The document discusses computer networks and the internet. It defines a computer network as a group of connected computers that allow communication between them. There are two main types of networks: local area networks (LANs) within a single location, and wide area networks (WANs) connecting multiple locations over greater distances. The document outlines advantages of networks like speed, cost savings, security, and resource sharing. It also discusses internet basics like browsers, websites, email, and search engines.
Learning Outcomes
A Network of Networks
Internet
Define Computer Networks
Define Communication
State Importance of Computer network and communication
Network classification
Types of networks
Comparison of different networks
TCP/IP
Hypertext Transfer Protocol
Internet
A network formed by the co-operative interconnection of a large no. of computer networks.
Since Internet is formed by the interconnection of no. of networks, sometimes its also called as network of networks
This presentation briefly describes the different types of computer networks along with their advantages and disadvantages and comparison between them.
Learning Outcomes
A Network of Networks
Internet
Define Computer Networks
Define Communication
State Importance of Computer network and communication
Network classification
Types of networks
Comparison of different networks
TCP/IP
Hypertext Transfer Protocol
Internet
A network formed by the co-operative interconnection of a large no. of computer networks.
Since Internet is formed by the interconnection of no. of networks, sometimes its also called as network of networks
This presentation briefly describes the different types of computer networks along with their advantages and disadvantages and comparison between them.
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
This Presentation consists of various Network Devices
Hub, Router, Repeater, Bridge, Brouter, Gateway, NIC etc. It is very helpful for B.tech, BCA, MCA, M.Tech students and for those who is interested in networking.
Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code . Common targets for web application attacks are content management systems Web application security is important to any business as it helps to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences . Web applications may face a number of attack types depending on the attacker’s goals, the nature of the targeted organization’s work. A web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface. Web services are web apps by definition and many, although not all, websites contain web apps.
Embedded Systems - IO Programming
In 8051, I/O operations are done using four ports and 40 pins. The following pin diagram shows the details
of the 40 pins. I/O operation operation port reserves reserves 32 pins where each port has 8 pins. The other 8 pins are
designated as V , GND, XTAL1, XTAL2, RST, EA (bar), ALE/PROG (bar), and PSEN (bar).
It is a 40 Pin PDIP (Plastic Dual Inline Package)
I/O Ports and their Functions
The four ports P0, P1, P2, and P3, each use 8 pins, making them 8-bit ports. Upon RESET, all the ports
are configured onfigured as inputs, inputs, ready to be used as input ports. When the first 0 is written written to a port, it becomes becomes
an output. To reconfigure it as an input, a 1 must be sent to a port.
Port 0 (Pin No 32 – Pin No 39)
Dual Role of Port 0 and Port 2
Embedded systems tools & peripherals
Compilers and Assemblers
Cross-Compiler
Compiler
Decompiler
Language Converter
Assemblers
Debugging Tools in an Embedded System
Simulators
Functions of Simulators
Emulators
Peripheral Devices in Embedded System
Criteria for Choosing Microcontroller
Importance of reading and its types.
Reading is a complex cognitive process of decoding symbols in order to construct or derive meaning (reading comprehension). Reading is a means of language acquisition, communication, and of sharing information and ideas. Like all languages, it is a complex interaction between the text and the reader which is shaped by the reader’s prior knowledge, experiences, attitude, and language community which is culturally and socially situated
Negative amplifiers and its types Positive feedback and Negative feedbackimtiazalijoono
Negative amplifiers
What is Feedback?
