1. The document outlines the course plan for Introduction to IT for the first year BCA class at Punjab College of Technical Education in Ludhiana. It includes 47 total lectures over 11 weeks covering various topics in computer fundamentals, I/O devices, operating systems, and computer applications.
2. Students will have 3 assignments and 3 tests throughout the semester, with evaluations based on marks semester exam, presentations, assignments, and tests.
3. The course will introduce students to basic computer concepts like number systems, computer hardware, operating systems, and applications of computers in various fields to provide foundational knowledge in information technology.
The document provides a course plan for Introduction to IT class of BCA-I section A. It includes details of the total lectures (45), topics to be covered in each lecture, assignments (4) and tests (4) to be given. The evaluation includes marks distribution for mid semester test, tests, presentations and assignments. The topics range from introduction to computers, number systems, input-output devices, storage devices, operating systems, DOS commands, computer networking, internet and intranet.
A device driver allows operating systems and programs to interact with hardware devices. This document discusses device drivers in Linux, including that drivers are loaded as kernel modules, communicate between user and kernel space, and have character, block, and network classes. It provides examples of initializing and removing a sample "memory" driver that allows reading from and writing to a character device memory buffer.
This document provides information to musicians about using social media and online tools to promote their music. It discusses various social networks like Facebook, Twitter, and MySpace that musicians can use to connect with fans. It also covers music streaming and sharing sites like Pandora, Last.fm, and imeem where musicians can distribute their music for fans to listen to. The document provides tips on setting up profiles and using features on these sites to most effectively promote a music career in the digital age.
Goals Unlimited Corporation produces various health and wellness products including alkaline ionized water products, skin lightening soaps, antioxidant supplements, ear candles, washing balls, energy pendants, sanitary pads, drinks, and lotions. The document provides details on 12 products and their ingredients which are presented as having health and wellness benefits.
Introduction,Software Process Models, Project Managementswatisinghal
The document discusses different types of software processes and models used in software engineering. It defines software and differentiates it from programs. It then explains key concepts in software engineering including the waterfall model, prototyping model, incremental/iterative model, and spiral model. For each model it provides an overview and discusses their advantages and limitations.
The document provides a course plan for Introduction to IT class of BCA-I section A. It includes details of the total lectures (45), topics to be covered in each lecture, assignments (4) and tests (4) to be given. The evaluation includes marks distribution for mid semester test, tests, presentations and assignments. The topics range from introduction to computers, number systems, input-output devices, storage devices, operating systems, DOS commands, computer networking, internet and intranet.
A device driver allows operating systems and programs to interact with hardware devices. This document discusses device drivers in Linux, including that drivers are loaded as kernel modules, communicate between user and kernel space, and have character, block, and network classes. It provides examples of initializing and removing a sample "memory" driver that allows reading from and writing to a character device memory buffer.
This document provides information to musicians about using social media and online tools to promote their music. It discusses various social networks like Facebook, Twitter, and MySpace that musicians can use to connect with fans. It also covers music streaming and sharing sites like Pandora, Last.fm, and imeem where musicians can distribute their music for fans to listen to. The document provides tips on setting up profiles and using features on these sites to most effectively promote a music career in the digital age.
Goals Unlimited Corporation produces various health and wellness products including alkaline ionized water products, skin lightening soaps, antioxidant supplements, ear candles, washing balls, energy pendants, sanitary pads, drinks, and lotions. The document provides details on 12 products and their ingredients which are presented as having health and wellness benefits.
Introduction,Software Process Models, Project Managementswatisinghal
The document discusses different types of software processes and models used in software engineering. It defines software and differentiates it from programs. It then explains key concepts in software engineering including the waterfall model, prototyping model, incremental/iterative model, and spiral model. For each model it provides an overview and discusses their advantages and limitations.
The document discusses the software engineering process from a customer's needs to installation at a user's site. It also covers driving forces for software projects, quality attributes, and other characteristics that influence software projects like scale.
