SlideShare a Scribd company logo
1 of 16
Download to read offline
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 42
Chapter 03: INTRODUCTION TO COMPUTER CONCEPTS
3.1 Introduction to computers
According to the definition, "A computer is a programmable electronic device that takes data, perform
instructed arithmetic and logical operations, and gives the output."
Main Highlights of Computer are as follows:
• A computer is described as an electronic device because; it is made up of electronic components and
uses electric energy (such as electricity) to operate.
• A computer has an internal memory, which stores data & instructions temporarily awaiting processing,
and even holds the intermediate result (information) before it is communicated to the recipients through
the Output devices.
• It works on the data using the instructions issued, means that, the computer cannot do any useful job
on its own. It can only work as per the set of instructions issued.
• A computer will accept data in one form and produce it in another form. The data is normally held
within the computer as it is being processed.
The general meaning of a computer is a machine that can calculate. However, modern computers are not just
a calculating device anymore. They can perform a variety of tasks. In simple terms, a computer is a
programmable electronic machine used to store, retrieve, and process data.
3.1.1 Evolution of computer
The modern computer took its shape with the advent of time. It was around 16th century when the evolution
of computer started. The initial computer faced many changes, obviously for the betterment. It continuously
improved itself in terms of speed, accuracy, size, and cost to get the shape of the modern-day computer.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 43
3.1.2 Generation of computers
This long period of evolution can be conveniently divided into the following phases called computer
generations:
Generations of Computer Time-Period Evolving Hardware
First Generation 1940s – 1950s Vacuum Tube Based
Second Generation 1950s – 1960s Transistor Based
Third Generation 1960s – 1970s Integrated Circuit Based
Fourth Generation 1970s – Present Microprocessor Based
Fifth Generation Present – Future Artificial Intelligence Based
Let us now discuss the development in Computer Technology over the different generations.
First Generation
• The period 1940 to 1956, roughly considered as the First Generation of Computer.
• The first-generation computers were developed by using vacuum tube or thermionic valve machine.
• The input of this system was based on punched cards and paper tape; however, the output was displayed
on printouts.
• The first-generation computers worked on binary-coded concept (i.e., language of 0-1).
• Examples: ENIAC, EDVAC, etc.
Second Generation
• The period 1956 to 1963 is roughly considered as the period of Second Generation of Computers.
• The second-generation computers were developed by using transistor technology.
• In comparison to the first generation, the size of second generation was smaller.
• In comparison to computers of the first generation, the computing time taken by the computers of the
second generation was lesser.
Third Generation
• The period 1963 to 1971 is roughly considered as the period of Third Generation of computers.
• The third-generation computers were developed by using the Integrated Circuit (IC) technology.
• The size of the computers of the third generation was smaller.
• In comparison to the computers of the second generation, the computing time taken by the computers of
the third generation was lesser.
• The third-generation computer consumed less power and also generated less heat.
• The maintenance cost of the computers in the third generation was also low.
• The computer system of the computers of the third generation was easier for commercial use.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 44
Fourth Generation
• The period 1972 to 2010 is roughly considered as the fourth generation of computers.
• The fourth-generation computers were developed by using microprocessor technology.
• By coming to fourth generation, computer became very small in size, it became portable.
• The machine of fourth generation started generating very low amount of heat.
• It is much faster and accuracy became more reliable.
• The production cost reduced to very low in comparison to the previous generation.
• It became available for the common people as well.
Fifth Generation
• The period 2010 to till date and beyond, roughly considered as the period of fifth generation of
computers.
• By the time, the computer generation was being categorized on the basis of hardware only,
but the fifth-generation technology also included software.
• The computers of the fifth generation had high capability and large memory capacity.
• Working with computers of this generation was fast and multiple tasks could be performed
simultaneously.
• Some of the popular advanced technologies of the fifth generation include Artificial
intelligence, Quantum computation, Nanotechnology, Parallel processing, etc.
3.1.3 Classification of computer
Computers are classified based on 3 types as shown below.
3.1.4 Applications of Computers
a) Home b) Medical c) Entertainment d) Industries e) Education
f) Government g) Banking h) Business i) Training & Art f) Science & Research
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 45
3.2 Components of computers
a) Hardware (different types of hardware components)
Computer hardware includes the physical components of a computer. Personal computers (PCs) are electronic
devices that use microchips to process information and may include desktop computers, laptops or tablets.
Computer Hardware’s are classified into 3 main groups
a) Internal Hardware’s
b) Input Hardware’s
c) Output Hardware’s
Internal Hardware include the following:
• Motherboard. This is a printed circuit board that holds the central processing unit (CPU) and other
essential internal hardware and functions as the central hub that all other hardware components run
through.
• CPU. The CPU is the brain of the computer that processes and executes digital instructions from
various programs; its clock speed determines the computer's performance and efficiency in processing
data.
• RAM. RAM: It is temporary memory storage that makes information immediately accessible to
programs; RAM is volatile memory, so stored data is cleared when the computer powers off.
• Hard drive or Solid-state drive (SSD): Hard disk drives are physical storage devices that store both
permanent and temporary data in different formats, including programs, device files, photos, etc.
• Optical drive. Optical drives typically reside in an on-device drive bay; they enable the computer to
read and interact with nonmagnetic external media, such as compact disc read-only memory or DVD.
• Heat-sink. This is a passive piece of hardware that draws heat away from components to
regulate/reduce their temperature to help ensure they continue to function properly.
• Graphics processing unit. This chip-based device processes graphical data and often functions as an
extension to the main CPU.
• Network interface card (NIC). A NIC is a circuit board or chip that enables the computer to connect to
a network; also known as a network adapter or local area network adapter, it typically supports
connection to an Ethernet network
Input Hardware components include the following:
• Mouse. A mouse is a hand-held pointing device that moves a cursor around a computer screen and
enables interaction with objects on the screen. It may be wired or wireless.
• Keyboard. A keyboard is an input device featuring a standard QWERTY keyset that enables users to
input text, numbers or special characters.
• Microphone. A microphone is a device that translates sound waves into electrical signals and supports
computer-based audio communications.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 46
• Camera. A camera captures visual images and streams them to the computer or through a computer to
a network device.
• USB flash drive. A USB flash drive is an external, removable storage device that uses flash memory
and interfaces with a computer through a USB port.
• Memory card. A memory card is a type of portable external storage media, such as a CompactFlash
card, used to store media or data files.
Output hardware components include the following:
• Monitor. A monitor is an output device similar to a TV screen that displays information, documents or
images generated by the computing device.
• Printer. Printers render electronic data from a computer into printed material.
• Speaker. A speaker is an external audio output device that connects to a computer to generate a sound
output.
• Headphones, earphones, earbuds. Similar to speakers, these devices provide audio output that's audible
only to a single listener.
b) Software (System Software, Application Software, E-accessibility Software, Open source,
freeware and proprietary software)
• The software which is an interface between the application software and the system is the system
software. Examples of system software are: Operating System, Programming Language,
Communication Software, etc
• The application software runs on the platform provided by the system software as per the user’s
request. The software is created targeting a specific user task, which does the work for the user. It is
also called an application package, as it acts as a bridge between the system software and the end-user.
High-level languages like C, Java, VB. Net, are used to build application software. Examples of
application software are: Word Doc, Spreadsheet, Database, etc
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 47
c) Peripherals (working of keyboard and laser printer)
KEYBOARD: A keyboard is one of the main input devices for a computer. It looks similar to a typewriter. It
has various keys that when pressed display numbers, letters, and other symbols on the display unit. A keyboard
can perform other functions as well when certain combinations of keys are used.
• In the middle of each key is a tiny cylindrical bar. On the keyboard are circular holes that the keys fit
into. When you push a key, it goes down like a spring and touches the contact layers on the board. The
