Computer Testbook
Computer Testbook
Programming Language
• Computer Programming is a set of instructions that helps the developer to perform
certain tasks that return the desired output for the valid inputs.
• The computer requires storage to store this information and the storage is called
Memory.
• Output Devices: These are the computer hardware devices that help in converting
information into human-readable form. Some of the output devices include Visual
Display Units (VDU) such as a Monitor, Printer, Graphics Output devices, Plotters,
Speakers, etc.
• A developer can analyse the problem and come up with simple steps to achieve a
solution to this problem, for which he/she uses a programming algorithm. This can
be compared to a recipe for a food item, where ingredients are inputs and finished
delicacy is the output required by the client.
• Based on the client’s requirements, the solution required could be desktop, web or
mobile-based
2. Source code: Source code is the actual text that is used to construct the program
using the language of choice.
For Example, it is mandatory to have the main method in Java and the text used is
as shown below.
public static void main(String arg[ ]) {
//Steps to be performed
}
3. Compiler: Compiler is a software program that helps in converting the source code
into binary code or byte code, also called machine language, that is easy for a
computer to understand, and can be further executed using an interpreter to run the
program.
4. Data Type: Data used in the applications can be of a different type, it can be a
whole number (integer), floating-point (decimal point numbers), characters or
objects. For Example, double currency = 45.86, where double is a data type used
for storing numbers with decimal points.
5. Variable: Variable is a space holder for the value stored in the memory and this
value can be used in the application. For Example, int age = 25, where age is a
variable.
6. Conditionals: Knowledge of how to use a certain condition, such that a set of code
should execute only if a certain condition is true. In case of a false condition, the
program should exit and should not continue the code further.
7. Array: Array is the variable that stores elements of a similar data type. Knowledge
of using an array in coding/programming will be a great benefit.
8. Loop: Loop is used to execute the series of code until the condition is true. For
Example, in Java, loops can be used as for loop, do-while, while loop or enhanced
for loop.
The code for loop is as shown below:
for (int I =0; i<10; i++) {[Link](i); }
10. Class: Class is like a template that contains state and behaviour, which
corresponding to programming is field and method. In Object-Oriented languages
like Java, everything revolves around Class and Object.
Programming
Popularity Practical Applications of Languages
Language
Programming
Popularity Practical Applications of Languages
Language
The selection of particular programming languages depends on many factors such as:
Low-level Language
• Hardware dependent
• Difficult to understand
High-level Language
• Independent of hardware
• Their codes are very simple and developers can read, write and debug as they are
similar to English like statements.
1. Input: Data can be input using the keyboard, touch screen, text editor, etc. For
Example, to book a flight, the user can enter his login credentials and then select a
departure date and return date, the number of seats, starting place and destination
place, Name of Airlines, etc., from desktop, laptop or mobile device.
2. Output: Once authenticated, and upon receiving the request to book the tickets with
the mandatory inputs, a confirmation of booking for the selected date and destination
will be displayed on the screen, and a copy of the tickets and invoice information is
sent to the user’s registered email id and mobile number.
3. Arithmetic: In case of flight booking, update of the number of seats booked and
those seats need some mathematical calculations, further name of the passenger,
no. of seats reserved, date of journey, journey start date, and starting place,
destination place, etc. should be filled into the airlines server database system.
5. Looping: It is required to repeat /perform the task until the condition holds. Types of
loops can be While loop, Do-while loop, For loop.
For Example,
[Link](i);
OSI Model
Overview
OSI stands for Open System Interconnection is a reference model that describes how information from
a software application in one computer moves through a physical medium to the software application in
another computer.
OSI consists of seven layers, and each layer performs a particular network function.
OSI model was developed by the International Organization for Standardization (ISO) in 1984, and it is now
considered as an architectural model for the inter-computer communications.
OSI model divides the whole task into seven smaller and manageable tasks. Each layer is assigned a partic-
ular task.
Each layer is self-contained, so that task assigned to each layer can be performed independently.
The Open Systems Interconnection (OSI) model describes seven layers that computer systems use to
communicate over a network.
It was the first standard model for network communications, adopted by all major computer and
telecommunication companies in the early 1980s.
The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the OSI 7-layer
model is still widely used, as it helps visualize and communicate how networks operate, and helps isolate
and troubleshoot networking problems.
OSI was introduced in 1983 by representatives of the major computer and telecom companies, and was
adopted by ISO as an international standard in 1984.
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical Layer
The lowest layer of the OSI reference model is the physical layer. It is responsible for the actual physical
connection between the devices.
It deals with a electrical and mechanical specifications of the interface and transmission medium (type of
medium).
It is responsible for transmitting individual bits from one node to the next.
Bit representation encode bits(0’s and 1’s) into electrical or optical signals
Synchronizing the sender and receiver clocks(both are not have same bit rate).
Physical Topology how devices are connected – ring, star, mesh, bus topology
divides the stream of bits received from network layer into manageable data
Farming
units called frames
Add a header to the frame to define the physical address of the source and the
Physical Addressing
destination machines(MAC
If the receiver is less than rate of at which data are produced in the sender.[The
Flow Control
flow control mechanism to avoid overwhelming the receiver
When two (or) more devices connected to the same link, then this layer
Access Control
protocol determine which devices has control over the link at any given time
Network Layer
The main aim of this layer is to deliver packets from source to destination across multiple links (networks).
If two computers (system) are connected on the same link, then there is no need for a network layer.
It routes the signal through different channels to the other end and acts as a network controller.
It also divides the outgoing messages into packets and to assemble incoming packets into messages for
higher levels.
2. Routers and gateways operate in the network layer. Mechanism is provided by Network Layer for
routing the packets to final destination.
3. Connection services are provided including network layer flow control, network layer error control and
packet sequence control.
Transport layer
Layer 4 of the OSI Model: Transport Layer provides transparent transfer of data between end users,
providing reliable data transfer services to the upper layers.
The transport layer controls the reliability of a given link through flow control, segmentation and de-
segmentation, and error control.
3. Connection Control
5. Flow control.
6. Error Control.
Session Layer
Layer 5 of the OSI Model: Session Layer is the layer of the ISO Open Systems Interconnection
(OSI) model that controls the dialogues (connections) between computers.
It establishes, manages, and terminates the connections between the local and remote application.
Authorization: Authorization is the process of determining the user's authority to access the data. The
session layer determines whether the device has permission to access those data elements or not.
Dialog control – allows two systems to enter into a dialog, keep a track of whose turn it is to transmit
Presentation Layer
The presentation layer formats or translates data for the application layer based on the syntax or
semantics that the application accepts. Because of this, it at times also called the syntax layer.
This layer can also handle the encryption and decryption required by the application layer
2. Data Encryption and Decryption: Data encryption is the process of converting a plain text into cypher text
for security. Encryption is applied to the data at the sender's side. Data decryption is the process of
converting a ciphertext into plain text. It is applied to the data at the receiver's side. The presentation layer
uses the SSL(Secure Socket Layer) for data encryption and decryption.
3. Data Compression: Data compression is the process of reducing the number of bits in the data. It can
either be lossy or lossless in nature. Lossless compression is mostly preferred for some important data
items.
Application Layer
The Application layer is the topmost layer of the OSI model. This layer is mostly used by the network
applications, that use the network.
It mainly acts as an interface between the user and the network services.
The Application layer provides services for network applications with the help of protocols. Some of the
most widely used application layer protocols are HTTP, HTTPS, FTP, NFS, DHCP, FMTP, SNMP, SMTP,
Telnet, etc.
Web Surfing: Web surfing is possible only in the application layer. Some protocols like HTTP (Hypertext
Transfer Protocol), HTTPs (Hypertext Transfer Protocol Secure), etc. enables web surfing.
Emails: Electronic-mails can be sent from one device to another on the network only through the
application layer. Some protocols like SMTP (Simple Mail Transfer Protocol), etc. are used for sending
emails over the network.
Network Virtual Terminal: The Application layer facilitates the remote host login in the network with
the help of protocols like Telnet, etc. It can also be referred to as the software version of the physical
terminal in the network.
Markup Languages
HyperText Markup Language.
Web page developer puts brief codes called tags in the page to indicate how the page should be
formatted.
XML
Extensible Markup Language.
Other Facts
BASIC means Beginner's All purpose symbolic instruction code
ALGOL is a high level language designed specially for programming Scientific Computations.
PHP (Hypertext Preprocessor): PHP is a server side scripting language that is embedded in HTML. It
is used to manage dynamic content, databases, session tracking, even build entire e-commerce sites.
It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of
the OSI model. It contains four layers, unlike seven layers in the OSI model
The TCP/IP reference model has four layers: Network interface, Internet, Transport, and Application.
OSI model is a generic model that is based upon functionalities of each layer. TCP/IP model is a protocol-
oriented standard.
OSI model distinguishes the three concepts, namely, services, interfaces, and protocols. TCP/IP does not
have a clear distinction between these three.
OSI model gives guidelines on how communication needs to be done, while TCP/IP protocols layout
standards on which the Internet was developed. So, TCP/IP is a more practical model.
In OSI, the model was developed first and then the protocols in each layer were developed. In the TCP/IP
suite, the protocols were developed first and then the model was developed.
The OSI has seven layers while the TCP/IP has four layers.
Number System
Number systems are the technique to represent numbers in the computer system
architecture, every value that you are saving or getting into/from computer memory
has a defined number system.
Representation
Table of the Numbers Systems with Base, Used Digits, Representation, C language
representation:
int
Binary 2 0,1 (11110000)2
val=0b11110000;
Octal 8 0,1,2,3,4,5,6,7 (360)8 int val=0360;
Decimal 10 0,1,2,3,4,5,6,7,8,9 (240)10 int val=240;
0,1,2,3,4,5,6,7,8,9
Hexadecimal 16 , (F0)16 int val=0xF0;
A,B,C,D,E,F
To convert Number system from Decimal Number System to Any Other Base is
quite easy; you have to follow just two steps:
1. Divide the Number (Decimal Number) by the base of target base system (in
which you want to convert the number: Binary (2), octal (8) and Hexadecimal
(16)).
2. Write the remainder from step 1 as a Least Signification Bit (LSB) to Step
last as a Most Significant Bit (MSB).
Binary Number is
(11000000111001)2
Octal Number is
(30071)8
Example 1
Hexadecimal Number is
Decimal Number is : (12345)10 (3039)16
Hexadecimal Number is
(2D5)16
Example 2 Convert
Decimal Number is : (725)10 10, 11, 12, 13, 14, 15
to its equivalent...
A, B, C, D, E, F
To convert Number System from Any Other Base System to Decimal Number
System, you have to follow just three steps:
1. Determine the base value of source Number System (that you want to
convert), and also determine the position of digits from LSB (first digit’s
position – 0, second digit’s position – 1 and so on).
2. Multiply each digit with its corresponding multiplication of position value and
Base of Source Number System’s Base.
5. And then add each value of step D, resulted value is the Decimal
Number.
=512+208+5
=725
Decimal Number is: (725)10
IP Address
IP address is an exclusive logical address given to a device available on the
network. An IP address exhibits the given properties:
IP address is the unique address assigned to each host present on Internet.
IP address is 32 bits (4 bytes) long.
IP address consists of two components: network component and host
component.
Each of the 4 bytes is represented by a number from 0 to 255, separated with
dots. For example [Link]
IP address is 32-bit string while domain names are easy to remember
characters. For example, when we enter an email address we always enter a
symbolic string such as webmaster@[Link].
Absolute URL
Absolute URL is the entire address of a resource available on the web. This
completed address consists of protocol utilized, server name, path name and file
name.
For example http:// [Link]/[Link]. where:
http is the protocol.
[Link] is the server name.