Positive feedback
Negative feedback
Feedback Circuit
Principles of Negative Voltage Feedback In Amplifiers
Gain of Negative Voltage Feedback Amplifier
Advantages of Negative Voltage Feedback
Principles of Negative Current Feedback
Current Gain with Negative Current Feedback
Multistage amplifiers and Name of coupling Name of multistage amplifierimtiazalijoono
MULTISTAGE AMPLIFIERS
Name of coupling Name of multistage amplifier
1) RC coupling R-C coupled amplifier
2) Transformer coupling Transformer coupled amplifier
3) Direct coupling Direct coupled amplifier
Loop Introduction for Loop while Loop do while Loop Nested Loops Values of...imtiazalijoono
loop
Outline
• Introduction
• for Loop
• while Loop
• do while Loop
• Nested Loops
• Values of functions and assignment expressions
• break and continue Statements
Programming Fundamentals and basic knowledge imtiazalijoono
Programming Fundamentals
Outline
• Course introduction
• Programming languages concepts
• C Programming Basics
• Machine languages
• Assembly languages
• High-level languages
Basic Structure of C Program
Programming Fundamentals Functions in C and typesimtiazalijoono
Programming Fundamentals
Functions in C
Lecture Outline
• Functions
• Function declaration
• Function call
• Function definition
– Passing arguments to function
1) Passing constants
2) Passing variables
– Pass by value
– Returning values from functions
• Preprocessor directives
• Local and external variables
C Building Blocks
• Variable and Types of Variables
• Input Functions: scanf() and getche()
• Arithmetic Operators
– Arithmetic Assignment Operators
– Increment/Decrement Operators
• Relational Operators
• Comments in C
Programming Fundamentals Arrays and Strings imtiazalijoono
Programming Fundamentals
Arrays and Strings
• Arrays
• Initializing arrays
• Multidimensional arrays
• Arrays as arguments to functions
• Strings
• String functions
Accessing Individual Components
Declaring Arrays
Arrays: Example Garbage
Multidimensional Arrays
1) Write a C program using arrays that produces the multiplication of two 2x2 matrices.
3-Dimensional Array
Write a program of your own choice that makes use of arrays of more than 2 dimensions.
2-Dimensional Arrays
Programming Fundamentals and Programming Languages Concepts Translatorsimtiazalijoono
Programming Fundamentals and Programming Languages Concepts
Translators
Types of Translators
Assembler
Compiler
Simple C Program
Basics of C Environment
Executing a C Program
Executing a C Program
Programming Fundamentals and Programming Languages Conceptsimtiazalijoono
Programming Fundamentals:
What is a Computer?
Software & Hardware?
Operating System
Programming Languages Concepts
Why do we need programming languages?
Why C Still Useful?
Array
Introduction
One-dimensional array
Multidimensional array
Advantage of Array
Write a C program using arrays that produces the multiplication of two matrices.
NTRODUCTION TO COMPUTER PROGRAMMING Loop as repetitive statement,imtiazalijoono
INTRODUCTION TO COMPUTER PROGRAMMING
Loop as repetitive statement, For loop/statement.
While loop statement and do while loop statement.
Variable Types, Data types, ranges and width.
INTRODUCTION TO COMPUTER PROGRAMMING
Decisions in C, simple if, if-else, else if and switch statement,
Nested if and switch.
Manual expression to Computer Expressions
Operators, Arithmetic and Arithmetic assignment operators
COMPUTER PROGRAMMING
INTRODUCTION TO COMPUTER PROGRAMMING
1) Comments in C, Program Style, Round one, format specifiers.
2) Variable, identifiers or Names in C and CONSTANTS IN C
3) Working with variable, identifiers or Names in C etc
Escape Sequences
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
1. 137
COMPUTER NETWORK
DEFINATION:
“A computer network is a group of computers which are connected together to allow
communication between them.”
TYPES OF NETWORK
There are two main types of network:
LAN
WAN
LOCAL AREA NETWORK (LAN):
Definition: “A network which is located entirely on one site such as an office, school or within a
group of buildings that is in close proximity that is connected together.”
2. 138
WIDE AREA NETWORK (WAN):
“A network which connects together computers on a number of sites in different areas”.
A WAN or Wide Area Network is a group of widely dispersed computers that are connected
together. These could be across the same town or across a country or even across the world”.
Apart from distance, the other feature that distinguishes as WAN from a LAN is that the WAN
would make use of a range of communication technologies such as telephone, microwave and
satellite links.
Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of
minutes, without paying enormous phone bills. A WAN is complicated.