holes are built with small pieces of rubber that push the keys back up.
• The above figure shows the contact layers that the keyboards have. These layers are responsible for
detecting which key is pressed. The cables inside carry electrical signals from the keyboard to the USB
port on the computer.
• The contact layers consist of a set of 3 layers of plastic. These are the most crucial elements of the
working of the keyboard. The top and bottom layers have metal tracks that can conduct electricity. The
layer in between has holes in it and acts as an insulator. These are the holes upon which the keys are
fixed. When a key is pressed, the two layers come in contact and produce an electrical signal that is
carried to the port on the system.
LASER PRINTER: here are many moving parts and components inside a laser printer that work together to
produce your final document or image, each have an important part to play. The key parts of the printer
include, toner cartridges, image drum (also known as drum unit or
photo-conductor), transfer roller or belt, fuser unit, laser, and
mirrors.
1. The moment you press print on your computer, tablet or
mobile device, the information is sent to the printer
memory, where the data is stored temporarily.
2. The printer begins to warm up. This is the point where
you usually need to wait, and it’s because the corona wire
is heating up and getting ready to pass its positive static
charge to the drum.
3. As the drum (coated metal cylinder) begins to roll, it received a positive charge across its whole
surface. Some printers contain four drums, one for each colour – Cyan, Magenta, Yellow & Black.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 48
4. The laser activates, and beams against a series of mirrors to reflect across the surface of the drum(s)
imprinting the shape of your print using an opposite negative electrical charge.
5. The toner cartridge and hopper sat next to the drum(s) slowly releases positively charged carbon
toner particles on to the drum as it turns. The toner is attracted to any areas of negative charge
leaving positively charged areas of the drum untouched.
6. The transfer belt rolls the paper through the printer giving it a positive charge. As it passes the drum,
the negatively charged toner is attracted to the page in the shape of your print.
7. The toner is then melted to the paper by hot rollers called the fuser unit, and voila, your page is
printed.
3.2 Computer Network (Concept Only)
Computer Networking is the practice of connecting computers together to enable communication and
data exchange between them. In general, Computer Network is a collection of two or more computers. It helps
users to communicate more easily. In this article, we are going to discuss the basics which everyone must
know before going deep into Computer Networking.
The working of Computer Networks can be simply defined as rules or protocols which help in sending and
receiving data via the links which allow Computer networks to communicate. Each device has an IP Address,
that helps in identifying a device.
Basic Terminologies of Computer Networks
• Network: A network is a collection of computers and devices that are connected together to enable
communication and data exchange.
• Nodes: Nodes are devices that are connected to a network. These can include computers, Servers,
Printers, Routers, Switches, and other devices.
• Protocol: A protocol is a set of rules and standards that govern how data is transmitted over a network.
Examples of protocols include TCP/IP, HTTP, and FTP.
• Topology: Network topology refers to the physical and logical arrangement of nodes on a network. The
common network topologies include bus, star, ring, mesh, and tree.
• Service Provider Networks: These types of Networks give permission to take Network Capacity and
Functionality on lease from the Provider. Service Provider Networks include Wireless Communications,
Data Carriers, etc.
• IP Address: An IP address is a unique numerical identifier that is assigned to every device on a network. IP
addresses are used to identify devices and enable communication between them.
• DNS: The Domain Name System (DNS) is a protocol that is used to translate human-readable domain names
(such as www.google.com) into IP addresses that computers can understand.
• Firewall: A firewall is a security device that is used to monitor and control incoming and outgoing network
traffic. Firewalls are used to protect networks from unauthorized access and other security threats.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 49
3.2.1 Categories / Types of Computers Networks:
There are mainly five Categories / types of Computer Networks
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Campus Area Network (CAN)
4. Metropolitan Area Network (MAN)
5. Wide Area Network (WAN)
1. Personal Area Network (PAN)
PAN is the most basic type of computer network. This network is restrained to a single person, that is,
communication between the computer devices is cantered only on an individual’s workspace. PAN offers a
network range of 1 to 100 meters from person to device providing
communication. Its transmission speed is very high with very easy
maintenance and very low cost.
This uses Bluetooth, IrDA, and Zigbee as technology.
Examples of PAN are USB, computer, phone, tablet, printer, PDA, etc.
2. Local Area Network (LAN)
LAN is the most frequently used network. A LAN is a computer
network that connects computers through a common communication
path, contained within a limited area, that is, locally. A LAN
encompasses two or more computers connected over a server. The two
important technologies involved in this network are Ethernet and Wi-
fi. It ranges up to 2km & transmission speed is very high with easy
maintenance and low cost. Examples of LAN are networking in a home,
school, library, laboratory, college, office, etc.
3. Campus Area Network (CAN)
CAN is bigger than a LAN but smaller than a MAN. This is a type
of computer network that is usually used in places like a school or
colleges. This network covers a limited geographical area that is, it
spreads across several buildings within the campus. CAN mainly
use Ethernet technology with a range from 1km to 5km.
Its transmission speed is very high with a moderate maintenance
cost and moderate cost. Examples of CAN are networks that cover
schools, colleges, buildings, etc.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 50
4. Metropolitan Area Network (MAN)
A MAN is larger than a LAN but smaller than a WAN. This is the type of computer network that connects
computers over a geographical distance through a shared communication path over a city, town, or
metropolitan area. This network mainly uses FDDI, CDDI, and ATM as the technology with a range from
5km to 50km. Its transmission speed is average. It is difficult to maintain and it comes with a high cost.
Examples of MAN are networking in towns, cities, a single large city, a large area within buildings, etc.
5. Wide Area Network (WAN)
WAN is a type of computer network that connects computers over a large geographical distance through a
shared communication path. It is not restrained to a single location but extends over many
locations. WAN can also be defined as a group of local area networks that communicate with each other
with a range above 50km.
Here we use Leased-Line & Dial-up technology. Its transmission speed is very low and it comes with very
high maintenance and very high cost. The most common example of WAN is the Internet.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 51
3.3 Protocols of Computers Networks (Application layer)
A Protocol; is simply defined as a set of rules and regulations for data communication. Rules are basically
defined for each and every step and process at time of communication among two or more computers.
Networks are needed to follow these protocols to transmit the data successfully. All protocols might be
implemented using hardware, software, or combination of both of them. There are three aspects of protocols
given below:
• Syntax – It is used to explain data format that is needed to be sent or received.
• Semantics – It is used to explain exact meaning of each of sections of bits that are usually transferred.
• Timings – It is used to explain exact time at which data is generally transferred along with speed at
which it is transferred.
Protocol Hierarchies:
Generally, Computer networks are comprised of or contain a large number of pieces of hardware and
software. To just simplify network design, various networks are organized and arranged as a stack of layers
of hardware and software, one on top of another. The number, name, content, and function of each layer
might vary and can be different from one network to another. The main purpose of each of layers is just to
offer and provide services to higher layers that are present. Each and every layer has some particular task
or function. In programming, this concept is very common. The networks are organized and arranged as
different layers or levels simply to reduce and minimize complexity of design of network software.
Example: Below is diagram representing a five-layer network. The diagram shows communication between
Host 1 and Host 2. The data stream is passed through a number of layers from one host to other. Virtual
communication is represented using dotted lines between peer layers. Physical communication is
represented using solid arrows between adjacent layers. Through physical medium, actual communication
occurs. The layers at same level are commonly known as peers. The peer basically has a set of
communication protocols. An interface is present between each of layers that are used to explain services
provided by lower layer to higher layer.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 52
Advantages of Protocols:
• The layers generally reduce complexity of
communication between networks
• It increases network lifetime.
• It also uses energy efficiently.
• It does not require overall knowledge and
understanding of network.
3.4 Methods of data processing (concepts only)
Collection, manipulation, and processing collected data for the required use is known as data processing. It is
a technique normally performed by a computer; the process includes retrieving, transforming, or classification
