0% found this document useful (0 votes)
12 views

Unit 1 - ICT

Ict

Uploaded by

adeshmuch
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Unit 1 - ICT

Ict

Uploaded by

adeshmuch
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Unit1

Concepts of Information and Communication Technology (ICT)

Lesson 1

Introduction to Computer

1
What is ICT?
ICT means Information and Communication Technology is a broader term for Information
Technology (IT), which refers to all communication technologies, including the internet, wireless
networks, cell phones, computers, software, videoconferencing, social networking and other
media applications and services enabling users to access, retrieve, store, transmit, and manipulate
information in a digital form.

Why is ICT important for teaching and learning?


ICT helps teachers to interact with students. It helps them in preparation their teaching, provide
feedback. It also helps in effective use of ICT software and hardware
for teaching learning process. It helps in improve Teaching skill, helps in innovative Teaching.

Definitions of Computer.
A computer is an electronic device, operating under the control of instructions stored in its own
memory that can accept data (input), process the data according to specified rules, produce
information (output), and store the information for future use.

Functions of Computers
The followings are four basic main functions of Computers.
1. Takes data as an input (Input function).
2. Store’s data/instructions in its memory (Storage Function)
3. Process the data and converts into information (Process function).
4. Generates the output (Output function).

2
Generations of Computers
There are five generations of computers and described in following table.
Generations Periods Technology Examples
First 1940-1956 Vacuum tube ENIAC, UNIVAC, EDVAC,
IBM-701, IBM-650
Second 1956-1963 Transistors CDC 3600, Honeywell 400,
UNIVAC 1108, IBM-7094
And many more
Third 1963-1971 Integrated Circuits (IC’s) IBM-370, PDP-8, ICL 2900,
IBM-360, PDP-11 And more
Fourth 1971-2010 Very Large-Scale Star 1000, PUP-11, IBM-
Integration (VLSI) or 4341, DEC-10
Microprocessor
Fifth 2010-Till date Ultra-Large-Scale Ultrabook, Chromebook,
Integration (ULSI) or Desktop, Laptop, Notebook
Parallel Processor or AI
(Artificial Intelligence)

Types of Computers
There are five basic types of Computers classified by size and power as follows.

Supercomputers
Supercomputers are expensive, fastest, and biggest computer. They are designed to process huge
amount of data. It has thousands of interconnected processors.

Mainframe Computers
Supercomputers are used for defense, aerospace, science, engineering, weather forecasting etc.
Examples: Kingdom of Saudi Arabia has Supercomputers like Shaheen I, Shaheen II, SANAM
and Dammam 7 etc.

Mainframe Computers
Mainframe computer is a big and centralized machine that contains large memory, huge storage
space and multiple high-grade processors. Used primarily by large scale organizations, scientific
research, and census data.

Most eminent suppliers of mainframe computers are IBM, Hitachi, Amdahl, and Unisys.

Minicomputers
Minicomputer is a mid-range computer less than mainframe and more than microcomputer
(Personal computer).

4
It supports multiprocessing and multi-tasking and can be used by small organizations and
individuals.

Workstation Computers
Workstation computer is a high-performance computer, designed for single user advanced
graphics capabilities with large storage and powerful processing.

It is used for engineering applications (CAD/CAM), 3D animation and video editing.

Personal Computers or Microcomputers


Personal computer (PC) is small, affordable, and general-purpose computer that is designed for
individuals use. It has a microprocessor as a central processing unit, memory, storage area, input
unit and output unit.

Types of Personal Computers


Personal Computers are divided into four types that are Desktop, Laptop, Tablet and Smartphone
by size and chassis or case.

Desktop computer – A personal computer that is designed to stay at one location and fits on or
under a desk. It typically has a monitor, keyboard, mouse, and a tower (system unit).

Laptop computer (or notebook) – A portable personal computer that is small enough to rest on
the user’s lap and can be powered by a battery. It includes a flip down screen and a keyboard
with a touchpad.

5
Tablet – A wireless touchscreen PC that is slightly smaller and weighs less than the average
laptop.

Smartphone – A mobile phone that performs many of the functions of a personal computer.

Summary
In this lesson, we learned about concepts of ICT with its importance in teaching and learning. In
addition to that learned about computer with functions, generations and types of computers.

Questions

Choose (True or False) for following statements.

