0% found this document useful (0 votes)
93 views

Plus one Computer Science Micro Full

Uploaded by

mehajebinop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views

Plus one Computer Science Micro Full

Uploaded by

mehajebinop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Chapter 1: The Discipline of Computing Capturing data, Input of data, Storage of data,

Processing / manipulating data, Output of information,


Abacus: Considered as the first computer The mathematician John Von Neumann designed
and Distribution of information.
for basic arithmetical calculations. computer architecture. It is known as Von Neumann
Discovered by the Mesopotamians around architecture. It consists of a central processing unit Functional Units of a computer: Input Unit, Central
3000 BC. (CPU) containing Processing Unit (CPU), Storage Unit and Output Unit.
Napier’s bones: A set of numbering rods by arithmetic logic unit (ALU) and control unit (CU), input- Computer: An electronic machine designed to accept
which a multiplication problem could be output unit and a memory for storing data and the data and instructions, performs arithmetic and logical
easily performed. instructions. This model implements the ‘Stored operations on the data according to a set of instructions
Invented by John Napier, a mathematician in 1617 Program Concept’ in which the data and the and output the results or information.
AD. instructions are stored in the memory.
Characteristics of computer: Speed, accuracy,
Pascaline: A computing machine that was Artificial Intelligence: AI is the ability to simulate diligence, versatility, huge memory, no IQ, lack of
capable of adding and subtracting two numbers human intelligence. Such intelligent systems are still decision making.
directly and that could multiply and divide by in the development stage, though there are some
applications, such as speech recognition, face Important registers inside a CPU:
repetition. Developed by Blaise Pascal. Number representation methods: (i) Sign and
recognition and robotic vision and movement that are i. Accumulator:, ii. Memory Address Register (MAR): , iii.
Leibniz’s Calculator: The Step Reckoner already available. magnitude representation (ii) 1’s complement
Memory Buffer Register (MBR):, iv. Instruction Register
expanded on Pascal’s ideas and extended the representation (iii) 2’s complement
Programming language: It is an artificial language (IR):, v. Program Counter (PC
capabilities to perform multiplication and representation.
division as well. designed to communicate instructions to a ASCII: American Standard Code for Measuring units of memory:
computer. The first programming language
Difference Engine: In 1822, Babbage Information Interchange. Binary Digit = 1 Bit 1 MB (Mega Byte) = 1024 KB
developed for use in computers was called
invented this machine that could perform machine language. Machine language consisted EBCDIC: Extended Binary Coded Decimal 1 Nibble = 4 Bits 1 GB (Giga Byte) = 1024 MB
arithmetic calculations and print results of strings of the binary digits 0 and 1. Interchange Code. This is similar to ASCII and is an 1 Byte = 8 Bits 1 TB (Tera Byte) = 1024 GB
automatically. 8 bit code. It can represent 256 characters. 1 KB = 1024 Bytes 1 PB (Peta Byte) = 1024 TB
Algorithm: a step by step procedure to get the
Analytical Engine: Its input/output devices solution for a given problem. ISCII: Indian Standard Code for Information RAM Vs ROM:
were in the form of punched cards containing Interchange or Indian Script Code for Information
instructions. These instructions were written by Turing Machine: A model of a computer Cache memory: It is a small and fast memory
Interchange. It uses 8-bits and can represent various
Babbage’s assistant, Agusta Ada King, the proposed by Alan Turing. He is regarded as the between the processor and RAM
writing systems of India.
first programmer in the world. Charles Father of Modern Computer Science as well as
Artificial Intelligence. Unicode: Unicode can represent characters in Storage unit of computer: Two types –
Babbage’s great inventions – the Difference primary and secondary.
almost all written languages of the world.
Engine and the Analytical Engine earned
Charles Babbage the title ‘Father of Computer’. Boolean operations: The operations performed on i. Primary storage: It is also known as main
Chapter 2: Data Representation and Boolean the Boolean values 0s and 1s. The operations are memory. It is again divided into two – Random
Algebra Access Memory (RAM) and Read Only Memory
OR (Logical Addition), AND (Logical Multiplication),
Generations of Computers: NOT (Logical Negation). (ROM).
Base of a number system: The number of symbols
used in a number system is called base or radix of a Logic gate: It is a physical device that can perform
number system logical operations on one or more logical inputs and
produce a single logical output.
MSD and LSD: Left most digit of a number is MSD
and right most digit of a number is LSD. Truth Table: It is a table that shows Boolean
operations and their results.
Different Number Systems:
Universal Gates: The NAND and NOR gates are
called universal gates. A universal gate is a gate
which can implement any Boolean function without ii. Secondary storage: It is also known as
using any other gate type. auxiliary storage. It has huge storage capacity
NAND: It is an inverted AND operation. NAND gate and the storage is permanent - . Hard disk, CDs,
Von Neumann architecture: is an inverted AND gate. DVDs, memory sticks,
Number Conversion procedure: Input devices: These devices feed data and
NOR: It is an inverted OR operation. NOR gate
is an inverted OR gate. instructions from the user into the computer.
1. Keyboard: Allows the user to input text data
consisting of alphabets, numbers and other
Chapter 3: Computer System Organisation characters.
Data processing: It refers to the operations or 2. Mouse: A small handheld device used to
activities performed on data to generate position the cursor or move the pointer on the
information. Data processing proceeds through six computer screen
stages –
3. Light pen: A pointing device shaped like a pen.

