buffer between the CPU and the main RAM. Accessing RAM is
slow for the ultra-fast CPU. The cache holds copies of the data and instructions that the CPU is
likely to need next, significantly reducing the time the CPU has to wait for data and thus speeding
up the entire system.
The Backspace key on a keyboard typically deletes the character to the left of the cursor. The
Delete key, by contrast, typically deletes the character to the right of the cursor.
A touchscreen is a dual-function device. It acts as an input device by allowing the user to interact
with the system by touching the screen, and it acts as an output device by displaying information,
just like a standard monitor.
The speed of a dot matrix printer is measured in CPS (Characters Per Second) because it creates
characters by striking pins against an ink ribbon. PPM (Pages Per Minute) is used for page printers
like laser and inkjet, while DPI (Dots Per Inch) measures print quality.
Software Categories and Licensing
System Software Application Software
Manages hardware and Performs specific tasks for
provides platform for users:
applications:
Productivity (Word,
Operating Systems Excel, PowerPoint)
(Windows, Linux, macOS) Web Browsers
Device Drivers Graphics and Multimedia
Firmware Games and
2
Utility Programs Entertainment
Distribution Models
How software is licensed
Programming Software
and distributed: Tools for creating other
software:
Commercial Software:
Paid with license Compilers and
Freeware: Free but Interpreters
closed source Integrated Development
Shareware: Try before Environments (IDEs)
buying Debuggers
Open Source: Source Code Editors
code available
Freeware is software that is distributed free of charge. However, it is under copyright, and the user
is not given the right to view or modify the source code, which distinguishes it from open-source
software. Examples include Adobe Acrobat Reader and Skype.
Shareware operates on a "try before you buy" principle. It allows users to test the software's
functionality during a trial period. After the trial expires, the user must purchase a license to
continue using it.
Open-source software is defined by the availability of its source code to the public to use, modify,
and distribute. While it is often free of charge, this is not a requirement. The freedom to view,
change, and distribute the code is the defining characteristic.
Network Topologies and Architectures
1 2
Failure in the main cable affects the Failure of one device doesn't affect
entire network others
3 4
A repeater is a network device that regenerates and amplifies a signal to extend the distance it can
travel. Signals weaken over distance (a phenomenon called attenuation). A repeater receives a
signal, cleans it, regenerates it, and retransmits it at a higher power level, thereby extending the
range of a network like Ethernet or Wi-Fi.
The physical layout of computers and devices in a network is known as the network topology. The
logical topology, on the other hand, refers to how data actually flows through the network, which
may differ from the physical arrangement.
Programming Languages and
Development
Low-Level Languages 1
Close to machine code, specific to
computer architecture:
A compiler is a program that converts an entire program written in a high-level language into
machine code before it is executed. An interpreter, in contrast, translates and executes the program
line by line. An assembler specifically translates assembly language into machine code.
A logic error in programming is a bug that causes a program to operate incorrectly, but not to
terminate abnormally (or crash). The program will run but will produce the wrong output. A syntax
error, by contrast, is a mistake in the language's structure that prevents the program from being
compiled or run at all.
Summary of Computer Knowledge for
CET
This document has covered the essential topics required for the Computer Knowledge section of
the CET exam, including computer basics, organization, input/output devices, memory, operating
systems, Microsoft Office applications, internet usage, and more.
Key skills for the exam include understanding the organization of a computer, knowledge of
input/output devices, familiarity with memory concepts, proficiency with Windows and Microsoft
Office applications, and competence in internet usage including web browsing, searching, and
email management.
Remember that the CET exam tests both theoretical knowledge and practical application of
computer concepts. Focus on understanding the fundamental principles as well as how to use
common software applications and navigate operating system features.