What Is Computer
What Is Computer
Computer
Computer is an electronic device which is capable of receiving information or data
and perform a series of operations in accordance with a set of operations. This
produces results in the form of data or information. Computer is a machine capable
of solving problems and manipulating data. It accepts and processes the data by
doing some mathematical and logical operations and gives us the desired output.
in other language Computer is an electronic machine which has been mastered in
the rapid calculation, today the use of computer is increasing in all fields, now
computer is not only used for addition and remainder, it is now a machine taken
even in rocket science. It is really such an amazing machine that processes our
given Instructions (Input) and produces useful Results (output|).
Computer Hardware: It is the external part of the whole computer which we can
see even by touching or in other language say that the parts and devices of the
computer which we can touch and see are hardware. It is physically connected to
the computer.
Computer Software: It is a set of instructions and programs. A computer needs a
set of programs to program and run it, these are called software, it gives the ability
to any user to work on the computer very easily.
Computer User: The one who operates the computer is the user because the
computer needs to be operated and turned on at least once, to run any software, the
user’s instruction is required.
Accuracy
Computers perform calculations with 100% accuracy. Errors may occur due
to data inconsistency or inaccuracy.
Diligence
Versatility
Reliability
A computer is reliable as it gives consistent result for similar set of data i.e., if we
give same set of input any number of times, we will get the same result.
Automation Computer performs all the tasks automatically i.e. it performs tasks
without manual intervention.
Memory
A computer has built-in memory called primary memory where it stores data.
Secondary storage are removable devices such as CDs, pen drives, etc., which are
also used to store data.
1. Monitor
The device which displays all the icons, text, images, etc. over a screen is called the Monitor
When we ask the computer to perform an action, the result of that action is displayed on the monitor
Various types of monitors have also been developed over the years
2. Printer
A device which makes a copy of the pictorial or textual content, usually over a paper is called a printer
For example, an author types the entire book on his/her computer and later gets a print out of it, which is in the
form of paper and is later published
Multiple types of printers are also available in the market, which can serve different purposes
3. Speakers
A device through which we can listen to a sound as an outcome of what we command a computer to do is called a
speaker
Speakers are attached with a computer system and also are a hardware device which can be attached separately
With the advancement in technology, speakers are now available which are wireless and can be connected using
BlueTooth or other applications
4. Projector
An optical device which presents an image or moving images onto a projection screen is called a projector
Most commonly these projectors are used in auditoriums and movie theatres for the display of the videos or
lighting
If a projector is connected to a computer, then the image/video displayed on the screen is the same as the one
displayed on the computer screen
5. Headphones
They perform the same function as a speaker, the only difference is the frequency of sound
Using speakers, the sound can be heard over a larger area and using headphones, the sound is only audible to
the person using them
Also known as earphones or headset
Software and its Types
Software is a collection of instructions, data, or computer programs that are used to run machines and carry out
particular activities. It is the antithesis of hardware, which refers to a computer’s external components. A device’s
running programs, scripts, and applications are collectively referred to as “software” in this context.
What is a Software?
In a computer system, the software is basically a set of instructions or commands that tell a computer what to do. In
other words, the software is a computer program that provides a set of instructions to execute a user’s commands
and tell the computer what to do. For example like MS-Word, MS-Excel, PowerPoint, etc.
Types of Software
It is a collection of data that is given to the computer to complete a particular task. The chart below describes the
types of software:
Above is the diagram of types of software. Now we will briefly describe each type and its subtypes:
1. System Software
Operating System
Language Processor
Device Driver
2. Application Software
General Purpose Software
Customize Software
Utility Software
System Software
System software is software that directly operates the computer hardware and provides the basic functionality to the
users as well as to the other software to operate smoothly. Or in other words, system software basically controls a
computer’s internal functioning and also controls hardware devices such as monitors, printers, and storage devices,
etc. It is like an interface between hardware and user applications, it helps them to communicate with each other
because hardware understands machine language(i.e. 1 or 0) whereas user applications are work in human-readable
languages like English, Hindi, German, etc. so system software converts the human-readable language into machine
language and vice versa.