[Link] is the file name.
The protocol side defines the web browser how to execute the file. Just like that we
have some different protocols also that can be utilized to create URL are:
FTP
https
Gopher
mailto
News
Relative URL
Relative URL is half of the address of a webpage. Different from an absolute URL,
the protocol and server part are neglected from relative URL.
Relative URLs are useful for internal links i.e. to create links to file that are
component of same website as the Webpages on which user is creating the link.
for linking web pages on different websites For linking web pages within the same website.
transforms when the server name or directory Stays same even if we change the server name
name changes or directory name.
Domain Names
Domain Name is a symbolic string related with an IP address. There are different
domain names available; some of them are generic such as com, Edu, gov, net etc,
while some country level domain names such as au, in, za, us etc.
The given table shows the Generic Top-Level Domain names:
Edu Education
Considering above diagram every sub tree reflects a domain. Every domain can be
segmented into sub domains and these can be further segmented and so on.
Name Server
Name server consists of DNS database. This database contains many names and
their corresponding IP addresses. As it is not possible for an individual server to
maintain entire DNS database, therefore, the information is shared among many
DNS servers.
Hierarchy of server is the hierarchy of names.
Whole name space is segmented into the zones
Zones
Zone is aggregation of nodes
(sub domains) under the main
domain. The server keeps a
record of a database called
zone file for every zone.
If the domain is not further
segmented into sub domains
then domain and zone reflects
the same thing.
The information related to the
nodes in the sub domain is
saved in the servers at the lower levels. However, the initial server stores reference
to these lower levels of servers.
Root Server
Root Server is the topmost level server which contains the complete DNS tree. It
does not maintain the information related to domains but delegates the authority to
the other server.
Primary Servers
Primary Server maintains a file about its zone. It has authority to develop, maintain,
and update the zone file.
Secondary Server
Secondary Server shifts entire information about a zone from another server which
can be primary or secondary server. The secondary server does not have
permission to create or update a zone file.
DNS Working
DNS transforms the domain name into IP address automatically. Given steps will
take user through the steps included in domain resolution process:
When we type [Link] into the browser, it asks the local DNS Server for
its IP address.
When the local DNS fails to find the IP address of requested domain name, it
transfers the request to the root DNS server and again enquires about IP address of
it.
The root DNS server replies with delegation that I do not know the IP address of
[Link] but know the IP address of DNS Server.
The local DNS server then asks the com DNS Server the same question.
The com DNS Server replies the same that it does not know the IP address of
[Link] but knows the address of [Link].
Then the local DNS asks the [Link] DNS server the same question.
Now, the local DNS sends the IP address of [Link] to the computer that
sends the request.
Internet Connectivity
Internet Service Providers (ISP)
Internet Service Provider (ISP) is a network company offering access to internet.
They offer different services:
Internet Access
Domain name registration
Dial-up access
Leased line access
ISP Types
ISPs can broadly be categorised into six segments as shown in the given diagram:
Access Providers
They provide accessibility to web through telephone lines, cable wi-fi or fiber optics.
Mailbox Providers
Such providers offer mailbox hosting facilities.
Hosting ISPs
Hosting ISPs provides e-mail, and other web hosting facilities such as virtual
machines, clouds etc.
Virtual ISPs
Such ISPs offer internet accessibility through other ISP services.
Free ISPs
Free ISPs do not seek money for internet services.
Connection Types
There are multiple methods to connect to the internet. Given are some of these
connection types available:
1. Dial-up Connection
2. ISDN
3. DSL
4. Cable TV Internet connections
5. Satellite Internet connections
6. Wireless Internet Connections
Dial - Up Connection
Dial-up connection utilizes telephone line to let PC access the internet. It requires a
modem to establish dial-up connection. This modem acts as a mediator between PC
and the telephone line.
There is also a communication program that aids the modem to process a calling
facility to specific number provided by an ISP.
Dial-up connection uses following protocols:
1. Serial Line Internet Protocol (SLIP)
2. Point to Point Protocol (PPP)
The given diagram shows the accessing internet using modem:
ISDN
ISDN is a short form of Integrated Services Digital Network. It creates the connection
using the phone lines which transfers digital signals in place of analog signals.
There are two methods to deliver ISDN services:
1. Basic Rate Interface (BRI)
2. Primary Rate Interface (PRI)
Key points:
1. The BRI ISDN contains three distinct modes on a single ISDN line: one
64kbps B (Bearer) channel and one 16kbps D (Delta or Data) channels.
2. The PRI ISDN contains 23 B channels and one D channels with both have
working capacity of 64kbps uniquely making a total transmission bandwidth of
1.54Mbps.
The given diagram shows accessing internet using ISDN connection:
DSL
DSL is a short form of Digital Subscriber Line. It is a kind of broadband connection
as it facilitates connection over commonly used telephone lines.
Given are the few versions of DSL methods available today:
1. Asymmetric DSL (ADSL)
2. Symmetric DSL (SDSL)
3. High bit-rate DSL (HDSL)
4. Rate adaptive DSL (RDSL)
5. Very high bit-rate DSL (VDSL)
6. ISDN DSL (IDSL)
All of the above technologies varies in their upload and download bandwidth, bit
transfer rate and level of service.
The given diagram shows that how we can connect to internet through DSL
technology:
IP ADDREESS
An IP address is a numerical label assigned to the devices connected to a computer
network that uses the IP for communication. IP address act as an identifier for a
specific machine on a particular network. It also helps you to develop a virtual
connection between a destination and a source.
IP Full Form: The IP address stands for Internet Protocol address is also called IP
number or internet address. It helps you to specify the technical format of the
addressing and packets scheme. Most networks combine TCP with IP.
Types of IP address
There are mainly four types of IP addresses:
Public,
Private,
Static
Dynamic.
Public IP Addresses
A public IP address is an address where one primary address is associated
with your whole network. In this type of IP address, each of the connected
devices has the same IP address.
This type of public IP address is provided to your router by your ISP.
Private IP Address
A private IP address is an IP address that's reserved for internal use behind a router or
other Network Address Translation (NAT) device, apart from the public. Private IP
addresses are in contrast to public IP addresses, which are public and can't be used
within a home or business network. Sometimes a private IP address is also referred to
as a local IP address.
Dynamic IP address
Dynamic IP addresses always keep changing. It is temporary and are allocated to a
device every time it connects to the web. Dynamic IPs can trace their origin to a
collection of IP addresses that are shared across many computers..
Class A
This Class IP address always has its first bit as 0, next 7 bits as a network address
and following 24 bits as the host address.
The range of IP addresses is [Link] to [Link].
This means that it allows 2^7 networks and 2^24 hosts per network.
This class of IP address is used for a very large network. Ex. Big Organisation
Class B
Class B IP address always has its first bits as 10, next 14 bits as a network address
and following 16 bits as the host address.
The range of IP addresses is [Link] to [Link].
This means that it allows 2^14 networks and 2^16 hosts per network.
This class of IP address is used for a medium network like multinational companies.
Class C
Class C IP address always has its first bits as 110, next 21 bits as a network ad-
dress and following 8 bits as the host address.
The range of IP addresses is the first block from [Link] to [Link] and the
last block from [Link] to [Link].
This means that it allows 2^21 networks and 2^8 hosts per network.
This class is used for a small network such as small companies or colleges.
Class D
Class D IP address always has its first bits as 1110.
There is no segregation of host and network addresses.
It allows multicast which means a datagram directed to multiple hosts.
Class E
The address begins with 1111.
It is reserved for future use, research, and development purpose.
Keyloggers
Keyloggers are activity-monitoring software programs that give hackers access to your
personal data. The passwords and credit card numbers you type, the webpages you
visit – all by logging your keyboard strokes. The software is installed on your computer,
and records everything you type.
Worms
A computer worm is a type of malware that spreads copies of itself
from computer to computer. A worm can replicate itself without any human interaction,
and it does not need to attach itself to a software program in order to cause damage.
Trojans
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate
software. Trojans can be employed by cyber-thieves and hackers trying to gain access
to users' systems. Users are typically tricked by some form of social engineering into
loading and executing Trojans on their systems.
Ransomware
Ransomware is malware that employs encryption to hold a victim's information at
ransom. A user or organization's critical data is encrypted so that they cannot access
files, databases, or applications. A ransom is then demanded to provide access.
Logic Bombs
A logic bomb is a program which has deliberately been written or modified to produce
results when certain conditions are met that are unexpected and unauthorized by
legitimate users or owners of the software. Logic bombs may be within stand-alone
programs or they may be part of worms or viruses.
Bots/Botnets
A bot is a computer that has been compromised through a malware infection and can
be controlled remotely by a cybercriminal. The cybercriminal can then use the bot (also
known as a zombie computer) to launch more attacks, or to bring it into a collection of
controlled computers, known as a botnet.
Adware & Spyware
Adware (or advertising software) is the term used for various pop-up advertisements
that show up on your computer or mobile device. Adware has the potential to become
malicious and harm your device by slowing it down, hijacking your browser and
installing viruses and/or spyware.
Rootkits
Rootkits are a type of malware that are designed so that they can remain hidden on
your computer.
After the data has been sent, the connection is torn down using a similar four-way
handshake.
TCP is the protocol of choice for many of the most popular uses for the internet,
including WWW, FTP, SSH, and email. It is safe to say that the internet we know
today would not be here without TCP.
UDP
UDP stands for user datagram protocol. It is a popular companion protocol to TCP
and is also implemented in the transport layer.
The fundamental difference between UDP and TCP is that UDP offers unreliable
data transfer. It does not verify that data has been received on the other end of the
connection. This might sound like a bad thing, and for many purposes, it is.
However, it is also extremely important for some functions.
Because it is not required to wait for confirmation that the data was received and
forced to resend data, UDP is much faster than TCP. It does not establish a
connection with the remote host, it simply fires off the data to that host and doesn’t
care if it is accepted or not.
Because it is a simple transaction, it is useful for simple communications like
querying for network resources. It also doesn’t maintain a state, which makes it
great for transmitting data from one machine to many real-time clients. This makes
it ideal for VOIP, games, and other applications that cannot afford delays.
HTTP
HTTP stands for hypertext transfer protocol. It is a protocol defined in the
application layer that forms the basis for communication on the web.
HTTP defines a number of functions that tell the remote system what you are
requesting. For instance, GET, POST, and DELETE all interact with the requested
data in a different way.
FTP
FTP stands for file transfer protocol. It is also in the application layer and provides a
way of transferring complete files from one host to another.
It is inherently insecure, so it is not recommended for any externally facing network
unless it is implemented as a public, download-only resource.
DNS
DNS stands for domain name system. It is an application layer protocol used to provide
a human-friendly naming mechanism for internet resources. It is what ties a domain
name to an IP address and allows you to access sites by name in your browser.
SSH
SSH stands for secure shell. It is an encrypted protocol implemented in the
application layer that can be used to communicate with a remote server in a secure
way. Many additional technologies are built around this protocol because of its end-
to-end encryption and ubiquity.
There are many other protocols that we haven’t covered that are equally important.
However, this should give you a good overview of some of the fundamental
technologies that make the internet and networking possible.
TELNET
Telnet is an application protocol used on the Internet or local area network to provide a
bidirectional interactive text-oriented communication facility using a
virtual terminal connection. User data is interspersed in-band with Telnet control
information in an 8-bit byte oriented data connection over the Transmission Control
Protocol (TCP).
Telnet was developed in 1969 beginning with RFC 15, extended in RFC 855, and
standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one
of the first Internet standards. The name stands for "teletype network
Web log
It is a sort of online inventory (normally on a specialized topics) that consists of a series
of entries. These entries are arranged in opposite chronological order. The person who
maintains the weblog regularly update it with a new information.