3. 139
ADVANTAGES OF NETWORK
SPEED.
Networks provide a very rapid method for sharing and transferring files. Without a network, files
are shared by copying them to memory cards or discs, then carrying or sending the discs from
one computer to another. This method of transferring files can be very time-consuming.
COST.
Network able versions of many popular software programs are available at considerable savings
when compared to buying individually licensed copies.
SECURITY.
Files and programs on a network can be designated as "copy inhibit," so that you do not have to
worry about illegal copying of programs. Also, passwords can be established for specific
directories to restrict access to authorized users.
CENTRALIZED SOFTWARE MANAGEMENT.
One of the greatest benefits of installing a network at a school or university is the fact that all of
the software can be loaded on one computer (the file server). This eliminates that need to spend
time and energy installing updates and tracking files on independent computers throughout the
building.
RESOURCE SHARING.
Sharing resources is another advantage of school/ university networks. Most organizations
cannot afford enough laser printers, fax machines, modems, scanners, and CD players for each
computer. However, if these or similar peripherals are added to a network, they can be shared by
many users.
ELECTRONIC MAIL.
The presence of a network provides the hardware necessary to install an e-mail system. E-mail
aids in personal and professional communication for all personnel, and it facilitates the
dissemination of general information to the entire staff. Electronic mail on a LAN can enable
students to communicate with teachers and peers at their own institute. If the LAN is connected
to the Internet, we can communicate with others throughout the world.
4. 140
FLEXIBLE ACCESS.
Networks allow users to access their files from computers throughout the institute. Like Students
can begin an assignment in their classroom, save part of it on a public access area of the network,
and then go to the media center after school to finish their work. Students can also work
cooperatively through the network.
WORKGROUP COMPUTING.
Collaborative software allows many users to work on a document or project concurrently. For
example, educators located at various schools within a country could simultaneously contribute
their ideas about new curriculum standards to the same document, spreadsheets, or website.
NETWORK TOPOLOGY
Network topology refers to the layout used to wire the computers together.
TYPES OF TOPOLOGY
There are three main topologies that are used.
1. BUS
2. STAR
3. RING
BUS TOPOLOGY
Each computer is connected to a single cable which connects all of the computers. All nodes (file
server, workstations, and peripherals) are connected to the linear cable.
5. 141
Advantages of Bus Topology
Easy to connect a computer or peripheral to a linear bus.
Requires less cable length than a star topology.
Disadvantages of a Bus Topology
Entire network shuts down if there is a break in the main cable.
Terminators are required at both ends of the backbone cable.
Difficult to identify the problem if the entire network shuts down.
Not meant to be used as a stand-alone solution in a large building.
STAR TOPOLOGY
“All communication takes place via a central computer or HUB device.”
A star topology is designed with each node connected directly to a central network hub, switch,
or concentrator.
Data on a star network passes through the hub, switch before continuing to its destination. The
hub, switch, or concentrator manages and controls all functions of the network. It also acts as a
repeater for the data flow.
Advantages of a Star Topology
• Easy to install and wire.
• No disruptions to the network then connecting or removing devices.
• Easy to detect faults and to remove parts.
6. 142
Disadvantages of a Star Topology
• requires more cable length than a linear topology.
• If the hub or concentrator fails, nodes attached are disabled.
• More expensive than bus topologies because of the cost of the HUB device.
RING TOPOLOGY
Each computer is connected to the two computers on either side of it. The last computer is linked
to the first to form a ring.
Advantages of a Ring Topology
• Easy to install and wire.
• Equal Access to devices no one computer will use all the bandwidth
• Easy to detect faults and to remove parts.
7. 143
Disadvantages of a Ring Topology
• Slow since signals goes in sequential order
• If the concentrator fails, nodes attached are disabled.
• Single break in cable can disrupt the flow of network.
INTERNET
DEFINATION:
Internet is global “Network of Networks”. The internet is a worldwide public network of
computers on which people can join and use multiple services such as sharing of information.