of information. However, the processing of data largely depends on the following:
• The volume of data that need to be processed
• The complexity of data processing operations
• Capacity and inbuilt technology of respective computer system
• Technical skills
• Time constraints
Methods of Data Processing
Let us now discuss the different methods of data processing.
a) Single user programming
b) Multiple programming
c) Real-time processing
d) On-line processing
e) Time sharing processing
f) Distributed processing
a) Single User Programming
It is usually done by a single person for his personal use. This technique is suitable even for small offices.
b) Multiple Programming
This technique provides facility to store and execute more than one program in the Central Processing Unit
(CPU) simultaneously. Further, the multiple programming technique increases the overall working efficiency
of the respective computer.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 53
c) Real-time Processing
This technique facilitates the user to have direct contact with the computer system. This technique eases data
processing. This technique is also known as the direct mode or the interactive mode technique and is developed
exclusively to perform one task. It is a sort of online processing, which always remains under execution.
d) On-line Processing
This technique facilitates the entry and execution of data directly; so, it does not store or accumulate first and
then process. The technique is developed in such a way that reduces the data entry errors, as it validates data
at various points and also ensures that only corrected data is entered. This technique is widely used for online
applications.
e) Time-sharing Processing
This is another form of online data processing that facilitates several users to share the resources of an online
computer system. This technique is adopted when results are needed swiftly. Moreover, as the name suggests,
this system is time based.
Following are some of the major advantages of time-sharing processing −
• Several users can be served simultaneously
• All the users have almost equal amount of processing time
• There is possibility of interaction with the running programs
f) Distributed Processing
This is a specialized data processing technique in which various computers (which are located remotely)
remain interconnected with a single host computer making a network of computer. All these computer systems
remain interconnected with a high-speed communication network. This facilitates in the communication
between computers. However, the central computer system maintains the master data base and monitors
accordingly.
3.5 Computer Security: Types of threats and source of threats
Computer security threats are potential threats to your computer’s efficient operation and performance.
These could be harmless adware or dangerous trojan infection. As the world becomes more digital, computer
security concerns are always developing. A threat in a computer system is a potential danger that could
jeopardize your data security. At times, the damage is irreversible.
Types of Threats:
A security threat is a threat that has the potential to harm computer systems and organizations. The cause
could be physical, such as a computer containing sensitive information being stolen. It’s also possible that
the cause isn’t physical, such as a viral attack.
1. Physical Threats: A physical danger to computer systems is a potential cause of an occurrence/event
that could result in data loss or physical damage. It can be classified as:
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 54
• Internal: Short circuit, fire, non-stable supply of power, hardware failure due to excess
humidity, etc. cause it.
• External: Disasters such as floods, earthquakes, landscapes, etc. cause it.
• Human: Destroying of infrastructure and/or hardware, thefts, disruption, and
unintentional/intentional errors are among the threats.
2. Non-physical threats: A non-physical threat is a potential source of an incident that could result in:
• Hampering of the business operations that depend on computer systems.
• Sensitive – data or information loss
• Keeping track of other’s computer system activities illegally.
• Hacking id & passwords of the users, etc.
The non-physical threads can be commonly caused by:
(i) Malware: Malware (“malicious software”) is a type of computer program that infiltrates and damages
systems without the users’ knowledge. Malware tries to go unnoticed by either hiding or not letting the user
know about its presence on the system. You may notice that your system is processing at a slower rate than
usual.
(ii) Virus: It is a program that replicates itself and infects your computer’s files and programs, rendering
them inoperable. It is a type of malware that spreads by inserting a copy of itself into and becoming part of
another program. It spreads with the help of software or documents. They are embedded with software and
documents and then transferred from one computer to another using the network, a disk, file sharing, or
infected e-mail. They usually appear as an executable file.
(iii) Spyware: Spyware is a type of computer program that tracks, records, and reports a user’s activity
(offline and online) without their permission for the purpose of profit or data theft. Spyware can be acquired
from a variety of sources, including websites, instant chats, and emails. A user may also unwittingly obtain
spyware by adopting a software program’s End User License Agreement.
Adware is a sort of spyware that is primarily utilized by advertising. When you go online, it keeps track of
your web browsing patterns in order to compile data on the types of websites you visit.
(iv) Worms: Computer worms are similar to viruses in that they replicate themselves and can inflict similar
damage. Unlike viruses, which spread by infecting a host file, worms are freestanding programs that do not
require a host program or human assistance to proliferate. Worms don’t change programs; instead, they
replicate themselves over and over. They just eat resources to make the system down.
(v) Trojan: A Trojan horse is malicious software that is disguised as a useful host program. When the host
program is run, the Trojan performs a harmful/unwanted action. A Trojan horse, often known as a Trojan,
is malicious malware or software that appears to be legal yet has the ability to take control of your computer.
A Trojan is a computer program that is designed to disrupt, steal, or otherwise harm your data or network.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 55
(vi) Denial Of Service Attacks: A Denial-of-Service attack is one in which an attacker tries to prohibit
legitimate users from obtaining information or services. An attacker tries to make a system or network
resource unavailable to its intended users in this attack. The web servers of large organizations such as
banking, commerce, trading organizations, etc. are the victims.
(vii) Phishing: Phishing is a type of attack that is frequently used to obtain sensitive information from users,
such as login credentials and credit card details. They deceive users into giving critical information, such as
bank and credit card information, or access to personal accounts, by sending spam, malicious Web sites,
email messages, and instant chats.
(viii) Key-Loggers: Keyloggers can monitor a user’s computer activity in real-time. Keylogger is a program
that runs in the background and records every keystroke made by a user, then sends the data to a hacker
with the intent of stealing passwords and financial information.
How to make your system secure:
In order to keep your system data secure and safe, you should take the following measures:
1. Always keep a backup of your data.
2. Install firewall software and keep it updated every time.
3. Make use of strong and difficult to crack passwords (having capital & small alphabets, numbers, and
special characters).
4. Install antivirus/ anti-spyware and keep it updated every time.
5. Timely scan your complete system.
6. Before installing any program, check whether it is safe to install it (using Antivirus Software).
7. Take extra caution when reading emails that contain attachments.
8. Always keep your system updated.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 56
Previous Year Question Papers
April / May 2021
6. (a) Classify computers based on purpose and size.
(b) Distinguish between system software & application software.
(c) Describe the working of Keyboard.
SECTION-IV
7. (a) Explain Computer network categories.
(b) Describe online data processing method.
(c) Explain the functional units of computer with diagram.
April / May 2022
SECTION- II
5. (a) ************************************************
(b) Classify computers according to purpose.
(c) List different types of system software’s.
6. (a) ************************************************
(b) Explain application layer protocols.
(c) List different types of computer hardware components.
SECTION-IV
7. (a) In distribution data processing, how data is arranged & processed?
(b) Explain functional units of computer with neat block diagram.
(c) Classify the following memory as Primary/Secondary:
(i) ROM (ii) SRAM (iii) DRAM (iv) HDD (v) CD-R (vi) DVD
8. (a) Explain any 2 cyber securities threats.
June / July 2023
SECTION-III
5. (a) ***********************************************
(b) **********************************************
6. (a) Classify computer based on purposes. List any 4 applications of computer.
(b) Explain the working of laser printer with diagram.
SECTION-IV
7. (a) Define Computer Network. Explain categories of network.
(b) Explain the functional units of computer with a neat diagram.
8. (a) Write a note on:
(i) Primary Memory
(ii) Cache Memory
(b) Define Operating System. Explain any two types of Operating System.
Vidya Vikas Educational Trust (R),
Vidya Vikas Polytechnic
27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028
Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 57
October / November 2021
SECTION-III
6. (a) Discuss the characteristics of computers.
(b) List various applications of computers.
(c) List and explain different categories of computer networks.
SECTION-IV
7. (a) Explain the following:
(i) Single user programming
(i) Multi programming