This document outlines the course break up plan for BCA-303 (N2) Software Engineering. It lists 46 lecture topics that will be covered over the course, including introductions to software process models, project management concepts, analysis, design, and testing. There are three assignments, three tests, a presentation, and a mid-semester examination that will contribute to the total internal evaluation, which is out of 40 marks.
The document describes several common input and output devices for computers. It discusses traditional mice that use a rolling ball, optical mice that avoid ball cleaning issues, and wireless mice that communicate via Bluetooth. Touchpads are described as pointing devices commonly found in laptops as mouse substitutes. Touchscreens are highlighted as intuitive interfaces used for touch selection in devices like kiosks and ATMs. Additional devices mentioned include trackpoints, trackball mice, light pens, and joysticks.
The document describes several common input and output devices including keyboards, mice with scroll wheels, optical mice, wireless mice, touchpads, touchscreens, mobile devices with touchscreens and keyboards, trackpoint devices, trackball mice, and joysticks. It provides brief descriptions of how each device works and notes that touchscreens are commonly used in information kiosks and ATMs due to their simple, intuitive interface.
The document outlines four sections of must-have items for a music artist's online presence. Section one recommends using FBML, having a ReverbNation and video page, and including MP3 and Flickr files. Section two stresses constant communication, including MP3 links, a custom background, TwitPic, and other links. Section three suggests custom HTML, links, MP3s, videos, a call to action, and clean apps. The final section proposes a complete profile, management link, digital distribution, video links, fan email, and suggestions.
Este documento presenta un estado financiero de una empresa con su activo, pasivo y capital contable. Incluye cálculos de diferentes razones financieras como liquidez, endeudamiento y rentabilidad para analizar la situación financiera de la compañía.
The document discusses different types of software metrics that can be used to measure various aspects of software development. Process metrics measure attributes of the development process, while product metrics measure attributes of the software product. Project metrics are used to monitor and control software projects. Metrics need to be normalized to allow for comparison between different projects or teams. This can be done using size-oriented metrics that relate measures to the size of the software, or function-oriented metrics that relate measures to the functionality delivered.
Course module introduction to computersamandeep0224
This document provides the course plan for the subject "Basics of Computers- I (Practical)" which includes the syllabus, topics to be covered over 25-30 lectures, assignments, tests and grading criteria. The syllabus includes definitions of computer elements, hardware features/uses, software concepts and basic Windows operations. The lectures cover computer components, generations, input/output devices and their types. Tests and assignments will be given on Windows operations, DOS commands and introduction to MS applications like PowerPoint, Word. Students will be graded based on an MSE, assignments, tests, presentation and attendance/performance with specific rules around attendance, late assignments and absenteeism for tests.
This document outlines the course plan for an Introduction to Computers class over 30 lectures. It includes topics that will be covered such as the history of computers, components of computers, operating systems, and Microsoft Office applications. There will be 4 assignments, 4 tests, and a group presentation assigned. Attendance is required for at least 75% of lectures and students will not receive credit if they miss assignment due dates, tests, or their presentation day. The grading breakdown includes tests, assignments, presentations, attendance, and class participation. Suggested reading materials are also provided.
This document provides an overview and instructions for a Blinky LED project using an Arduino. It begins with a list of topics for users to learn before starting the project such as additive color, RGB colorspace, pulse-width modulation, and Arduino basics. The document then recommends connecting the Arduino and running a test "Blink" code before hooking up an LED strip and running a sample code. It provides basic steps for setting up the Arduino and references additional resources for using FastLED and finding components.
This module aims to provide learners with knowledge of computer hardware, systems architecture, and troubleshooting. It covers components, peripherals, installation, maintenance, and analysis. The syllabus includes 12 topics over 12 weeks, including introduction to systems, hardware, software, installation, maintenance, file management, needs analysis, and selection. Learners will understand computer systems, design systems, build and configure systems, and perform routine maintenance.
This document provides an overview of virtual machines, bytecode, and techniques for efficiently executing bytecode. It discusses:
1) How virtual machines simulate processors through bytecode instruction sets and memory management.