Podcast
It is a digital file that normally contains audio or video record and is available on the
Internet as well.
Chat Rooms
It is a dedicated area on the Internet that facilitates users to communicate.
Public Switched Telephone Network (PSTN)
It is a technical expression for public telephone system.
Integrated Services Digital Network (ISDN)
It is a set of communication standards that transmits voice, video, data, and other
network services simultaneously.
Asymmetric Digital Subscriber Line (ADSL)
It is a sort of digital subscriber line (DSL) technology that facilitates faster data
transmission.
Download
It is a process that saves data from Internet onto a personal computer.
Upload
It is a process that transfers the saved data from a personal computer to Internet
server.
Dial-up
It is a technique in which a phone line is used in order to connect to the Internet.
Broadband
It is a wide bandwidth data transmission that transports multiple signals and traffic
types swiftly.
Voice over Internet Protocol (VoIP)
It is a Protocol, which is used especially for voice transfer over IP network. Likewise, it
facilitates users to make phone-calls by using internet.
Really Simple Syndication (RSS)
It is a technique, which is used for the dissemination of information, articles, etc. Users
normally subscribe to the RSS channel in order to receive news. After subscription,
users do not need to visit the respective website rather they receive emails regarding
the same.
ESSID
ESSID (extended service set identifier) An electronic marker or identifier that serves as
an identification and address for a computer or network device to connect and access
the Internet. It is an identifying name for all 802.11 wireless networks.
Digital signature
A digital code that is attached to an electronically transmitted message that uniquely
identifies the sender.
MAC address
A MAC address is a hardware identification number that uniquely identifies each
device on a network. The MAC address is manufactured into every network card, such
as an Ethernet card or Wi-Fi card, and therefore cannot be changed.
ARP
ARP (Address Resolution Protocol) is a network protocol used to find out the hardware
(MAC) address of a device from an IP address. ... The sending device uses ARP to
translate IP addresses to MAC addresses. The device sends an ARP request message
containing the IP address of the receiving device.
Cryptograph
Cryptography is a method of protecting information and communications through the
use of codes, so that only those for whom the information is intended can read and
process it. The prefix “crypt-” means “hidden” or “vault” — and the suffix “-graphy”
stands for “writing.”
Encryption
Encryption is the process of taking plain text, like a text message or email, and
scrambling it into an unreadable format — called “cipher text.” This helps protect the
confidentiality of digital data either stored on computer systems or transmitted through
a network like the internet.
Decryption
Decryption is simply the reverse of encryption, the process by which ordinary data, or
plain text, is converted into a cipher. A cipher, often incorrectly identified as a code, is a
system in which every letter of a plain text message is replaced with another letter so
as to obscure its meaning. To decipher a message requires a key, an algorithm that
provides the method by which the message was encrypted.
Host
A network host is any device or a computer connected to a computer network. A
network host provides services, information resources, and applications to users or
other nodes on the network.
ICMP
ICMP is a network level protocol. ICMP messages communicate information about
network connectivity issues back to the source of the compromised transmission. It
sends control messages such as destination network unreachable, source route failed,
and source quench.
SMTP
SMTP stands for Simple Mail Transfer Protocol. SMTP is a set of communication
guidelines that allow software to transmit an electronic mail over the internet is called
Simple Mail Transfer Protocol. It is a program used for sending messages to other
computer users based on e-mail addresses.
Post Office Protocol
Post Office Protocol (POP) is a type of computer networking and Internet standard
protocol that extracts and retrieves email from a remote mail server for access by
the host machine.
POP is an application layer protocol in the OSI model that provides end users the
ability to fetch and receive email.
Network Address Translation (NAT)
Network Address Translation (NAT) is designed for IP address conservation. It enables
private IP networks that use unregistered IP addresses to connect to the Internet. NAT
operates on a router, usually connecting two networks together, and translates the
private (not globally unique) addresses in the internal network into legal addresses,
before packets are forwarded to another network.
NNTP
Stands for "Network News Transfer Protocol." NNTP is the protocol used to connect
to Usenet servers and transfer newsgroup articles between systems over the
Internet. It is similar to the SMTP protocol used for sending email messages, but is
designed specifically for newsgroup articles.
RARP
RARP is abbreviation of Reverse Address Resolution Protocol which is a protocol
based on computer networking which is employed by a client computer to request
its IP address from a gateway server’s Address Resolution Protocol table or cache.
The network administrator creates a table in gateway-router, which is used to map
the MAC address to corresponding IP address.
URL
Also known as a internet address or web address, a URL (Uniform Resource
Locator) is a form of URI and standardized naming convention for addressing
documents accessible over the Internet and Intranet. An example of a URL is
[Link] which is the URL for the Computer Hope website
virtual network
A network that emulates a physical network and is a combination of hardware and
software network resources.
WAP
WAP stands for Wireless Application Protocol. It is a protocol designed for micro-
browsers and it enables the access of internet in the mobile devices. It uses the
mark-up language WML (Wireless Markup Language and not HTML), WML is
defined as XML 1.0 application.
It enables creating web applications for mobile devices. In 1998, WAP Forum was
founded by Ericson, Motorola, Nokia and Unwired Planet whose aim was to
standardize the various wireless technologies via protocols.
Microsoft Word
Introduction
Let us consider an office scene. Many letters are typed in the office. The officer dictates a letter. The typist
first types a draft copy of the letter. The officer goes through it to check mistakes regarding spelling errors,
missing words, etc. and suggests corrections. The typist changes the letter as suggested by the officer. This
is a simple example of word processing.
There are many software packages to do the job of word processing. Some of them work in DOS
environment. Example are WordStar, Word Perfect and Professional Write. But in these days working in
WINDOWS is becoming more and more popular. So let us consider software for word processing which
works in WINDOWS. Our choice is MS-WORD because it is the most popular software in these days.
MS-WORD is a part of the bigger package called MS OFFICE, which can do much more than word
processing. In fact when you open up MS OFFICE you will find four main components in it. They are MS-
WORD (for word processing), MS EXCEL (for spreadsheet), MS ACCESS (for database management) and MS
POWERPOINT (for presentation purposes). However, we will limit ourselves to MS-WORD only in this
Objectives
After going through this lesson you should be in a position to :
Text is typing into the computer, which allows alterations to be made easily.
Spelling can be checked and modified through the spell check facility.
Multiple copies of letters can be generated with different addresses through the mail-merge
facility.
Soft word
WordStar
Word perfect
Microsoft word
Using word you can create the document and edit them later, as and when required, by adding more
text, modifying the existing text, deleting/moving some part of it.
Changing the size of the margins can reformat complete document or part of text.
Font size and type of fonts can also be changed. Page numbers and Header and Footer can be included.
Spelling can be checked and correction can be made automatically in the entire document. Word count
and other statistics can be generated.
Text can be formatted in columnar style as we see in the newspaper. Text boxes can be made.
Word also allows the user to mix the graphical pictures with the text. Graphical pictures can either be
created in word itself or can be imported from outside like from Clip Art Gallery.
Word also has the facility of macros. Macros can be either attached to some function/special keys or to a
tool bar or to a menu.
While working in MS-WORD you have to work with a mouse. Also one can work, to some extent, through
the keyboard. The use of mouse is simpler as it is fully menu driven. In MS-WORD every command is
available in the form of ‘icons’.
Take the mouse pointer to START button on the task bar. Click the left mouse button.
Move the pointer to programs. You will notice another menu coming up to the right.
In that menu identify where Microsoft word is placed. Move the cursor horizontally to come out
of programs.
Move into the rectangular area meant for Microsoft word. Click the left mouse button there. The
computer will start MS-WORD.
Title Bar: The title bar displays the name of the currently active word document. Like other WINDOWS
applications, it can be used to alter the size and location of the word window.
Tool Bars: Word has a number of tool bars that help you perform task faster and with great ease. Two
of the most commonly tool bars are the formatting tool bar and the standard tool bar. These two toolbars
are displayed just below the title bar. At any point of time any tool bar can be made ON or OFF through
the tool bar option of View Menu.
Ruler Bar: The Ruler Bar allows you to format the vertical alignment of text in a document.
Status Bar: The Status Bar displays information about the currently active document. This includes the
page number that you are working, the column and line number of the cursor position and so on.
Scroll Bar: The Scroll Bar helps you scroll the content or body of document. You can do so by moving
the elevator button along the scroll bar, or by click in on the buttons with the arrow marked on them to
move up and down and left and right of a page.
Workspace: The Workspace is the area in the document window were you enter/type the text of your
document.
Main Menu: The Word main menu is displayed at the top of the screen as shown in the Figure. The
main menu further displays a sub menu. Some of the options are highlighted options and some of them
appear as faded options. At any time, only highlighted options can be executed, faded options are not
applicable. Infect if the option is faded you will not be able to choose it. You may not that any option
faded under present situation may become highlighted under different situations
File
You can perform file management operations by using these options such as opening, closing, saving,
printing, exiting etc.
New Ctrl+N
Open Ctrl+O
Close ALT + F4
Save Ctrl+S
Save As CTL + A
Print Ctrl+P
Using this option you can perform editing functions such as cut, copy, paste, find and replace etc.
Word document can be of many pages. The different pages may have different modes. Each mode has its
limitations. For example in normal mode the graphical picture cannot be displayed. They can only be
displayed in page layout mode. Using the option “View” you can switch over from one mode to other. It
displays the following Sub menu.
Online Layout
Page Layout
Normal
Outline
Master Document
Tool Bars Ruler
Footnotes
Comments
Header and Footer
Full Screen
Zoom
Insert
Using this menu, you can insert various objects such as page numbers, footnotes, picture frames etc. in
your document. It displays the following Sub menu.
Break
Page Numbers
Date and Time
AutoText
Symbol
Comment
Footnote
Caption
Cross-reference
Index & Tables
Picture
Text Box
File
Object
Bookmark
Hyperlink
Format
Using this menu, you can perform various type of formatting operations, such as fonts can be changed,
borders can be framed etc. It displays the following Sub menu.
Paragraph…
Font Bullets and Numbering
Borders and Shading
Tabs…
Drop Cap…
Text Direction…
Change Case…
Columns
Auto Format… Style Gallery…
Style…
Background…
Object
Tools
Using this menu, you can have access to various utilities/tools of Word, such as spell check, macros, mail
merge etc. It displays the following Sub menu.
Language…
Word Count AutoSummarise
Spelling and Grammar
Auto Correct..
Look Up Reference
Merge Documents…
Track Change Protect Document…
Mail Merge
Letter Wizard…
Macro…
Envelops and Lebels Templates and Add-Ins…
Customize…
Options…
Table
This menu deals with tables. Using this menu you can perform various types of operations on the table. It
displays the following Sub menu.
Draw Table
Delete Cells…
Insert Table Merge Cells…
Split Cells
Select Column
Select Row
Select Table
Distribute Rows Evenly
Distribute Columns Evenly
Table Auto Format
Cell Height and Width…
Headings
Sort …
Formula…
Convert Text to table
Split Table
Hide Grid Lines
COMPUTER AWARENESS | Microsoft Word PAGE 8
Download Testbook
Window
This menu allows you to work with two documents simultaneously. This would require two windows to
be opened so that each one can hold one document. Using this menu, you can switch over from one
window to another. It displays the following Sub menu.
Arrange All
New Window Split
[Link]
Help
Using this menu, you can get on-line help for any function.
Ctrl + V -- Paste.
F1 -- Open help.
Ctrl + S -- Save.
Word Processing: Word Processing refers to the act of using a computer to create, edit, save and print
documents.
Word Wrap: Word Wrap refers to the function of a word processor that will automatically force text to
a new line when the right margin is reached while typing. Word Wrap eliminates the need for pressing
the Enter key on the keyboard at the end of every line.