Has the advantage of ‘drawing’ directly onto 3. Printer: Used to produce hardcopy output. The Utility software: complex problem into smaller sub tasks and solving
the screen. output printed on paper is known as hardcopy. each task from sub to main.
1. Compression utility: Large files can be
Classified as Impact or Non-impact printers.
4. Touch screen: Allows the user to compressed sothat they take less storage Stages of problem solving:
operate/make selections by simply touching Dot-matrix uses impact mechanism. It can area.
(i) Problem identification
on the display screen. print carbon copies with less printing cost. These
2. Disk defragmenter: A program that rearranges (ii) Preparing algorithms and flowcharts
printers are slow and noisy.
5. Graphic tablet: Consists of an electronic files on a computer hard disk. (iii) Coding the program using programming language
writing area and a special ‘pen’ that works with Inkjet printers, Laser printers and thermal (iv) Translation
3. Backup utility: These programs facilitate the
it. Allows artists to create graphical images printers are non-impact printers (v) Debugging
backing up of disk.
with actions similar to traditional drawing tools. (vi)Execution and Testing and
4. Plotter: A plotter is an output device used to
4. Antivirus programs: A utility program that (vii) Documentation
6. Joystick: Used to play video games, control produce hardcopies of graphs and designs on the
scans the computer system for viruses.
training simulators and robots. paper.
Algorithm: It is a step-by-step procedure to solve a
General purpose software: These are used
7. Microphone: Accepts sound in analogue 5. 3D printer: A 3D printer is an output device used problem, where each step represents a specific task
to perform tasks in a particular application area.
nature as input and converts it to digital to print 3D objects. It can produce different kinds of to be carried out.
format. objects, in different materials, using the same 1. Word processing software: It is designed for
Flowchart: The pictorial representation of an algorithm
printer. creating and modifying documents. Eg: MS
8. Scanner: Allows capturing of information, like with specific symbols for instructions and arrows
Word, Open Office Writer, Apple iWork Pages,
pictures or text and converting it into a digital e-Waste: Electronic waste may be defined as discarded showing the sequence of operations.
etc.
format that can be edited using a computer. computers, office electronic equipment, entertainment Process
devices, mobile phones, television sets and 2. Spreadsheet software: This software allows Chapter 5: Introduction to C++ Programming
9. OMR: Scanning device that reads predefined
refrigerators. users to perform calculations. Eg: Microsoft
positions and records where marks are made
Excel, Open Office Calc, Lotus 1-2-3 and Apple Character set: The fundamental unit of C++
on the printed form. Useful for applications such e-Waste disposal methods: Re-use, incineration
iWork Numbers. language. The character set of C++ is categorized
as objective type tests and questionnaires. (combustion process in which the waste is burned in
incinerators at a high temperature), recycling, (the 3. Presentation software: The software is used as (i) Letters (A – Z, a – z), (ii) Digits (0 – 9), (iii)
10. Bar Code Reader: A bar code is a set of Special characters (iv)White spaces.
process of making new products from a product that has to display information in the form of a slide
vertical lines of different thicknesses and Tokens: The fundamental building blocks of the
originally served its purpose) and land filling. show. Eg: Microsoft PowerPoint, Apple iWork
spacing that represent a number. Barcode
Keynote and Open Office Impress. program. C++ has five types of tokens – Keywords,
readers are used to input data from such set of Software: A general term used to denote a set of Identifiers, Literals, Punctuators and Operators.
barcodes. programs that help us to use the computer system. Two 4. Database software: Database is an organised Keywords: The words (tokens) that convey a
types - system software, application software. collection of data arranged in tabular form. Eg: specific meaning to the language compiler. These
11. QR (Quick Response) code is similar to
System software: A set of programs which aids in Microsoft Access, Oracle, Postgres SQL, My are also known as reserved words.
barcodes.
Barcodes are single dimensional where as QR the execution of a general user’s computational SQL, etc. Identifiers: These are the user-defined words used to
codes are two dimensional. requirements on a computer system. 5. Multimedia software: Multimedia is the name different program elements such as memory
integration of multiple forms of media. Eg: VLC locations, statements, functions, objects, classes etc.
12. Biometric sensor: Identifies unique human The components of system softwareare Operating
