4. The computer comes from the word compute
which means to calculate .Hence people
usually consider a computer to be a calculating
device that can perform arithmetic operation at
high speed.
5. Speed:- Computer can perform billion (109)
arithmetic operation in one second.
Accuracy:-Gives right and accurate
information.
Versatility:- Perform various task.
Diligence:-Free from tiredness.
No Feeling
No IQ
8. ALU Accumulator
General register
Control Unit
Memory
Auxiliary Memory
Input
Output
Figer 1. Digital computer
CPU
9. Register
Cache
Main memory
Disk cache
Magnetic disk
1-2ns
3-50ns
30-90ns
5-20ms
Optical disk Magnetic tape
Figer 2. Memory Hierarchy
Offline
Most costly
System
Less costly
10. Internet:- Network of networks.
Internet is based upon the need to share information
between two or more computers. This is done by
interconnecting or networking the computers. The
computers may be connected through various media
as optical fibers, telephone lines and satellite systems.
The internet is a decentralized global network of
various networks.
11. 1.LAN (Local Area Network)
2.MAN (Metropolitan Area Network)
3.WAN (Wide Area Network)
14. Mail refers to the sending and receiving of documents
in electronic form from one computer to another
computer .Every recipient or user must have an Email
address .This mail address is used to send and receive
the mail . The email is delivered to the inbox of the
user.
15. Senders ISP
Senders computer
Receivers ISP
Mail server of
receivers ISP
Receivers
computer
Internet
Telephone lines
16. If the buying and selling of product’s and other related
activities of business are conducted with the help of
internet then known as Ecommerce .
Other names of ecommerce are:-
1. Electronic trading
2. Electronic business
3. Electronic Marketing
17. 1. B to B (Business to business)
2. B to C (Business to customer)
3. B to G (Business to Government)
*B to B:- business alliance between different companies
for their mutual benefit.
• B to C:- Shopping on internet.
• B to G:- Governments departmental website.
18. From credit cards and debit cards.
Authorization
Bank Credit cards processor
Bill
Customer Company
Result of
verification
Verification
Credit cards
19. Fire wall are the hardware or software that are placed
on the gateway.
Fire wall is used to protect the network from the outer
side world against any unauthorized access to the
network.
The most common way to doing to this is by placing a
computer at the gateway , which verifies the
authenticity of the user fire wall is also known as
secure internet gateway.