0% found this document useful (0 votes)
634 views30 pages

It Skills - 25cs01i-1

Uploaded by

indian computers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
634 views30 pages

It Skills - 25cs01i-1

Uploaded by

indian computers
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

IT Skills - 25CS01I - I/II Semester

IT Skills - 25CS01I
I / II Semester

Notes
+
List to Experiments to be
Maintained in
Portfolio/Record

Department of Computer science

Department of Computer Science 1


IT Skills - 25CS01I - I/II Semester

Week – 1: Introduction to Computers

1. Introduction to Computers
A computer is an electronic machine that accepts data through input devices, processes it
using a set of instructions, and delivers output. It can store, retrieve, and manipulate data
efficiently and accurately.

2. Generations of Computers
● First Generation (1940–1956):
Used vacuum tubes for processing and were large, slow, and expensive.
Programming was done in machine language.
● Second Generation (1956–1963):
Used transistors instead of vacuum tubes, which made them smaller and more
reliable. They consumed less power and supported assembly language.
● Third Generation (1964–1971):
Used integrated circuits (ICs), increasing speed and reducing size. These computers
supported multitasking and high-level languages.
● Fourth Generation (1971–Present):
Used microprocessors, allowing the entire CPU to be on a single chip. Personal
computers (PCs) became popular during this time.
● Fifth Generation (Present & Beyond):
Focused on Artificial Intelligence (AI) and technologies like quantum computing.
These systems aim to mimic human intelligence and decision-making.

3. Classification of Computers
Based on Size:
● Microcomputer: Small, personal devices like desktops and laptops used at home or
in offices.
● Minicomputer: Medium-sized systems used by small organizations for business
processes.
● Mainframe: Large computers used by enterprises to process large volumes of data.
● Supercomputer: Extremely fast systems used for complex scientific and engineering
tasks.

Department of Computer Science 2


IT Skills - 25CS01I - I/II Semester

Based on Purpose:
● General Purpose Computer: Designed to perform a variety of tasks, such as PCs
and laptops.
● Special Purpose Computer: Designed for specific tasks, like ATMs or medical
diagnostic machines.
Based on Functionality:
● Analog Computer: Processes continuous data, used in scientific instruments.
● Digital Computer: Processes discrete (binary) data, used in most modern devices.
● Hybrid Computer: Combines features of both analog and digital computers.
Based on Technology:
● Classification by technology refers to the type of components used, like vacuum
tubes, transistors, ICs, and microprocessors.

4. Functional Block Diagram of a Digital Computer

● Input Devices:
Devices used to send data and instructions to the computer.
Example: Keyboard, mouse, scanner.
● Output Devices:
Devices that display or present the processed data to the user.
Example: Monitor, printer, speakers.
● CPU (Central Processing Unit):
The brain of the computer that processes data and controls operations. It includes:
● ALU (Arithmetic Logic Unit): Performs arithmetic calculations and logical
operations.
● CU (Control Unit): Directs the operation of the processor and coordinates
activities of all other units.

Department of Computer Science 3


IT Skills - 25CS01I - I/II Semester

● Memory Unit:
Stores data and instructions before, during, and after processing. It includes primary
memory (RAM and ROM) and is essential for CPU operations.

5. Memory Systems: Types of Memory and Their Usage


● Primary Memory:
Directly accessed by the CPU and is volatile, meaning it loses data when power is off.
Examples: RAM (temporary storage), ROM (permanent system instructions).
● Secondary Memory:
Used for long-term data storage and is non-volatile.
Examples: Hard disk drive (HDD), Solid-state drive (SSD), USB flash drives.

6. Input/Output Systems
● Input Devices:
Used to provide data and control signals to the computer system.
Examples: Keyboard (typing), Mouse (pointing), Microphone (audio input).
● Output Devices:
Used to convey processed information to the user.
Examples: Monitor (visual output), Printer (hard copy), Speakers (sound output).

7. Software: System Software vs Application Software


● System Software:
Controls and manages the computer hardware and provides a platform for application
software.
Examples: Operating Systems (Windows, Linux), Device Drivers.
● Application Software:
Used by end-users to perform specific tasks like document editing or browsing the
web.
Examples: MS Word (word processing), Google Chrome (web browsing), VLC
Media Player (media playback).

Department of Computer Science 4


IT Skills - 25CS01I - I/II Semester

Week – 2: Internet skills

1. Computer Networks
A computer network is a system of interconnected devices, such as computers and servers,
that communicate with each other to share resources like data, printers, and internet access.
These networks can be local (LAN), regional (MAN), or global (WAN), depending on their
scope.

2. Types of Networks
● Local Area Network (LAN):
A network that covers a small geographic area like a home, office, or building. It
allows devices within the same area to communicate and share resources.
● Wide Area Network (WAN):
A network that spans a large geographical area, often connecting multiple LANs,
cities, or even countries. The internet is a prime example of a WAN.
● Metropolitan Area Network (MAN):
A network that spans a city or large campus and connects multiple LANs within that
area.
● Wireless Networks (Wi-Fi):
Networks that use wireless technology to connect devices without physical cables,
using radio waves for data transmission.