2) Bytecode formats and examples of bytecode for operations.
3) Different techniques for executing bytecode like interpretation, threaded code, and just-in-time compilation.
4) Optimizations for method lookup like inline caching and polymorphic inline caching to speed up dynamic method dispatch.
5) Advanced dynamic optimization techniques used in virtual machines like HotSpot that recompile and optimize hot code sections at runtime.
The document discusses principles of input/output (I/O) hardware and software. It covers topics like I/O device controllers that interface between devices and main memory, disk controllers that assemble serial data streams into blocks, video controllers that control monitor hardware, interrupts, direct memory access, programmed I/O, interrupt-driven I/O, I/O software layers, device drivers, character-oriented terminals, graphical user interfaces, network terminals, and power management techniques. The document provides examples and diagrams to illustrate key concepts in I/O systems.
Vulnerability Inheritance in ICS (English)Digital Bond
This document discusses vulnerability inheritance in programmable logic controllers (PLCs) from third-party libraries and software. It provides a specific example of vulnerabilities found in the CoDeSys runtime and engineering software used by hundreds of industrial control system vendors. The document outlines how two major Japanese PLC vendors were found to be affected by these vulnerabilities due to their use of CoDeSys, and concludes that vendors need to implement secure development practices like security testing to prevent inheriting vulnerabilities from third-party components.
The document discusses the software engineering process from a customer's needs to installation at a user's site. It also covers driving forces for software projects, quality attributes, and other characteristics that influence software projects like scale.
This document outlines the course break up plan for BCA-303 (N2) Software Engineering. It lists 46 lecture topics that will be covered over the course, including introductions to software process models, project management concepts, analysis, design, and testing. There are three assignments, three tests, a presentation, and a mid-semester examination that will contribute to the total internal evaluation, which is out of 40 marks.
The document describes several common input and output devices for computers. It discusses traditional mice that use a rolling ball, optical mice that avoid ball cleaning issues, and wireless mice that communicate via Bluetooth. Touchpads are described as pointing devices commonly found in laptops as mouse substitutes. Touchscreens are highlighted as intuitive interfaces used for touch selection in devices like kiosks and ATMs. Additional devices mentioned include trackpoints, trackball mice, light pens, and joysticks.
The document describes several common input and output devices including keyboards, mice with scroll wheels, optical mice, wireless mice, touchpads, touchscreens, mobile devices with touchscreens and keyboards, trackpoint devices, trackball mice, and joysticks. It provides brief descriptions of how each device works and notes that touchscreens are commonly used in information kiosks and ATMs due to their simple, intuitive interface.
The document outlines four sections of must-have items for a music artist's online presence. Section one recommends using FBML, having a ReverbNation and video page, and including MP3 and Flickr files. Section two stresses constant communication, including MP3 links, a custom background, TwitPic, and other links. Section three suggests custom HTML, links, MP3s, videos, a call to action, and clean apps. The final section proposes a complete profile, management link, digital distribution, video links, fan email, and suggestions.
Este documento presenta un estado financiero de una empresa con su activo, pasivo y capital contable. Incluye cálculos de diferentes razones financieras como liquidez, endeudamiento y rentabilidad para analizar la situación financiera de la compañía.
The document discusses different types of software metrics that can be used to measure various aspects of software development. Process metrics measure attributes of the development process, while product metrics measure attributes of the software product. Project metrics are used to monitor and control software projects. Metrics need to be normalized to allow for comparison between different projects or teams. This can be done using size-oriented metrics that relate measures to the size of the software, or function-oriented metrics that relate measures to the functionality delivered.
Course module introduction to computersamandeep0224
This document provides the course plan for the subject "Basics of Computers- I (Practical)" which includes the syllabus, topics to be covered over 25-30 lectures, assignments, tests and grading criteria. The syllabus includes definitions of computer elements, hardware features/uses, software concepts and basic Windows operations. The lectures cover computer components, generations, input/output devices and their types. Tests and assignments will be given on Windows operations, DOS commands and introduction to MS applications like PowerPoint, Word. Students will be graded based on an MSE, assignments, tests, presentation and attendance/performance with specific rules around attendance, late assignments and absenteeism for tests.