Player, Adobe Flash, Real Player, Media The identifiers of
physical features like fingerprints, retina, iris system, Language processors and Utility software.
Player, etc. memory locations are called variables.
patterns, etc. to identify, verify and authenticate Operating system (OS): A set of programs that acts Rules for naming identifiers: An arbitrary long
the identity of the user. as an interface between the user and computer The Free Software Foundation (FSF) defines sequence of letters, digits and underscores.
hardware. the four freedoms for free and open source The first character must be a letter or underscore
13. Smart card reader: These are used to access
software: ( _ ). White space and special characters are not
data in a smart card. Smart card is a plastic card Function of OS: Process management,
that stores and transacts data. Used in banking, memory management, file management, Freedom 0 : The freedom to run program. allowed.
healthcare, telephone calling, electronic cash device management, security management and Freedom 1 : The freedom to study Keywords cannot be used. Upper and lower case
payments and other applications. command interpretation. Freedom 2 : The freedom to distribute letters are treated
copies Freedom 3 : The freedom to improve differently.
14. Digital camera: Takes pictures and videos and Computer languages: Machine language, Literals: Data items that never change their value
the program
converts it to the digital format. Web camera is a assembly language and High Level Languages during the program run. They are often referred to
compact and less expensive version of a digital
camera. Language processors: These are the system Chapter 4 – Principles of Programming as constants.
programs that translate programs written in high level and Problem Solving Literals are of four types – Integer literals,
Output devices: These devices present information language or assembly language into its equivalent Computer program: A sequence of instructions Floating point literals, Character literals(‘) and
from a computer system to the user. machine language. given to a computer to solve a problem. String literals.(“)
Escape sequences: These special character
1. Monitor: Display devices include CRT monitors, Types of language processors: Program instruction: It is an action oriented constants that represent non-graphic symbols. It
LCD monitors, TFT monitors, LED monitors, gas statement and it tells the computer what operation it consists of a backslash (\) followed by one or more
plasma monitors, Organic Light Emitting Diode 1. Assembler (translates the program code
should perform. specific characters.
(OLED) Monitors, etc. written in assembly language to machine language),
2. Interpreter (converts a HLL program into machine Top down design: It is the process of solving a .
2. LCD projector: An LCD projector is a type of language line by line) and 3. Compiler (translates a complex problem by breaking it down into different
video projector for displaying video, images or program written in high level language into machine tasks and solving each task from main to sub.
computer data on a large screen or other flat language).
surface. Bottom up design: It is the process of breaking a
Flow line
on Type conversion: Conversion of the data type of an This selection statement successively tests the three loop elements (initialisation, test expression
Advantages of flowcharts: Better communication, operand into another type. Done in two ways: implicitly value of a variable or an expression against a list and update statement) are placed together in for
Effective analysis, Effective synthesis, Efficient coding. and explicitly. of integers or character constants. statement.
Translation: It is the process of converting a program Type promotion: It is the implicit type conversion is switch(expression) do...while statement
written in high level language into its equivalent version performed by C++ compiler internally.
in machine language. It is also an exit-controlled loop. The body of the loop will
Type casting: It is the explicit type conversion and is execute at least once.
Debugging: It is the process of detecting and done by the programmer by specifying the data type within
correcting the errors in a program. parentheses to the left of the operand.
Nesting of a loop: Placing a loop inside the body of
Syntax errors: The errors occur when the rules or Variable declaration: data_type <variable1>,<variable2>; another loop. When we nest two loops, the outer loop
syntax of the programming language are not followed. counts the number of completed repetitions of the
Variable initialisation: Supplying value to a variable at
Logical error: It is due to improper planning of the the time of its declaration. inner loop.
program's logic and revealed during the execution of {case constant_1 : statement