3. Physical and Logical Address


● Physical Address:
A MAC (Media Access Control) address is a unique identifier assigned to a
network interface card (NIC) that is used to identify devices on a network at the data
link layer.
● Logical Address:
An IP address is a logical address used to identify a device on a network. It is
assigned based on the device's location and is used for routing data across the internet
or LAN.

Department of Computer Science 5


IT Skills - 25CS01I - I/II Semester

4. Protocols
Protocols are standardized rules that govern the communication between devices in a
network. Some common protocols include:
● TCP/IP (Transmission Control Protocol/Internet Protocol): The foundational
protocol of the internet, responsible for data transmission.
● HTTP (HyperText Transfer Protocol): Protocol used for transferring web pages on
the internet.
● FTP (File Transfer Protocol): Used to transfer files between computers over the
internet.

5. Key Devices in a Network


● Router:
A device that routes data packets between different networks, typically between a
local network (LAN) and the internet (WAN). It manages traffic and directs data to its
correct destination.
● Switch:
A network device that connects devices within a single LAN, allowing them to
communicate with each other. It operates at the data link layer and uses MAC
addresses to forward data.
● Modem:
A device that modulates and demodulates signals for data transmission over telephone
lines or cable. It enables internet access by converting digital data from a computer
into an analog signal for transmission, and vice versa.
● Access Point (AP):
A device that allows wireless devices to connect to a wired network, typically used in
Wi-Fi networks. It acts as an interface between the wired network and wireless
devices.

6. What is the Internet?


The internet is a global network of interconnected computers and servers that communicate
using standard protocols like TCP/IP. It provides services such as the World Wide Web,
email, file sharing, and online communication.

Department of Computer Science 6


IT Skills - 25CS01I - I/II Semester

7. Common Applications of the Internet


● Browsers:
Web browsers like Google Chrome, Mozilla Firefox, and Safari allow users to
access and view websites on the World Wide Web. They interpret HTML code and
display web pages.
● Web Server:
A web server stores, processes, and delivers web pages to users via the internet. It
handles requests made by browsers for resources like text, images, and videos.
● Client-Server Model:
In the client-server model, the client (a device or application) requests services, and
the server (a powerful computer or software) provides those services or resources.
For example, a browser (client) requests a webpage from a web server.
● URL (Uniform Resource Locator):
A URL is the address used to access websites or resources on the internet. It includes
the protocol (HTTP/HTTPS), domain name, and path to the specific resource, like
https://www.example.com.
● Search Engine:
A search engine is a tool that helps users find information on the internet by indexing
and searching the web. Google, Bing, and Yahoo are popular search engines.
● Domain Name and Domain Name System (DNS):
A domain name is a human-readable address for a website (e.g., www.google.com).
The DNS translates domain names into IP addresses, enabling computers to locate
websites on the internet.
● Websites:
A website is a collection of related web pages and resources hosted on a server,
accessible via the internet using a domain name. Websites can be informational,
commercial, or social.

8. Personal Website and Website Hosting


● Personal Website:
A personal website is a website created by an individual to showcase personal
interests, portfolios, blogs, or social media profiles. It can be a platform for self-
expression or professional branding.

Department of Computer Science 7


IT Skills - 25CS01I - I/II Semester

● Website Hosting:
Website hosting is a service that provides the infrastructure and resources (servers,
storage, bandwidth) to store and serve a website on the internet. Popular hosting
providers include GoDaddy, Bluehost, and HostGator.

Week – 3: Cybersecurity: Introduction to Cybersecurity

What is Cybersecurity?
Cybersecurity is the practice of protecting computer systems, networks, programs, and data
from digital attacks, unauthorized access, damage, or theft. It ensures the confidentiality,
integrity, and availability of information.

CIA Triad
The CIA Triad stands for Confidentiality, Integrity, and Availability:
● Confidentiality: Ensures that sensitive information is accessed only by authorized
individuals.
● Integrity: Ensures that data is accurate and unaltered during storage or transmission.
● Availability: Ensures that systems and data are accessible when needed by authorized
users.

Importance and Risks


Cybersecurity is crucial to protect personal, corporate, and government data. Risks include
data breaches, financial loss, reputation damage, and identity theft. As more systems become
connected online, the chances of cyberattacks grow significantly.

Common Threats

● Malware
Malware (malicious software) includes viruses, worms, trojans, and spyware designed
to disrupt or damage systems, steal data, or gain unauthorized access.
● Phishing
A social engineering attack where attackers trick individuals into revealing sensitive
information by impersonating legitimate sources, often via emails or fake websites.

Department of Computer Science 8


IT Skills - 25CS01I - I/II Semester

● Ransomware
A type of malware that locks or encrypts a victim’s data and demands payment
(ransom) to restore access.
● Social Engineering
Manipulating individuals into revealing confidential information or performing
actions that compromise security (e.g., pretending to be tech support).