This document outlines the course plan for an Introduction to Computers class over 30 lectures. It includes topics that will be covered such as the history of computers, components of computers, operating systems, and Microsoft Office applications. There will be 4 assignments, 4 tests, and a group presentation assigned. Attendance is required for at least 75% of lectures and students will not receive credit if they miss assignment due dates, tests, or their presentation day. The grading breakdown includes tests, assignments, presentations, attendance, and class participation. Suggested reading materials are also provided.
This document provides an overview and instructions for a Blinky LED project using an Arduino. It begins with a list of topics for users to learn before starting the project such as additive color, RGB colorspace, pulse-width modulation, and Arduino basics. The document then recommends connecting the Arduino and running a test "Blink" code before hooking up an LED strip and running a sample code. It provides basic steps for setting up the Arduino and references additional resources for using FastLED and finding components.
This module aims to provide learners with knowledge of computer hardware, systems architecture, and troubleshooting. It covers components, peripherals, installation, maintenance, and analysis. The syllabus includes 12 topics over 12 weeks, including introduction to systems, hardware, software, installation, maintenance, file management, needs analysis, and selection. Learners will understand computer systems, design systems, build and configure systems, and perform routine maintenance.
This document provides an overview of virtual machines, bytecode, and techniques for efficiently executing bytecode. It discusses:
1) How virtual machines simulate processors through bytecode instruction sets and memory management.
2) Bytecode formats and examples of bytecode for operations.
3) Different techniques for executing bytecode like interpretation, threaded code, and just-in-time compilation.
4) Optimizations for method lookup like inline caching and polymorphic inline caching to speed up dynamic method dispatch.
5) Advanced dynamic optimization techniques used in virtual machines like HotSpot that recompile and optimize hot code sections at runtime.
The document discusses principles of input/output (I/O) hardware and software. It covers topics like I/O device controllers that interface between devices and main memory, disk controllers that assemble serial data streams into blocks, video controllers that control monitor hardware, interrupts, direct memory access, programmed I/O, interrupt-driven I/O, I/O software layers, device drivers, character-oriented terminals, graphical user interfaces, network terminals, and power management techniques. The document provides examples and diagrams to illustrate key concepts in I/O systems.
Vulnerability Inheritance in ICS (English)Digital Bond
This document discusses vulnerability inheritance in programmable logic controllers (PLCs) from third-party libraries and software. It provides a specific example of vulnerabilities found in the CoDeSys runtime and engineering software used by hundreds of industrial control system vendors. The document outlines how two major Japanese PLC vendors were found to be affected by these vulnerabilities due to their use of CoDeSys, and concludes that vendors need to implement secure development practices like security testing to prevent inheriting vulnerabilities from third-party components.
This document summarizes NCC Group's research into vulnerabilities in USB device drivers. It begins with a USB primer covering architecture, terminology and the device enumeration process. It then discusses previous work fuzzing USB interfaces and common classes of USB vulnerabilities found. The document outlines NCC Group's three phase USB fuzzing research: Phase 1 used an Arduino fuzzbox; Phase 2 used commercial USB testing equipment; Phase 3 developed "Frisbee" to remotely fuzz hosts. Several vulnerabilities were found across different operating systems. The security impact of exploiting such vulnerabilities is discussed.
Patching Windows Executables with the Backdoor Factory | DerbyCon 2013midnite_runr
Patching Windows Executives with the Backdoor Factory is a presentation about binary patching techniques. It discusses the history of patching, how key generators and Metasploit patch binaries, and how the author learned to manually patch binaries. The presentation then introduces the Backdoor Factory tool, which can automatically patch Windows binaries by injecting shellcode into code caves. It demonstrates patching via code cave insertion, single cave jumps, and cave jumping. Mitigations like self-validation and antivirus are discussed.