Types of System Software
It has two subtypes which are:
1. Operating System: It is the main program of a computer system. When the computer system ON it is the first
software that loads into the computer’s memory. Basically, it manages all the resources such as computer
memory, CPU, printer, hard disk, etc., and provides an interface to the user, which helps the user to interact
with the computer system. It also provides various services to other computer software. Examples of operating
systems are Linux, Apple macOS, Microsoft Windows, etc.
2. Language Processor: As we know that system software converts the human-readable language into a machine
language and vice versa. So, the conversion is done by the language processor. It converts programs written in
high-level programming languages like Java, C, C++, Python, etc(known as source code), into sets of
instructions that are easily readable by machines(known as object code or machine code).
3. Device Driver: A device driver is a program or software that controls a device and helps that device to perform
its functions. Every device like a printer, mouse, modem, etc. needs a driver to connect with the computer system
eternally. So, when you connect a new device with your computer system, first you need to install the driver of
that device so that your operating system knows how to control or manage that device.
Features of System Software
Let us discuss some of the features of System Software:
System Software is closer to the computer system.
System Software is written in a low-level language in general.
System software is difficult to design and understand.
System software is fast in speed(working speed).
System software is less interactive for the users in comparison to application software.
Application Software
Software that performs special functions or provides functions that are much more than the basic operation of the
computer is known as application software. Or in other words, application software is designed to perform a specific
task for end-users. It is a product or a program that is designed only to fulfill end-users’ requirements. It includes
word processors, spreadsheets, database management, inventory, payroll programs, etc.
Types of Application Software
There are different types of application software and those are:
1. General Purpose Software: This type of application software is used for a variety of tasks and it is not limited to
performing a specific task only. For example, MS-Word, MS-Excel, PowerPoint, etc.
2. Customized Software: This type of application software is used or designed to perform specific tasks or
functions or designed for specific organizations. For example, railway reservation system, airline reservation
system, invoice management system, etc.
3. Utility Software: This type of application software is used to support the computer infrastructure. It is designed
to analyze, configure, optimize and maintains the system, and take care of its requirements as well. For
example, antivirus, disk fragmenter, memory tester, disk repair, disk cleaners, registry cleaners, disk space
analyzer, etc.
Features of Application Software
Let us discuss some of the features of Application Software:
An important feature of application software is it performs more specialized tasks like word processing,
spreadsheets, email, etc.
Mostly, the size of the software is big, so it requires more storage space.
Application software is more interactive for the users, so it is easy to use and design.
The application software is easy to design and understand.
Application software is written in a high-level language in general.
Difference Between System Software and Application Software
Now, let us discuss some difference between system software and application software:
It is designed to manage the resources of the computer It is designed to fulfill the requirements of the user
system, like memory and process management, etc. for performing specific tasks.
Less interactive for the users. More interactive for the users.
System software plays vital role for the effective Application software is not so important for the
functioning of a system. functioning of the system, as it is task specific.
The malicious activity carried out by the virus’s code can damage the local file system, steal data, interrupt services,
download additional malware, or any other actions the malware author coded into the program. Many viruses pretend to be
legitimate programs to trick users into executing them on their devices, delivering the computer virus payload.
Your computer drive has a sector solely responsible for pointing to the operating system so that it can boot into the
interface. A boot sector virus damages or controls the boot sector on the drive, rendering the machine unusable. Attackers
usually use malicious USB devices to spread this computer virus. The virus is activated when users plug in the USB
device and boot their machine.
Most browsers have defenses against malicious web scripts, but older, unsupported browsers have vulnerabilities allowing
attackers to run code on the local device.
Browser Hijacker
A computer virus that can change the settings on your browser will hijack browser favorites, the home page URL, and
your search preferences and redirect you to a malicious site. The site could be a phishing site or an adware page used to
steal data or make money for the attacker.