1. The smartphones are also personal computers? (T/F)


2. ICT means Information and Communication Technology? (T/F)
3. The Vacuum tubes were used in First Generation Computers? (T/F)

Choose the correct answer.

6
4. Choose the correct main basic functions of Computer.
a) Input Function b) Store Function c) Process Function d) All
5. Which one is an expensive, fastest, and biggest computer?
a) Supercomputer b) Mainframe Computer
c) Minicomputer d) Microcomputer

7
Unit 1
Lesson 2
Components of Computers (Hardware)

8
Components of Computers
There are two types of components of computer
1) Hardware
2) Software

Hardware
Computer Hardware are the physical components of computer that one can touch and feel which
includes computer Input, Processing (System Unit), Storage, Output and Communication
Devices.

Input Devices
Input devices are used to enter data and commands into a computer system. Computers then use
their CPU to process this data and produce output.

Types of Input Devices


There are two types of Input Devices.
 Manual Input Devices
 Automatic Input Devices

9
Output Devices
After processing of entered data, it is converted into a format which humans can understand that
becomes useful information. After conversion, the output units display this data to users.

10
Central Processing Unit (CPU)
The Central Processing Unit (CPU) is the brain of the computer.

There are three major elements of CPU as below.

 Memory Unit
 Control Unit
 Arithmetic and Logical Unit

Memory Unit
When we enter the data into the computer using an input device, the entered information
immediately gets saved in the memory unit of the Central Processing Unit (CPU).
Similarly, when the output of our command is processed by the computer, it is saved in the
memory unit before giving the output to the user.

Control Unit
Basically, the instructions taken, interpretation of entered data, issuing signals to execute the
data, and then finally retrieving the data is all done in the Control Unit.

11
Arithmetic & Logical Unit (ALU)
As the name suggests, all the mathematical calculations or arithmetic operations (addition,
subtraction, multiplication, division, and other numerical based calculations) that is arithmetical
part and the comparison of data and decision-making actions are performed by logical part in
CPU.
Memory Devices
Memory devices are any type of hardware that is used for storing and retrieving data.
There are two types of storage memories:
 Primary Memory
 Secondary Memory
Primary Memory
Primary Memory is a main memory of the computer. It stores the instructions, operating system
and data which required to run the computer.
There are two types of primary memories.
 RAM (Random Access Memory)
 ROM (Read Only Memory)
RAM (Random Access Memory)
RAM is a read and write memory; it accesses data in a random order that is why it is faster than
secondary memory.
When we are working on a file on your computer, it will temporarily store data in your RAM.
RAM allows you to perform everyday tasks like opening applications, loading webpages, editing
a document, or playing games. It also allows you to jump from one task to another without losing
your progress.
Larger the RAM of your computer, the smoother and quicker it is for you to multitask.
RAM is a volatile memory, meaning it cannot hold onto data once the system turns off (power
off). For example, if you copy a block of text, restart your computer, and then attempt to paste
that block of text into a document, we will find that our computer has forgotten the copied text.
This is because it was only stored temporarily in your RAM.
There are two types of RAM:
– DRAM (Dynamic Random-Access Memory)
– SRAM (Static Random-Access Memory)

12
ROM (Read Only Memory)
It is read only memory; it is designed for reading data. ROM is used for retrieving stored data
that are permanently fixed and cannot be rewritten.
ROM is non-volatile memory, meaning that the data stored on ROM are not lost even when the
power is shut off.

Types of Read Only Memory (ROM)


PROM (Programmable read-only memory)
It can be programmed by the user. Once programmed, the data and instructions in it cannot be
changed.

EPROM (Erasable Programmable read only memory) –


It can be reprogrammed. To erase data from it, expose it to ultraviolet light. To reprogram it,
erase all the previous data.

EEPROM (Electrically erasable programmable read only memory) –


The data can be erased by applying an electric field, with no need for ultraviolet light. We can
erase only portions of the chip.

Secondary Memory or Storage Devices


Secondary storage devices are non-volatile storage devices that are internal or external to the
computer.
Any file we create or download saves to the computer’s secondary storage.