More Related Content

What's hot

Computer Concepts PPT
Computer Concepts PPTComputer Concepts PPT
Computer Concepts PPTokmomwalking
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application softwareSowmini Gowda
 
project on input output devie
project on input output devieproject on input output devie
project on input output devieRaunak Sodhi
 
Basic of computer ( miit )
Basic of computer ( miit )Basic of computer ( miit )
Basic of computer ( miit )Ankit Verma
 
The input and output device
The  input  and  output deviceThe  input  and  output device
The input and output devicearchana_brai
 
Computer basic for kids
Computer basic for kidsComputer basic for kids
Computer basic for kidsPaul Gonzales
 
Part’s of computer
Part’s of computerPart’s of computer
Part’s of computerleo saluta
 
Input output devices
Input output devicesInput output devices
Input output deviceschirag patil
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers TheoryMakaha Rutendo
 
La computadora y sus Partes
La computadora y sus PartesLa computadora y sus Partes
La computadora y sus PartesFlor_Angelica
 
Basic of Computer fundamental
Basic of Computer fundamental Basic of Computer fundamental
Basic of Computer fundamental Sohan Grover
 
Computer Software
Computer SoftwareComputer Software
Computer Softwarenorzaini
 
Lesson 1 history of computer (grade 1)
Lesson 1 history of computer (grade 1)Lesson 1 history of computer (grade 1)
Lesson 1 history of computer (grade 1)Shaw Cruz
 

What's hot (20)

KEYBOARD
KEYBOARDKEYBOARD
KEYBOARD
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Computer Concepts PPT
Computer Concepts PPTComputer Concepts PPT
Computer Concepts PPT
 
Computer basics
Computer basicsComputer basics
Computer basics
 
04 software system and application software
04 software   system and application software04 software   system and application software
04 software system and application software
 
project on input output devie
project on input output devieproject on input output devie
project on input output devie
 
Basic of computer ( miit )
Basic of computer ( miit )Basic of computer ( miit )
Basic of computer ( miit )
 
The input and output device
The  input  and  output deviceThe  input  and  output device
The input and output device
 
Computer basic for kids
Computer basic for kidsComputer basic for kids
Computer basic for kids
 
Part’s of computer
Part’s of computerPart’s of computer
Part’s of computer
 
Input output devices
Input output devicesInput output devices
Input output devices
 
Parts of computer
Parts of computerParts of computer
Parts of computer
 
Fundamental of computer
Fundamental of computer Fundamental of computer
Fundamental of computer
 
Basic computer
Basic computerBasic computer
Basic computer
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
La computadora y sus Partes
La computadora y sus PartesLa computadora y sus Partes
La computadora y sus Partes
 
Basic of Computer fundamental
Basic of Computer fundamental Basic of Computer fundamental
Basic of Computer fundamental
 
Hardware
HardwareHardware
Hardware
 
Computer Software
Computer SoftwareComputer Software
Computer Software
 
Lesson 1 history of computer (grade 1)
Lesson 1 history of computer (grade 1)Lesson 1 history of computer (grade 1)
Lesson 1 history of computer (grade 1)
 

Similar to Fundamentals of Computer 20CS11T Chapter 3.pdf

It tools & technology
It tools & technologyIt tools & technology
It tools & technologyJIGAR MAKHIJA
 
5403 Unit No 1+2 Basics of ICT.pptx
5403 Unit No 1+2 Basics of ICT.pptx5403 Unit No 1+2 Basics of ICT.pptx
5403 Unit No 1+2 Basics of ICT.pptxYasirArfat77
 
BASICS OF COMP'gjgjjggjghjghgffUTER.pptx
BASICS OF COMP'gjgjjggjghjghgffUTER.pptxBASICS OF COMP'gjgjjggjghjghgffUTER.pptx
BASICS OF COMP'gjgjjggjghjghgffUTER.pptxammarqazi53
 
Ecoonomics 2nd sem computer application project.docx
Ecoonomics 2nd sem   computer application project.docxEcoonomics 2nd sem   computer application project.docx
Ecoonomics 2nd sem computer application project.docxGorav Gopal Singh
 
Session 23-8-07
Session 23-8-07Session 23-8-07
Session 23-8-07gogulraj25
 
I b.com compute applications new sylabus notes 96
I b.com compute applications  new sylabus notes 96I b.com compute applications  new sylabus notes 96
I b.com compute applications new sylabus notes 96Murali Mohan
 
module1-complete-180407143624 (1).pdf
module1-complete-180407143624 (1).pdfmodule1-complete-180407143624 (1).pdf
module1-complete-180407143624 (1).pdfrabiprasaddevkota1
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer FundamentalsMudit Khetan
 
Unit1-fcp-fundamentals of computing
Unit1-fcp-fundamentals of computingUnit1-fcp-fundamentals of computing
Unit1-fcp-fundamentals of computingkokilabe
 
Uc14 chap01
Uc14 chap01Uc14 chap01
Uc14 chap01ayahye
 
basics of computer ( B.K. school of maangement ).ppt
basics of computer ( B.K. school of maangement ).pptbasics of computer ( B.K. school of maangement ).ppt
basics of computer ( B.K. school of maangement ).pptPragatiKachhi1
 

Similar to Fundamentals of Computer 20CS11T Chapter 3.pdf (20)

It tools & technology
It tools & technologyIt tools & technology
It tools & technology
 
5403 Unit No 1+2 Basics of ICT.pptx
5403 Unit No 1+2 Basics of ICT.pptx5403 Unit No 1+2 Basics of ICT.pptx
5403 Unit No 1+2 Basics of ICT.pptx
 
Ict 001
Ict 001Ict 001
Ict 001
 
BASICS OF COMP'gjgjjggjghjghgffUTER.pptx
BASICS OF COMP'gjgjjggjghjghgffUTER.pptxBASICS OF COMP'gjgjjggjghjghgffUTER.pptx
BASICS OF COMP'gjgjjggjghjghgffUTER.pptx
 
Ecoonomics 2nd sem computer application project.docx
Ecoonomics 2nd sem   computer application project.docxEcoonomics 2nd sem   computer application project.docx
Ecoonomics 2nd sem computer application project.docx
 
computer-generations-1.pptx
computer-generations-1.pptxcomputer-generations-1.pptx
computer-generations-1.pptx
 
computer
computercomputer
computer
 
Session 23-8-07
Session 23-8-07Session 23-8-07
Session 23-8-07
 
I b.com compute applications new sylabus notes 96
I b.com compute applications  new sylabus notes 96I b.com compute applications  new sylabus notes 96
I b.com compute applications new sylabus notes 96
 
Ch01 senn3e
Ch01 senn3eCh01 senn3e
Ch01 senn3e
 
module1-complete-180407143624 (1).pdf
module1-complete-180407143624 (1).pdfmodule1-complete-180407143624 (1).pdf
module1-complete-180407143624 (1).pdf
 
Basic of Computer Introduction - World of Computers
Basic of Computer Introduction - World of Computers Basic of Computer Introduction - World of Computers
Basic of Computer Introduction - World of Computers
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Unit1-fcp-fundamentals of computing
Unit1-fcp-fundamentals of computingUnit1-fcp-fundamentals of computing
Unit1-fcp-fundamentals of computing
 
1 basics of computers
1  basics of computers1  basics of computers
1 basics of computers
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
Uc14 chap01
Uc14 chap01Uc14 chap01
Uc14 chap01
 
Uc14 chap01
Uc14 chap01Uc14 chap01
Uc14 chap01
 
basics of computer ( B.K. school of maangement ).ppt
basics of computer ( B.K. school of maangement ).pptbasics of computer ( B.K. school of maangement ).ppt
basics of computer ( B.K. school of maangement ).ppt
 

More from THANMAY JS

Multimedia and Animation 20CS21P Portfolio.pdf
Multimedia and Animation 20CS21P Portfolio.pdfMultimedia and Animation 20CS21P Portfolio.pdf
Multimedia and Animation 20CS21P Portfolio.pdfTHANMAY JS
 
Fundamentals of Automation Technology 20EE43P Portfolio.pdf
Fundamentals of Automation Technology 20EE43P Portfolio.pdfFundamentals of Automation Technology 20EE43P Portfolio.pdf
Fundamentals of Automation Technology 20EE43P Portfolio.pdfTHANMAY JS
 
Elements of Industrial Automation Portfolio.pdf
Elements of Industrial Automation Portfolio.pdfElements of Industrial Automation Portfolio.pdf
Elements of Industrial Automation Portfolio.pdfTHANMAY JS
 
Fundamentals of Computer 20CS11T Chapter 5.pdf
Fundamentals of Computer 20CS11T Chapter 5.pdfFundamentals of Computer 20CS11T Chapter 5.pdf
Fundamentals of Computer 20CS11T Chapter 5.pdfTHANMAY JS
 
Fundamentals of Computer 20CS11T Chapter 4.pdf
Fundamentals of Computer 20CS11T Chapter 4.pdfFundamentals of Computer 20CS11T Chapter 4.pdf
Fundamentals of Computer 20CS11T Chapter 4.pdfTHANMAY JS
 