Charts: graphs that use lines, columns, and pie shapes to represent numbers and data.
Desktop Publishing: the ‘big brother’ of word processing, the process of using a word processor type
package to create things such as newsletters, flyers, brochures etc. combining both text and graphics.
Embedded Object: an object that becomes part of the destination file and is no longer a part of the
source file.
Font: a set of characters that all use the same basic design.
Font Effects: a way to change the appearance of text such as bold, italics, underline etc.
Footer: text or graphics that are printed on every page or section, usually at the bottom but can be
anywhere on a page
Header: text or graphics that are printed on every page or section, usually at the top but can be
anywhere on a page.
Indent Markers: markers along the ruler that control how text wraps on the left or right side of a
document.
Index: a list of the topics, names and terms used in a document along with the corresponding page
numbers. An index is usually found at or near the end of a document (also see Table of Contents)
Landscape: a term used to describe page orientation, where the page is wider than it is tall.
Linked Object: an object such as a graphic etc, which is included within a document in such a way that
it is linked to the source file, so that when ever the source changes, the object automatically updates.
Macro: A recorded series of commands, menu selections and key presses that automate repetitive
tasks.
Mail Merge: The process of combining a standard ‘form’ letter with a set of names and addresses to
create many letters that appear to be individually written.
Main Document: the standard ‘form’ letter used in a mail merge process.
Manual Page Break: a page break inserted into a document by the author at a specific position rather
than one created automatically when a page has no more room for text.
Merge Field: a placeholder that indicates where Word inserts information from a data source during a
mail merge
Normal View: the default editing view which is usually used to write and edit documents.
Note Separator: the line that divides the notes from the body of the document.
Office Assistant: a help that answers questions for the Microsoft Office suite of programs.
Office Clipboard: a storage area that allows the user to temporarily store snippets of information, and
retrieve them later.
AutoCorrect: a feature that corrects commonly misspelled words automatically as they are typed.
Bookmark: a method to mark locations within a document so that they can be easily returned to later.
Bullet: a small graphic, commonly a large dot, that starts each item in a list.
Character Style: a style for selected words and lines of text within a paragraph
Outline View: a view that shows the structure of a document which consists of headings and body text.
Page Orientation: the way in which pages are laid out in a printed document.
Paragraph: a piece of text that has had the enter key pressed before its first line, and after its last.
COMPUTER AWARENESS | Microsoft Word PAGE 14
Download Testbook
Paragraph Styles: Styles for entire paragraphs, including their fonts, tabs, alignments etc.
Point: a measure of the size of text for a font. One point is approximately 1/72 of an inch.
Print Layout View: a view that shows how a document will appear when it is printed.
Reference Mark: a number or character in the main text of a document that indicates additional
information is included in a footnote or endnote.
Reviewing Pane: a pane that shows information regarding the changes made to a document.
Section Break: a section of the document that can be formatted differently to other parts of the
document.
Selection Area: a blank area to the left of a documents left margin that you can click to select parts of
the document.
Soft Page Break: a page break that is automatically inserted into a document by Word when a there
is too much text to fit on the current page.
Spelling and grammar checker: a feature that attempts to check and correct errors in spelling and
grammar that the writer may have missed.
Tab Stop: a location along the ruler that you use to align text.
Table AutoFormat: a set of predefined styles that are intended to make table formatting easier.
Table of Contents: a list of the main headings and sub headings that indicate to the reader the
contents of a document.
Template: a document that stores formatting, text styles and document information that is then
used as the basis for another document.
Theme: a unified look in a document that incorporates heading and text styles.
Thesaurus: a feature that looks up alternative words with the similar meanings.
Watermark: semi-transparent text or picture that are ‘behind’ the main text of the document.
Web Layout View: a view showing how a document will appear when viewed as a web page.
Web Page: a special page written using the HTML language that is intended for viewing in a web
browser.
WordArt: a tool within Microsoft Office that allows you to manipulate text in a variety of different,
graphical ways.
Word Processing: the process of creating, editing and printing a computer written text document.
Word Wrap: the movement of text to the next line when typing goes beyond the right margin.
Scroll Bars: Since many documents are too long to fit legibly on a single computer screen, vertical and
horizontal scroll bars are included to allow you to move through the document and change the area of
the document that is currently being viewed on the screen.
Clipboard: The clipboard is a temporary holding area the computer uses for any item that has been
copied or cut. When an item such as text is placed on the clipboard, it can then be pasted elsewhere in
the document. Items will stay on the clipboard until they are deleted or erased. The manner in which the
clipboard is cleared depends on the application being used. Quite often, the clipboard is cleared when
another item is cut or copied or if the application is closed.
Header: The header is an area that appears at the top of every page in a document that can contain
one or more lines of text. One common use of the header is to include information about the document
(such as the title) on every page in the document.
Footer: The footer is an area that appears at the bottom of every page in a document that can contain
one or more lines of text. One common use of the footer is to insert the current page number on every
page in the document.
Font: A font is a set of letters and numbers of one particular typeface. The font includes not only the
typeface, but other characteristics such as size, spacing and emphasis. An example of a font would be
Arial, 12 point, italic.
Formatting: The process of formatting a document involves specifying how the document will look in its
final form on the screen and when printed. Common formatting options include the font, font size, color,
alignment, spacing, margins and other properties.
Indent: The space between the margin of the page and the text. Most word processors allow for both
left and right indentation. One other common use of indention is what is known as a "first line indent"
where only the first line of a paragraph is indented and the remaining lines of text lie directly against the
left margin of the page.
Line Spacing: Line spacing refers to the amount of white space between lines of text in a paragraph.
Commonly used line spacing settings are single spaced and double spaced.
Types of Computers
A computer is an electronic device that manipulates information, or data. It has the abil-
ity to store, retrieve, and process data. You may already know that you can use
a computer to type documents, send email, play games, and browse the Web.
COMPUTER stands for Common Operating Machine Purposely Used for Technological
and Educational Research.
Type Specifications
PC (Personal Computer) It can hold a single user at a time and this computer system has
moderately powerful microprocessor.
Main Frame This one is also a multi-user system. The software technology is
different from minicomputer.
This an extremely fast computer used to solve problems beyond
Supercomputer human capabilities. This can execute hundreds of millions of
instructions per second.
PC (Personal Computer)
This can be defined as a small, relatively less expensive computer designed for an
individual user. PCs are driven by the microprocessor chip that enables
manufacturers to fabricate an entire CPU on one chip. Personals in businesses
keeps a personal computers for desktop publishing, word processing, accounting, ,
and for running spreadsheet and database management applications. Individuals
owing it home, use it for playing games, surfing the Internet, etc.
Workstation
It is a machine used for desktop publishing, software development, engineering
applications (CAD/CAM), and other similar types
of applications which needs a moderate amount
of execution power and relatively high quality
graphics capabilities.
Generally, UNIX and Windows NT are common operating systems for workstations.
Similar to PC, workstations can also handle single-user but are typically connected
together to form a local-area network, although they may operate as stand-alone
systems.
Minicomputer
It is a medium size, multi-processing machine capable of serving up to 250
users simultaneously.
Mainframe
This is very large sized and expensive machine capable
enough to support hundreds or even thousands of users
at a time. Mainframe performs large quantity of programs
concurrently and supports many executions of programs
simultaneously.
Supercomputer
Supercomputers are logically one of the fastest
machines currently available. These are very
expensive and are deployed for specialized
operations that require immense amount of
mathematical calculations (number crunching).
Few examples are - fluid dynamic calculations,
weather forecasting, nuclear energy research,
scientific simulations, (animated) graphics, electronic
design, and analysis of geological data (e.g. in petrochemical prospecting).
Components of Computers
All types of computers are based on the same basic logical structure and execute the
following 5 basic operations for converting raw input data into useful information for their
users.
1. Take Input: The process of feeding data and instructions to the comput-
er.
2. Store Data: Saving unprocessed/processed data and instructions so
that they are ready for processing as and when required.
3. Processing Data: Executing arithmetic and logical operations on the da-
ta provided in order to transform it into useful information.
4. Output Information: Producing useful information/results for the user,
like printed report or visual information.
Input Unit
This part of computer encapsulates devices with the help of which user feed data to the
computer. It creates an interface between the user and the computer. The input devices
transform the information into a form acceptable by the computer.
Output Unit
This part of computer encapsulates devices with the help of which user receive the
information from the computer. Output devices transform the output from computer into
a form understandable by the users.
Control Unit
This unit manages the operations of all parts of the computer but does not carry out
any calculations or comparisons or actual data processing operations.
Responsibilities of this unit are −
1. For facilitating the transfer of data and instructions among other units of a
system.
2. It manages and coordinates all the units of the system.
3. It receives the instructions from the memory, interprets them, and directs the
operation of the system.
4. It interacts with Input/output units to transfer of data/results from storage.
5. It does not performs processes or store data.
Input Devices
Some of the Commonly used input units used in a computer system are follows:
1. Keyboard
2. Mouse
3. Joy Stick
4. Light pen
5. Track Ball
6. Scanner
7. Graphic Tablet
8. Microphone
9. Magnetic Ink Card Reader (MICR)
10. Optical Character Reader (OCR)
11. Bar Code Reader
12. Optical Mark Reader (OMR)
Keyboard
Keyboard is the most basic, and very commonly
used input device which helps to input data to the
computer. The layout of the buttons in a normally
used keyboard is similar to the traditional
typewriter, but there are a few additional keys
provided by different manufacturers for performing
additional functions.
Normally available keyboards in market were of two sizes 84 keys and 101/102
keys, but now keyboards with 104 keys or 108 keys are also available for Windows
and Internet.
Following is the description of the buttons on the keyboard:
1. Typing Keys
These buttons include the letter keys (A-Z) and digit keys (09) which normally
give the same layout like typewriters.
2. Numeric Keypad
These buttons are used to input the numeric data or cursor movement.
Normally, it consists of a set of 17 keys that are laid out in the similar
configuration used by most addition machines and calculators.
3. Function Keys
The 12 function keys are provided on the keyboard which are arranged in a
row at the top of the keyboard. Each of these keys has a unique function and
is used for some specific task.
4. Control keys
These buttons are used to cursor and screen control. It also adds four
directional arrow keys. Following are also included in control keys: Home,
End, Insert, Delete, Page Up, Page Down, Control (Ctrl), Alternate (Alt),
Escape (Esc).
Mouse
It is the most commonly used pointing device. It is a
very famous cursor-control device and the earlier
versions of it was built over a small palm size box
with a round ball at its base, which tracks the
movement of the mouse and feed digital signals to
the CPU when the mouse buttons are pressed.
Currently, mouse have a sensor at bottom to detect
cursor position.
Basic versions if it has two buttons called the left and the right click button and a
wheel is present between the buttons to provide scroll function. The movement of
mouse on flat surface is used to control the position of the cursor on the display, but
it cannot be used to feed text into the system directly.
Advantages
Easy to use
Not very expensive
The cursor movement is faster than the arrow keys of the keyboard.
Joystick
Just like a mouse, Joystick is also a pointing device, which is used
to travel the cursor position on a display. It is a perpendicular stick
having a spherical ball at its both lower and upper ends. The
spherical ball connected at the circuit having sensors moves in a
socket. The joystick controller can be traversed in all directions.
The functionality of the joystick is just like a mouse. Its applications
are generally in Computer Aided Designing (CAD) and playing computer games.
Light Pen
Just like a pen, light pen is a digital pointing device. This
device is used to select an item displayed in the menu or
to draw anything on the display. It contains a photocell
and an optical sensor placed in a small tube at the tip.