Cybersecurity Best Practices


Secure Authentication and Access Control
Involves verifying users’ identities and assigning access levels based on roles. Helps prevent
unauthorized access and data leaks.

Importance of Strong Passwords and MFA


● Strong Passwords: Should include uppercase, lowercase, numbers, and symbols to
reduce the chance of being guessed.
● MFA (Multi-Factor Authentication): Adds an extra layer of security (e.g., OTPs,
biometrics) in addition to a password.

Role of User Access Control and Privileged Accounts


● User Access Control: Ensures that users only have access to the data and systems
they need.
● Privileged Accounts: Special accounts with administrative rights should be protected
with strict controls and monitored regularly.

Password Management Tools


These tools securely store and manage complex passwords, helping users avoid weak or
reused passwords (e.g., LastPass, Bitwarden).

Safe Browsing and Data Protection

Secure Websites (HTTPS, SSL Certificates)


● HTTPS encrypts data between your browser and the website.
● SSL Certificates authenticate the identity of websites and enable secure connections.

Department of Computer Science 9


IT Skills - 25CS01I - I/II Semester

Identifying Fake Websites and Links


● Check for misspelled URLs, unusual domain names, and lack of HTTPS.
● Hover over links to see their destination before clicking.

Basics of Encryption and Secure File Sharing


● Encryption converts data into a coded format readable only with a key.
● Secure File Sharing uses encrypted platforms (e.g., Google Drive with link access
restrictions, ProtonDrive) to protect data during transmission.

Importance of Backups
Regular backups (on external drives or cloud) ensure data can be recovered after a
cyberattack, hardware failure, or accidental deletion.

Week-4: Cybersecurity Best Practices

Awareness on Cyber Safety


Cyber safety awareness is the understanding of online threats and how to protect oneself from
them. It includes knowing safe online behavior, recognizing suspicious activity, and
understanding how to respond to cyber incidents.

Do's and Don'ts with Respect to Password Management


Do’s:
● Use strong, unique passwords for each account.
● Use a combination of letters, numbers, and symbols.
● Change passwords regularly.
● Enable multi-factor authentication (MFA).
● Use a reputable password manager.
Don'ts:
● Don't use common passwords like "123456" or "password".
● Don’t share passwords with others.
● Don’t reuse the same password across multiple accounts.
● Don’t write down passwords where others can find them.

Department of Computer Science 10


IT Skills - 25CS01I - I/II Semester

Safe Browsing and Email Habits


● Always check for HTTPS before entering sensitive information on a website.
● Avoid clicking on suspicious links or pop-ups.
● Don’t download software or files from untrusted sources.
● Be cautious of email attachments, especially from unknown senders.
● Never provide personal or financial information in response to unsolicited emails.

Software and System Security


● Keep your operating system, antivirus, and applications updated.
● Use firewalls and trusted antivirus software.
● Avoid using pirated or cracked software.
● Regularly scan your system for threats.
● Disable unused services and ports to reduce attack surfaces.

Data Protection and Backup


● Encrypt sensitive data on devices and during transmission.
● Regularly backup data to external drives or cloud storage.
● Limit access to confidential data only to authorized users.
● Be mindful of where and how personal information is shared.
● Use data loss prevention tools where available.

Social Engineering and Phishing Awareness


● Be cautious of phone calls, emails, or messages requesting personal or login
information.
● Verify the identity of the requester through official channels.
● Recognize phishing emails by poor grammar, urgency, or mismatched URLs.
● Report suspicious emails or interactions to your IT/security team.
● Never click on suspicious links or provide information without confirmation.

Secure Mobile and IoT Devices


● Set strong screen locks (PIN, fingerprint, face ID).
● Install apps only from official stores (Google Play, App Store).
● Keep device software updated.
● Disable Bluetooth, Wi-Fi, and location services when not needed.

Department of Computer Science 11


IT Skills - 25CS01I - I/II Semester

● Change default passwords of IoT devices and update their firmware.

Staying Safe from Online Predators, Cyberbullying, and Cyber Harassment


● Don’t share personal information or photos with strangers online.
● Block and report any inappropriate or threatening behavior.
● Educate children and teens about online risks and encourage open communication.
● Use parental controls and privacy settings on social platforms.
● Keep evidence (screenshots, messages) in case legal action is needed.

Using Social Networks Safely


● Set social media profiles to private.
● Be selective about friend/follower requests.
● Avoid posting personal information (address, phone number, travel plans).
● Think before sharing or commenting—nothing is truly ―deleted‖ online.
● Be aware of location sharing and disable it when unnecessary.

Week – 5: Introduction to Problem Solving

What is Problem-Solving?
Problem-solving is a step-by-step process of identifying a problem, analyzing it, and finding
the best solution. In computing, it involves designing logic or algorithms that can be
implemented using programming languages to solve real-world problems.

Problem-Solving Cycle
The problem-solving cycle typically includes the following stages:
1. Understanding the Problem – Clearly define what needs to be solved.
2. Planning the Solution – Brainstorm possible approaches or strategies.
3. Designing the Algorithm – Create a step-by-step method for solving the problem.
4. Implementing the Solution – Use a programming language or tool to write the
solution.
5. Testing and Debugging – Check for errors and make corrections.
6. Evaluating the Solution – Ensure it works efficiently and meets the requirements.