Fundamentals of Computer 20CS11T Chapter 2.pdf
Fundamentals of Computer 20CS11T Chapter 2.pdfFundamentals of Computer 20CS11T Chapter 2.pdf
Fundamentals of Computer 20CS11T Chapter 2.pdfTHANMAY JS
 
Elements of Industrial Automation Week 09 Notes.pdf
Elements of Industrial Automation Week 09 Notes.pdfElements of Industrial Automation Week 09 Notes.pdf
Elements of Industrial Automation Week 09 Notes.pdfTHANMAY JS
 
Elements of Industrial Automation Week 08 Notes.pdf
Elements of Industrial Automation Week 08 Notes.pdfElements of Industrial Automation Week 08 Notes.pdf
Elements of Industrial Automation Week 08 Notes.pdfTHANMAY JS
 
Elements of Industrial Automation Week 07 Notes.pdf
Elements of Industrial Automation Week 07 Notes.pdfElements of Industrial Automation Week 07 Notes.pdf
Elements of Industrial Automation Week 07 Notes.pdfTHANMAY JS
 
Elements of Industrial Automation Week 06 Notes.pdf
Elements of Industrial Automation Week 06 Notes.pdfElements of Industrial Automation Week 06 Notes.pdf
Elements of Industrial Automation Week 06 Notes.pdfTHANMAY JS
 
Elements of Industrial Automation Week 05 Notes.pdf
Elements of Industrial Automation Week 05 Notes.pdfElements of Industrial Automation Week 05 Notes.pdf
Elements of Industrial Automation Week 05 Notes.pdfTHANMAY JS
 
Elements of Industrial Automation Week 04 Notes.pdf
Elements of Industrial Automation Week 04 Notes.pdfElements of Industrial Automation Week 04 Notes.pdf
Elements of Industrial Automation Week 04 Notes.pdfTHANMAY JS
 
Elements of Industrial Automation Week 03 Notes.pdf
Elements of Industrial Automation Week 03 Notes.pdfElements of Industrial Automation Week 03 Notes.pdf
Elements of Industrial Automation Week 03 Notes.pdfTHANMAY JS
 
Elements of Industrial Automation Week 02 Notes.pdf
Elements of Industrial Automation Week 02 Notes.pdfElements of Industrial Automation Week 02 Notes.pdf
Elements of Industrial Automation Week 02 Notes.pdfTHANMAY JS
 
Elements of Industrial Automation Week 01 Notes.pdf
Elements of Industrial Automation Week 01 Notes.pdfElements of Industrial Automation Week 01 Notes.pdf
Elements of Industrial Automation Week 01 Notes.pdfTHANMAY JS
 
Automation and Robotics Week 08 Theory Notes 20ME51I.pdf
Automation and Robotics Week 08 Theory Notes 20ME51I.pdfAutomation and Robotics Week 08 Theory Notes 20ME51I.pdf
Automation and Robotics Week 08 Theory Notes 20ME51I.pdfTHANMAY JS
 
Automation and Robotics Week 07 Theory Notes 20ME51I.pdf
Automation and Robotics Week 07 Theory Notes 20ME51I.pdfAutomation and Robotics Week 07 Theory Notes 20ME51I.pdf
Automation and Robotics Week 07 Theory Notes 20ME51I.pdfTHANMAY JS
 
Automation and Robotics Week 06 Theory Notes 20ME51I.pdf
Automation and Robotics Week 06 Theory Notes 20ME51I.pdfAutomation and Robotics Week 06 Theory Notes 20ME51I.pdf
Automation and Robotics Week 06 Theory Notes 20ME51I.pdfTHANMAY JS
 
Automation and Robotics Week 05 Theory Notes 20ME51I.pdf
Automation and Robotics Week 05 Theory Notes 20ME51I.pdfAutomation and Robotics Week 05 Theory Notes 20ME51I.pdf
Automation and Robotics Week 05 Theory Notes 20ME51I.pdfTHANMAY JS
 
Automation and Robotics Week 04 Theory Notes 20ME51I.pdf
Automation and Robotics Week 04 Theory Notes 20ME51I.pdfAutomation and Robotics Week 04 Theory Notes 20ME51I.pdf
Automation and Robotics Week 04 Theory Notes 20ME51I.pdfTHANMAY JS
 

More from THANMAY JS (20)

Multimedia and Animation 20CS21P Portfolio.pdf
Multimedia and Animation 20CS21P Portfolio.pdfMultimedia and Animation 20CS21P Portfolio.pdf
Multimedia and Animation 20CS21P Portfolio.pdf
 
Fundamentals of Automation Technology 20EE43P Portfolio.pdf
Fundamentals of Automation Technology 20EE43P Portfolio.pdfFundamentals of Automation Technology 20EE43P Portfolio.pdf
Fundamentals of Automation Technology 20EE43P Portfolio.pdf
 
Elements of Industrial Automation Portfolio.pdf
Elements of Industrial Automation Portfolio.pdfElements of Industrial Automation Portfolio.pdf
Elements of Industrial Automation Portfolio.pdf
 
Fundamentals of Computer 20CS11T Chapter 5.pdf
Fundamentals of Computer 20CS11T Chapter 5.pdfFundamentals of Computer 20CS11T Chapter 5.pdf
Fundamentals of Computer 20CS11T Chapter 5.pdf
 
Fundamentals of Computer 20CS11T Chapter 4.pdf
Fundamentals of Computer 20CS11T Chapter 4.pdfFundamentals of Computer 20CS11T Chapter 4.pdf
Fundamentals of Computer 20CS11T Chapter 4.pdf
 
Fundamentals of Computer 20CS11T Chapter 2.pdf
Fundamentals of Computer 20CS11T Chapter 2.pdfFundamentals of Computer 20CS11T Chapter 2.pdf
Fundamentals of Computer 20CS11T Chapter 2.pdf
 
Elements of Industrial Automation Week 09 Notes.pdf
Elements of Industrial Automation Week 09 Notes.pdfElements of Industrial Automation Week 09 Notes.pdf
Elements of Industrial Automation Week 09 Notes.pdf
 
Elements of Industrial Automation Week 08 Notes.pdf
Elements of Industrial Automation Week 08 Notes.pdfElements of Industrial Automation Week 08 Notes.pdf
Elements of Industrial Automation Week 08 Notes.pdf
 
Elements of Industrial Automation Week 07 Notes.pdf
Elements of Industrial Automation Week 07 Notes.pdfElements of Industrial Automation Week 07 Notes.pdf
Elements of Industrial Automation Week 07 Notes.pdf
 
Elements of Industrial Automation Week 06 Notes.pdf
Elements of Industrial Automation Week 06 Notes.pdfElements of Industrial Automation Week 06 Notes.pdf
Elements of Industrial Automation Week 06 Notes.pdf
 
Elements of Industrial Automation Week 05 Notes.pdf
Elements of Industrial Automation Week 05 Notes.pdfElements of Industrial Automation Week 05 Notes.pdf
Elements of Industrial Automation Week 05 Notes.pdf
 
Elements of Industrial Automation Week 04 Notes.pdf
Elements of Industrial Automation Week 04 Notes.pdfElements of Industrial Automation Week 04 Notes.pdf
Elements of Industrial Automation Week 04 Notes.pdf
 
Elements of Industrial Automation Week 03 Notes.pdf
Elements of Industrial Automation Week 03 Notes.pdfElements of Industrial Automation Week 03 Notes.pdf
Elements of Industrial Automation Week 03 Notes.pdf
 
Elements of Industrial Automation Week 02 Notes.pdf
Elements of Industrial Automation Week 02 Notes.pdfElements of Industrial Automation Week 02 Notes.pdf
Elements of Industrial Automation Week 02 Notes.pdf
 
Elements of Industrial Automation Week 01 Notes.pdf
Elements of Industrial Automation Week 01 Notes.pdfElements of Industrial Automation Week 01 Notes.pdf
Elements of Industrial Automation Week 01 Notes.pdf
 
Automation and Robotics Week 08 Theory Notes 20ME51I.pdf
Automation and Robotics Week 08 Theory Notes 20ME51I.pdfAutomation and Robotics Week 08 Theory Notes 20ME51I.pdf
Automation and Robotics Week 08 Theory Notes 20ME51I.pdf
 