Resident Virus
A virus that can access computer memory and sit dormant until a payload is delivered is considered a resident virus. This
malware may stay dormant until a specific date or time or when a user performs an action.
When a user executes a seemingly harmless file attached to malicious code, direct-action viruses deliver a payload
immediately. These computer viruses can also remain dormant until a specific action is taken or a timeframe passes.
Polymorphic Virus
Malware authors can use polymorphic code to change the program’s footprint to avoid detection. Therefore, it’s more
difficult for an antivirus to detect and remove them.
To persist on a system, a threat actor uses file infector viruses to inject malicious code into critical files that run the
operating system or important programs. The computer virus is activated when the system boots or the program runs.
Multipartite Virus
These malicious programs spread across a network or other systems by copying themselves or injecting code into critical
computer resources.
Macro Virus
Microsoft Office files can run macros that can be used to download additional malware or run malicious code. Macro
viruses deliver a payload when the file is opened and the macro runs.
Computer viruses function as malicious software programs designed to infect other programs by modifying them in some
way. In doing so, a virus will attach itself to an unsuspecting file or application in order to spread.
A virus can attach itself to any legitimate program or document that supports macros to execute its code, such as an email
attachment or a file download from a website. Once the file is opened or downloaded, the virus springs into action and
starts executing.
Computer viruses can be quite crafty to remain hidden from both users and antivirus software alike. Viruses employ
stealth techniques such as polymorphism, which changes their appearance, or encryption methods.
Once activated, a virus may wreak havoc on your computer system. It can steal sensitive data, corrupt files, slow down
performance, and even crash your entire system. It can spread from system to system after a user takes action that either
intentionally or accidentally facilitates it.
It’s important to note that viruses are just one type of malware, and many other types of malicious software can harm your
computer or steal your personal information.
One method of virus transmission is through email attachments. Hackers often disguise their malicious code as seemingly
harmless files, such as documents or images unsuspecting users open without a second thought. For example, Ursnif
banking Trojan campaigns are known to spread via email attachments posing as invoices or financial statements.
Internet Downloads
Viruses can also hide in software installers, media files, or even browser extensions that you download from the web. It’s
important to be cautious when downloading files from unknown sources or sketchy websites. A notorious case was the
Download.com scandal, where popular applications were bundled with adware and other unwanted programs by default.
File sharing networks like torrent sites and peer-to-peer platforms can easily transmit viruses. Innocent-looking movie
torrents or cracked software may carry hidden payloads designed to compromise your device upon installation. For
example, The Pirate Bay used a browser-based cryptocurrency miner, so when someone visited the website, their
computer was used to mine cryptocurrency without their knowledge or consent.
Removable Media
Viruses can attach to removable media, such as USB drives and CDs/DVDs, infecting any computer they’re plugged into.
The infamous Stuxnet worm is a prime example of a virus that spreads through removable media.
To protect yourself and your organization from computer viruses, always exercise caution and employ robust
cybersecurity measures like up-to-date antivirus software and regular system scans. Remember, knowledge is power,
especially when preventing viruses and cyber-attacks.
1. Download and install antivirus software: Assuming you don’t already have antivirus software installed,
download and install a real-time and on-demand solution, if possible. A real-time malware scanner scans for
viruses in the background while you use the computer. You must start the on-demand scanner whenever you
want to scan your device.
2. Disconnect from the internet: Some computer viruses use the internet connection to spread, so it’s best to
disconnect from the internet when removing a virus from your PC to prevent further damage.
3. Delete any temporary files: Depending on the type of virus, deleting temporary files can also delete the virus, as
some viruses are designed to initiate when your computer boots up.
4. Reboot your computer into safe mode: To help mitigate damages to your computer while you remove a virus,
reboot your device in ‘Safe Mode.’ This will inhibit the virus from running and allow you to remove it more
effectively.