When the light pen tip is travelled on the display, its
photocell sensing element calculates the screen location
and sends the digital signal to the CPU.
Track Ball
Track ball is another type of input device similar to
the mouse. It is mostly helpful with notebook or
laptop computer, instead of a mouse. It consists a
ball on the top which is half inserted and
connected to the sensors. By moving fingers on
the ball, the cursor can be moved.
Because the whole device is not moved to move the cursor, a track ball requires
less space as compared to the mouse. This device comes in different shapes like a
ball, a button, or a square.
Scanner
Scanner is another input device, which works very
much like a photocopy machine. It can be used when
some information on paper is to be transferred to the
hard disk of the computer in digital format for further
manipulation.
Scanner captures high resolution images from the source
which are then converted into a digital format that can be saved on the disk and
shared digitally. These digital images can be edited before they are printed.
Digitizer
Digitizer is also an input device which is used to convert
analog information into digital form. Using digitizer, signal
from the television or camera can be converted into a
series of numbers that could be saved in a computer hard
drive. They can be helpful with the computer to create a
picture of whatever the camera had been pointed at.
Digitizer is also called Tablet or Graphics Tablet because it transforms graphics and
pictorial data into binary inputs to the system. A special kind of graphic tablet as
digitizer is used for fine works of drawing and image related applications.
Microphone
Microphone is a very common input device used to input
sound that is then stored in a digital form.
Now a days microphones are used in almost every
industry and devices related to sound recording or
transmission.
The microphone is used for different applications like adding sound to a multimedia
presentation or for mixing music.
The format to be fed to the OCR is predefined and can’t be used like an ordinary
scanner.
OCR, unlike scanner, scans the text optically, character by character, converts them
into a machine readable digital code instead of creating high resolution images, and
stores the text on the system memory.
A flash of light from the device strikes to the surface of the object and reflects back
to the sensors present behind the source of light to collect the input.
Bar Code Reader can only scan a bar code image, converts it into an alphanumeric
value, which is then transferred to the computer that the bar code reader is
connected to.
Output Devices
Following are some of the commonly used output devices used in a computer system:
1. Monitors
2. Printer
Monitors
Monitors or Visual Display Unit (VDU), are the primary output device of a computer
system. It creates images from tiny dots, so called pixels that are arranged in a well-
defined rectangular form. The depth and sharpness of the image depends upon the
number and sized of the pixels.
There are two types of digital screen used for monitors:
1. Cathode-Ray Tube (CRT)
2. Flat-Panel Display
Printers
Printer is a very commonly used output device, which is used to print information on
paper.
There are two types of printers −
1. Impact Printers
2. Non-Impact Printers
Impact Printers
Impact printers print by hitting the characters on the ribbon containing ink, which is
then pressed on the paper.
following are the characteristics of Impact Printers −
1. Very low consumable costs
2. Very noisy
3. Useful for bulk printing due to low cost
Character Printers
Character printers are the type of printers that are capable of printing only one
character at a time.
These can be further categorized into two types:
1. Dot Matrix Printer (DMP)
2. Daisy Wheel
Daisy Wheel
Head is fixed on a wheel and pins creating characters are like petals of Daisy
(flower) that is why it is known as Daisy Wheel
Printer. These printers are commonly used for word-
processing tasks in offices that need a very less
number of letters to be sent here and there with very
nice quality.
Advantages:
More reliable than DMP
Better quality
Fonts of character can be easily changed
Disadvantages:
Slower than DMP
Noisy
More expensive than DMP
Line Printers
These printers are capable of printing one line at a time.
These are of two types −
1. Drum Printer
2. Chain Printer
Drum Printers
The head of this printer is in the shape of
drum in that is why it is known drum printer.
The printing drum surface is divided into a
number of tracks which are equivalent to the
size of the paper. For instance, if a paper is of
width of 200 characters, then the drum will
have 200 tracks. A fixed character set is
embossed on the track which cannot be
altered any means. To use a different character set, a different drum needs to be
purchased like the one with 48 character set, or 64 and 96 characters set. Single
rotation of drum containing permanent characters prints a single line. These printers
are offer fast printing speed and can print 300 to 2000 lines per minute.
Advantages:
Very high speed
Disadvantages:
Very expensive
Characters fonts cannot be changed
obsolete
Chain Printers
In this type printer, a chain consisting of character set is used, that is why it is known
as Chain Printer. The predefined-standard character set can have 48, 64, or 96
characters.
Advantages:
It is easier to change character fonts.
Different languages can be used by replacing chains with the same printer.
Disadvantages:
Noisy
Chain Printers
In this type printer, a chain consisting of character set is used, that is why it is known
as Chain Printer. The predefined-standard character set can have 48, 64, or 96
characters.
Advantages:
It is easier to change character fonts.
Different languages can be used by replacing chains with the same printer.
Disadvantages:
Noisy
Non-Impact Printers
Non-impact printers do not hit the paper with any embossed character-containing
instrument. These printers are able to print a complete page all at once, this is the
reason why they are also known as Page Printers.
Chain Printers
These are very commonly used these days and are type of non-impact page
printers. They use laser lights to charge the metallic drum in shape of characters or
objects to be printed which attracts powdered ink. Then this drum is pressed over
the page to create printed output.
Advantages
Very high speed
Very high quality output
Good graphics quality
Supports many fonts and different character
size
Disadvantages
Expensive
Produces heat
Difficult to maintain
Inkjet Printers
Inkjet printers are also very commonly used printers these days. They use ink
cartridges to print characters by spraying small drops of ink in very precise manner
onto the paper. Inkjet printers are very versatile and can produce relatively high
quality output with presentable features.
They make very less noise as compared to other printers because no hammering is
done and these have many different modes of printing. Using these printers, color
printing is also possible. Some advanced and
newer models of Inkjet printers are capable
enough to produce multiple number copies of
printing also.
Advantages
High quality printing
More reliable
Disadvantages
Expensive as the cost per page is high
Slow as compared to laser printer
Booting
Starting a computer or a computer-embedded device is called booting. Booting takes
place in two steps −
The first program or set of instructions that run when the computer is switched on is
called BIOS or Basic Input Output System. BIOS is a firmware, i.e. a piece of
software permanently programmed into the hardware.
Cold Booting − When the system is started by switching on the power supply it is
called cold booting. The next step in cold booting is loading of BIOS.
Warm Booting − When the system is already running and needs to be restarted or
rebooted, it is called warm booting. Warm booting is faster than cold booting
because BIOS is not reloaded.
Internet
The Internet is a huge collection of networks, a networking infrastructure. It
encapsulates millions of computers together globally, forming a network in which
any computer can communicate with any other computer as long as they are both
connected to the Internet. In other words, it is a worldwide system of cross
connected computer networks, connecting millions of devices through which
exchange of information such as data, news and opinions etc. is possible.
The Internet is available to each and every user across the globe.
Evolution
The methodology of Internet was coined in 1969 and has undergone various
technological & Infrastructural amendments that are discussed below:
The origin of the Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET).
ARPANET was designed by the Department of Defence of The United States.
The primary motive of ARPANET was to facilitate communication among the
different bodies of the government.
At that time, there existed only four nodes, formally named Hosts.
In 1972, the ARPANET spread over the globe with 23 nodes located in different
countries and thus became known as the Internet.
By the time, with invention of new technologies such as TCP/IP protocols, DNS,
WWW, browsers, scripting languages etc., the Internet provided a medium to
publish and access information over the web.
Advantages
The Internet covers almost every aspect of life, one can think of. Here, we will
discuss some of the advantages of Internet:
The Internet allows us to communicate with the people sitting at remote locations.
There are various apps available on the web that use the Internet as a medium for
communication. Users can find different social networking sites. Following are
examples of few Social Networking sites:
Facebook
Twitter
Yahoo
Flickr
Anyone can surf for various kinds of information using the internet. Information
related to different topics such as Technology, Geographical Information, Health &
Science, Social Studies, Information Technology, Products etc can be surfed using a
search engine.
Apart from communication and source of information, the internet also serves a
medium for entertainment. Following are the various modes for entertainment over
the internet.
Online Television
Online Games
Songs
Videos
Social Networking Apps
Internet allows us to use many services like:
Internet Banking
Matrimonial Services
Online Shopping
Online Ticket Booking
Online Bill Payment
Data Sharing
E-mail
The Internet facilitates the concept of electronic commerce, that aids the business
deals to be processed on electronic systems.
Disadvantages
However, Internet is evolved to be a powerful medium of information in almost all
areas, yet there are many associated disadvantages discussed below:
There is always the possibility to lose personal information such as name, address,
credit card number. Therefore, users must be very vigilant while sharing this type of
information. Users must use credit cards only via authenticated websites.
Another disadvantage is the Spamming. Spamming corresponds to the unwanted
emails in bulk. These emails serve no purpose and lead to obstruction of the entire
system.
Virus can easily be spread to the computers connected to the internet. Such virus
attacks may cause the user's system to crash or the user's important data may get
deleted.
There are different websites that do not supply the authenticated information. This
leads to misconception among many people.
Intranet
Intranet is defined as a private network of computers within an organization with its
own server and firewall.
Moreover we can define
Intranet as:
The Internet is a system
in which multiple PCs are
networked to be
connected to each other.
PCs on the intranet are
not available to the world
outside of the intranet.
Normally each company
or organization holds their
own Intranet network and
members/employees of
that company collaborate
via access to the computers in their intranet.
Each computer in Intranet is also identified by an IP Address, which is unique
among the computers in that Intranet.
Benefits
Intranet is considered as a very efficient and reliable network infrastructure for any
organization. It is profitable in every aspect such as cost-effectiveness,
collaboration, security, productivity and much more.
Application
Intranet applications are the same as that of Internet applications. Intranet
applications can be also accessed via a web browser. The only difference is that,
Intranet applications reside on local servers while Internet applications reside on
remote servers. Here, we've discussed some of these applications:
Intranet Internet
Localized Network. Worldwide Network
Doesn't have access to Intranet Have access to the Internet.
More Expensive Less Expensive
More Safe Less Safe
More Reliability Less Reliability
Extranet
Extranet refers to a network
within an organization, using the
internet to connect to the
outsiders in a controlled manner.
It aids to interconnect businesses
with their customers and
suppliers and in turn allows
working in a collaborative
manner.
Implementation
Extranet is implemented as a Virtual Private Networks (VPN) because it uses the
internet to connect to corporate organizations and there is always a threat to
information security. VPN facilitates a secure network in public infrastructure
(Internet).
Key Points
1. The packet is wrapped at the boundary of networks in IPSEC compliant
routers.
2. It utilizes an encryption key to associate packets and IP addresses as well.
3. The packet is decoded only by the IPSEC compliant routers or servers.
4. The digital information is shared over VPN via VPN Tunnel and this process
is called tunneling.
VPN utilizes Internet Protocol Security Architecture (IPSEC) Protocol to facilitate
secure transactions by implementing an additional security layer to TCP/IP protocol.
This layer is implemented by encapsulating the IP packet to a new IP packet as
described in the following diagram:
Benefits
Extranet has proven to be a successful model for various kinds of businesses even
if they are small or big. following are few of the advantages of extranet for business
partners, employees, suppliers, and customers:
Issues
Apart from advantages there are also some issues associated with extranet. These
issues are discussed below:
Hosting
Where the extranet pages will be held i.e. who will host the extranet pages. In this
context there are two choices:
1. May host it on the user's own server.
2. May host it along with an Internet Service Provider (ISP) in the similar way as
web pages.
But hosting extranet pages on a user's own server requires high bandwidth internet
connection which is comparatively very costly.
Security
Additional firewall security is required if the user hosts extranet pages on the user's
own server which result in a complex security mechanism and increased workload.