Here are some key lessons we can learn from Nokia's downfall:
- Technological innovation moves fast. Companies must continuously invest in R&D to stay ahead of the curve and anticipate emerging trends. Nokia focused too much on its existing Symbian platform.
- Open platforms can gain mass adoption faster. While Nokia's Symbian was proprietary, Android was open source so it was adopted more widely by other manufacturers.
- User experience matters greatly. Early Android and iOS devices offered touchscreen interfaces that were more intuitive than Symbian. Nokia was slow to transition to touch.
- It's risky to rely on any single partner. Nokia bet big on Windows Phone but Microsoft's platform never gained critical mass.
Computers when invented by Charles Babbage only viewed it as a computing machines. However it is only recently that computer has evolved more rapidly. Through its complex systems and processing capabilities computers can be used to manipulate databases.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
This document provides a guidebook for a course on PC hardware, maintenance, and repair. It outlines the course objectives, which include identifying PC components, understanding how PCs operate, troubleshooting hardware issues, installing hardware upgrades, and basic networking skills. It provides a table of contents and chapters to read from the required textbook. The first section of the course will cover basics like electrical power, computer viruses, PC components, POST, boot processes, and guidelines for testing and repairing PCs. Students are provided diagnostic and preparation software to use.
1. Charles Babbage is considered the founder of computers for originating the concept of a programmable computer in the early 19th century with his analytical engine, a precursor to modern computers.
2. Computer generations are defined by the technology used - first generation used vacuum tubes, second used transistors, third used integrated circuits, fourth used VLSI circuits and gave rise to personal computers, and fifth uses ULSI technology and focuses on parallel processing and artificial intelligence.
3. Each generation brought improvements in size, cost, reliability, and speed and allowed new uses through advances in programming languages and operating systems from machine language to time-sharing and networks.
This document outlines the curriculum for a one-year Diploma in Computer Hardware Maintenance and Network Technologies program at Indira Technical Institute in Nashik, India. The program consists of 8 courses covering topics such as digital electronics, computer operation, networking technologies, and computer maintenance. It includes both theory and practical components, with the latter involving hands-on lab work. Upon completion, students will receive a diploma that is recognized by the government of India.
This document provides an introduction to the course "Computer Architecture" taught at Complutense University of Madrid. It discusses the following key points in 3 paragraphs or less:
1) It outlines the various levels of computer description that are studied in the course, from the application level down to the circuit level.
2) It provides a brief historical perspective on computer generations from the first generation using vacuum tubes to modern microprocessor-based systems.
3) It discusses some of the main topics that will be covered in the course, including processor architecture, memory organization, I/O systems, multiprocessors, and interconnection networks.
Webinar: STM32WB - microcontrolador dual-core certificado BLE 5.0Embarcados
STMicroelectronics apresenta a família STM32WB que é o primeiro e único dual-core Cortex-M4 e Cortex-M0 + MCU no mercado certificado Bluetooth Low Energy v5.0 e 802.15.4. Para acompanhar a chegada desses componentes, também estamos lançando o STM32CubeMonRF, uma ferramenta de software para ajudar os desenvolvedores a testar e configurar seu rádio com mais eficiência. Também estamos lançando o P-NUCLEO-WB55, um pacote de desenvolvimento contendo uma placa Nucleo 64 clássica e um dongle USB. Ambos são fornecidos com o aplicativo de demonstração do microcontrolador,onde oferece uma experiência verdadeiramente única, pronta para uso.
Assista o webinar em: https://www.embarcados.com.br/webinars/webinar-stm32wb/
Gowtham Thamilarasu is a senior embedded design engineer at Sparks Automations. The document discusses Arduino and embedded systems. It includes sections on Arduino hardware, programming, digital and analog input/output, serial communication, and examples of using Arduino to control devices like LCD displays and send messages via GSM. The document provides an overview of key Arduino concepts for engineers and programmers.
this is a training ppt of Advance Networking windows 2008 server. any one can use this ppt for training presentations. hardware part is also included in this ppt
The document contains 43 programming problems ranging from basic input/output and arithmetic operations to more complex problems involving loops, conditional statements, series, and pattern printing. The problems cover a wide range of fundamental programming concepts and techniques including variables, data types, arithmetic, conditional statements, loops, functions, patterns, and more.