5. Run a virus scan: Run a full scan using your antivirus software, opting for the most thorough or complete
scanning option available. If possible, cover all your hard drive letters during the scan.
6. Delete or quarantine the virus: Once the virus is detected, your antivirus software will give you the option to
delete or quarantine the virus. Quarantining the virus will isolate it from the rest of your computer to prevent it
from causing further damage.
7. Reboot your computer: Assuming you’ve effectively removed the virus, your computer can be rebooted. Simply
turn on the device as you would do so normally without initiating the “Safe Mode” option.
8. Update your browser and operating system: To complete the virus removal process, update your operating
system and web browser to the latest version possible. Browser and OS Updates often contain fixes for
particular vulnerabilities and exploits.
Given the general nature of this process, the outcome may vary from virus to virus and device to device. If you are unsure
if you’ve effectively removed a virus from your computer, contact an IT or computer professional for assistance.
What is Cyber Security?
The technique of protecting internet-connected systems such as computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks is known as cybersecurity. We can divide cybersecurity into
two parts one is cyber, and the other is security. Cyber refers to the technology that includes systems, networks,
programs, and data. And security is concerned with the protection of systems, networks, applications, and
information. In some cases, it is also called electronic information security or information technology
security.
o Network Security: It involves implementing the hardware and software to secure a computer network
from unauthorized access, intruders, attacks, disruption, and misuse. This security helps an organization
to protect its assets against external and internal threats.
o Application Security: It involves protecting the software and devices from unwanted threats. This
protection can be done by constantly updating the apps to ensure they are secure from attacks.
Successful security begins in the design stage, writing source code, validation, threat modeling, etc.,
before a program or device is deployed.
o Information or Data Security: It involves implementing a strong data storage mechanism to maintain
the integrity and privacy of data, both in storage and in transit.
o Identity management: It deals with the procedure for determining the level of access that each
individual has within an organization.
o Operational Security: It involves processing and making decisions on handling and securing data
assets.
o Mobile Security: It involves securing the organizational and personal data stored on mobile devices
such as cell phones, computers, tablets, and other similar devices against various malicious threats.
These threats are unauthorized access, device loss or theft, malware, etc.
o Cloud Security: It involves in protecting the information stored in the digital environment or cloud
architectures for the organization. It uses various cloud service providers such as AWS, Azure, Google,
etc., to ensure security against multiple threats.
o Disaster Recovery and Business Continuity Planning: It deals with the processes, monitoring, alerts,
and plans to how an organization responds when any malicious activity is causing the loss of
operations or data. Its policies dictate resuming the lost operations after any disaster happens to the
same operating capacity as before the event.
o User Education: It deals with the processes, monitoring, alerts, and plans to how an organization
responds when any malicious activity is causing the loss of operations or data. Its policies dictate
resuming the lost operations after any disaster happens to the same operating capacity as before the
event.
Types of Cyber Security Threats
A threat in cybersecurity is a malicious activity by an individual or organization to corrupt or steal data, gain
access to a network, or disrupts digital life in general. The cyber community defines the following threats
available today:
Malware
Malware means malicious software, which is the most common cyber attacking tool. It is used by the
cybercriminal or hacker to disrupt or damage a legitimate user's system. The following are the important types
of malware created by the hacker:
Phishing
Phishing is a type of cybercrime in which a sender seems to come from a genuine organization like PayPal,
eBay, financial institutions, or friends and co-workers. They contact a target or targets via email, phone, or text
message with a link to persuade them to click on that links. This link will redirect them to fraudulent websites to
provide sensitive data such as personal information, banking and credit card information, social security
numbers, usernames, and passwords. Clicking on the link will also install malware on the target devices that
allow hackers to control devices remotely.
Ransomware
In a ransomware attack, the victim's computer is locked, typically by encryption, which keeps the victim from using
the device or data that's stored on it. To regain access to the device or data, the victim has to pay the hacker a
ransom, typically in a virtual currency such as Bitcoin. Ransomware can be spread via malicious email attachments,
infected software apps, infected external storage devices and compromised websites.