Accessing Issues
Information cannot be accessed in absence of internet connection. However,
information may be accessed within Intranet with no internet connection.
Decreased Interaction
It reduces the face to face interaction in the business which results in lack of
communication among customers, business partners and suppliers.
Extranet Intranet
Internal network that can be accessed externally. Internal network that cannot be
accessed externally.
Extranet is an extension of the company's Intranet. Only limited users of a company.
For controlled external communication between Only for communication within a
customers, suppliers and business partners. company.
Internet Services
Internet Services allow us to access a huge amount of information such as text,
graphics, sound and software over the internet. The diagram given below shows the
four different categories of Internet Services.
Communication Services
There are different communication Services available that facilitate exchange of
information among individuals or groups. The following table provides a brief
introduction to such services:
Archie: It's an updated database of public FTP sites and their content. It helps
2
to find a file by using its name.
Gopher: It is utilized to retrieve, search, and display documents on remote
3
sites.
VERONICA (Very Easy Rodent Oriented Net wide Index to Computer
4 Achieved): VERONICA is a resource based on gopher. It facilitates access to
the information resource saved on gopher’s servers.
Web Services
Web services facilitate exchange of information among applications on the web.
Through web services, applications can simply interact with each other.
The web services are offered using the concept of Utility Computing.
Video Conferencing
Video conferencing or Video teleconferencing is a way of communicating by two-
way video and audio transmission with help of telecommunication technologies.
Multi Point
Such mode of conferencing established connection between more than two
locations via Multipoint Control Unit (MCU).
Internet Protocols
Transmission Control Protocols (TCP)
TCP is basically a connection oriented protocol and offers end-to-end packet delivery. It
acts as a back bone for connection. It exhibits the following key features:
Transmission Control Protocol (TCP) works at the Transport Layer of OSI Model.
TCP is a reliable and connection oriented protocol.
TCP offers:
Stream Data Transfer.
Reliability.
Efficient Flow Control
Full-duplex operation.
Multiplexing.
TCP offers connection oriented end-to-end packet delivery.
TCP ensures reliability by sequencing bytes with a forwarding acknowledgement
number that indicates to the destination the next byte the source expects to receive.
It retransmits the bytes not acknowledged within a specified time period.
TCP Security
TCP facilitates the following services to the processes at the application layer:
Stream Delivery Service
Sending and Receiving Buffers
Bytes and Segments
Full Duplex Service
Connection Oriented Service
Reliable Service
Sending and Receiving Buffers: It may not be possible for the sending and
receiving process to produce and obtain data at same speed, therefore, TCP needs
buffers for storage at sending and receiving ends.
Full Duplex Service: Transmission of the data in duplex mode simply defi nes
the flow of data in both the directions at the same time.
TCP of the first process informs TCP of the second process and gets its
approval.
TCP of the first process and TCP of the second process and exchange data
in both the two directions.
After completion of the exchange of data, when buffers on both of the sides
are empty, the two TCP’s destroy their buffers.
Points to remember:
1. The length of the datagram is variable.
2. The Datagram can be segmented into two parts: header and data.
3. The associated length of its header is around 20 to 60 bytes.
4. The header contains information for routing and delivery of the packet.
Points to remember:
1. UDP is utilized by the application that typically transmits a small quantity of
data at one time.
2. UDP provides protocol port utilized i.e. UDP message consists of both source
and destination port number, that makes it easier for UDP software at the
destination to divert the message to the right application program.
Telnet
Telnet is a protocol used to log in to remote computers on the internet. There are a
number of Telnet clients having user friendly interfaces. The following diagram
elaborates that a person is logged into the computer named A, and from there, he
remotely logged into computer named B:
HTTP Request
HTTP request comprises of lines which contains:
1. Request line
2. Header Fields
3. Message body
Key Points
1. The first line i.e. the Request line specifies the request method i.e. Get or Post.
2. The second line defines the header which reflects the domain name of the server
from where [Link] is retrieved.
HTTP Response
Like HTTP requests, HTTP response also has a certain structure. HTTP response
contains:
1. Status line
2. Headers
3. Message body
While every computer has its own unique address, every user using the Internet has a
unique address called a domain. A domain recognizes one or more IP addresses. An
example of a domain is [Link] and is part of the URL such as https://
[Link]. The standard top-level domains are:
mil - Military
There are additional top-level domains that are now recognized on the Internet. They
include:
biz - Businesses
coop - Cooperatives
museum - museums
tv - Television
Browser
A piece of software such as Mozilla Firefox and Internet Explorer that allows a computer
to access and display documents, view pictures, hear sound, and view video clips from
the World Wide Web.
Mail that's electronically transmitted by your computer. As opposed to snail mail, e-mail
sends your messages instantaneously, anywhere in the world. It has the capability to
send messages at any time and to anyone.
The standard method for downloading and uploading files over the Internet. With FTP,
you can login to a server and transfer files (meaning you can "send" or "receive" files).
Homepage
The first page that is viewed when the browser starts. It is also the page of a Web site
that provides the introduction or content with links.
The abbreviation for Hypertext Transfer Protocol. It is the set of rules by which Web
pages are transferred across the Internet.
The Internet is composed of local, regional, national, and worldwide computer networks.
Each computer on the Internet can be identified by a set of unique numbers that is
called an internet protocol (IP) address. The IP address is composed of four different
numbers separated by periods such as [Link].
An underlined word(s), phrase(s), or graphics on a Web page that transports the reader
to additional or related information on the Internet.
TelNet
An addressing scheme that is used on the Internet to locate resources and/or services
on the World Wide Web. Basically the URL is the address of a computer file that has
been put on a computer server to access the Internet.
Web Page
Website
Address
Cyberspace
Navigate
The act of moving from page to page and website to website online.
Piracy
Website :
A collection of “pages” or files linked together and available on the world Wide Web.
Attachment:
Chat:
Cyber bullying
Sending or posting harmful or cruel text or images using the internet or other digital
communication devices.
Icons:
Post
Query
A request for information about certain topic. It is what you put in the box when you
type something into the search engine.
Usually defines as a personal or noncommercial web site that uses a dated log format.
Emoticons
Outbox
This is where all of the messages that you send are kept.
Server
Surf
Bookmark:
Hacker:
A popular term for someone who accesses computer information either legally or
illegally.
Spamming
The coded format language used for creating documents on the world wide web and
controlling how web pages appear.
Cookie :
Also known as an HTTP cookie, web cookie, or browser cookie.A small file downloaded
by some web sites to store a packet of information on your browser.
History:
A list of websites the people are using a particular computer have visited.
Netiquette
Plug-in
Softcopy
Domain Name
A name given to the numerical or internet protocol (IP) address of a web site.
Firewall
This is a system that creates a special “wall” used by network servers to separate their
intranet from internet
The standard method computers use to communicate via the world wide web.
Pharming
Phishing
An online scam that uses e-mail to “fish” for users’ private information by imitating
legitimate companies.
Streaming (media)
The exchange of video clips, sounds or other types of media over the internet.
The protocol or conventions that computers use to communicate over the internet.
Zip File
Large files that have been compressed to make them easier to send over the internet
Google Chrome
Microsoft Edge
Apple Safari
Opera
Brave
Vivaldi
DuckDuckgo
Chromium
Epic
2. Bing : Bing is Microsoft’s answer to Google and it was launched in 2009. Bing is the
default search engine in Microsoft’s web browser. At Bing, they are always striving to
make it a better search engine but it’s got a long way to go to give Google competition.
Microsoft’s search engine provides different services including image, web and video
search along with maps. Bing introduced Places (Google’s equivalent is Google My
Business), this is a great platform for business to submit their details to optimise their
search results.
3. Yahoo : Yahoo & Bing compete more with each other than with Google. A
recent report on [Link] tells us that Yahoo have a market share of 7.68
percent. Although a leader as a free email provider, this is declining significantly though
with their recent acknowledgement that User Details & Passwords where hacked last
year.
4. Baidu : Baidu is the most used search engine in China and was founded in Jan,
2000 by Chinese Entrepreneur, Eric Xu. This web search is made to deliver results for
website, audio files and images. It provides some other services including maps, news,
cloud storage and much more.
5. AOL : [Link] is also among the top search engines. These are the guys that used
to send out CD’s which you’d load onto your PC to install their browser and modem
software. Once the pre-eminent player they now have a market share of 0.59 percent.
Verizon Communication bought AOL for $4.4 billion. It was started back in 1983 as
Control Video Corporation. It was named America Online in 1991 and in 2009 as AOL
Inc. AOL is a global mass media company which is based in New York. The company
also provides advertising services as AOL Advertising, AOL mail and AOL Platform.
7. Excite : Excite is not widely known but is one that still gets into the top 10.
Excite is an online service portal that provides internet services like email, search
engine, news, instant messaging and weather updates. This also provides us with the
latest trends, topics and search for phrases such as: What can President Trump
actually do?
10. Yandex : Launched in 1997, Yandex is most used search engine in Russia.
Yandex also has a great presence in Ukraine, Kazakhstan, Belarus and Turkey. It
provides services like Yandex Maps, Yandex Music, online translator, Yandex Money
and many other services.
11. Lycos : Lycos has a good reputation in search engine industry. Its key areas
served are email, web hosting, social networking, and entertainment websites.
QZone
Tumblr
Baidu Tieba
Skype
Viber
Sina Weibo
LINE
Snapchat
Telegram
Myspace
Ali Baba.
eBay.
Jingdong.
Zappos.
Rakuten.
Home Depot.
Flipkart.
Snapdeal
Ali Baba
Snanpdeal
Myntra
DBMS or Database
Management System
DBMS is actually a tool or collection of programs that enables us to perform any kind
of operation on a data stored in a database. Database Management System allows
you to store, modify and extract information whenever required. It comprises of 4
essential components namely -
4. Database.
DBMS Examples
RDBMS (Relational Database MySQL
Management System) PostgreSQL
dBase Microsoft Access
Clipper SQL Server
FoxPro Oracle
FileMaker
Types of DBMS
There are 4 major types of Database Management Systems:
DBMS - Architecture
DBMS architecture helps in development, implementation, design, and maintenance
of a database that store and organize information for agencies, businesses, and
institutions.
It is the base of any database management system, which allows it to perform the
functions effectively and efficiently.
The whole concept of DBMS depends upon its architecture. It can be designed
as centralized, decentralized, or hierarchical.
1-tier architecture
2-tier architecture
3-tier architecture
In 1-tier architecture,
In this architecture, the database is directly available to the user. This means that
the user can access the DBMS directly.
The changes made here will be done directly on the database itself. It does not
provide handy tools for end users.
2-tier Architecture
The 2-tier architecture is similar to the basic client-server. In 2-tier architecture, the
applications on the client end can directly communicate with the database on the
server side. For this interaction, API's such as: ODBC, JDBC are used.
Server side is responsible for providing functionalities such as: query processing and
transaction management.
3-tier Architecture
In 3-Tier architecture, there is a layer between the client and the server. In this
architecture, the client cannot communicate with the server directly.
At the client-end the application interacts with an application server which further
communicates with the database system.
The end user has no idea about the existence of the database beyond the
application server. The database does not contain any information about any other
user beyond the application.
Data Models
A data model is a theory or specification describing how a database is structured
and used.
A data model is not just a way of structuring data: it also defines a set of operations
that can be performed on the data.
The relational model, for example, defines operations such as select, and join.
Although these operations may not be explicit in a particular query language, they
provide the foundation on which a query language is built.
Hierarchical Model
Relational Model
Network Model
Relation Model
The data is stored in two-dimensional tables (rows and columns). The data is
manipulated based on the relational theory of mathematics.