By internet users at any one computer can get information from any other computer.
HISTORY OF INTERNET
It was developed by the United States Defense Advanced Research Projects Agency in the 1970s
and was initially known as ARPANET. The Internet was designed to be used by companies and
Universities doing military research so that they could share information. Since then the number
of people who use the Internet and the services that are provided on the Internet have grown
tremendously. There are now over 200,000,000 or more people who regularly/simultaneously
make use of it.
8. 144
CONNECTING METHODS TO THE INTERNET
To connect to the Internet the following are needed:
a computer
telephone line
modem and/or router
an ISP (Internet Service Provider)
Web browser, e.g. Internet Explorer, Fire fox, Chrome, Safari, Opera etc.
WHAT IS MODEM?
A device which converts analog signals into digital signals and digital signals into analog for
transmission of data over internet.
9. 145
WHAT IS WEB BROWSER?
Web Browser is Software used to display the Web pages. Internet explorer is an example of web
browser.
Here are some types of web browser:
Internet explorer
Fire fox
Chrome
Safari
Opera
10. 146
WHAT IS WEB SITE ADDRESS?
Every web site has a specific address which is also called URL that is Uniform Resource
Locator.
EXAMPLE:
http://www.paknews.com
HTTP: Hyper Text Transfer Protocol, is rule to send and receive text on internet
WWW: World Wide Web, It consists of a large number of web servers that host websites. Each
website will normally consist of a number of web pages. A web page can contain text, images,
video, animation and sound.
Paknews: Domain Name
Com: type of web site there are many other types of web sites like
Pak: Pakistan
Edu: education
Mil: military
Gov: govt
Com: commercial
ADVANTAGES OF INTERNET
There many advantages of using the internet such as:
Email
Sharing Information
Services
Buy or sell products
Communities
News
Searching jobs
Advertisement
11. 147
Communication
Entertainment
Online education
Online education and research
DISADVANTAGES OF INTERNET
Although there are huge advantages of internet but there is always another side of picture.
So internet has some disadvantages like
Viruses
Security problem
Many information is not accurate
Wastage of time
And many more………
EMAIL
Electronic Mail (email) is a system which allows users of a computer network to send messages
to each other. Users can usually:
Send a message to another user, or group of users.
Keep their messages in a mailbox.
Read, print and delete messages from their mailbox.
It is not only typewritten messages that can be sent using Electronic Mail. Pictures, music,
videos, in fact almost any sort of information you can think of, can also be sent.
Each user has to have his or her own address that other users need to know to send messages to
him or her.
Electronic mail is good because it is much faster that the ordinary post. It is also very accessible
since you can read your email on any suitable computer anywhere in the world. On the other
hand not everybody has an electronic mailbox at the moment, so you cannot use email to send
messages to everyone, and you certainly can’t send a parcel by email.
There are many email service provider companies which allow any user to send and receive
electronic mail like
13. 149
WHAT IS SEARCH ENGINE
“Internet search engines are special sites on the Web that are designed to help people find
information stored on other sites.”
Tools are available for finding information especially on the Internet or World Wide Web.
Search engines are essentially massive databases that cover wide swaths of the Internet. Search
engines are the primary method Internet surfers use to locate information on the Web.
We can search any information by use of search engines. There are thousands of different search
engines to help people navigate the Internet. These include major commercial search engines—
like Google, Yahoo!, Lycos, AltaVista, and Excit, as well as many smaller, industry-specific
directories. There are even Meta searchers, which work by querying a number of other search
engines and processing the results.
Many of the major search engines are created through an automated process in which a program
called a spider "crawls" across the Web to gather information about existing sites. The spider
captures this basic information and organizes its findings into categorizes, which are then used to
generate search results for users. Small businesses hoping to list an existing Web site with a
major search engine may find that the process has already been completed for them by an
automated spider
Major search engines URLs are define below:
Yahoo!: www.yahoo.com
Google: www.google.com
Alta vista: www.altavista.com
Lycos: www.lycos.com
Msn: www.msn.com