Exploit kits
An exploit kit is a programming tool that enables a person without any experience writing software code to
create, customize and distribute malware. Exploit kits are known by a variety of names,
including infection kit , crimeware kit , DIY attack kit and malware toolkit . Cybercriminals use these
toolkits to attack system vulnerabilities to distribute malware or engage in other malicious activities, such
A short note of the history of the Internet will help you understand when, where,
and how the Internet was developed.
History of the Internet
The first question that pops into your mind is probably, “Who started the
internet?”. The Internet was developed by Bob Kahn and Vint Cerf in the 1970s.
They began the design of what we today know as the ‘internet.’ It was the result
of another research experiment which was called ARPANET, which stands for
Advanced Research Projects Agency Network. This was initially supposed to be
a communications system for the Defense Team of the United States of America
- a network that would also survive a nuclear attack. It eventually became a
successful nationwide experimental packet network. But when was the first
Internet started? It is believed that on 6 August 1991, when the World Wide Web
opened to the public.
How Does the Internet Work?
Computers that we use every day are called clients because they are indirectly
connected to the Internet through an internet service provider. When you open a
webpage on your computer, you connect to the webpage, and then you can
access it. Computers break the information into smaller pieces called packets,
which are reassembled in their original order.
If we put the right address on a packet and send it to any computer which is
connected as part of the internet, each computer would figure out which cable to
send it down next so that it would get to its destination. With several computers
on a network, it may create confusion even with unique addresses. This transfer
of messages is handled by the Packet Routing Network, and hence a router is
required to set up.
The Transfer Control Protocol is another system that makes sure no packet is
lost or left behind because it might create a disrupted message at the receiving
end.
The below are the steps for how the message is transferred.
1. First, Computer1 sends a message by IP address to Computer2
2. The message sent by Computer1 is broken into small pieces- packets.
3. These small pieces- packets are transferred concerning Transfer Protocol
so that the quality is maintained.
4. Finally, these small pieces- packets reach Computer2 and are
reassembled at their IP address.
The Internet works in a more complex manner than these above-given steps, but
this might give a basic idea of how the internet works.
Father of the Internet: Tim Berners-Lee
Tim Berners-Lee was the man, who led the development of the World Wide Web,
the defining of HTTP (HyperText Transfer Protocol), HTML (hypertext markup
language) used to create web pages, and URLs (Universal Resource Locators).
The development of WWW, HTTP, HTML and URLs took place between 1989
and 1991. Tim Berners-Lee was born in London and he graduated in Physics
from Oxford University in 1976. Currently, Tim Berners-Lee is the Director of the
World Wide Web Consortium, the group that sets technical standards for the
web.
Tim Berners-Lee, Vinton Cerf is also named as an internet daddy other than Tim
Berners-Lee. After being out for 10 years from high school, he began co-
designing and co-developing the protocols and structure of what became the
internet.
Evolution of the Internet
Although the Internet was developed much earlier, it only became popular in
households in the 1990s. The emergence of the Internet can be tracked by how
many businesses and homes started changing the way they worked and started
connecting their laptops and other devices to the Internet. However, the concept
of hypertext transfer protocol (HTTP) as we know it today, was created only
during this time. This meant that people could access the same web pages on
their devices now and share information.
There has been a dramatic growth in the number of internet users since its
inception. As a result, the number of computer networks that are connected has
grown exponentially too. It started with only connecting less than ten computers
initially. Today, 440 million computers can be connected directly, making life
easier for people across the globe. Sharing information and knowledge has
become extremely easy for those that have access to the Internet. The country
with the highest number of internet users is China, with 1.4 billion users, followed
by India with 1.3 billion and the United States of America with a little over 0.3
billion users.
Wireless Local Area Network: This is a local area network that uses wireless
communication instead of wired communication. In WLAN, two computers use
wireless communication to form a local area network. A wifi router is very
common in this case. There are no cables involved in this case.