the program. Pre-processors: These are the compiler directive block 1; break;
statements which give instruction to the compiler to case constant_2 : statement
Run time error: These errors occur unexpectedly process the information provided before actual
Chapter 8: Arrays
block 2; break;
when computer becomes unable to process some compilation starts. These lines always start with a # (hash) default : statement block n;} An array is a collection of elements of the same type
improper data. symbol. placed in contiguous memory locations. Arrays are used
Documentation: 1. Internal documentation is to store a set of values of the same type under a single
Header files: Files available along with compiler
done through comments in programs. 2. Various variable name. Each element in an array can be
manuals provide external documentation. using namespace statement: It tells the compiler about accessed using its position in the list called index
a namespace where it should search for the elements number or subscript.
used in the program.
Chapter 6: Data Types and Operators Syntax: data_type array_name[size];
main() function: An essential function in every C++
Eg: int num[10];
program. The execution starts at main() and ends
within main(). int score[5] = {98, 87, 92, 79, 85};
Data types: These are the means to identify the
total_bytes = sizeof(array_type) × size_of_array
nature of the data and the set of operations that can
be performed on the data. Chapter 7: Control Statements Array Operations:
The conditional operator (?:)
Fundamental data types: The five fundamental Decision making statements or Selection 1. Traversal
C++ has a ternary operator. It is the conditional 2. Searching
data types in C++ are char (1byte), int (4byte), float statements. if and switch are the two types of selection
operator (?:) consisting of the symbols ? and : (a a. Linear Serach b. Binary Search
(4byte), double (8byte) and void (0byte). statements in C++. The selection will be based on
question mark and a colon). It requires three 3. Sorting
conditions.
Data type modifiers: The keywords used to alter operands. a. Selection Sort b. Bubble Sort
the size, range or precision of data supported by the if statement
Looping (Iteration) Statements
basic data types. Important modifiers are signed,
The if statement is used to select a set of statements
unsigned, long and short. Four elements of a loop:
for execution based on a condition.
Variables: The names given to memory locations. 1. Initialisation: The loop control variable
if – else statement
(Variable used in the condition) gets its first
Operators: The tokens or symbols that trigger
The syntax is: value..
computer to carry out operations. The data on which Two dimensional (2D) arrays
an operation are called operands. An operand may if (test expression) 2. Test expression: It is a relational or
be either a constant or a variable. Classified into statement block 1; logical expression whose value is either A two dimensional array is an array in which each element
three –unary, binary and ternary. else True or False. itself is an array. For instance, an array AR[m][n] is a 2D
statement block 2; array containing m rows and n columns.
Arithmetic operators: Used to perform basic 3. Update statement: The update statement
When we write an if statement inside another if block, it is data_type array_name[rows][columns];
arithmetic operations. modifies the loop control variable by changing
called nesting.
its value.. The indices (subscripts) of rows and columns, start at 0
Modulus operator (%): Also called as mod
The else if ladder and ends at (rows–1) and (columns–1) respectively.
operator. It gives the remainder value during 4. Body of the loop: The statements that
arithmetic division. When we want to select one action from more than two need to be executed repeatedly constitute the int marks[5][4];
actions, different conditions will be given and each body of the loop.
Relational operators: Used for comparing numeric condition will decide which statement is to be selected for
while statement
data. These are binary operators. The result of any execution. Chapter 9: String Handling and I/O Functions
relational operation will be either True or False. if (test expression 1) It is an entry-controlled loop. The condition is
statement block 1; checked first and if it is True the body of the loop will A character array can be used to store a string, since it
Expression: Composed of operators and be executed. is a sequence of characters. The array char
else if (test expression 2)
operands. Classified into arithmetic my_name[10]; can store a string of 9 characters. One
statement block 2; for statement
expressions, relational expressions and logical location will be used to store ‘\0’ (null character) as
expressions. switch statement It is also an entry-controlled loop in C++. All the string terminator.