Department of Computer Science 12


IT Skills - 25CS01I - I/II Semester

Introduction to Block-Based Coding


Block-based coding is a visual programming method where users build programs by dragging
and dropping ―blocks‖ of code. It simplifies coding for beginners by removing syntax errors
and helping understand programming logic.
Popular block-based platforms:
● Scratch: Developed by MIT, ideal for animations, games, and stories.
● Blockly: A Google project, integrates with JavaScript and supports advanced coding
structures.
● MIT App Inventor: Used to create Android apps using drag-and-drop coding.
● Klaritree (or similar tools): Used in educational environments for learning logical
thinking and app development.

Understanding Algorithms, Flowcharts, and Sequencing


● Algorithms
An algorithm is a set of precise, step-by-step instructions used to solve a problem or
perform a task. Algorithms are the foundation of all computer programs.
● Flowcharts
A flowchart is a diagram that represents a process or algorithm visually. It uses
standard symbols (like ovals for start/end, diamonds for decisions, rectangles for
processes) to map out each step in the logic.
● Sequencing
Sequencing refers to the specific order in which instructions are executed in a
program. It ensures that actions happen in the correct logical order, which is crucial
for the success of the program.

Week – 6: Variables and Basic Elements of Block-Based Coding

What are Variables?


A variable is a named container used to store information that can change during the
execution of a program. Think of it as a storage box where you can put a value (like a number
or word), and use or update it whenever needed in your program.

Storing and Updating Values


● Storing a Value: You assign an initial value to a variable (e.g., score = 0).

Department of Computer Science 13


IT Skills - 25CS01I - I/II Semester

● Updating a Value: You can change the value based on user actions or program logic
(e.g., score = score + 1).
● Variables help make a program dynamic and responsive.

Using Variables for Score Counters and Timers


● Score Counters: In games, a variable can be used to keep track of the player’s score.
Each time the player earns points, the variable is updated.
o Example: score = score + 10 when a target is hit.
● Timers: A variable can be used to count down or track how long the player has been
playing.
o Example: time = time - 1 every second to create a countdown timer.

Basic Elements of Block-Based Coding


Block-based coding tools like Scratch, Blockly, and MIT App Inventor use drag-and-drop
blocks grouped into categories. Below are the basic elements:

Motion Blocks
● Used to control the movement of sprites (characters or objects).
● Examples:
o move 10 steps
o turn 15 degrees
o go to x: y:
o glide to position

Looks Blocks
● Control how a sprite appears (color, visibility, costumes, text).
● Examples:
o say Hello for 2 seconds
o change color effect by 25
o show / hide
o switch costume to [costume1]

Events Blocks
● Trigger scripts to run when certain actions happen.

Department of Computer Science 14


IT Skills - 25CS01I - I/II Semester

● Examples:
o when green flag clicked
o when this sprite clicked
o when key pressed
Control Blocks
● Manage the flow of the program using loops and conditional statements.
● Examples:
o repeat 10
o forever
o if ... then
o wait 1 second

Operators Blocks
● Perform arithmetic, comparisons, and logic operations.
● Examples:
o +-×÷
o greater than, equal to
o and, or, not
o Used in decision-making and calculations.

Variables Blocks
● Used to create, set, change, or show variables.
● Examples:
o set [score] to 0
o change [score] by 1
o show variable [timer]
o hide variable [score]

Department of Computer Science 15


IT Skills - 25CS01I - I/II Semester

Week – 7: Decision Making

What are Conditions? (if, if-else, nested if)


Conditions are expressions that evaluate to true or false. They are used to control which
parts of a program are executed, based on certain criteria.
● if statement: Executes a block of code if a condition is true.
o Example: if (score > 10) then say "Great Job!"
● if-else statement: Executes one block if the condition is true, another if false.
o Example: if (Age > 18) then say "Eligible for Voting"
Else say "Not Eligible for Voting"
Week – 8: Understanding Loops and Repetition

Importance of Loops in Coding


Loops are essential in programming because they allow a set of instructions to be executed
multiple times without rewriting the code. This helps to:
● Avoid redundancy and manual repetition
● Automate repeated tasks (like animations or score updates)
● Save time and reduce code errors
● Solve problems that involve cycles, patterns, or timed events
● Make programs more efficient, concise, and logical

Types of Loops
Repeat Loop
● Executes a block of code a specific number of times.
● Example in Scratch:
repeat (5) → do something 5 times.
Repeat Until Loop
● Continues to execute the block until a certain condition becomes true.
● Useful when the number of repetitions is not known in advance.
● Example:
repeat until (score > 10) → keep doing something until score crosses 10.
Forever Loop
● Repeats a block endlessly until the program is stopped.

Department of Computer Science 16


IT Skills - 25CS01I - I/II Semester

● Commonly used for actions that should always happen (e.g., checking for
keypresses).
● Example:
forever → check if spacebar is pressed.