Types of Storage Devices


 Magnetic Storage
 Optical storage
 Solid State Storage
 Cloud Storage

Magnetic Storage
It uses a magnetization process to write, rewrite and access data. It is covered with a magnetic
coating and stores data in the form of tracks, spots, and sectors. Hard Disk Drive (Internal or
External), Magnetic tape and Floppy Disks are common examples of Magnetic Storage.
13
Hard Disk Drives (HDD)
It stores data on a stack of rotating magnetized platters.
There are two types of Hard Disk drives.

Internal Hard Disk


It is fixed Hard Disk used to store operating system, application software, files and documents.

External Hard Disk


It is portable Hard Disk works in a similar way like Internal Hard Disk but are connected to the
computer externally via USB (Universal Serial Bus) port.
Typically, storage capacity for both Hard Disk are 250 GB to 4 TB.

Floppy Disk
Very old method of portable data storage where information is kept on a thin plastic disk. Few
modern computers have floppy disk drives to read Floppy Disk.
Maximum storage on a floppy disk is only about 1.44 MB

Magnetic Tape
This is also oldest form of data storage. It is a thin strip of magnetic coated plastic which is
wrapped onto a reel.

Optical storage
It stores data on an optically readable form. It’s all read and write activities are performed by
light (Usually a laser beam)

14
Optical disc is any storage media that holds content in digital format and is read using a laser
assembly is considered optical media.
The most common types of optical media are.
– Blu-ray (BD)
– Compact Disc (CD)
– Digital Versatile Disc (DVD)

Solid-State Drives (SSD)


SSDs do not rely on magnets and disks, instead they use a type of flash memory. It is with no
moving parts (No reels of tape, no spinning disk, no moving laser beam etc.) are based on
electronic circuits.

15
Solid State Hard Drives (SSD’S)
SSD’S are used in place of magnetic hard disk drives (HDD) in laptops and desktops. It uses
electrical circuit technology that means no moving parts that’s why run silently and less chances
of breaking down.
Memory Stick / Pen Drive / USB Drive
It is small, portable external storage device and connected to the computer via USB (Universal
Serial Bus) port. Storage capacity Pen Drive are 4 GB to 1 TB.
Flash Memory Cards
It is also known as Secure Digital Cards (SD Cards). SD cards are small and rectangular in shape
uses the solid-state technology.
Storage capacity SD Cards are 2 GB to 1 TB.

Micro Flash Memory Cards


Micro Flash Memory Cards are just smaller version of flash memory cards. It is also known as
Micro SD Cards.
Storage capacity Micro SD Cards are 2 GB to 1 TB.

Cloud Storage
Also, many secondary storage devices are now virtual devices residing on third-party cloud
servers hosted by many services such as Dropbox, Google Drive, Amazon Web Services (AWS),
or Microsoft Azure.

Units of Measurements used in Computer


A computer processor is made up of multiple decisive circuits, each one of which may be either
OFF (0) or ON (1). These two states in terms of memory are represented by a 0 or 1 (bits)
A group of eight bits is known as a byte.

 8 bits=1 Byte
 1024 Bytes = 1 KB (Kilobyte)
 1024 KB = 1 MB (Megabyte)
 1024 MB = 1 GB (Gigabyte)
 1024 GB = 1 TB (Terabytes)

Number System

16
Number System is a way to represent the numbers in the computer architecture. There are four
different types of the number system, such as:
Binary number system (base 2 and digits 0 & 1)
Octal number system (base 8 and digits 0 to 7)
Decimal number system (base 10 and digits 0 to 9)
Hexadecimal number system (base 16 and digits 0 to 9 with Alphabets A to F).

Number System Conversion


There are many methods or techniques which can be used to convert numbers from one base to
another. We'll demonstrate here the following −

 Decimal to Other Base System


 Other Base System to Decimal
 Other Base System to Non-Decimal
 Shortcut method − Binary to Octal
 Shortcut method − Octal to Binary
 Shortcut method − Binary to Hexadecimal
 Shortcut method − Hexadecimal to Binary
Decimal to Other Base System
Steps
 Step 1 − Divide the decimal number to be converted by the value of the new base.
 Step 2 − Get the remainder from Step 1 as the rightmost digit (least significant digit) of
new base number.
 Step 3 − Divide the quotient of the previous divide by the new base.
 Step 4 − Record the remainder from Step 3 as the next digit (to the left) of the new base
number.