A string can be input using the


statement: cin >> my_name; Type Functions Syntax / Example Operation
This statement can store a string without any To find the length of a string.
white space (that is, only one word). If we want strlen() strlen(string)
store strings containing white spaces (strings strcpy() strcpy(string1, To copy one string into another
having more than one word) we can use gets()
Functions
(string.h)

function, getline() function or get() function. strcmp() strcmp(string To compare two strings.

String

1, string2) Returns 0 if string1 and string2 are same.


Similarly to display string data we can use puts()
function and write() function.
• Returns a –ve value if string1 is alphabetically lower than
string2.
There are functions to perform input output operation:  Returns a +ve value if string1 is alphabetically higher than
string2.
Type Consol Stream Operation
of e (iostream. abs() abs(int) To find the absolute value of an integer.
Mathematic

Functions

data (stdio.h h)
(math.h)

To find the square root of a number.


) sqrt() sqrt(double)
al

Character getchar( cin.get() Character input pow() pow(double, int) To find the power of a number. It takes two arguments x
functions )
putchar( cout.put() Character and y. Returns the value of xy.
) output
gets() cin.getline( String input isupper() isupper(char) To check whether a character is in upper case or not. The
String
Function ) function returns non-zero if the given character is in uppercase,
s puts() out.write() String output and 0 otherwise.
islower() islower(char) To check whether a character is in lower case or not. The
function returns non-zero if the given character is in lowercase,
and 0 otherwise.
Chapter 10: Functions
Character Functions (ctype.h)

isalpha() isalpha(char) To check whether a character is alphabet or not. The


The process of breaking large programs into
smaller subprograms is called modularisation. function returns non-zero if the given character is an alphabet,
The sub programs are generally called and 0 otherwise.
functions. isdigit() isdigit(char) To check whether a character is digit or not. The function returns
Merits of modular programming non- zero if the given character is a digit, and 0 otherwise.
 Reduces the size of the program. isalnum() isalnum(char) To check whether a character is alphanumeric or not. The
 Less chance of error occurrence. function
 Reduces programming complexity. returns non-zero if the given character is alphanumeric, and 0
 Improves reusability. otherwise.
Function is a named unit of statements in a toupper() toupper(char c) This function is used to convert the given character into its
program to perform a specific task as part of uppercase.
the solution.
tolower() tolower(char c) This function is used to convert the given character into its
Predefined functions lowercase.
C++ provides a number of functions for various itoa() itoa(int n, char c[], This function is used to convert an integer value to string type. It
tasks. While using these functions, some of int len) requires three arguments. The first one is the number to be
Function (stdlib.h)

them require data for performing the task converted. The second argument is the character array where
Conversion