Advantages of Internet
The internet has become a popular name since the introduction of its easy
installation and setup. The Internet was first invented for only military and
government uses. But now, it is found in every house across the world. The
following are the advantages of the internet.
It is a great medium of sharing and has increased connectivity.
With the internet, banking has now become easier. Long tiresome waiting
lines have been eliminated since the introduction of e-banking platforms.
E-commerce websites are one of the great advantages of the internet. One
can buy groceries, clothes, household items, and much more with the
internet.
The Internet is also a great source of entertainment. One can watch videos
and movies, listen to music, and play games, without any hassle.
Social media platforms like Facebook, Instagram, and Twitter have brought
the world closer.
The education system has also transformed. With the internet, any student
across the world can attend online classes.
The most powerful motivator for the Internet to work is the fact that knowledge
and information have to be shared amongst people. The article provided useful
information about the internet such as its history, working and evolution etc.
The Internet standards describe a framework known as the Internet protocol suite (also
called TCP/IP, based on the first two components.) This is a suite of protocols that are ordered into a
set of four conceptional layers by the scope of their operation, originally documented
in RFC 1122 and RFC 1123. At the top is the application layer, where communication is described in
terms of the objects or data structures most appropriate for each application. For example, a web
browser operates in a client–server application model and exchanges information with the Hypertext
Transfer Protocol (HTTP) and an application-germane data structure, such as the HyperText Markup
Language (HTML).
Below this top layer, the transport layer connects applications on different hosts with a logical
channel through the network. It provides this service with a variety of possible characteristics, such
as ordered, reliable delivery (TCP), and an unreliable datagram service (UDP).
Underlying these layers are the networking technologies that interconnect networks at their borders
and exchange traffic across them. The Internet layer implements the Internet Protocol (IP) which
enables computers to identify and locate each other by IP address and route their traffic via
intermediate (transit) networks.[75] The Internet Protocol layer code is independent of the type of
network that it is physically running over.
At the bottom of the architecture is the link layer, which connects nodes on the same physical link,
and contains protocols that do not require routers for traversal to other links. The protocol suite does
not explicitly specify hardware methods to transfer bits, or protocols to manage such hardware, but
assumes that appropriate technology is available. Examples of that technology include Wi-
Fi, Ethernet, and DSL.
Internet protocol
The most prominent component of the Internet model is the Internet Protocol (IP). IP enables internetworking and, in
essence, establishes the Internet itself. Two versions of the Internet Protocol exist, IPv4 and IPv6.
IP Addresses
A DNS resolver consults three name servers to resolve the domain name
user-visible "www.wikipedia.org" to determine the IPv4 Address 207.142.131.234.
For locating individual computers on the network, the Internet provides IP addresses. IP addresses are used by the Internet
infrastructure to direct internet packets to their destinations. They consist of fixed-length numbers, which are found within the
packet. IP addresses are generally assigned to equipment either automatically via DHCP, or are configured.
However, the network also supports other addressing systems. Users generally enter domain names (e.g.
"en.wikipedia.org") instead of IP addresses because they are easier to remember, they are converted by the Domain Name
System (DNS) into IP addresses which are more efficient for routing purposes.
Uses of Internet
The Internet is a global networking system that can be used on most devices nowadays and has become an
essential part of our lives. In today's technological era, most of the companies are getting their operations done
over the Internet. There are various uses of the Internet by which companies and individuals are making their
daily tasks more productive and more comfortable.
Here, we have discussed the major uses of the Internet that play a vital role in daily life:
The Internet has made it a lot easier for people to book tickets for buses, trains, flights (domestic and
international) directly using their devices from anywhere. People can also book a taxi by choosing their current
location, and they will be picked up or dropped at a specified location. Now no one needs to wait in long
queues for their turn to book tickets at the ticket counter.
Besides, people can order a wide variety of products at home using the Internet and devices. It can range from
grocery products to ready to eat, fashionable clothes to medicines. Most items can be ordered at home and
received directly at the door.