17
Repeat Steps 3 and 4, getting remainders from right to left, until the quotient becomes zero in
Step 3.
The last remainder thus obtained will be the Most Significant Digit (MSD) of the new base
number.
Example −
Decimal Number: (29)10
Calculating Binary Equivalent −

Step Operation Result Remainder

Step 1 29 / 2 14 1

Step 2 14 / 2 7 0

Step 3 7/2 3 1

Step 4 3/2 1 1

Step 5 1/2 0 1

As mentioned in Steps 2 and 4, the remainders have to be arranged in the reverse order so that
the first remainder becomes the Least Significant Digit (LSD) and the last remainder becomes
the Most Significant Digit (MSD).
Decimal Number – (29)10 = Binary Number – (11101)2.
Other Base System to Decimal System
Steps
 Step 1 − Determine the column (positional) value of each digit (this depends on the
position of the digit and the base of the number system).
 Step 2 − Multiply the obtained column values (in Step 1) by the digits in the
corresponding columns.
 Step 3 − Sum the products calculated in Step 2. The total is the equivalent value in
decimal.
Example
Binary Number – (11101)2
Calculating Decimal Equivalent −

Step Binary Number Decimal Number

Step 1 111012 ((1 × 24) + (1 × 23) + (1 × 22) + (0 × 21) + (1 × 20))10

Step 2 111012 (16 + 8 + 4 + 0 + 1)10

18
Step 3 111012 (29)10

Binary Number – (11101)2 = Decimal Number – (29)10


Other Base System to Non-Decimal System
Steps
 Step 1 − Convert the original number to a decimal number (base 10).
 Step 2 − Convert the decimal number so obtained to the new base number.
Example
Octal Number − 258
Calculating Binary Equivalent −
Step 1 − Convert to Decimal
Step Octal Number Decimal Number

Step 1 (25)8 ((2 × 81) + (5 × 80))10

Step 2 (25)8 (16 + 5 )10

Step 3 (25)8 (21)10

Octal Number − (25)8= Decimal Number − (21)10


Step 2 − Convert Decimal to Binary
Step Operation Result Remainder

Step 1 21 / 2 10 1

Step 2 10 / 2 5 0

Step 3 5/2 2 1

Step 4 2/2 1 0

Step 5 1/2 0 1

Decimal Number − (21)10= Binary Number – (10101)2


Octal Number – (25)8 = Binary Number − (10101)2
Shortcut method - Binary to Octal
Steps
 Step 1 − Divide the binary digits into groups of three (starting from the right).
 Step 2 − Convert each group of three binary digits to one octal digit.

19
Example
Binary Number − (10101)2
Calculating Octal Equivalent −

Step Binary Number Octal Number

Step 1 (10101)2 010 101

Step 2 (10101)2 (22*0+21*1+20*0) (22*1+21*0+20*1)= 28 58

Step 3 (10101)2 (25)8

Binary Number − (10101)2= Octal Number – (25)8


Shortcut method - Octal to Binary
Steps
 Step 1 − Convert each octal digit to a 3 digit binary number (the octal digits may be
treated as decimal for this conversion).
 Step 2 − Combine all the resulting binary groups (of 3 digits each) into a single binary
number.
Example
Octal Number – (25)8
Calculating Binary Equivalent −

Step Octal Number Binary Number

Step 1 (25)8 210 510

Step 2 (25)8 (010)2 (101)2

Step 3 (25)8 (010101)2

Octal Number − (25)8= Binary Number − (010101)2


Shortcut method - Binary to Hexadecimal
Steps
 Step 1 − Divide the binary digits into groups of four (starting from the right).
 Step 2 − Convert each group of four binary digits to one hexadecimal symbol.
Example
Binary Number – (10101)2
Calculating hexadecimal Equivalent −

20
Step Binary Number Hexadecimal Number

Step 1 (10101)2 0001 0101

Step 2 (10101)2 110 510

Step 3 (10101)2 (15)16

Binary Number − (10101)2= Hexadecimal Number − (15)16


Shortcut method - Hexadecimal to Binary
Steps
 Step 1 − Convert each hexadecimal digit to a 4 digit binary number (the hexadecimal
digits may be treated as decimal for this conversion).
 Step 2 − Combine all the resulting binary groups (of 4 digits each) into a single binary
number.
Example
Hexadecimal Number − (15)16
Calculating Binary Equivalent −