assigned to it. We call them parameters or the


arguments and are provided within the pair of converted string value is to be stored and the last argument is
parentheses of the function name. There are the size of the character array.
certain functions which give results after atoi() int atoi(char c[]); This function is used to convert a string value to integer. It
performing the task. This result is known as takes a string as argument returns the integer value of the
value returned by the function. Some functions string.
do not return any value; rather they perform the
specified task.
User defined functions and optical fibre cable are examples. Network Interface Card (wired/wireless) facility and an
Unguided media: Wireless medium is used. Radio operating system that supports TCP/IP protocol (ii)
The syntax of a function definition is given below: Modem (iii) An Internet account given by an Internet
waves, microwaves or infrared signals are examples.
data type function_name(argument_list) Service Provider (ISP) (iv)Software like browser, client
{ Bluetooth technology uses radio waves for short application for e-mail, chat, etc.
statements in the body; range communication between devices. Cell
Dial-up connectivity Vs Wired
} phones, laptops, mouse, keyboard, tablets,
Logical Classification: Peer-to-peer and Client broadband connectivity:
A function prototype is the declaration of a function headsets, cameras, etc.
by which compiler is provided with the information server
Wi-Fi (Wireless Fidility) makes use of radio
about the function such as the name of the function, Peer-to-peer network: No dedicated servers.
waves to transmit information across a network
its return type, the number and type of arguments, Here a number of computers are connected
like cell phones, televisions and radios.
and its accessibility. together for the purpose of sharing information
Wi-MAX (Worldwide Interoperability for Microwave or devices.
The following is the format:
Access) uses radio waves to provide high-speed
data_type function_name(argument_list); wireless Internet access over very long distances (a Client-server: It consists of high-end computer
(called server) serving lower configuration Popular broadband technologies: Integrated
whole city).
Arguments or parameters are the means to pass machines called clients. Services Digital Network (ISDN), Cable Internet,
values from the calling function to the called Satellite links use radio waves for long distance Digital Subscriber Line (DSL), Leased Lines and
function. The variables used in the function wireless communication systems. Protocol: The set of rules to be followed in a Fiber to the Home (FTTH).
definition as arguments are known as formal network for data transmission. TCP/IP, HTTP, FTP
Communication devices: NIC, Hub, Switch, and DNS Wireless broadband connectivity: It provides
arguments. The constants, variables or
Repeater, Bridge, Router, Gateway. almost the same speed as that of a wired broadband
expressions used in the function call are known as HTTP stands for Hypertext Transfer Protocol. It is a
Network Interface Card (NIC): A device that connection. The popular wireless broadband
actual (original) arguments. If variables are used standard protocol for transferring requests from
enables a computer to connect to a network and accesses are Mobile Broadband, Wi-MAX, Satellite
in function prototype, they are known as dummy client-side and to receive responses from the server-
communicate. Broadband and Wi-Fi.
arguments. side.
Sharing an Internet connection: Internet
Two type of Function Calling Hub: A device used in a wired network to FTP stands for File Transfer Protocol. It is a connection can be shared among several computers
connect computers/devices of the same standard for exchanging of data and program files using a LAN, Wi-Fi network or Li-Fi network.
network. across a network.
Switch: An intelligent device that connects Services on the Internet: Services like WWW, e-
DNS stands for Domain Name System. DNS mail, search engines, social media, etc. are widely
several computers to form a network. returns the IP address of the domain name, that used throughout the globe.
Repeater: A device that regenerates incoming we type in our web browser’s address bar.
World Wide Web (WWW): It is a system of
electrical, wireless or optical signals through a Media Access Control (MAC) address: A
communication medium interlinked hypertext documents accessed via the
universally unique address (12 digit hexadecimal Internet. It is a huge client-server system consisting
Bridge: A device used to split a network into number) assigned to each NIC (Network Interface of millions of clients and servers connected together.
different segments and interconnected. Card) by its manufacturer.
Web browser: It is a software use to retrieve or
Router: A device that can interconnect two IP address: A unique 4 part numeric address present information and to navigate through web
Chapter 11: Computer Networks networks of the same type using the same assigned to each node on a network, for their pages in the World Wide Web. Eg: Google Chrome,
Computer network is a group of computers and protocol. It is more intelligent than bridge. unique identification. Internet Explorer, Mozilla Firefox, Opera, and Safari.
other computing hardware devices. Gateway: A device that interconnects two URL stands for Uniform Resource Locator. URL is Web browsing procedure:
Advantages: Resource sharing, Price- different networks having different protocols. a formatted text string used by web browsers to
identify a network resource on the Internet. URL Search engines: Internet search engine websites
performance ratio, Communication, Reliability, Data Terminal Equipments: Modem, Multiplexer are special programs that are designed to help
Scalability. string can be divided into three parts – Network
Modem: It converts digital signals to analog protocol, Domain name, File name. people to find information available in World Wide
Data communication is the exchange of digital signals and converts the analog signals back to Web. Search engine web sites use programs called
data between any two devices through a digital signals. web crawlers or spiders or robots to search the web.
medium of transmission. Chapter 12 – Internet and Mobile Electronic mail or e-mail: It is a method of
Multiplexer: It combines (multiplexes) the inputs
Five basic elements of data communication from different sources and sends them through Computing exchanging digital messages between computers
system: Message, Sender, Receiver, Medium different channels of a medium. over Internet.
Internet is an interconnected system of computer
and Protocol. networks that serves the users all over the world. Sections of e-mail: To (Recipient Address), Cc
Topology: The way in which the nodes are
Communication channel or communication physically interconnected to form a network. Vinton Gray Cerf is considered as the father of (Carbon copy to the secondary recipients), Bcc
medium: The medium for data transmission over a Major topologies are Internet. Tim Berners Lee proposed the idea of (Blind carbon copy to the tertiary recipients), Subject,
computer network. World Wide Web (WWW). Content, Attachments.
Bus, Star, Ring, and Mesh Topology
Two types of communication media: Guided Intranet is considered as a private computer Advantages of e-mail: Speed, easy to use,
(wired) and unguided (wireless). Types of network: PAN (Personal Area Network), network similar to Internet provision of attachments, environment friendly,
LAN (Local Area Network), MAN (Metropolitan Area easy reply to an e- mail, cost-effective, available
Guided media: physical wires or cables are used. Network) and WAN (Wide Area Network). Hardware and software requirements for
anywhere anytime.
Coaxial cable, twisted pair cable (Ethernet cable) connecting to the Internet: (i) A computer with