Practical Use of Loops in Problem Solving


Loops are used in many practical coding tasks:
● Animations: Move a sprite repeatedly or make it blink.
● Games: Continuously check for collisions, score updates, or health levels.
● Timers and Counters: Increment or decrement values regularly.
● Drawing Patterns: Use loops to draw shapes (e.g., circles or spirals) repeatedly.
● Simulations: Repeatedly perform calculations (like temperature changes, motion).
Example in a game:
repeat (10) move (10) steps

Week – 9: Cloud Computing

What is Cloud Computing?


Cloud Computing is the delivery of computing services like servers, storage, databases,
networking, software, and more over the internet ("the cloud"). It allows users to access
and use resources without owning or maintaining physical hardware.
Instead of storing data or running programs on a personal computer or server, users can do so
remotely via cloud service providers such as Amazon Web Services (AWS), Microsoft
Azure, or Google Cloud Platform (GCP).

Cloud Computing Benefits and Use Cases


Benefits:
● Cost Efficiency: Pay-as-you-go model; no need to invest in hardware.
● Scalability: Easily scale up or down based on demand.
● Accessibility: Access from anywhere with an internet connection.
● Performance: High-speed infrastructure with global reach.
● Backup and Recovery: Automated data backups and disaster recovery solutions.
● Security: Advanced security measures like encryption, access controls, and
compliance.

Department of Computer Science 17


IT Skills - 25CS01I - I/II Semester

Use Cases:
● Data Storage (e.g., Google Drive, Dropbox)
● Web Hosting (e.g., websites hosted on AWS or Azure)
● Software as a Service (e.g., Google Docs, Microsoft 365)
● Online Education Platforms (e.g., Coursera, Khan Academy)
● Streaming Services (e.g., Netflix, YouTube)
● Enterprise Applications (e.g., ERP, CRM systems)
● Backup and Disaster Recovery solutions

Cloud Service Models


Cloud services are delivered through three main models:
1. IaaS (Infrastructure as a Service)
● Provides virtualized computing resources over the internet (e.g., servers, storage,
networking).
● Users manage: OS, applications, and data.
● Examples: Amazon EC2, Microsoft Azure Virtual Machines.
2. PaaS (Platform as a Service)
● Offers a platform and environment for developers to build, test, and deploy
applications.
● Users manage: Applications and data.
● Providers manage: OS, servers, storage.
● Examples: Google App Engine, Heroku, Microsoft Azure App Service.
3. SaaS (Software as a Service)
● Delivers ready-to-use software applications over the internet.
● Users just use the software via a browser or app; the provider manages everything.
● Examples: Gmail, Zoom, Salesforce, Microsoft 365.

Week – 10: Internet of Things (IoT)

What is IoT?
The Internet of Things (IoT) refers to a network of interconnected physical devices that
can collect, exchange, and act on data using the internet. These devices range from household
appliances to industrial machines, and they communicate without human intervention.

Department of Computer Science 18


IT Skills - 25CS01I - I/II Semester

Characteristics of IoT
● Connectivity: Devices are connected to a network and communicate in real-time.
● Automation and Control: IoT allows for automated processes and remote control.
● Data Collection: Devices continuously gather data from their environment.
● Integration: Combines hardware, software, and communication technologies.
● Intelligence: Uses data analytics and AI to make smart decisions or trigger actions.

Components of IoT
1. Sensors
o Detect physical conditions like temperature, motion, light, or pressure.
o Example: Temperature sensor in a smart thermostat.
2. Actuators
o Devices that perform actions based on received data or commands.
o Example: A motor that opens a smart door when a sensor detects movement.
3. Communication
o Connects sensors/actuators to the internet via protocols like Wi-Fi, Bluetooth,
Zigbee, or cellular networks.
4. Cloud
o Stores and processes data received from IoT devices.
o Enables remote access, control, and integration with other services.
5. Analytics
o Interprets data using software and algorithms to provide insights, predict
behavior, or automate decisions.
o Example: Analyzing usage patterns to optimize energy consumption in smart
homes.

Use Cases of IoT Across Various Industries


● Healthcare:
o Remote patient monitoring, wearable health trackers, smart beds.
● Agriculture:
o Soil moisture sensors, automated irrigation, weather monitoring.
● Manufacturing:
o Predictive maintenance of machinery, real-time monitoring of production.
● Smart Cities:

Department of Computer Science 19


IT Skills - 25CS01I - I/II Semester

o Traffic management, smart street lighting, waste management systems.


● Retail:
o Smart shelves, inventory tracking, personalized shopping experiences.
● Transportation:
o Fleet tracking, smart parking systems, real-time navigation.

Examples of IoT in Everyday Life


● Smart Homes:
o Smart lights (e.g., Philips Hue), thermostats (e.g., Nest), and voice assistants
(e.g., Alexa).
● Wearables:
o Fitness trackers (e.g., Fitbit), smartwatches (e.g., Apple Watch).
● Smart Appliances:
o Refrigerators that notify you about food expiry, or washing machines you can
control with a phone.
● Connected Cars:
o Vehicles with GPS, real-time diagnostics, and auto-assistance features.
● Home Security Systems:
o IoT-enabled CCTV cameras, motion sensors, and smart door locks.