Some well known RDBMS: IBM DB2, Informix, Microsoft SQL Server, Microsoft
Visul Foxpro, MySQL, Oracle, Sybase, Teradata, Microsoft Access
Advantages
The major advantage of network model are-
1.) Conceptual simplicity-Just like the hierarchical model,the network model is also
conceptually simple and easy to design.
2.) Capability to handle more relationship types-The network model can handle the
one to many and many to many relationships which is real help in modeling the real life
situations.
3.) Ease of data access-The data access is easier and flexible than the hierarchical
model.
4.) Data integrity- The network model does not allow a member to exist without an
owner.
5.) Data independence- The network model is better than the hierarchical model in
isolating the programs from the complex physical storage details.
Disadvantages
1.) System complexity- All the records are maintained using pointers and hence the
whole database structure becomes very complex.
Object Model
The ODBMS which is an abbreviation for object-oriented database management
system is the data model in which data is stored in form of objects, which are
instances of classes. These classes and objects together make an object-
oriented data model.
Advantages
Database integrity
Disadvantages
Database Languages
Database languages are used to read, update and store data in a database.
Database Languages are the set of statements, that are used to define and
manipulate a database.
Data Definition Language. DDL stands for Data Definition Language. ...
Data Control Language. DCL stands for Data Control Language. ...
Transaction Control Language. TCL is used to run the changes made by the
DML statement.
It simply deals with descriptions of the database schema and is used to create and
modify the structure of database objects in the database.
CREATE – is used to create the database or its objects (like table, index, function,
views, store procedure and triggers).
TRUNCATE–is used to remove all records from a table, including all spaces
allocated for the records are removed.
Examples of DML:
REVOKE- withdraw user’s access privileges given by using the GRANT command.
Database Schema
A database schema is the skeleton structure that represents the logical view of the
entire database. It defines how the data is organized and how the relations among
them are associated. It formulates all the constraints that are to be applied on the
data.
A database schema defines its entities and the relationship among them. It contains
a descriptive detail of the database, which can be depicted by means of schema
diagrams. It’s the database designers who design the schema to help programmers
understand the database and make it useful.
2. Conceptual or Logical Level: Structure and constraints for the entire database
Conceptual or Logical Level: This schema defines all the logical constraints that
require to be applied on the information stored. It defines tables, views, and integrity
constraints.
External or View level: View schema is outlined because of the style of a database at
view level that usually describes end-user interaction with database systems.
In today's time we use Structured Query Language (SQL), Not only SQL (NoSQL)
and Cloud database.
Functions of DBMS
Manages data dictionaries that stores definition of various data elements and their
relationships.
Provides storage for not only a data but also all related data like procedural codes,
data validation and entry forms.
DBMS provides data privacy by using security systems in a multi user database
interface.
Allows multiple users to access any data at the same point of time without
any discrepancies.
Ensures easy data recovery and back up in order to protect its integrity.
It allows users to communicate and transact via emails and many other
communication modes.
DBMS has reduced the data inconsistencies and difficulty in accessing data.
Important Questions
Q. What is database?
A. A database is a logically coherent collection of data with some inherent meaning,
representing some aspect of real world and which is designed, built and populated
with data for a specific purpose.
Q. What is DBMS?
A. A database is a logically coherent collection of data with some inherent meaning,
representing some aspect of real world and which is designed, built and populated
with data for a specific purpose.
Q. How is the data structure of System R different from the relational structure?
A. Unlike Relational systems in System R
Domains are not supported
Enforcement of candidate key uniqueness is optional
Enforcement of entity integrity is optional
Referential integrity is not enforced
Q. What is an Entity?
A. It is a 'thing' in the real world with an independent existence.
Q. What is an attribute?
A. It is a particular property, which describes the entity.
Q. What is Relationship?
A. It is an association among two or more entities.
Q. What is Record-at-a-time?
A. The Low level or Procedural DML can specify and retrieve each record from a set of
records. This retrieve of a record is said to be Record-at-a-time.
Q. What is normalization?
A. It is a process of analyzing the given relation schemas based on their Functional
Dependencies (FDs) and primary key to achieve the properties
1. Minimizing redundancy,
2. Minimizing insertion, deletion and update anomalies.
Q. What is 2NF?
A. A relation schema R is in 2NF if it is in 1NF and every non-prime attribute A in R is
fully functionally dependent on primary key.
Q. What is 3NF?
A. A relation schema R is in 3NF if it is in 2NF and for every FD X A either of the
following is true
X is a Super-key of R.
A is a prime attribute of R.
In other words, if every non-prime attribute is non-transitively dependent on primary key.
Q. What is 4NF?
A. A relation schema R is said to be in 4NF if for every multivalued dependency X Y
that holds over R, one of following is true.
X is subset or equal to (or) XY = R.
X is a super key.
Q. What is 5NF?
A. A Relation schema R is said to be 5NF if for every join dependency {R1, R2, ..., Rn}
that holds R, one the following is true
Ri = R for some i.
The join dependency is implied by the set of FD, over R in which the left side
is key of R.
Q. What is a query?
A. A query with respect to DBMS relates to user commands that are used to interact
with a data base. The query language can be classified into data definition language
and data manipulation language.
Q. Name the buffer in which all the commands that are typed in are stored?
A. 'Edit' Buffer.
Q. Are the resulting relations of PRODUCT and JOIN operation the same?
A. No.
Product: Concatenation of every row in one relation with every row in
another.
Join: Concatenation of rows from one relation and related rows from
another.
Q. Which part of the RDBMS takes care of the data dictionary? How?
A. Data dictionary is a set of tables and database objects that is stored in a special
area of the database and maintained exclusively by the kernel.
Q. Which part of the RDBMS takes care of the data dictionary? How?
A. Data dictionary is a set of tables and database objects that is stored in a special
area of the database and maintained exclusively by the kernel.
Q. Name the three major set of files on disk that compose a database in Oracle.
A. There are three major sets of files on disk that compose a database. All the files are
binary. These are
Database files
Control files
Redo logs
The most important of these are the database files where the actual data resides.
The control files and the redo logs support the functioning of the architecture
itself. All three sets of files must be present, open, and available to Oracle for
any data on the database to be useable. Without these files, you cannot access
the database, and the database administrator might have to recover some or all
of the database using a backup, if there is one.
Q. What are stored-procedures? And what are the advantages of using them?
A. Stored procedures are database objects that perform a user defined operation. A
stored procedure can have a set of compound SQL statements. A stored procedure
executes the SQL commands and returns the result to the client. Stored procedures
are used to reduce network traffic.
Implicit
Explicit
Cryptography
What is Cryptography
The method of protecting information and communications through the use of codes, so that only those
for whom the information is intended can access it is called Cryptography.
It refers to secure information and communication techniques derived from mathematical concepts and a
set of rule based calculations called algorithms and these algorithm transform messages in ways that are
hard to decipher. These algorithms are used for cryptographic key generation, digital signing, and data
privacy.
History of cryptography
The first known user of a modern cipher was by Roman emperor Julius Caesar , who did not trust his
messengers when communicating with his governors and officers. For this reason, he created a system in
which each character in his messages was replaced by a character three positions ahead of it in the Roman
alphabet.
Recently, cryptography has become a battleground of some of the world's best mathematicians and
computer scientists.
The ability to securely store and transfer sensitive information has proved a critical factor in important
businesses and enterprises.
Cryptography techniques
Cryptography is closely related to the disciplines of cryptology and cryptanalysis. It includes techniques
such as microdots, merging words with images and other ways to hide information in storage or transit.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 2
Download Testbook
Today in the era of the internet, cryptography is most often associated with scrambling plaintext,
ordinary text, sometimes referred to as cleartext into ciphertext, a process called encryption, then back
again known as decryption. Individuals who practice this field are known as cryptographers.
1. Confidentiality. The information cannot be understood by anyone for whom it was unintended.
2. [Link] information cannot be altered in storage or transit between sender and intended receiver
without the alteration being detected.
3. Non-repudiation. The creator/sender of the information cannot deny at a later stage their intentions in
the creation or transmission of the information.
Authentication. The sender and receiver can confirm each other's identity and the origin/destination of
the information.
Procedures which meet the above criteria are known as cryptosystems. Cryptosystems are thought to
refer only to mathematical procedures and computer programs but they also include the regulation of
human behavior like choosing hard-to-guess passwords, logging off unused systems and not discussing
sensitive procedures with outsiders.
Cryptographic algorithms
Cryptosystems are systems which use a set of procedures known as cryptographic algorithms or ciphers
to encrypt and decrypt messages to secure communications among computer systems and applications.
The cipher suite uses one algorithm for encryption and another algorithm for message authentication and
another for key exchange.
key exchange
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 3
Download Testbook
Types of cryptography
Single-key or symmetric-key encryption algorithms: Symmetric encryption is a type of encryption
where only one key (a secret key) is used to both encrypt and decrypt electronic information. The entities
communicating via symmetric encryption must exchange the key so that it can be used in the decryption
process.
Public-key or asymmetric-key encryption algorithms: This algorithm uses a pair of keys, a public key
associated with the sender for encrypting messages and a private key that only the originator knows.
RSA(Ron Rivest, Adi Shamir and Leonard Adleman), used widely on the internet
Digital Signature Algorithm (DSA) adopted as a Federal Information Processing Standard for
digital signatures by NIST in FIPS 186-4
To maintain data integrity in cryptography, hash functions, which return a deterministic output from an
input value, are used to map data to a fixed data size.
Types of cryptographic hash functions include SHA-1 (Secure Hash Algorithm 1), SHA-2 and SHA-3.
It is an encryption system where the sender and receiver of message use a single common key to encrypt
and decrypt messages.
Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to
somehow exchange keys in a secure manner.
The most popular symmetric key cryptography system is Data Encryption System(DES).
Hash Functions:
A hash value with fixed length is calculated as per the plain text which makes it impossible for contents of
plain text to be recovered.
Under this system a pair of keys is used to encrypt and decrypt information.
A public key is used for encryption and a private key is used for decryption.
Even if the public key is known by everyone the intended receiver can only decode it because he alone
knows the private key.
Cryptography concerns
Hackers can bypass cryptography and hack into computers that are responsible for data encryption and
decryption or exploit weak implementations. But cryptography makes it harder for attackers to access
messages and data protected by encryption algorithms.
Increasing concerns about the processing power of quantum computing to break current cryptography
encryption standards.
Quantum computing uses quantum bits called qubits that can represent both 0 and 1 and therefore
perform two calculations at once.
While a large-scale quantum computer may not be built in the next decade, the existing infrastructure
requires standardization of publicly known and understood algorithms.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 5
Download Testbook
Software Engineering
What is software engineering
Software engineering: It is an engineering branch associated with development of software products
using well-defined scientific principles, methods and procedures. The outcome of software engineering is
an efficient and reliable software product. The term software engineering is made of two words, software
and engineering.
Software is more than just a program code, a program is an executable code, which serves some
computational purpose, Software is considered to be a collection of executable programming code,
associated libraries and documentations. Software, when made for a specific requirement is called a
software product.
Engineering on the other hand, is about developing products, using well-defined, scientific principles and
methods.
The process of developing a software product using software engineering principles and methods is
referred to as software evolution. This includes the initial development of software and its maintenance
and updates, till desired software product is developed, which satisfies the expected requirements.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 6
Download Testbook
Evolution starts from the requirement gathering process. After which developers create a prototype of
the intended software and show it to the users to get their feedback at the early stage of software
product development. The users suggest changes, on which several consecutive updates and
maintenance keep on changing too.