Cashless Transactions
Most countries are promoting cashless transactions and digital payments. This helps people not carry much
cash. People can pay their bills through debit or credit cards using POS devices. These devices are connected to
the payment gateway on the Internet. Besides, People can also use their smartphone and the Internet for
processing transactions on UPI (Unified Payment Interface). It does not even require them to carry their cards.
The UPI payment method is continuously evolving and is expected to cover most transactions in the near
future.
Education
Most of the devices nowadays are connected through the Internet. The Internet has the availability of broad
educational content on any topic with different types. People can study the relevant topic just by spending a
couple of minutes over the Internet. Internet Search engines help people quickly find the relevant study
material in multiple formats (such as images, videos, documents, etc.). This helps eliminate the need to go to
the library to read several books to find the desired information.
Besides, the Internet has also enabled students to participate in their classes through video conferencing, where
students can connect with their teachers or professionals anywhere in the world.
The way of banking has changed after the introduction of the Internet. The Internet has made banking online
where people can manage their bank accounts while sitting at home or traveling abroad. Nowadays, most of
the features of banking are right in people's hands. With the help of online banking, people can securely
transfer the money from one account to another, change their ATM pins, apply for the physical or virtual credit
cards, update credit card limits, enable or disable international transactions, track their transactions, and many
more. Also, they can even raise an online complaint or contact to bank's support staff.
Apart from this, the Internet has made it a lot easier for people to trade in the Stock market from anywhere.
People can easily buy, sell, or manage stocks online.
Research
The Internet is playing a significant role in the field of research. Before the use of the Internet, it was quite hard
to look for information about anything. People had to go through hundreds of books for references to find the
desired information. However, the Internet has made it a lot easier, and anyone can find the required
information at some clicks only. In research, people can study about the success and failed research and work
further for the improvements. Uses of the Internet in research have incredibly beneficial for the researchers.
Electronic Mail
Email or electronic mail is one of the first significant uses of the Internet. The email has enabled faster
communication between people on the Internet. Using email, people can quickly share information, data files,
such as images, audio, video, and other types of files. The use of email has significantly reduced paper use,
which was the primary source of communication in the olden days. Anyone can have a free email address and
can easily communicate with others. This has also reduced the load on the physical mail system, although it is
still in use.
Job Search
Getting a job is a lot easier than before. Any person can view relevant job information using the Internet. Earlier,
people had to go through each company individually to know if a position was vacant or not. However, the
Internet has enabled people to find employment sitting at home to suit their interests. Many websites provide
details about job availability. Once people submit their resumes, these websites keep informing about vacancies
through email. Besides, each well-known company has its website, where the company posts about the vacancy
opening. So, just sitting at home, people can search, apply for jobs and even give their interviews and see or
know their results.
Social Networking
Social networking sites have connected people around the world. Social networking is an essential part of the
Internet. With the help of the Internet, people have got the ability to form social groups where they can share
information, thoughts and ideas about anything. The social networking platform is the largest source of
content, covering everything from informative content to entertainment. The best thing is that people don't
have to pay anything to use these services. This helps businesses develop their community and promote their
products.
Collaboration
Due to the Internet, communication has become easier and better. You can easily connect with anyone on the
Internet, either texting, calling or video calling. It has created new cooperation opportunities for the people.
There are several online chat software and websites that help people create group discussions or meetings. It
helps businesses to have a hassle-free discussion. Therefore, people do not always need to travel long distances
to attend meetings. This helps people avoid unnecessary travel and save time for productive use.
Besides, there are many cloud-based software and websites that offer people to work on the same project
simultaneously at the same time. People from different places can easily connect and support their specialties
using the Internet.
Entertainment
The Internet is the most effective means of entertainment. There are various options available on the Internet,
which people can try, such as watching movies, playing online games, listening to songs, etc. The Internet has
also made it easy for people to download entertainment items to their local storage. Using the Internet, people
can also share their videos, songs, pictures online with others. Also, nowadays, people can watch live TV or
sports on the Internet.