This document contains two practice tests for an Introduction to IT course. Test A contains three questions - the first asks to draw and explain the block diagram of a computer (10 marks), the second asks to list 5 DOS commands with syntax and examples (5 marks), and the third asks two decimal to binary conversions (5 marks total). Test B follows the same format but contains different questions - describing computer generations (10 marks), listing 5 input devices (5 marks), and performing one decimal to octal and one hexadecimal to binary conversion (5 marks total). Both tests are worth a maximum of 20 marks and are to be completed in 1 hour.
Data scanning devices allow direct data entry into computers from source documents, improving accuracy and timeliness over manual key entry. The main types are image scanners, optical character recognition (OCR) scanners, optical mark readers, bar code readers, and magnetic ink character recognition (MICR) readers. Digitizers are also used to convert pictures, maps, and drawings into digital formats.
The document outlines the course plan for Programming in C at Punjab College of Technical Education in Ludhiana, including topics to be covered such as fundamentals of C, control statements, functions, arrays, structures, pointers, and file handling, along with assignments, tests, references, and sample programs for students. It provides details on the teacher, course code, number of lectures and assignments, topics, schedule, assessments, references, and sample programs for practice.
This document outlines the syllabus for a Software Engineering course. It is divided into two sections - Section A contains 10 short answer questions covering the entire syllabus, worth 20 marks total. Section B contains 6 questions worth 10 marks each, and students must attempt 4 of these questions. The syllabus covers software characteristics and components, software process models, project planning techniques, system analysis methods, software design principles and methodologies, and testing fundamentals and strategies. References for further reading are also provided.
The document discusses the software engineering process from a customer's needs to installation at a user's site. It also covers driving forces for software projects, quality attributes, and other characteristics that influence software projects like scale.
This document outlines the syllabus for a software engineering course. It discusses the internal and external assessment breakdown, with sections A and B on the question paper. Section A contains 10 short answer questions covering the entire syllabus, worth 20 marks total. Section B has 6 questions worth 10 marks each. Students must attempt all of section A and 4 questions from section B. Topics covered in the syllabus include software characteristics, components, and applications, software process models like waterfall and spiral, project management concepts, software estimation techniques, system analysis methods, software design objectives and methodologies, and testing fundamentals and strategies.
1. PUNJAB COLLEGE OF TECHNICAL EDUCATION
LUDHIANA
Course Plan
Class: BCA-I B Subject Name: Introduction to IT
Teacher's Name: Swati Singhal Assignments: 3
Subject Code: BC-101 (N2) Tests: 3
Total Lectures: 47
Evaluation:
MSE: 15 marks Tests: 10 marks
Presentation: 5 marks Assignments: 10 marks
Week Lecture Topics Assignment Test
Number
1 1. Introduction to course module
2. Introduction to Information
Technology
3. Basic Fundamentals Of Computers
• Characteristics of computer
• Types of Computer
4. History Of computers
• Generations of Computers
2 5. Block Diagram(BD) of Computer
Detailed Significance of each parts
of BD
• Input Unit
• Output Unit
• Storage Unit
6. • ALU Test 1-
• Control Unit DOD
• CPU
7. Introduction To Number System Assign 1-
Types Of Number System DOD
• Binary Number System
8. • Octal Number System
2. • Hexadecimal Number
System
3 9. Types Of Number System Assign 1-DOS
• BCD
• EBCDIC
• ASCII
CLASS DISCUSSION
10.
TEST -1
11.