Week – 11: Artificial Intelligence (AI)

What is AI?
Artificial Intelligence (AI) is the branch of computer science that enables machines to
mimic human intelligence. AI systems can learn from data, recognize patterns, solve
problems, make decisions, and even communicate or interact like humans.
AI aims to create machines that can perform tasks that typically require human cognitive
abilities such as learning, reasoning, and understanding language.

Types of AI
1. Weak AI (Narrow AI)
o AI systems designed to perform a specific task.
o They do not possess real intelligence but simulate it.
o Examples: Siri, Google Assistant, spam filters.

Department of Computer Science 20


IT Skills - 25CS01I - I/II Semester

2. Strong AI (Artificial General Intelligence)


o Hypothetical AI that has the ability to think and reason like a human in any
situation.
o Still under research and development.
o Can learn, apply logic, and adapt like humans.
3. General AI (AGI - Artificial General Intelligence)
o Also refers to Strong AI — an AI that can fully replicate human intelligence.
o Capable of performing any intellectual task that a human can do, with
consciousness and self-awareness.

AI in Everyday Life: Real-world Applications


AI is already part of our daily lives through various applications:
● Smart Assistants: Alexa, Google Assistant respond to voice commands.
● Navigation: Google Maps suggests the best routes using AI.
● Face Recognition: Used in phone unlocking and security systems.
● Online Shopping: Product recommendations on Amazon or Flipkart.
● Social Media: AI curates news feeds and filters content.
● Autocorrect & Translation: Helps with writing and language conversion.

AI Systems like Prediction and Recommendation


1. Prediction Systems
o Use historical data to forecast future events.
o Examples:
▪ Predicting weather
▪ Stock market trends
▪ Predictive maintenance in industries
2. Recommendation Systems
o Suggest items based on user behavior or preferences.
o Examples:
▪ Netflix recommending shows
▪ YouTube autoplay suggestions
▪ Amazon recommending products
These systems use machine learning algorithms to learn from past data and improve over
time.

Department of Computer Science 21


IT Skills - 25CS01I - I/II Semester

AI Applications in Various Fields


Healthcare
● Disease diagnosis (e.g., detecting cancer from X-rays)
● Virtual health assistants
● AI-based surgery robots
● Drug discovery
Finance
● Fraud detection
● Algorithmic trading
● Credit scoring
● Personal finance assistants (like chatbots)
Robotics
● AI-powered robots used in manufacturing, warehouse management, and home
assistance
● Autonomous robots in hazardous environments (like space or underwater)
Transportation
● Self-driving cars
● Traffic prediction and route optimization
● Driver-assist technologies
Education
● Personalized learning apps
● Automatic grading systems
● AI tutors

Week – 12: Prompt Engineering

What is Prompt Engineering?


Prompt Engineering is the process of crafting effective inputs (called prompts) that guide
an AI language model (like ChatGPT) to generate accurate, relevant, and useful responses. It
is an important skill when working with AI tools, especially for tasks like writing, problem-
solving, coding, and more.

Role of AI Language Models

Department of Computer Science 22


IT Skills - 25CS01I - I/II Semester

AI language models are trained on large datasets and are capable of:
● Understanding natural language
● Generating human-like responses
● Answering questions, writing essays, translating text, coding, etc.
Prompt engineering helps in guiding the AI’s behavior by shaping how you ask questions or
give instructions.

Types of AI Prompts
1. Direct Prompts
o Simple and specific requests.
o Example: ―Translate this into Hindi.‖
2. Instructional Prompts
o Provide clear instructions for a task.
o Example: ―Write a short poem about rain using ABAB rhyme scheme.‖
3. Conversational Prompts
o Used in chat-based interactions, with follow-up questions or tasks.
o Example: ―What are the benefits of yoga? Can you give me 3 points?‖

Understanding AI Capabilities and Limitations


Capabilities:
● Language understanding and generation
● Summarization, translation, rewriting
● Code generation, problem solving
● Brainstorming ideas and content creation
Limitations:
● May generate incorrect or outdated information
● Doesn’t have real-world awareness or emotions
● Can misunderstand vague or poorly structured prompts
● Depends heavily on how the prompt is written

Domain-Specific Prompting
This involves tailoring prompts based on a specific field or subject area:
● Medical: ―Summarize symptoms of dengue for a school project.‖
● Legal: ―Explain fundamental rights under Indian Constitution in simple terms.‖

Department of Computer Science 23


IT Skills - 25CS01I - I/II Semester

● Technical: ―Generate a Python code to sort a list of numbers.‖


● Business: ―Create a product description for an eco-friendly water bottle.‖

Using AI for Content Creation


AI tools can assist in:
● Writing: Essays, blog posts, scripts, poems
● Marketing: Ad copy, slogans, email templates, product descriptions
● Coding: Generating and explaining code, debugging
● Social Media: Captions, posts, video ideas