Step Hexadecimal Number Binary Number

Step 1 (15)16 110 510

Step 2 (15)16 (0001)2 (0101)2

Step 3 (15)16 (00010101)2

Hexadecimal Number − (15)16= Binary Number − (00010101)2


Arithmetic Operations of Binary Numbers:
In the Binary System, there are only two symbols or possible digit values, i.e., 0 and 1.
Represented by any device that only 2 operating states or possible conditions. Generally, it is
expressed by subscript 2 or binary (B).
Binary arithmetic is essential part of various digital systems. You can add, subtract, multiply,
and divide binary numbers using various methods. These operations are much easier than
decimal number arithmetic operations because binary system has only two digits: 0 and 1.
Binary additions and subtractions are performed as same in decimal additions and subtractions.
When we perform binary additions, there will have two outputs: Sum (S) and Carry (C) . There
are four rules for binary addition. These are given as following below,

Input A Input B Sum (S) Carry (C)


A+B

21
0 0 0 0

0 1 1 0

1 0 1 0

1 1 0 1
There are four rules for binary subtraction. These are given as following below,

Input A Input B Subtract (S) Borrow (B)


A-B

0 0 0 0

0 1 0 1

1 0 1 0

1 1 0 0
Borrow 1 is required from next higher order bit to subtract 1 from 0. So, result became 0.
There are four rules for binary multiplication. These are given as following below,

Input A Input B Multiply (M)


AxB

0 0 0

0 1 0

1 0 0

1 1 1
Whenever at least one input is 0, then multiplication is always 0.
There are four part in any division: Dividend, Divisor, quotient, and remainder. These are given
as following rules for binary division,

Input A Input B Divide (D)


A/B

0 0 Not defined

0 1 0

1 0 Not defined

22
1 1 1
Whenever divisor is 0, then result is always not defined.

Summary
In this lesson, we learned about different types of hardware components like CPU, Input, Output,
Memory, and storage devices. In addition to that units of measurements and number systems
with its operations.

Questions

Choose (True or False) for following statements.

1. Micro Flash Memory Cards are just smaller version of flash memory cards? (T/F)
2. RAM is non-volatile memory (T/F)
3. The Central Processing Unit (CPU) is the brain of the computers? (T/F)

Choose the correct answer.

Q.4 Which of the following used as Input device


A) Printer B) Keyboard C) Mouse D) B and C
Q.5 DVD is an example of …….?
A) Output B) Input C) Storage D) Communication

23
Unit 1
Lesson 3
Components of Computers (Software)

24
Definition of Software
Software is a set of Instructions (Written in computer code) that tells hardware what to do. Most
of hardware’s are useless without software.

Types of Software
Mainly there are three types of software.
 System Software
 Application Software
 Programming Languages

System Software
System software are used to run your computer system smoothly. System software runs things in
the background.

Types of System Software’s


 Operating System (OS)
 Firmware
 Device Drivers
 Utilities

Operating System (OS)


The OS allows the computer to perform basic functions, provides an interface so users can
interact with the computer, and a platform on which applications can run.

Examples of Operating Systems


For desktop computers, laptops, and tablets:

 Microsoft Windows
 MacOS (for Apple devices)
 GNU/Linux

For smartphones:

 Apple’s iOS
 Google’s Android
 Windows Phone OS

Firmware

25
Firmware is software that is stored on a computer’s motherboard or chipset which is semi-
permanent software that tells the device how to behave and how to interact with other devices. It
checks the drive for errors then queries if the operating system is present.

Example: a computer motherboard without firmware would not know how to detect the hard
drive or the video card found inside your computer. If your hard drives did not have firmware
embedded in them, they wouldn't know how fast to spin or when to stop. A wireless network
card would not know how to use a particular radiofrequency for connecting to Wi-Fi.

Device drivers
Driver software communicates with hardware and control devices and peripherals attached to a
computer. It does this by gathering input from the OS (operating system) and giving instructions
to the hardware to perform an action or other designated task.

Every component in a computer, including the video card, sound chip, keyboard, and mouse
have their own drivers.

Utility Software
Utility software is designed to analyses and optimize a device.

These apps are usually bundled with an OS. They track performance and alert the system if
there’s a problem like overheating.