E-Commerce
The Internet is not just limited to ordering things; it can also be used to sell products. Many e-commerce
websites allow businesses and individuals to sell their products. Products are purchased by these e-commerce
companies, stored in their warehouses, packaged in their brand packaging, and distributed by themselves. E-
commerce companies charge some commission to distribute goods to customers. Also, they offer great
discounts and offers to customers. The best thing is that customers do not have to go to physical stores.
Besides, sellers can also create their website and list their products there. They can refer to all information about
the product, answer customer questions and provide online payment options to their customers. All these
things are possible on the Internet.
File Transfer
The Internet has made file transfer between systems or devices easier. With FTP (File Transfer Protocol), data
can be securely exchanged over the Internet. FTP is mainly beneficial when large files need to be transferred
because email allows sharing files with limited size. FTP is the best way to exchange information between two
stakeholders. This method is still quite popular and in use.
Navigation
The navigation mechanism is one of the most beneficial uses of the Internet. Once a user put the location in the
online maps (such as Google maps), it provides all the details about that location. Users can even find the best
route to visit that particular location. The map also provides the distance between the locations. The best thing
about navigation is that it will provide the shortest possible route with less traffic. One can also search for any
specific place like the nearest hotel, restaurants, banks, ATM, etc. Apart from this, a person can share a live
location with others using the Internet and the navigation technique.
Advertising
Because most people use the Internet, it is the best means of promoting something or advertising. There are
options for paid promotion as well as free promotion. There are many advertising platforms on the Internet that
help promote products or businesses online. These platforms advertise products on other related websites
using banners, videos, email etc. They charge for these advertisements according to distance, keywords and
audience etc. However, one can also use social media platforms to create online groups or communities and
advertise freely.
Real-time updates
The Internet is helping people to keep up with what is happening around the world. Many news and
information websites provide real-time updates on various categories, such as politics, history, news, geology,
leisure, sports, technology, marketing, and more. One can easily select the category of interest and stay
connected with updates. The presence of e-newspapers and magazines is updating people and helping to cut
paper usage.
1) Bus Topology
o The bus topology is designed in such a way that all the stations are connected through a single cable
known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly connected to the backbone
cable.
o When a node wants to send a message over the network, it puts a message over the network. All the
stations available in the network will receive the message whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is broadcast to all the
stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access).
CSMA: It is a media access control used to control the data flow so that data integrity is maintained, i.e., the
packets do not get lost. There are two alternative ways of handling the problems that occur when two nodes
send the messages simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to detect the collision. Once the
collision is detected, the sender will stop transmitting the data. Therefore, it works on "recovery after the
collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the collision by
checking whether the transmission media is busy or not. If busy, then the sender waits until the media
becomes idle. This technique effectively reduces the possibility of the collision. It does not work on
"recovery after the collision".
2) Ring Topology
o Ring topology is like a bus topology, but with connected ends.
o The node that receives the message from the previous computer will retransmit to the next node.
o The data flows in one direction, i.e., it is unidirectional.
o The data flows in a single loop continuously known as an endless loop.
o It has no terminated ends, i.e., each node is connected to other node and having no termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed from one node to
another node.
o Token: It is a frame that circulates around the network.
3) Star Topology
o Star topology is an arrangement of the network in which every node is connected to the central hub,
switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to the server are known
as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star topology.
o Star topology is the most popular topology in network implementation.
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with each other in
hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are the descendants of
the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it forms a parent-child
hierarchy.
5) Mesh topology
o Mesh technology is an arrangement of the network in which computers are interconnected with each
other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a central point of
communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication failures are a critical
concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
o Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers available
in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected to
those computers with which they communicate frequently.
Reliable: The mesh topology networks are very reliable as if any link breakdown will not affect the
communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the communication between other devices.
6) Hybrid Topology