Software Paradigms
Software paradigms refer to the methods and steps, which are taken while designing the software. There
are many methods proposed and are in work today, but we need to see where in the software
engineering these paradigms stand. These can be combined into various categories, though each of them
is contained in one another:
Programming paradigm is a subset of Software design paradigm which is further a subset of Software
development paradigm.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 7
Download Testbook
This Paradigm is known as software engineering paradigms where all the engineering concepts pertaining
to the development of software are applied. It consists of –
Requirement gathering
Software design
Programming
Design
Maintenance
Programming
Programming Paradigm
This paradigm is related closely to the programming aspect of software development. This includes –
Coding
Testing
Integration
Large software - As the size of software becomes large engineering has to step to give it a scientific
process.
Scalability- If the software process were not based on scientific and engineering concepts, it would be
easier to re-create new software than to scale an existing one.
Cost- The cost of software remains high if the proper process is not adapted.
Dynamic Nature- If the nature of software is always changing, new enhancements need to be done in
the existing one. This is where software engineering plays a good role.
Quality Management- Better process of software development provides better and quality software
products.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 8
Download Testbook
Operational
This tells us how well software works in operations. It can be measured on:
Budget
Usability
Efficiency
Correctness
Functionality
Dependability
Security
Safety
Transitional
This aspect is important when the software is moved from one platform to another:
Portability
Interoperability
Reusability
Adaptability
Maintenance
This aspect briefs about how well a software has the capabilities to maintain itself in the ever-changing
environment:
Modularity
Maintainability
Flexibility
Scalability
In short, Software engineering is a branch of computer science, which uses well-defined engineering
concepts required to produce efficient, durable, scalable, in-budget and on-time software products.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 9
Download Testbook
SDLC Activities : SDLC provides a series of steps to be followed to design and develop a software product
efficiently. SDLC framework includes the following steps:
Communication
This is the first step where the user initiates the request for a desired software product. He contacts the
service provider and tries to negotiate the terms. He submits his request to the service providing
organization in writing.
Requirement Gathering
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 10
Download Testbook
Feasibility Study
After requirement gathering, the team comes up with a rough plan of the software process. At this step the
team analyzes if a software can be made to fulfill all requirements of the user and if there is any possibility of
software being no more useful.
System Analysis
At this step the developers decide a roadmap of their plan and try to bring up the best software model
suitable for the project. System analysis includes Understanding of software product limitations, learning
system related problems or changes to be done in existing systems beforehand, identifying and addressing
the impact of a project on organization and personnel etc.
Software Design
Next step is to bring down the whole knowledge of requirements and analysis on the desk and design the
software product. The inputs from users and information gathered in the requirement gathering phase are
the inputs of this step. The output of this step comes in the form of two designs; logical design and physical
design.
Coding
This step is also known as the programming phase. The implementation of software design starts in terms of
writing program code .
Testing
Software testing is done while coding by the developers and thorough testing is conducted by testing experts
at various levels of code such as module testing, program testing, product testing, in-house testing and
testing the product at user’s end. Early discovery of errors and their remedy is the key to reliable software.
Integration
Software may need to be integrated with the libraries, databases and other program(s). This stage of SDLC is
involved in the integration of software with outer world entities.
Implementation
This means installing the software on user machines. At times, software needs post-installation
configurations at the user end. Software is tested for portability and adaptability and integration related
issues are solved during implementation.
The software is maintained timely by updating the code according to the changes taking place in the user end
environment or technology. This phase may face challenges from hidden bugs and real-world unidentified
problems
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 11
Download Testbook
Disposition
This phase includes archiving data and required software components, closing down the system, planning
disposition activity and terminating the system at appropriate end-of-system time.
Waterfall Model
Waterfall model is the simplest model of software development paradigm. It says that all the phases of
SDLC will function one after another in a linear manner. That is, when the first phase is finished then only
the second phase will start and so on.
This model assumes that everything is carried out and takes place perfectly as planned in the previous
stage and there is no need to think about the past issues that may arise in the next phase.
This model does not work smoothly if there are some issues left at the previous step.
The sequential nature of the model does not allow us to go back and undo or redo our actions.
This model is best suited when developers already have designed and developed similar software in the
past and are aware of all its domains.
Iterative Model
Iterative process starts with a simple implementation of a subset of the software requirements and
iteratively enhances the evolving versions until the full system is implemented.
At each iteration, design modifications are made and new functional capabilities are added.
The basic idea behind this method is to develop a system through repeated cycles (iterative) and in
smaller portions at a time (incremental).
Spiral Model
The spiral model combines the idea of iterative development with the systematic, controlled aspects of
the waterfall model.
This Spiral model is a combination of iterative development process model and sequential linear
development model i.e. the waterfall model with a very high emphasis on risk analysis.
It allows incremental releases of the product or incremental refinement through each iteration around
the spiral.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 12
Download Testbook
V – model
The V-model is an SDLC model where execution of processes happens in a sequential manner in a V-
shape. It is also known as the Verification and Validation model.
The V-Model is an extension of the waterfall model and is based on the association of a testing phase for
each corresponding development stage.
This means that for every single phase in the development cycle, there is a directly associated testing
phase. This is a highly-disciplined model and the next phase starts only after completion of the previous
phase.
This model is the simplest model in its form. It requires little planning, lots of programming and lots of
funds. This model is conceptualized around the big bang of the universe.
As scientists say that after the big bang lots of galaxies, planets and stars evolved just as an event.
Likewise, if we put together lots of programming and funds, you may achieve the best software product.
For this model, a very small amount of planning is required. It does not follow any process, or at times the
customer is not sure about the requirements and future needs. So the input requirements are arbitrary.
Data Structure
What is Data Structure
Data structures is a way of organizing data in a specialized format on a system so that the information
can be organized, processed, stored, and retrieved quickly and effectively. They are a means of handling
information, rendering the data for easy use.
Every application, piece of software, or program foundation consists of two components: algorithms and
data.
Data is information, and algorithms are rules and instructions that turn the data into something useful to
programming.
Abstract
Abstract Data type (ADT) is a type (or class) for objects whose behavior is defined by a set of values and a
set of operations.
The definition of ADT only mentions what operations are to be performed but not how these operations
will be implemented.
It does not specify how data will be organized in memory and what algorithms will be used for
implementing the operations.
It is called abstract , because it gives an implementation-independent view. The process of providing only
the essentials and hiding the details is known as abstraction.
Composite or Compound
Composite data comprises combined primitive data types and includes arrays, classes, records, strings,
and structs.
A composite data type or compound data type is any data type which can be constructed in a program
using the programming language's primitive data types and other composite types.
Primitive
Primitive data is classified as basic data and consists of Boolean, characters, integers, pointers, and fixed-
and floating-point numbers.
These data types are the building blocks of data structures. Data types tell the interpreter or the
computer how the programmer plans on using the data. Furthermore, data analysts can choose from
different data structure classifications. The trick is to select the structure best suited for your needs and
situation.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 14
Download Testbook
Linear structures arrange data in a linear sequence, such as found in an array, list, or queue.
In nonlinear structures, the data doesn’t form a sequence but instead connects to two or more
information items, like in a tree or graph.
As the term implies, static structures consist of fixed, permanent structures and sizes at compile time.
The array reserves a set amount of reserve memory set up by the programmer ahead of time.
Dynamic structures feature non-fixed memory capacities, shrinking or expanding as required by the
program and its execution requirements.
Homogenous data structures consist of the same data element type, like element collections found in an
array.
In inhomogeneous structures, the data don’t have to be the same type, such as structures.
Arrays are collections of data items that are of the same type, stored together in adjoining memory
locations. Each data item is known as an “element.” Arrays are the most basic, fundamental data
structure. Aspiring Data Scientists should master array construction before moving on to other structures
such as queues or stacks.
Graphs.
Graphs are a nonlinear pictorial representation of element sets. Graphs consist of finite node sets, also
called vertices, connected by links, alternately called edges. Trees, mentioned below, are a graph
variation, except the latter has no rules governing how the nodes connect.
Hash Tables.
Hash tables, also called hash maps, can be used as either a linear or nonlinear data structure, though
they favor the former.
This structure is normally built using arrays. Hash tables map keys to values.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 15
Download Testbook
For example, every book in a library has a unique number assigned to it that facilitates looking up
information about the book, like who has checked it out, its current availability, etc. The books in the
library are hashed to a unique number.
Linked List.
Linked lists store item collections in a linear order. Each element in a linked list contains a data item and a
link, or reference, to the subsequent item on the same list.
Stack.
Stacks store collections of items in a linear order and are used when applying the operations. For
example, the order could be “first in, first out” (FIFO) or “last in, first out” (LIFO).
Queue.
Queues store item collections sequentially like stacks but they operate on the principle of “first in, first
out” only. Queues are linear lists.
Tree.
Trees store item collections in an abstract hierarchy. They are multilevel data structures that use nodes.
The bottom nodes are called “leaf nodes,” while the topmost node is known as the “root node.”
Trie
Not to be confused with a Tree, Tries are data structures that store strings like data items and are placed
in a visual graph.
Tries are also called keyword trees or prefix trees. Whenever you use a search engine and receive
autosuggestions, you’re witnessing the trie data structure in action.
Stacks in computing architectures are regions of memory where data is added or removed in a last-in-
first-out (LIFO) manner.
In most modern computer systems, each thread has a reserved region of memory referred to as its
stack.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 16
Download Testbook
When a function executes, it may add some of its local state data to the top of the stack; when the
function exits it is responsible for removing that data from the stack.
At a minimum, a thread's stack is used to store the location of a return address provided by the caller
in order to allow return statements to return to the correct location.
The stack is often used to store variables of fixed length local to the currently active functions.
Programmers may further choose to explicitly use the stack to store local data of variable length. If a
region of memory lies on the thread's stack, that memory is said to have been allocated on the stack,
i.e. stack-based memory allocation (SBMA).
This is contrasted with a heap-based memory allocation (HBMA). The SBMA is often closely coupled
with a function call stack.
Stacks can be used for Conversion from one form of expression to another.
Que :
In this representation the Queue is implemented using the array. Variables used in this case are
FRONT- the index where the first element is stored in the array representing the queue.
REAR- the index where the last element is stored in array representing the queue.
MAX- defining how many elements (maximum count) can be stored in the array representing the
queue.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 17
Download Testbook
In this representation the queue is implemented using the dynamic data structure Linked List. Using a
linked list for creating a queue makes it flexible in terms of size and storage. You don’t have to define the
maximum number of elements in the queue.
FRONT- address of the first element of the Linked list storing the Queue.
REAR- address of the last element of the Linked list storing the Queue.
Queue Applications
Data structures offer many advantages to IT-related processes, especially as applications get more complex
and the amount of existing data keeps growing. Here are some reasons why data structures are essential.
They facilitate greater processing speeds. Large amounts of data require faster processing, and data
structures help organize the data into forms that are easier to work with and process.
They make it easier to search for data. Data structures organize information into workable forms that are
easier to conduct required searches for.
They are reusable. Once you implement a given data structure, it can be used anywhere. There is no
need to make a new structure. This function saves time and resources.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 18
Download Testbook
They make it easy to handle multiple requests. You rarely find a single user accessing a database. Instead,
it’s common to have hundreds, if not thousands, of users searching and interacting with a database. Data
structures arrange information so that users don’t have to search every item — they can instantly search
just the required data.
Data Storage.
Data structures facilitate efficient data persistence, like specifying attribute collections and corresponding
structures used in database management systems to store records.
Data Exchange.
Organized information, defined by data structures, can be shared between applications like TCP/IP
packets.
Data structures such as linked lists can enable core operating systems resources and services to perform
functions like file directory management, memory allocation, and processing scheduling queues.
Scalability.
Big data applications rely on data structures to manage and allocate data storage across many distributed
storage locations. This function guarantees scalability and high performance.
COMPUTER AWARENESS | Cryptography , Software Engineering , Data Structure & Memory PAGE 19