Examples
Anti-malware software, hard drive cleanup, and file compression tools (like WinZip)

Application Software
Application (Apps) software is a software program, designed according to need of users or
organizations or App designed for end-users.

Examples
Microsoft Word, Microsoft Excel, Microsoft PowerPoint, Microsoft Access, Games, Multimedia
software’s etc.

Programming Languages
A programming language is a Computer language used to develop all computer programs
(Computer Software’s).
It is probably no surprise that software is created with other software.

Examples:
C, C++, C#, Java, .Net, Python etc.

Software Distribution
Here are some of the major distribution mechanisms.

26
Commercial:
A lot of software is still commercial. Any program you purchase and get a physical or digital
copy of is commercial software. Keep in mind that you do not own the software; you only own a
license that confers the right to use the software.

Examples
Microsoft Window 10, Microsoft Office 365

Open source:
Often seen as the opposite of commercial, open-source software is usually made available with
all its source code, which allows an entire community of coders to update, modify, and improve
the program. Not all open-source software is free; some is sold at retail prices.

Example
Linux OS, LibreOffice, Python

Freeware:
A lot of software is completely free to download and use. The freeware model allows publishers
to distribute its software more easily because a lot of people will be willing to try something for
free. Some freeware is also referred to as adware because while the application is free, it comes
with embedded advertising.

Examples
Adobe Reader, Skype

Shareware:
Like freeware, shareware is free to use and share with others, but only for a short time. If you
find the application useful, you have the option to pay for it to continue using it.

Examples
WinZip, Kaspersky Antivirus

Summary
In this lesson, we covered the definition of software, with different types of system, application,
programming languages and distribution mechanism of software.

Questions

Choose (True or False) for following statements.

1. The Linux and Window 10 are types of Viruses? (T/F)


2. Most of hardware’s are useless without software (T/F)
3. Open-source software is usually made available with all its source code? (T/F)

Choose the correct answer.

27
4. Which of the following used as Application Software.
a) Microsoft Window b) Linux c) Microsoft Word d) Python
5. Linux OS is an example of?
a) Open-Source b) Freeware
c) Shareware d) Commercial

28
Unit 1
Lesson 4
Communications and Internet Technologies

Communication Network

29
Computer Communications Network in which two or more computers or devices transfer data,
instructions, and information.

The physical connection between networked computing devices is established using either cable
media or wireless media.

The best-known computer network is the Internet.

Types of Networks
There are three basic types of computer networks.

LAN (Local Area Network)


LAN connect computers and peripheral devices in a limited physical area, such as a business
office, laboratory, or college campus, by using either cable media it is kwon as Wired LAN or
connected wireless media like modem or antenna are called Wireless LAN.

MAN (Metropolitan Area Network)


MAN is basically a bigger version of LAN. It uses the similar technology as LAN. It is designed
to extend over the entire city. It can be means to connecting several LANs into a larger network
or it can be a single cable.

WAN (Wide Area Network)


WANs connect computers to larger networks over greater geographic areas, including different
continents. They may link the computers by means of cables, optical fibers, or satellites, but their
users commonly access the networks via a modem (a device that allows computers to
communicate over telephone lines). The largest WAN is the Internet.

A network architecture
A network architecture in which each computer or process on the network is either a client or
a server.

Server and Client


A server is a computer program or device that provides a service to another computer program
and its user, also known as the client.

30
Internet Technologies
The internet is a worldwide system where we can communicate, share files and lots of things
over the internet.

Internet Service Provider (ISP):


The internet service provider is basically the router you pay for, so you can use Wi-Fi at home,
office, and other places. This also includes cellular data like 3G, 4G and 5G.
Internet Protocol (IP) Address:
Each device is given an IP address, a unique address. It is a 32-bit number. When you have a
home computer, you are given an IP as soon as you connect to the internet.

MAC Address:
Media Access Control, it is basically the same as IP address, but it remains unchanged.

Web Browser
Web browser is something like Google Chrome or Mozilla Firefox, a place where you can
browse through the internet.

31
HTML
HTML is the “mother tongue” of your browser.
HTML (Hyper Text Mark-up Language) is the authoring language, used to create web pages and
other information that can be displayed in a web browser.
The websites are developed in HTML and stored on Web Servers. When User types of the URL
of website, browser locates and fetches the website from server on client’s computer and
displays contents.