Automation and Robotics Week 07 Theory Notes 20ME51I.pdf
Automation and Robotics Week 07 Theory Notes 20ME51I.pdfAutomation and Robotics Week 07 Theory Notes 20ME51I.pdf
Automation and Robotics Week 07 Theory Notes 20ME51I.pdf
 
Automation and Robotics Week 06 Theory Notes 20ME51I.pdf
Automation and Robotics Week 06 Theory Notes 20ME51I.pdfAutomation and Robotics Week 06 Theory Notes 20ME51I.pdf
Automation and Robotics Week 06 Theory Notes 20ME51I.pdf
 
Automation and Robotics Week 05 Theory Notes 20ME51I.pdf
Automation and Robotics Week 05 Theory Notes 20ME51I.pdfAutomation and Robotics Week 05 Theory Notes 20ME51I.pdf
Automation and Robotics Week 05 Theory Notes 20ME51I.pdf
 
Automation and Robotics Week 04 Theory Notes 20ME51I.pdf
Automation and Robotics Week 04 Theory Notes 20ME51I.pdfAutomation and Robotics Week 04 Theory Notes 20ME51I.pdf
Automation and Robotics Week 04 Theory Notes 20ME51I.pdf
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 

Fundamentals of Computer 20CS11T Chapter 3.pdf

  • 1. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 42 Chapter 03: INTRODUCTION TO COMPUTER CONCEPTS 3.1 Introduction to computers According to the definition, "A computer is a programmable electronic device that takes data, perform instructed arithmetic and logical operations, and gives the output." Main Highlights of Computer are as follows: • A computer is described as an electronic device because; it is made up of electronic components and uses electric energy (such as electricity) to operate. • A computer has an internal memory, which stores data & instructions temporarily awaiting processing, and even holds the intermediate result (information) before it is communicated to the recipients through the Output devices. • It works on the data using the instructions issued, means that, the computer cannot do any useful job on its own. It can only work as per the set of instructions issued. • A computer will accept data in one form and produce it in another form. The data is normally held within the computer as it is being processed. The general meaning of a computer is a machine that can calculate. However, modern computers are not just a calculating device anymore. They can perform a variety of tasks. In simple terms, a computer is a programmable electronic machine used to store, retrieve, and process data. 3.1.1 Evolution of computer The modern computer took its shape with the advent of time. It was around 16th century when the evolution of computer started. The initial computer faced many changes, obviously for the betterment. It continuously improved itself in terms of speed, accuracy, size, and cost to get the shape of the modern-day computer.
  • 2. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 43 3.1.2 Generation of computers This long period of evolution can be conveniently divided into the following phases called computer generations: Generations of Computer Time-Period Evolving Hardware First Generation 1940s – 1950s Vacuum Tube Based Second Generation 1950s – 1960s Transistor Based Third Generation 1960s – 1970s Integrated Circuit Based Fourth Generation 1970s – Present Microprocessor Based Fifth Generation Present – Future Artificial Intelligence Based Let us now discuss the development in Computer Technology over the different generations. First Generation • The period 1940 to 1956, roughly considered as the First Generation of Computer. • The first-generation computers were developed by using vacuum tube or thermionic valve machine. • The input of this system was based on punched cards and paper tape; however, the output was displayed on printouts. • The first-generation computers worked on binary-coded concept (i.e., language of 0-1). • Examples: ENIAC, EDVAC, etc. Second Generation • The period 1956 to 1963 is roughly considered as the period of Second Generation of Computers. • The second-generation computers were developed by using transistor technology. • In comparison to the first generation, the size of second generation was smaller. • In comparison to computers of the first generation, the computing time taken by the computers of the second generation was lesser. Third Generation • The period 1963 to 1971 is roughly considered as the period of Third Generation of computers. • The third-generation computers were developed by using the Integrated Circuit (IC) technology. • The size of the computers of the third generation was smaller. • In comparison to the computers of the second generation, the computing time taken by the computers of the third generation was lesser. • The third-generation computer consumed less power and also generated less heat. • The maintenance cost of the computers in the third generation was also low. • The computer system of the computers of the third generation was easier for commercial use.
  • 3. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 44 Fourth Generation • The period 1972 to 2010 is roughly considered as the fourth generation of computers. • The fourth-generation computers were developed by using microprocessor technology. • By coming to fourth generation, computer became very small in size, it became portable. • The machine of fourth generation started generating very low amount of heat. • It is much faster and accuracy became more reliable. • The production cost reduced to very low in comparison to the previous generation. • It became available for the common people as well. Fifth Generation • The period 2010 to till date and beyond, roughly considered as the period of fifth generation of computers. • By the time, the computer generation was being categorized on the basis of hardware only, but the fifth-generation technology also included software. • The computers of the fifth generation had high capability and large memory capacity. • Working with computers of this generation was fast and multiple tasks could be performed simultaneously. • Some of the popular advanced technologies of the fifth generation include Artificial intelligence, Quantum computation, Nanotechnology, Parallel processing, etc. 3.1.3 Classification of computer Computers are classified based on 3 types as shown below. 3.1.4 Applications of Computers a) Home b) Medical c) Entertainment d) Industries e) Education f) Government g) Banking h) Business i) Training & Art f) Science & Research
  • 4. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 45 3.2 Components of computers a) Hardware (different types of hardware components) Computer hardware includes the physical components of a computer. Personal computers (PCs) are electronic devices that use microchips to process information and may include desktop computers, laptops or tablets. Computer Hardware’s are classified into 3 main groups a) Internal Hardware’s b) Input Hardware’s c) Output Hardware’s Internal Hardware include the following: • Motherboard. This is a printed circuit board that holds the central processing unit (CPU) and other essential internal hardware and functions as the central hub that all other hardware components run through. • CPU. The CPU is the brain of the computer that processes and executes digital instructions from various programs; its clock speed determines the computer's performance and efficiency in processing data. • RAM. RAM: It is temporary memory storage that makes information immediately accessible to programs; RAM is volatile memory, so stored data is cleared when the computer powers off. • Hard drive or Solid-state drive (SSD): Hard disk drives are physical storage devices that store both permanent and temporary data in different formats, including programs, device files, photos, etc. • Optical drive. Optical drives typically reside in an on-device drive bay; they enable the computer to read and interact with nonmagnetic external media, such as compact disc read-only memory or DVD. • Heat-sink. This is a passive piece of hardware that draws heat away from components to regulate/reduce their temperature to help ensure they continue to function properly. • Graphics processing unit. This chip-based device processes graphical data and often functions as an extension to the main CPU. • Network interface card (NIC). A NIC is a circuit board or chip that enables the computer to connect to a network; also known as a network adapter or local area network adapter, it typically supports connection to an Ethernet network Input Hardware components include the following: • Mouse. A mouse is a hand-held pointing device that moves a cursor around a computer screen and enables interaction with objects on the screen. It may be wired or wireless. • Keyboard. A keyboard is an input device featuring a standard QWERTY keyset that enables users to input text, numbers or special characters. • Microphone. A microphone is a device that translates sound waves into electrical signals and supports computer-based audio communications.
  • 5. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 46 • Camera. A camera captures visual images and streams them to the computer or through a computer to a network device. • USB flash drive. A USB flash drive is an external, removable storage device that uses flash memory and interfaces with a computer through a USB port. • Memory card. A memory card is a type of portable external storage media, such as a CompactFlash card, used to store media or data files. Output hardware components include the following: • Monitor. A monitor is an output device similar to a TV screen that displays information, documents or images generated by the computing device. • Printer. Printers render electronic data from a computer into printed material. • Speaker. A speaker is an external audio output device that connects to a computer to generate a sound output. • Headphones, earphones, earbuds. Similar to speakers, these devices provide audio output that's audible only to a single listener. b) Software (System Software, Application Software, E-accessibility Software, Open source, freeware and proprietary software) • The software which is an interface between the application software and the system is the system software. Examples of system software are: Operating System, Programming Language, Communication Software, etc • The application software runs on the platform provided by the system software as per the user’s request. The software is created targeting a specific user task, which does the work for the user. It is also called an application package, as it acts as a bridge between the system software and the end-user. High-level languages like C, Java, VB. Net, are used to build application software. Examples of application software are: Word Doc, Spreadsheet, Database, etc