12. Conversion of Number system
• Binary to Decimal
4 13. • Binary to Octal
• Binary to Hexadecimal
14. Conversion of Number system
• Octal to Binary
15. • Hexadecimal to Binary
• Hexadecimal to Octal
16. Input devices Assign 2-
• Keyboard DOD
• Mouse
• Scanner
• Joystick
• Light Pen
5 17. Input devices Test 2-
• Track ball DOD
• Touch screen
• MICR, OMR, OBR
18. Output devices Assign 2-
• Monitor DOS
• Speaker
• Plotters
• Punched Card
19. Printers & their Types
• Impact(Dot Matrix, Daisy
Wheel, Drum & Chain)
3. • Non Impact (Ink Jet, Laser)
6 20. Storage Devices & their types
• Magnetic tape
• Magnetic Disk
21. 1. Optical Disk
2. Mass Storage Device
(Floppy , CD ROM, DVD)
22. What is VDU?
23. Intro. to Memory & Types of
Memory
• RAM,ROM,PROM
7 24. • EPROM,EEPROM E-Assign 3-
DOD
25. CLASS DISCUSSION
26. Test-2
27. Intro to Operating System & its
Types
GUI, CUI
8 28. Various Functions of the Operating
System
• Processor Mgnt.
• Memory Mgnt.
29. Functions of the Operating System E-Assign 3-
• Device Mgnt. DOS
• File Mgnt.
• Security Mgnt
30. Definition of simple batch
processing
• Buffering
• Spooling.
31. Difference b/w Multiprogramming,
Multiprocessing , Timesharing etc
9 32. Real time system and online system
33. What is DOS and its Internal
commands
34. Typical DOS External Commands
35. How to make the Batch Files
10 36. Practice on DOS Commands Assign 4-
DOD
37. Application of Computers in various
fields
4. 38. Intro to Computer & Communication
(Computer Networking, Modes of N/
W)
39. Overview of Topologies of N/W Assign 4-
• Star DOS
• Ring
• Bus
• Mesh
• Tree
11 40. Overview of IP Address
41. Single User, Multi User, Workstation Test 3-
DOD
42. Overview of LAN, WAN,MAN
43. Overview of Modem, E-mail, Fax
12 44. CLASS DISCUSSION
45. Intro. to Internet & Intranet
46. Internet facilities through WWW Test 3
47. Discussion of Previous Question
Papers
5. Practical S/W Lab I
BC-106(N2) Max. Marks
100
Internal Practical 40
External Practical 60
Based on BC 101 & BC 103
Familiarizing with PC and WINDOWS commands, file creation, editing and directory
creation. Mastery of DOS commands.
Learning to use MS Office: MS WORD, MS EXCEL & MS PowerPoint.
6. Introduction to Information Technology
BC-101(N2) Max. Marks 100
Internal Assessment 40
External Assessment 60
Instructions for paper setter
The question paper will consist of two sections A and B. Sections B will have Six
questions and will carry 10 marks each. Section A will have 10 short answer type
questions, which will cover the entire syllabus uniformly and will carry 20 marks in all.
Instructions for Candidates
Candidates are required to attempt four questions from section B and the entire section A.
Use of nonprogrammable scientific calculator is allowed. Use of non-programmable
scientific calculator is allowed.
Computer Fundamentals: Number Systems, History of Computers, Block diagram of
computer & detailed significance of each part.
Study of I/O devices: Keyboard, Hard disk, Floppy disk, CD-ROM, DVD, Plotters,
Scanners, mouse, Printers: Dot matrix, Laser, Thermal Inkjet, VDU.
Primary & secondary memories.
Introduction to Operating Systems & its functions
Definition of Simple batch processing, multiprogramming, multiprocessing, real-time,
time-sharing systems, Concept of Spooling.
Typical DOS commands, making simple batch files.
Application of Computers in various fields: Defense, Industry, Management, Sports,
Commerce, Internet.
Computer and communication: Single user, Multi-user, Workstations, and Overview of
LAN, WAN:
Overview of modem, E-Mail, Fax Internet facilities through WWW
7. REFRENCES
1. Larry long & Nancy long Computers Prentice Hall
2. V.Rajaraman Fundamentals Of Computers Prentice Hall
3. P.K.Sinha Computer Fundamentals
4. Basandra Computer Today
5. Leon & Leon Internet for Everyone