HTTP
HTTP (Hyper Text Transfer Protocol), the underlying protocol used by the World Wide Web.
HTTP defines how messages are formatted and transmitted, and what actions Web servers and
browsers should take in response to various commands. For example, when you enter a URL in
your browser, this sends an HTTP command to the Web server directing it to fetch and transmit
the requested Web page.

HTTPS
HTTPS (Hypertext Transfer Protocol Secure) (HTTPS) is an extension of the Hypertext Transfer
Protocol (HTTP). It is the safer version of the website; it has a padlock symbol on the top and
you can make sure that the website is not a scam.

Web servers:
Web servers are programs that use HTTP (Hypertext Transfer Protocol) to serve the files that
form Web pages to users, in response to their requests, which are forwarded by their computers’
HTTP clients.

Protocol
The Internet Protocol is known as TCP/IP.

32
A protocol is a set of rules that define how devices communicate. Here are the factors the
protocol affects when you are using the internet.
 How the communication will start
 The transmission speeds.
 The significance of the bits being transmitted.
 How the bits will be delivered (one at a time or in groups of 16 for example)
 Error checking procedures used.

Summary
In this lesson, we covered the definition of communication, with different types of
Communications networks, architecture, internet technologies with protocol.

Questions

Choose (True or False) for following statements.

1. Web servers are programs that use HTTP (T/F)


2. Communications Network is a logical connection between networked devices (T/F)
3. HTTP stands for Hyper Text Transfer Protocol? (T/F)

Choose the correct answer.

4. Which of the following used as larger computer networks.


a) WAN b) MAN c) LAN d) None
5. Google Chrome is an example of?
a) Operating System b) Web browser
c) Hardware d) All

33
Unit 1
Lesson 5
Security and Ethics

34
Definition of Computer Security
Computer security, also called cybersecurity, the protection of computer systems and
information from harm, theft, and unauthorized use.

Login and Password


To successfully access your account (Login), you must provide a valid username and password.
While usernames are generally public information, passwords are private to each user
A password is a string of characters used for authenticating a user on a computer system
Strong password is a combination of uppercase (A,B,C….) and lowercase (a,b,c,….) letters,
symbols (@,$,!....) and numbers(1,2,3…).

Examples:
 Very weak Password - abdullah (Combination of only lowercase or uppercase)
 Weak Password – Abdullah (combinations of uppercase and lowercase)
 Strong Password – Abdullah1(Combination of uppercase, lowercase, and numbers)
 Very Strong Password – Abdullah@1(Combination of uppercase, lowercase, number,
and symbol)

Malware
Malwares are malicious software that corrupts/harms a computer and the files on it.

Types of Malwares

35
Virus
A virus infects computer programs to corrupt, delete or move data or files and can spread to
other computer

Trojan horse
It uses malicious code to install software that seems ok but is hidden to create back doors into a
system. This typically causes loss or theft of data from an external source.

Worm
A worm is a standalone piece of malicious software that replicates itself in order to spread to
other computers. It often uses a computer network to spread itself.

Adware
Adware is software which can automatically cause pop-up and banner adverts to be displayed to
generate revenue for its author or publisher. A lot of freeware uses Adware but not always in a
malicious way. If it were malicious, it would then be classed as spyware or malware.

Phishing:
Phishing is run by a person or a creator that sends out a legitimate looking email. and as soon as
the recipient clicks on the link, they are sent to a fake website. The creator of the email can
access of personal data, and this can lead to fraud or identity theft.

Pharming:
Pharming is a code installed on a user’s hard drive or on the web server; the code will re direct
the user to a fake website without the user knowing. The creator can get access to personal data
and leads to fraud or identity theft.

Wardriving:
The act of locating and using wireless internet connections illegally; it only requires a laptop (or
other portable device), a wireless network card and antenna to pick up wireless signals. This can
potentially lead to the user’s internet time to be stolen, and it is very easy to steals a user’s
password and personal details.

Spyware:
It is a software, monitor your activities and collect sensitive information’s through internet
connection

What are Hacker and Hacking


Hacker: Person who tries to hack/ gain illegal access to a computer or network.

Hacking: stealing personal information and gaining access to money. Some hackers even leak
important info.

36
Types of hackers
Basically, there are two types of Hackers. One tests the security issues; they are hired by an
organization known as white hat hackers another are for illegal hacking known as black hat
hackers.