  • 6. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 47 c) Peripherals (working of keyboard and laser printer) KEYBOARD: A keyboard is one of the main input devices for a computer. It looks similar to a typewriter. It has various keys that when pressed display numbers, letters, and other symbols on the display unit. A keyboard can perform other functions as well when certain combinations of keys are used. • In the middle of each key is a tiny cylindrical bar. On the keyboard are circular holes that the keys fit into. When you push a key, it goes down like a spring and touches the contact layers on the board. The holes are built with small pieces of rubber that push the keys back up. • The above figure shows the contact layers that the keyboards have. These layers are responsible for detecting which key is pressed. The cables inside carry electrical signals from the keyboard to the USB port on the computer. • The contact layers consist of a set of 3 layers of plastic. These are the most crucial elements of the working of the keyboard. The top and bottom layers have metal tracks that can conduct electricity. The layer in between has holes in it and acts as an insulator. These are the holes upon which the keys are fixed. When a key is pressed, the two layers come in contact and produce an electrical signal that is carried to the port on the system. LASER PRINTER: here are many moving parts and components inside a laser printer that work together to produce your final document or image, each have an important part to play. The key parts of the printer include, toner cartridges, image drum (also known as drum unit or photo-conductor), transfer roller or belt, fuser unit, laser, and mirrors. 1. The moment you press print on your computer, tablet or mobile device, the information is sent to the printer memory, where the data is stored temporarily. 2. The printer begins to warm up. This is the point where you usually need to wait, and it’s because the corona wire is heating up and getting ready to pass its positive static charge to the drum. 3. As the drum (coated metal cylinder) begins to roll, it received a positive charge across its whole surface. Some printers contain four drums, one for each colour – Cyan, Magenta, Yellow & Black.
  • 7. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 48 4. The laser activates, and beams against a series of mirrors to reflect across the surface of the drum(s) imprinting the shape of your print using an opposite negative electrical charge. 5. The toner cartridge and hopper sat next to the drum(s) slowly releases positively charged carbon toner particles on to the drum as it turns. The toner is attracted to any areas of negative charge leaving positively charged areas of the drum untouched. 6. The transfer belt rolls the paper through the printer giving it a positive charge. As it passes the drum, the negatively charged toner is attracted to the page in the shape of your print. 7. The toner is then melted to the paper by hot rollers called the fuser unit, and voila, your page is printed. 3.2 Computer Network (Concept Only) Computer Networking is the practice of connecting computers together to enable communication and data exchange between them. In general, Computer Network is a collection of two or more computers. It helps users to communicate more easily. In this article, we are going to discuss the basics which everyone must know before going deep into Computer Networking. The working of Computer Networks can be simply defined as rules or protocols which help in sending and receiving data via the links which allow Computer networks to communicate. Each device has an IP Address, that helps in identifying a device. Basic Terminologies of Computer Networks • Network: A network is a collection of computers and devices that are connected together to enable communication and data exchange. • Nodes: Nodes are devices that are connected to a network. These can include computers, Servers, Printers, Routers, Switches, and other devices. • Protocol: A protocol is a set of rules and standards that govern how data is transmitted over a network. Examples of protocols include TCP/IP, HTTP, and FTP. • Topology: Network topology refers to the physical and logical arrangement of nodes on a network. The common network topologies include bus, star, ring, mesh, and tree. • Service Provider Networks: These types of Networks give permission to take Network Capacity and Functionality on lease from the Provider. Service Provider Networks include Wireless Communications, Data Carriers, etc. • IP Address: An IP address is a unique numerical identifier that is assigned to every device on a network. IP addresses are used to identify devices and enable communication between them. • DNS: The Domain Name System (DNS) is a protocol that is used to translate human-readable domain names (such as www.google.com) into IP addresses that computers can understand. • Firewall: A firewall is a security device that is used to monitor and control incoming and outgoing network traffic. Firewalls are used to protect networks from unauthorized access and other security threats.
  • 8. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 49 3.2.1 Categories / Types of Computers Networks: There are mainly five Categories / types of Computer Networks 1. Personal Area Network (PAN) 2. Local Area Network (LAN) 3. Campus Area Network (CAN) 4. Metropolitan Area Network (MAN) 5. Wide Area Network (WAN) 1. Personal Area Network (PAN) PAN is the most basic type of computer network. This network is restrained to a single person, that is, communication between the computer devices is cantered only on an individual’s workspace. PAN offers a network range of 1 to 100 meters from person to device providing communication. Its transmission speed is very high with very easy maintenance and very low cost. This uses Bluetooth, IrDA, and Zigbee as technology. Examples of PAN are USB, computer, phone, tablet, printer, PDA, etc. 2. Local Area Network (LAN) LAN is the most frequently used network. A LAN is a computer network that connects computers through a common communication path, contained within a limited area, that is, locally. A LAN encompasses two or more computers connected over a server. The two important technologies involved in this network are Ethernet and Wi- fi. It ranges up to 2km & transmission speed is very high with easy maintenance and low cost. Examples of LAN are networking in a home, school, library, laboratory, college, office, etc. 3. Campus Area Network (CAN) CAN is bigger than a LAN but smaller than a MAN. This is a type of computer network that is usually used in places like a school or colleges. This network covers a limited geographical area that is, it spreads across several buildings within the campus. CAN mainly use Ethernet technology with a range from 1km to 5km. Its transmission speed is very high with a moderate maintenance cost and moderate cost. Examples of CAN are networks that cover schools, colleges, buildings, etc.
  • 9. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 50 4. Metropolitan Area Network (MAN) A MAN is larger than a LAN but smaller than a WAN. This is the type of computer network that connects computers over a geographical distance through a shared communication path over a city, town, or metropolitan area. This network mainly uses FDDI, CDDI, and ATM as the technology with a range from 5km to 50km. Its transmission speed is average. It is difficult to maintain and it comes with a high cost. Examples of MAN are networking in towns, cities, a single large city, a large area within buildings, etc. 5. Wide Area Network (WAN) WAN is a type of computer network that connects computers over a large geographical distance through a shared communication path. It is not restrained to a single location but extends over many locations. WAN can also be defined as a group of local area networks that communicate with each other with a range above 50km. Here we use Leased-Line & Dial-up technology. Its transmission speed is very low and it comes with very high maintenance and very high cost. The most common example of WAN is the Internet.
  • 10. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 51 3.3 Protocols of Computers Networks (Application layer) A Protocol; is simply defined as a set of rules and regulations for data communication. Rules are basically defined for each and every step and process at time of communication among two or more computers. Networks are needed to follow these protocols to transmit the data successfully. All protocols might be implemented using hardware, software, or combination of both of them. There are three aspects of protocols given below: • Syntax – It is used to explain data format that is needed to be sent or received. • Semantics – It is used to explain exact meaning of each of sections of bits that are usually transferred. • Timings – It is used to explain exact time at which data is generally transferred along with speed at which it is transferred. Protocol Hierarchies: Generally, Computer networks are comprised of or contain a large number of pieces of hardware and software. To just simplify network design, various networks are organized and arranged as a stack of layers of hardware and software, one on top of another. The number, name, content, and function of each layer might vary and can be different from one network to another. The main purpose of each of layers is just to offer and provide services to higher layers that are present. Each and every layer has some particular task or function. In programming, this concept is very common. The networks are organized and arranged as different layers or levels simply to reduce and minimize complexity of design of network software. Example: Below is diagram representing a five-layer network. The diagram shows communication between Host 1 and Host 2. The data stream is passed through a number of layers from one host to other. Virtual communication is represented using dotted lines between peer layers. Physical communication is represented using solid arrows between adjacent layers. Through physical medium, actual communication occurs. The layers at same level are commonly known as peers. The peer basically has a set of communication protocols. An interface is present between each of layers that are used to explain services provided by lower layer to higher layer.