AI in Education and Research


● Tutoring: Explaining concepts step-by-step
● Study Aid: Summarizing textbooks or long articles
● Research Help: Generating ideas, outlines, or literature reviews
● Language Practice: Conversing in different languages
● Quizzes: Creating multiple-choice questions or flashcards

Customizing Prompts for Business Applications


Businesses use prompt engineering for:
● Customer support (automated chat replies)
● Market research (summarizing trends)
● Email automation
● Report generation
● Training content creation
Example: ―Write a professional email to a customer apologizing for late delivery and offering
a 10% discount.‖

Structuring Effective Prompts

Key Principles of Writing Effective Prompts


● Be clear: Avoid vague or incomplete instructions.
● Be specific: Mention the format, tone, and length.
● Provide context: Help the AI understand the background or goal.

Department of Computer Science 24


IT Skills - 25CS01I - I/II Semester

Clarity, Specificity, and Context in Prompts


● Clarity: Instead of ―Tell me about dogs,‖ ask ―List 3 interesting facts about German
Shepherds.‖
● Specificity: ―Write a 100-word summary of the Indian Independence Movement.‖
● Context: ―Pretend you are a school teacher. Explain photosynthesis to 8th-grade
students.‖

Role of Tone, Format, and Constraints


● Tone: Formal, friendly, humorous, etc.
o Example: ―Write a professional message declining a meeting.‖
● Format: Paragraph, bullet points, poem, code block, etc.
o Example: ―Give this in a table format.‖
● Constraints: Word limit, time frame, language, audience
o Example: ―Explain Newton’s laws in under 50 words for a science fair
project.‖

Week – 13: IT Certifications and Career Paths

Overview of IT Certifications (Entry-Level to Expert)


IT certifications are credentials awarded to individuals who demonstrate proficiency in
specific areas of information technology. They help validate skills and knowledge to
employers and clients.

Entry-Level Certifications
These are ideal for beginners or students:
● CompTIA IT Fundamentals (ITF+)
● Microsoft Certified: Azure Fundamentals
● Google IT Support Professional Certificate
● Cisco Certified Support Technician (CCST)

Intermediate Certifications
For professionals with some experience:
● CompTIA A+ / Network+ / Security+
● Cisco Certified Network Associate (CCNA)

Department of Computer Science 25


IT Skills - 25CS01I - I/II Semester

● AWS Certified Cloud Practitioner


● Microsoft Certified: Associate-level Certifications

Advanced/Expert Certifications
These validate deep technical expertise:
● Cisco Certified Network Professional (CCNP)
● AWS Certified Solutions Architect – Professional
● Certified Information Systems Security Professional (CISSP)
● Microsoft Certified: Azure Solutions Architect Expert

Importance of Certifications in IT Careers


● Skill Validation: Demonstrates your knowledge and capability in specific IT
domains.
● Career Advancement: Helps in securing promotions or specialized roles.
● Increased Job Opportunities: Certifications are often a requirement in job listings.
● Higher Salaries: Certified professionals generally earn more than non-certified peers.
● Global Recognition: Many certifications are internationally accepted and respected.
● Continuous Learning: Encourages lifelong learning in a fast-evolving field.

Choosing the Right Certification Based on Career Goals


Your career goal should determine which certifications to pursue. Here’s a guide:
Networking
● Best for: Network administrators, engineers, IT technicians
● Certifications:
o Cisco CCNA / CCNP
o CompTIA Network+
o Juniper Networks Certification
Cybersecurity
● Best for: Security analysts, ethical hackers, security consultants
● Certifications:
o CompTIA Security+
o CEH (Certified Ethical Hacker)
o CISSP
o CompTIA CySA+

Department of Computer Science 26


IT Skills - 25CS01I - I/II Semester

o Cisco CyberOps Associate


Cloud Computing
● Best for: Cloud architects, cloud engineers, DevOps professionals
● Certifications:
o AWS Certified Solutions Architect
o Microsoft Azure Fundamentals / Administrator
o Google Associate Cloud Engineer
Software Development / Programming
● Best for: Developers, software engineers, app builders
● Certifications:
o Microsoft Certified: Azure Developer
o Oracle Java Certification
o Certified Python Developer (PCAP)
o Meta Front-End Developer Certificate
IT Support and Administration
● Best for: IT support specialists, system admins
● Certifications:
o CompTIA A+
o Google IT Support Certificate
o Microsoft Modern Desktop Administrator

1. Identify the parts of a computer system.

The main parts of a computer, categorized into hardware components (physical parts) and
software components (essential systems that run the hardware):
Hardware Components (Physical Parts)
External (Visible) Parts
● Monitor – Displays the visual output from the computer.
● Keyboard – Used to type and give commands.
● Mouse – Used to point, click, and interact with the interface.
● CPU Cabinet (Tower or Case) – Encloses all the main internal components.
● Speakers – Output sound.