VPN
VPN (virtual private network) it will allow you to access websites that are blocked in a firewall
because it will block your IP address.

How Can a Computer Be Protected from Viruses?

 Install an anti-virus program and keep it up-to-date and regularly run scans.
 Install an anti-malware program to stop software installing without your knowledge.
 Never download and install software from the Internet unless you are certain it is from a
trusted source.
 Do not open email attachments unless you have scanned them first, even a picture can
carry a virus.
 Do not trust cracked or hacked software as they often contain malware, Trojans.
 Use Firewalls, its sits between your computer and the internet, swatting them away. Your
computer normally comes with a pre-installed firewall.
 Do not click on suspicious links or pop-ups.
 Backup your files.
 Update your operating system.

37
Computer Ethics
Ethics for computers is used to describe the philosophical principles or laws of right and wrong
in relation to the use of computers.

Common unethical activities of Computer and Internet

 Interfering with others computer works


 Using Computer to harm others.
 Using computer to steal.
 Using computer for false witness.
 Using illegal software (Pirated)
 Using others computer without authorization
 Using others intellectual properties (Copyright)
 Designing software or website or program without considering social impact.
 Spreading false statements about others using social media
 Hacking into others computer.

Summary
In this lesson, we identified password, benefits of it and how to create good one, also we learned
about computer security, different types of viruses and how to protect computers from viruses as
well as computer ethics and unethical activities by using computer and internet.

Questions

Choose (True or False) for following statements.

1. To successfully access your account (Login), you must provide a valid username and
password (T/F)
2. Viruses will not harm a computer and the files on it. (T/F)
3. Computer ethics are laws of right and wrong (T/F)

Choose the correct answer.

4. Which of the following is a very strong password.

a) abdullah b) Abdullah c) Abdullah1 d) Abdullah@1

5. Choose Common unethical activity of computer and internet?

a) Interfering with others computer works b) Using illegal software (Pirated)

c) Hacking into others computer d) All

38
Unit 1
Lesson 6
Key Concepts in Data Science

39
Data
Data is raw and unorganized facts such as text, number, images, audio, and video that need to be
processed. Data can be something simple and seemingly random and useless until it is organized.
Example: The student's test score is one piece of data

Information
When data is processed, organized, structured, or presented into a meaningful form, to make it
useful, it is called information.
Example: The average, percentage and total score of a students or class or of the entire school is
an information that can be derived from the given data.

Data Science
Data science is the field of data study that combines domain expertise, programming skills, and
knowledge of mathematics and statistics to extract meaningful information from data.

Applications of Data Science


Following are the important applications of data science

Internet Search:
Google search uses a Data science technology to search a specific result within a fraction of a
second.

Recommendation Systems:
To create a recommendation system. Example, "suggested friends" on Facebook or suggested
videos" on YouTube, everything is done with the help of Data Science.

Image & Speech Recognition:


Speech recognizes system like Siri, Google assistant, Alexa runs on the technique of Data
science. Moreover, Facebook recognizes your friend when you upload a photo with them, with
the help of Data Science.

Gaming world:
EA Sports, Sony, Nintendo, are using Data science technology. This enhances your gaming
experience. Games are now developed using Machine Learning technique. It can update itself
when you move to higher levels.

40
Online Price Comparison:
PriceRunner, Junglee, Shopzilla work on the Data science mechanism. Here, data is fetched from
the relevant websites using APIs.

Data Science Jobs


Most prominent Data Scientist job titles are:

 Data Scientist
 Data Engineer
 Data Analyst
 Statistician
 Data Architect
 Data Admin
 Business Analyst
 Data/Analytics Manager

Tools for Data Science


Data science tools (Statistical or programming languages) are used to carry out data operations
shown in below.

Summary
In this lesson, we identified data, Information and data science with its application, tools, and
jobs.

Questions

Choose (True or False) for following statements.

1. Data is raw and unorganized facts (T/F)


2. Google search uses a Data science technology to search a specific result. (T/F)
3. When data is processed, becomes information(T/F)
41
Choose the correct answer.

4. Which of the following is a Data science tools.

a) Python b) Window c) Word d) PowerPoint

5. ………., are using Data science technology?

a) Nintendo b) Word c) Java d) C++

42

You might also like