  • 11. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 52 Advantages of Protocols: • The layers generally reduce complexity of communication between networks • It increases network lifetime. • It also uses energy efficiently. • It does not require overall knowledge and understanding of network. 3.4 Methods of data processing (concepts only) Collection, manipulation, and processing collected data for the required use is known as data processing. It is a technique normally performed by a computer; the process includes retrieving, transforming, or classification of information. However, the processing of data largely depends on the following: • The volume of data that need to be processed • The complexity of data processing operations • Capacity and inbuilt technology of respective computer system • Technical skills • Time constraints Methods of Data Processing Let us now discuss the different methods of data processing. a) Single user programming b) Multiple programming c) Real-time processing d) On-line processing e) Time sharing processing f) Distributed processing a) Single User Programming It is usually done by a single person for his personal use. This technique is suitable even for small offices. b) Multiple Programming This technique provides facility to store and execute more than one program in the Central Processing Unit (CPU) simultaneously. Further, the multiple programming technique increases the overall working efficiency of the respective computer.
  • 12. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 53 c) Real-time Processing This technique facilitates the user to have direct contact with the computer system. This technique eases data processing. This technique is also known as the direct mode or the interactive mode technique and is developed exclusively to perform one task. It is a sort of online processing, which always remains under execution. d) On-line Processing This technique facilitates the entry and execution of data directly; so, it does not store or accumulate first and then process. The technique is developed in such a way that reduces the data entry errors, as it validates data at various points and also ensures that only corrected data is entered. This technique is widely used for online applications. e) Time-sharing Processing This is another form of online data processing that facilitates several users to share the resources of an online computer system. This technique is adopted when results are needed swiftly. Moreover, as the name suggests, this system is time based. Following are some of the major advantages of time-sharing processing − • Several users can be served simultaneously • All the users have almost equal amount of processing time • There is possibility of interaction with the running programs f) Distributed Processing This is a specialized data processing technique in which various computers (which are located remotely) remain interconnected with a single host computer making a network of computer. All these computer systems remain interconnected with a high-speed communication network. This facilitates in the communication between computers. However, the central computer system maintains the master data base and monitors accordingly. 3.5 Computer Security: Types of threats and source of threats Computer security threats are potential threats to your computer’s efficient operation and performance. These could be harmless adware or dangerous trojan infection. As the world becomes more digital, computer security concerns are always developing. A threat in a computer system is a potential danger that could jeopardize your data security. At times, the damage is irreversible. Types of Threats: A security threat is a threat that has the potential to harm computer systems and organizations. The cause could be physical, such as a computer containing sensitive information being stolen. It’s also possible that the cause isn’t physical, such as a viral attack. 1. Physical Threats: A physical danger to computer systems is a potential cause of an occurrence/event that could result in data loss or physical damage. It can be classified as:
  • 13. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 54 • Internal: Short circuit, fire, non-stable supply of power, hardware failure due to excess humidity, etc. cause it. • External: Disasters such as floods, earthquakes, landscapes, etc. cause it. • Human: Destroying of infrastructure and/or hardware, thefts, disruption, and unintentional/intentional errors are among the threats. 2. Non-physical threats: A non-physical threat is a potential source of an incident that could result in: • Hampering of the business operations that depend on computer systems. • Sensitive – data or information loss • Keeping track of other’s computer system activities illegally. • Hacking id & passwords of the users, etc. The non-physical threads can be commonly caused by: (i) Malware: Malware (“malicious software”) is a type of computer program that infiltrates and damages systems without the users’ knowledge. Malware tries to go unnoticed by either hiding or not letting the user know about its presence on the system. You may notice that your system is processing at a slower rate than usual. (ii) Virus: It is a program that replicates itself and infects your computer’s files and programs, rendering them inoperable. It is a type of malware that spreads by inserting a copy of itself into and becoming part of another program. It spreads with the help of software or documents. They are embedded with software and documents and then transferred from one computer to another using the network, a disk, file sharing, or infected e-mail. They usually appear as an executable file. (iii) Spyware: Spyware is a type of computer program that tracks, records, and reports a user’s activity (offline and online) without their permission for the purpose of profit or data theft. Spyware can be acquired from a variety of sources, including websites, instant chats, and emails. A user may also unwittingly obtain spyware by adopting a software program’s End User License Agreement. Adware is a sort of spyware that is primarily utilized by advertising. When you go online, it keeps track of your web browsing patterns in order to compile data on the types of websites you visit. (iv) Worms: Computer worms are similar to viruses in that they replicate themselves and can inflict similar damage. Unlike viruses, which spread by infecting a host file, worms are freestanding programs that do not require a host program or human assistance to proliferate. Worms don’t change programs; instead, they replicate themselves over and over. They just eat resources to make the system down. (v) Trojan: A Trojan horse is malicious software that is disguised as a useful host program. When the host program is run, the Trojan performs a harmful/unwanted action. A Trojan horse, often known as a Trojan, is malicious malware or software that appears to be legal yet has the ability to take control of your computer. A Trojan is a computer program that is designed to disrupt, steal, or otherwise harm your data or network.
  • 14. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 55 (vi) Denial Of Service Attacks: A Denial-of-Service attack is one in which an attacker tries to prohibit legitimate users from obtaining information or services. An attacker tries to make a system or network resource unavailable to its intended users in this attack. The web servers of large organizations such as banking, commerce, trading organizations, etc. are the victims. (vii) Phishing: Phishing is a type of attack that is frequently used to obtain sensitive information from users, such as login credentials and credit card details. They deceive users into giving critical information, such as bank and credit card information, or access to personal accounts, by sending spam, malicious Web sites, email messages, and instant chats. (viii) Key-Loggers: Keyloggers can monitor a user’s computer activity in real-time. Keylogger is a program that runs in the background and records every keystroke made by a user, then sends the data to a hacker with the intent of stealing passwords and financial information. How to make your system secure: In order to keep your system data secure and safe, you should take the following measures: 1. Always keep a backup of your data. 2. Install firewall software and keep it updated every time. 3. Make use of strong and difficult to crack passwords (having capital & small alphabets, numbers, and special characters). 4. Install antivirus/ anti-spyware and keep it updated every time. 5. Timely scan your complete system. 6. Before installing any program, check whether it is safe to install it (using Antivirus Software). 7. Take extra caution when reading emails that contain attachments. 8. Always keep your system updated.
  • 15. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 56 Previous Year Question Papers April / May 2021 6. (a) Classify computers based on purpose and size. (b) Distinguish between system software & application software. (c) Describe the working of Keyboard. SECTION-IV 7. (a) Explain Computer network categories. (b) Describe online data processing method. (c) Explain the functional units of computer with diagram. April / May 2022 SECTION- II 5. (a) ************************************************ (b) Classify computers according to purpose. (c) List different types of system software’s. 6. (a) ************************************************ (b) Explain application layer protocols. (c) List different types of computer hardware components. SECTION-IV 7. (a) In distribution data processing, how data is arranged & processed? (b) Explain functional units of computer with neat block diagram. (c) Classify the following memory as Primary/Secondary: (i) ROM (ii) SRAM (iii) DRAM (iv) HDD (v) CD-R (vi) DVD 8. (a) Explain any 2 cyber securities threats. June / July 2023 SECTION-III 5. (a) *********************************************** (b) ********************************************** 6. (a) Classify computer based on purposes. List any 4 applications of computer. (b) Explain the working of laser printer with diagram. SECTION-IV 7. (a) Define Computer Network. Explain categories of network. (b) Explain the functional units of computer with a neat diagram. 8. (a) Write a note on: (i) Primary Memory (ii) Cache Memory (b) Define Operating System. Explain any two types of Operating System.
  • 16. Vidya Vikas Educational Trust (R), Vidya Vikas Polytechnic 27-128, Mysore - Bannur Road Alanahally,Alanahally Post, Mysuru, Karnataka 570028 Prepared by: Mr Thanmay J.S, H.O.D Mechanical Engineering VVETP, Mysore Page | 57 October / November 2021 SECTION-III 6. (a) Discuss the characteristics of computers. (b) List various applications of computers. (c) List and explain different categories of computer networks. SECTION-IV 7. (a) Explain the following: (i) Single user programming (i) Multi programming