Types of social media: Internet forums, social Denial of Service (DoS): It is a network attack is
blogs, micro blogs, wikis, social networks, usually aimed at a web server. Such an attack forces
content communities and a lot more. the server/computer to restart.
Internet forums: It is an online discussion Phishing:Phishing websites have URLs and home
website where people can engage in pages similar to their original ones. The act of creating
conversations in the form of posted messages. such a misleading website is called spoofing.
Eg: Ubuntu Forum Man-in-the-middle attack: It refers to an attack in
Social blogs: It is a discussion or informational which an attacker secretly intercepts electronic
website consisting of entries or posts displayed in messages between the sender and the receiver and
the reverse chronological order i.e., the most recent then captures, inserts and modifies messages
post appears first. Eg: Blogger.com, Wordpress.com. during message transmission.
Microblogs: They allow users to exchange short Firewall: It is a system of computer hardware and
sentences, individual images or video links. It software that provides security to the computer
offers a communication mode that is spontaneous network in an organisation. It denies malicious data
and can influence public opinion. Twitter.com is a from entering into the computer networks.
popular micro blogging site.
Antivirus programs: These tools are used to
Wikis: Wikis allow people to add content or edit detect viruses and cure the infected system. It
existing information in a web page, to form a scans files in the computer system for known
community document. Wiki is a type of content viruses and removes them if found.
management system. Eg: wikipedia.org.
Cookies: These are small text files that are created
Social networks: These sites allow people to when we use a browser to visit a website.
build personal web pages and then connect
Mobile computing: It is a technology that has
with friends to communicate and share content.
computing capability and can transmit/receive data
We can share text, pictures, videos, etc. and
while in motion..
comment to the posts. Eg: facebook.com,
linkedin.com. Generations of mobile communication: 1G
mobile phones were based on the analog system
Content communities: These are websites that
and provided basic voice facility only. 2G networks
organise and share contents like photos, videos,
follow digital system for communication. Picture
etc. Eg: Youtube.com, flickr.com.
messages and MMS (Multimedia Messaging
Advantages of social media: Bring people Service) were introduced in 2G. 3Gnetworks
together, help to plan and organise events, offered multimedia services combining voice and
promoting business, enhance social skills. data. It has the facility to send and receive large
amounts of data using a mobile phone. 4G system,
Limitation of social media: Intrusion to
also called Long Term Evolution (L.T.E.), provides
privacy, addiction, spread rumours.
mobile ultra-broadband Internet access to mobile
Computer virus: It is a program that attaches itself devices.
to another program or file enabling it to spread from
Mobile communication technologies: SMS,
one computer to another without our knowledge and
MMS, GPS and smart cards. Short Message Service
interferes with the normal operation of a computer.
Mobile Operating System: The software that
Computer worm: It is a stand-alone malware
manages the hardware, multimedia functions,
(malicious software) program that replicates itself in
Internet connectivity, etc. in a mobile device. Eg:
order to spread to other computers.
Android from Google, iOS from Apple, BlackBerry
Trojan horse: It will appear to be a useful OS from BlackBerry and Windows Phone from
software but will actually do damage once installed Microsoft
or run on your computer.
Spams or junk mails: These are unsolicited e-
. JOIN OUR GROUP FOR MORE STUFF:
mails sent indiscriminately to persons to promote a
product or service.
Hacking: It is a technical effort to manipulate the
normal behaviour of network connections and
connected systems. Computer experts perform
hacking to test the security and find the
vulnerabilities in computer networks and computer
systems. ‘white hats’, ‘black hats’. and‘grey hat
hackers’,.

You might also like