Department of Computer Science 27


IT Skills - 25CS01I - I/II Semester

● Webcam & Microphone – For video calling and voice input.


Internal Components (Inside the CPU Case)
● Motherboard – The main circuit board; connects all internal components.
● Processor (CPU – Central Processing Unit) – The brain of the computer; handles
all processing.
● RAM (Random Access Memory) – Temporary memory that stores data for active
programs.
● Hard Drive / SSD (Storage) – Stores data permanently, including OS, files, and
programs.
● Power Supply Unit (PSU) – Converts electricity to power the internal components.
● Graphics Card (GPU) – Handles visual rendering, especially for games and design.
● Cooling Fans / Heat Sink – Keeps the system cool and prevents overheating.

Identify the operating system and hardware specifications of a computer


Operating System:

Hardware Specifications:

Explore and list 3 real-world examples for each type of network (LAN, MAN, WAN).

1. LAN (Local Area Network)


● Scope: Small area like a home, office, or school.
● Real-World Examples:
1. School Computer Lab: All the computers in the lab are connected to a single
local server.
2. Office Network: Printers, desktops, and laptops in a company branch are
connected through a LAN for file sharing and printing.
3. Home Wi-Fi Network: Multiple devices (phones, laptops, smart TVs) connected
to the same home router.

Department of Computer Science 28


IT Skills - 25CS01I - I/II Semester

2. MAN (Metropolitan Area Network)


● Scope: Covers a city or large campus (larger than LAN, smaller than WAN).
● Real-World Examples:
1. University Campus Network: All departments and hostels of a university across
a city are connected for data and internet sharing.
2. Cable TV Network in a City: A network used by cable operators to distribute
TV signals across urban areas.
3. City Government Offices Network: A single network connecting municipal
offices, police stations, and public libraries in one city.

3. WAN (Wide Area Network)


● Scope: Covers large geographical areas, even countries or continents.
● Real-World Examples:
1. The Internet: The biggest WAN in the world, connecting millions of networks
globally.
2. Banking Networks (e.g., SBI, ICICI): Banks use WAN to connect their
branches across the country for real-time transactions.
3. Airline Reservation Systems (e.g., Amadeus, Sabre): Used globally to manage
flight bookings, customer data, and availability.

Find your Physical (MAC) and Logical (IP) Address


MAC (Medium Access Control) Address:

Logical (IP-Internet Protocol) Address:

Department of Computer Science 29


IT Skills - 25CS01I - I/II Semester

List of ITS Lab Experiments to be Maintained in Record Book. (


and Theory Part):
1. Identify the parts of a Computer System (Define each one). (Page Number 5,6, 27, 28)
2. Explore and list 3 Real-World examples for each type of network (LAN, MAN,
WAN) (Page Number 28,29).
3. Design, develop and host a personal website using any free platform such as wix.com
4. List Different Basic Elements of Block-Based Coding and define few elements in
each block (Page Number 14, 15).
5. Write an Algorithm and Flow Chart to Add Two Numbers and Design the Scratch
Animation for the same.
6. Write an Algorithm and Flow Chart to find the Area of the Triangle and Design the
Scratch Animation for the same.
7. Write an Algorithm and Flow Chart to find the Biggest of Three Numbers using IF
and Design the Scratch Animation for the same.
8. Write an Algorithm and Flow Chart to check whether a student is eligible for Voting
or not using IF-ELSE and Design the Scratch Animation for the same.
9. Write an Algorithm and Flow Chart to convert weight entered in KG to Grams and
Design the Scratch Animation for the same.
10. Write an Algorithm and Flow Chart to convert Time entered in minutes to hours and
Design the Scratch Animation for the same.`
11. Write an Algorithm and Flow Chart to Biggest of Three Numbers using IF and Design
the Scratch Animation for the same.
12. Design Scratch Animation to make two balls move continuously and bounce back if it
touches each other or touches the edge.
13. Design a Algorithm and Flow Chart demo to make a cup of Tea using Scratch
Animation (Display Steps one after another using Hide/Show Concept).
14. Design Scratch Animation to make a count of number of times the moving bouncing
ball touched the horizontally moving rectangular box.
15. Display Greeting Message when user presses the buttons on keyboard (Button 1: Hi,
2: I am Student of Nitte Polytechnic, 3: Right now I am Writing Exam, 4: The Exam
is Easy, 5:Exit Game) using Scratch Animation
16. Write an Algorithm and Flow Chart to check login username and password and
Design the Scratch Animation for the same.
17. Write an Algorithm and Flow Chart to check whether Entered Number is Odd or Even
and Design the Scratch Animation for the same.
18. Design Scratch Animation to Simulate Traffic Signal (Red Yellow Green Light).
19. Design Scratch Animation to display First 20 Numbers.
20. Create a simple visual block code to blink LED in Arduino board using visual block
code, upload code to Arduino board and demonstrate.
21. Create a Traffic signal controller with 3 LED ( RED, YELLOW and GREEN), upload
code to Arduino board and demonstrate.

Department of Computer Science 30

You might also like